Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- I (298) GATTC: Start
- 0x4000d890: ?? ??:0
- D (308) BTDM_INIT: .data initialise [0x3ffae6e0] <== [0x4000d890]
- D (308) BTDM_INIT: .bss initialise [0x3ffb0000] - [0x3ffb09a8]
- D (318) BTDM_INIT: .bss initialise [0x3ffb09a8] - [0x3ffb1ddc]
- D (328) BTDM_INIT: .bss initialise [0x3ffb1ddc] - [0x3ffb2730]
- D (328) BTDM_INIT: .bss initialise [0x3ffb2730] - [0x3ffb8000]
- D (338) BTDM_INIT: .bss initialise [0x3ffb8000] - [0x3ffbbb28]
- D (338) BTDM_INIT: .bss initialise [0x3ffbbb28] - [0x3ffbdb28]
- D (348) BTDM_INIT: .bss initialise [0x3ffbdb28] - [0x3ffc0000]
- I (358) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE
- D (518) phy_init: loading PHY init data from partition at offset 0xf000
- D (518) phy_init: PHY data partition validated
- I (538) phy: phy_version: 362.0, 61e8d92, Sep 8 2017, 18:48:11, 0, 0
- E (538) BT: btm_acl_init
- E (538) BT: L2CA_RegisterFixedChannel() CID: 0x0004, 0x3ffd5b40
- E (538) BT: btm_sec_set_security_level : sec: 0x0
- E (548) BT: BTM_SEC_REG[0]: id 50, is_orig 1, psm 0x001f, proto_id 0, chan_id 0
- E (558) BT: : sec: 0x80, service name [] (up to 21 chars saved)
- E (558) BT: btm_sec_set_security_level : sec: 0x0
- E (568) BT: BTM_SEC_REG[0]: id 50, is_orig 0, psm 0x001f, proto_id 0, chan_id 0
- E (578) BT: : sec: 0x80, service name [] (up to 21 chars saved)
- E (588) BT: SMP_Init
- E (588) BT: SMDBG l2c smp_l2cap_if_init
- E (588) BT: L2CA_RegisterFixedChannel() CID: 0x0006, 0x3ffd5b20
- E (598) BT: btm_ble_init
- E (608) BT: BTA got event 0x100
- E (608) BT: bta_dm_sm_execute event:0x0
- E (608) BT: BTA got event 0x0
- E (608) BT: bta_sys_sm_execute state:0, event:0x0
- E (618) BT: bta_sys_hw_api_enable for 0, active modules 0x0001
- E (628) BT: BTA got event 0x1
- E (628) BT: bta_sys_sm_execute state:1, event:0x1
- E (638) BT: bta_sys_hw_evt_enabled for 0
- E (638) BT: btm_acl_device_down
- E (648) BT: BTM Register For VSEvents is successfully
- E (648) BT: btm_ble_resolving_list_init max_irk_list_sz = 3
- E (658) BT: btm_ble_white_list_init white_list_size = 12
- E (658) BT: #####################################num_lm_ble_bufs = 10
- E (668) BT: BTM_SetPinType: pin type 0 [variable-0, fixed-1], code , length 0
- E (678) BT: btm_decode_ext_features_page page: 0
- E (678) BT: Local supported ACL packet types: 0xcc18
- E (688) BT: Local supported SCO packet types: 0x003d
- E (688) BT: btm_sec_set_security_level : sec: 0x0
- E (698) BT: BTM_SEC_REG[1]: id 42, is_orig 0, psm 0x0003, proto_id 3, chan_id 0
- E (708) BT: : sec: 0x80, service name [RFC_MUX
- ] (up to 21 chars saved)
- E (718) BT: btm_sec_dev_reset sec mode: 4
- E (718) BT: BTM_SetInquiryMode
- E (728) BT: BTM_SetPageScanType
- E (728) BT: BTM_SetInquiryScanType
- E (728) BT: btm_decode_ext_features_page page: 1
- E (738) BT: btm_decode_ext_features_page page: 2
- E (738) BT: bta_sys_hw_btm_cback was called with parameter: 0
- E (748) BT: BTA got event 0x2
- E (758) BT: bta_sys_sm_execute state:1, event:0x2
- E (758) BT: bta_sys_hw_evt_stack_enabled!notify the callers
- E (768) BT: bta_dm_sys_hw_cback with event: 1
- E (768) BT: BTM_BleLoadLocalKeys
- E (778) BT: BTM_BleLoadLocalKeys
- E (778) BT: BTM_SecRegister application registered
- E (788) BT: BTM_SecRegister SMP_Register( btm_proc_smp_cback )
- E (788) BT: SMP_Register state=0
- E (798) BT: BTM_SecRegister application registered
- E (798) BT: BTM_SetDefaultLinkSuperTout
- E (808) BT: BTM: BTM_WritePageTimeout: Timeout: 8192.
- E (808) BT: BTM_SetDefaultLinkPolicy setting:0x000f
- E (818) BT: BTM_SetDefaultLinkPolicy hold not supported (settings: 0x000d)
- E (828) BT: BTM_SetDefaultLinkPolicy park not supported (settings: 0x0005)
- E (828) BT: Set DefaultLinkPolicy:0x0005
- E (838) BT: BTM_RegBusyLevelNotif
- E (848) BT: btm_ble_clear_resolving_list_complete status=0
- E (848) BT: btm_ble_clear_resolving_list_complete resolving_list_avail_size=3
- E (858) BT: BTA got event 0x110
- E (858) BT: bta_dm_sm_execute event:0x10
- E (868) BT: BTM_SecAddBleDevice dev_type=0x2
- E (868) BT: Add a new device
- E (868) BT: allocate a new dev rec idx=0x0
- E (878) BT: BTM_GetHCIConnHandle
- E (878) BT: BTM_GetHCIConnHandle
- E (888) BT: hci_handl=0xffff
- E (888) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
- E (898) BT: BTA got event 0x10f
- E (898) BT: bta_dm_sm_execute event:0xf
- E (898) BT: BTM_SecAddBleKey
- E (908) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x01
- E (908) BT: btm_sec_save_le_key key_type=0x1 pass_to_application=0
- E (918) BT: bd_addr:67-89-c2-b0-71-c6
- E (928) BT: BTM_LE_KEY_PENC key_type=0x1 sec_flags=0x1080 sec_leve=0x1
- E (928) BT: BLE key type 0x01 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- E (938) BT: BTA got event 0x10f
- E (938) BT: bta_dm_sm_execute event:0xf
- E (948) BT: BTM_SecAddBleKey
- E (948) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x02
- E (958) BT: btm_sec_save_le_key key_type=0x2 pass_to_application=0
- E (968) BT: bd_addr:67-89-c2-b0-71-c6
- E (968) BT: BTM_LE_KEY_PID key_type=0x3 save peer IRK
- E (978) BT: btm_consolidate_dev
- E (978) BT: BLE key type 0x02 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- E (988) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 0
- E (998) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 0
- E (998) BT: btm_ble_resolving_list_load_dev:adding device to controller resolving list
- E (1008) BT: btm_ble_suspend_bg_conn
- E (1018) BT: btm_ble_add_resolving_list_entry_complete status = 0
- E (1018) BT: BTA got event 0x10f
- E (1028) BT: bta_dm_sm_execute event:0xf
- E (1028) BT: BTM_SecAddBleKey
- E (1038) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x04
- E (1038) BT: btm_sec_save_le_key key_type=0x4 pass_to_application=0
- E (1048) BT: bd_addr:67-89-c2-b0-71-c6
- E (1048) BT: BTM_LE_KEY_PCSRK key_type=0x7 sec_flags=0x1080 sec_level=0x1 peer_counter=0
- E (1058) BT: BLE key type 0x04 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- E (1068) BT: BTA got event 0x10f
- E (1078) BT: bta_dm_sm_execute event:0xf
- E (1078) BT: BTM_SecAddBleKey
- E (1078) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x10
- E (1088) BT: btm_sec_save_le_key key_type=0x10 pass_to_application=0
- E (1098) BT: bd_addr:67-89-c2-b0-71-c6
- E (1098) BT: BTM_LE_KEY_LENC key_type=0x17 DIV=0x0 key_size=0x10 sec_level=0x1
- E (1108) BT: BLE key type 0x10 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- I (1118) GATTC: REGISTER GAP CALLBACK
- I (1118) GATTC: REGISTER GATTC CALLBACK
- I (1128) GATTC: REGISTER THIS APPLICATION
- E (1128) BT: btc_gattc_call_handler()
- E (1138) BT: BTA got event 0x1f13
- E (1138) BT: bta_gattc_register state 0
- E (1138) BT: bta_gattc_enable
- E (1148) BT: GATT_Register
- E (1148) BT: UUID=[0x0000]
- E (1158) BT: allocated gatt_if=1
- E (1158) BT: GATTC getbuf sucess.
- E (1158) BT: BTA got event 0x1f12
- E (1168) BT: GATT_StartIf gatt_if=1
- E (1168) BT: gatt_find_the_connected_bda start_idx=0
- E (1178) BT: gatt_find_the_connected_bda found=0 found_idx=4
- W (1178) GATTCallback: GATT CALLBACK: 0
- I (1188) GATTCallback: REG_EVT
- E (1188) BT: BTA got event 0x11e
- E (1198) BT: bta_dm_sm_execute event:0x1e
- E (1198) BT: BTM_BleConfigPrivacy
- E (1198) BT: btm_gen_resolvable_private_addr
- E (1208) BT: btm_ble_rand_enc_complete
- E (1208) BT: btm_gen_resolve_paddr_low
- E (1218) BT: smp_encrypt_data
- E (1218) BT: btm_gen_resolve_paddr_cmpl
- E (1228) BT: BTA got event 0x118
- E (1228) BT: bta_dm_sm_execute event:0x18
- E (1238) BT: BTM_BleSetScanFilterParams
- I (1238) GAPCallback: SCAN PARAMETERS SET; INITIATE A SCAN REQUEST
- E (1248) BT: BTA_DmBleScan:start = 1
- E (1248) BT: BTA got event 0x11a
- E (1258) BT: bta_dm_sm_execute event:0x1a
- I (1258) GAPCallback: scan start success
- E (1468) BT: BLE HCI(id=62) event = 0x02)
- E (1468) BT: btu_ble_process_adv_pkt
- E (1468) BT: btm_identity_addr_to_random_pseudo
- E (1478) BT: BTM_CheckAdvData type=0x01
- E (1478) BT: BTM_CheckAdvData type=0x19
- E (1488) BT: BTM_CheckAdvData type=0x03
- E (1488) BT: Random address, treating device as LE only
- E (1498) BT: BTM_CheckAdvData type=0x01
- E (1498) BT: bta_dm_observe_results_cb
- E (1508) BT: BTM_InqDbRead: bd addr [18cb72cff238]
- E (1508) BT: BLE HCI(id=62) event = 0x02)
- E (1518) BT: btu_ble_process_adv_pkt
- E (1518) BT: btm_identity_addr_to_random_pseudo
- E (1528) BT: BTM_CheckAdvData type=0x01
- E (1528) BT: BTM_CheckAdvData type=0x19
- E (1528) BT: BTM_CheckAdvData type=0x03
- E (1538) BT: Random address, treating device as LE only
- E (1538) BT: BTM_CheckAdvData type=0x01
- E (1548) BT: bta_dm_observe_results_cb
- E (1548) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
- E (1558) BT: BLE HCI(id=62) event = 0x02)
- E (1558) BT: btu_ble_process_adv_pkt
- E (1568) BT: btm_identity_addr_to_random_pseudo
- E (1568) BT: btm_ble_update_inq_result scan_rsp=false, to_report=false, scan_type_active=1
- E (1588) BT: BTM_CheckAdvData type=0x01
- E (1588) BT: BTM_CheckAdvData type=0x19
- E (1588) BT: BTM_CheckAdvData type=0x03
- E (1598) BT: BR/EDR NOT support bit not set, treat as DUMO
- E (1598) BT: BLE HCI(id=62) event = 0x02)
- E (1608) BT: btu_ble_process_adv_pkt
- E (1608) BT: btm_identity_addr_to_random_pseudo
- E (1618) BT: BTM_CheckAdvData type=0x01
- E (1618) BT: BTM_CheckAdvData type=0x19
- E (1628) BT: BTM_CheckAdvData type=0x03
- E (1628) BT: BR/EDR NOT support bit not set, treat as DUMO
- E (1638) BT: BTM_CheckAdvData type=0x01
- E (1638) BT: bta_dm_observe_results_cb
- E (1648) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
- E (1648) BT: BLE HCI(id=62) event = 0x02)
- E (1658) BT: btu_ble_process_adv_pkt
- E (1658) BT: btm_identity_addr_to_random_pseudo
- E (1668) BT: BTM_CheckAdvData type=0x01
- E (1668) BT: BTM_CheckAdvData type=0x19
- E (1678) BT: BTM_CheckAdvData type=0x03
- E (1678) BT: Random address, treating device as LE only
- E (1688) BT: BTM_CheckAdvData type=0x01
- E (1688) BT: bta_dm_observe_results_cb
- E (1698) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
- E (1698) BT: BLE HCI(id=62) event = 0x02)
- E (1708) BT: btu_ble_process_adv_pkt
- E (1708) BT: btm_identity_addr_to_random_pseudo
- E (1718) BT: BTM_CheckAdvData type=0x01
- E (1718) BT: BTM_CheckAdvData type=0x19
- E (1728) BT: BTM_CheckAdvData type=0x03
- E (1728) BT: Random address, treating device as LE only
- E (1738) BT: BTM_CheckAdvData type=0x01
- E (1738) BT: bta_dm_observe_results_cb
- E (1738) BT: BTM_InqDbRead: bd addr [18cb72cff238]
- E (1748) BT: BLE HCI(id=62) event = 0x02)
- E (1748) BT: btu_ble_process_adv_pkt
- E (1758) BT: btm_identity_addr_to_random_pseudo
- E (1758) BT: btm_ble_update_inq_result scan_rsp=false, to_report=false, scan_type_active=1
- E (1778) BT: BTM_CheckAdvData type=0x01
- E (1778) BT: BTM_CheckAdvData type=0x19
- E (1778) BT: BTM_CheckAdvData type=0x03
- E (1788) BT: BR/EDR NOT support bit not set, treat as DUMO
- E (1798) BT: BLE HCI(id=62) event = 0x02)
- E (1798) BT: btu_ble_process_adv_pkt
- E (1798) BT: btm_identity_addr_to_random_pseudo
- E (1808) BT: BTM_CheckAdvData type=0x01
- E (1808) BT: BTM_CheckAdvData type=0x19
- E (1818) BT: BTM_CheckAdvData type=0x03
- E (1818) BT: BR/EDR NOT support bit not set, treat as DUMO
- E (1828) BT: BTM_CheckAdvData type=0x01
- E (1828) BT: bta_dm_observe_results_cb
- E (1838) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
- E (1838) BT: BLE HCI(id=62) event = 0x02)
- E (1848) BT: btu_ble_process_adv_pkt
- E (1848) BT: btm_identity_addr_to_random_pseudo
- E (1858) BT: BTM_CheckAdvData type=0x01
- E (1858) BT: BTM_CheckAdvData type=0x19
- E (1868) BT: BTM_CheckAdvData type=0x03
- E (1868) BT: Random address, treating device as LE only
- E (1878) BT: BTM_CheckAdvData type=0x01
- E (1878) BT: bta_dm_observe_results_cb
- E (1888) BT: BTM_InqDbRead: bd addr [18cb72cff238]
- E (1888) BT: BLE HCI(id=62) event = 0x02)
- E (1898) BT: btu_ble_process_adv_pkt
- E (1898) BT: btm_identity_addr_to_random_pseudo
- E (1908) BT: BTM_CheckAdvData type=0x01
- E (1908) BT: BTM_CheckAdvData type=0x19
- E (1918) BT: BTM_CheckAdvData type=0x03
- E (1918) BT: Random address, treating device as LE only
- E (1928) BT: BTM_CheckAdvData type=0x01
- E (1928) BT: bta_dm_observe_results_cb
- E (1938) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
- E (1938) BT: BLE HCI(id=62) event = 0x02)
- E (1948) BT: btu_ble_process_adv_pkt
- E (1948) BT: btm_identity_addr_to_random_pseudo
- E (1958) BT: BTM_CheckAdvData type=0x01
- E (1958) BT: BTM_CheckAdvData type=0x19
- E (1958) BT: BTM_CheckAdvData type=0x03
- E (1968) BT: Random address, treating device as LE only
- E (1968) BT: BTM_CheckAdvData type=0x01
- E (1978) BT: bta_dm_observe_results_cb
- E (1978) BT: BTM_InqDbRead: bd addr [18cb72cff238]
- E (1988) BT: BLE HCI(id=62) event = 0x02)
- E (1988) BT: btu_ble_process_adv_pkt
- E (1998) BT: btm_identity_addr_to_random_pseudo
- E (1998) BT: BTM_CheckAdvData type=0x01
- E (2008) BT: BTM_CheckAdvData type=0x19
- E (2008) BT: BTM_CheckAdvData type=0x03
- E (2018) BT: Random address, treating device as LE only
- E (2018) BT: BTM_CheckAdvData type=0x01
- E (2028) BT: bta_dm_observe_results_cb
- E (2028) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
- E (2038) BT: BTM_CheckAdvData type=0x07
- E (2038) BT: BTM_CheckAdvData type=0x07
- E (2048) BT: BTM_CheckAdvData type=0x07
- I (2048) GAPCallback: OPEN A DIRECT CONNECTION TO DEVICE. application identity: 1 rssi: -69, bda: 3ffd6988
- E (2058) BT: BTM_CheckAdvData type=0x07
- E (2068) BT: BTM_CheckAdvData type=0x07
- E (2068) BT: BTM_CheckAdvData type=0x07
- E (2078) BT: BTM_CheckAdvData type=0x07
- E (2078) BT: BTM_CheckAdvData type=0x07
- E (2078) BT: BTM_CheckAdvData type=0x07
- E (2088) BT: BTM_CheckAdvData type=0x07
- E (2088) BT: BTA_DmBleScan:start = 0
- E (2098) BT: BTA got event 0x11a
- E (2098) BT: bta_dm_sm_execute event:0x1a
- E (2108) BT: bta_dm_observe_cmpl_cb
- E (2108) BT: BTA got event 0x1f00
- E (2108) BT: GATT_Connect gatt_if=1
- E (2118) BT: gatt_get_ch_state: ch_state=0
- E (2118) BT: gatt_set_ch_state: old=0 new=2
- E (2128) BT: L2CA_ConnectFixedChnl() CID: 0x0004 BDA: 6789c2b071c6
- E (2138) BT: l2c_ble_link_adjust_allocation num_hipri: 0 num_lowpri: 1 low_quota: 10 round_robin_quota: 0 qq: 10
- E (2148) BT: l2c_ble_link_adjust_allocation LCB 0 Priority: 0 XmitQuota: 10
- E (2148) BT: SentNotAcked: 0 RRUnacked: 0
- E (2158) BT: l2cu_allocate_ccb: cid 0x0000
- E (2168) BT: l2c_link_adjust_chnl_allocation
- E (2168) BT: CID:0x0040 FCR Mode:0 Priority:2 TxDataRate:1 RxDataRate:1 Quota:200
- E (2178) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
- E (2178) BT: btm_find_dev_type - device_type = 2 addr_type = 0
- E (2188) BT: btm_find_or_alloc_dev
- E (2198) BT: gatt_update_app_use_link_flag is_add=1 chk_link=0
- E (2198) BT: gatt_update_app_hold_link_status found=1[1-found] idx=0 gatt_if=1 is_add=1
- E (2208) BT: gatt_get_ch_state: ch_state=2
- E (2208) BT: GATT_GetConnIdIfConnected status=0
- I (2218) GAPCallback: stop scan successfully
- E (2268) BT: BLE HCI(id=62) event = 0x0a)
- E (2268) BT: status = 0, handle = 0, role = 0, bda_type = 2
- E (2268) BT: btm_identity_addr_to_random_pseudo
- E (2278) BT: btm_ble_connected
- E (2278) BT: Security Manager: btm_ble_connected : handle:0 enc_mode:0 bda:c2b071c6 RName:
- E (2288) BT: btm_ble_connected sec_flags=0x1080
- E (2298) BT: btm_find_or_alloc_dev
- E (2298) BT: l2cble_scanner_conn_comp: HANDLE=0 addr_type=0 conn_interval=12 slave_latency=0 supervision_tout=600
- E (2308) BT: btm_acl_created hci_handle=0 link_role=0 transport=2
- E (2318) BT: btm_bda_to_acl found
- E (2318) BT: device_type=0x3
- E (2328) BT: btm_bda_to_acl found
- E (2328) BT: btm_ble_refresh_peer_resolvable_private_addr: active_addr_type: 1
- E (2338) BT: btm_bda_to_acl found
- E (2338) BT: p_acl->active_remote_addr_type: 1
- E (2348) BT: btm_ble_refresh_peer_resolvable_private_addr conn_addr: 6b:60:66:6c:8e:23
- E (2358) BT: btm_ble_read_resolving_list_entry_complete status = 0
- E (2358) BT: btm_ble_refresh_peer_resolvable_private_addr: active_addr_type: 1
- E (2368) BT: btm_bda_to_acl found
- E (2368) BT: p_acl->active_remote_addr_type: 1
- E (2378) BT: btm_ble_refresh_peer_resolvable_private_addr conn_addr: 6b:60:66:6c:8e:23
- E (2388) BT: l2cu_release_ccb: cid 0x0004 in_use: 1
- E (2388) BT: GATT ATT protocol channel with BDA: 6789c2b071c6 is disconnected
- E (2398) BT: gatt_is_bda_in_the_srv_chg_clt_list :67-89-c2-b0-71-c6
- E (2408) BT: btm_sec_is_a_bonded_dev() is_bonded=1
- E (2408) BT: gatt_add_srv_chg_clt
- E (2418) BT: enqueue a srv chg client
- E (2418) BT: gatt_cleanup_upon_disc
- E (2428) BT: found p_tcb
- E (2428) BT: gatt_set_ch_state: old=2 new=0
- E (2438) BT: gatt_free_pending_ind
- E (2438) BT: gatt_free_pending_enc_queue
- E (2438) BT: gatt_free_pending_prepare_write_queue
- E (2448) BT: found p_reg tcb_idx=0 gatt_if=1 conn_id=0x1
- E (2458) BT: bta_gattc_conn_cback() - cif=1 connected=0 conn_id=1 reason=0x003e
- E (2458) BT: p_conn is NULL in bta_gattc_conn_cback
- E (2468) BT: ATT disconnected
- E (2468) BT: SMDBG l2c smp_connect_callback
- E (2478) BT: btm_acl_removed
- E (2478) BT: btm_bda_to_acl found
- E (2488) BT: btm_acl_report_role_change
- E (2488) BT: acl hci_handle=0 transport=2 connectable_mode=0x0 link_role=0
- E (2498) BT: before update p_dev_rec->sec_flags=0x1080
- E (2498) BT: LE link down
- E (2508) BT: Bonded
- E (2508) BT: after update p_dev_rec->sec_flags=0x1080
- E (2518) BT: btm_acl_resubmit_page
- E (2518) BT: btm_sec_disconnected sec_req:x0 state:IDLE reason:62 bd_addr:00:ec:0a:47:ba:e3 remote_name:
- E (2528) BT: btm_sec_disconnected before update sec_flags=0x1080
- E (2538) BT: btm_sec_disconnected after update sec_flags=0x1080
- E (2548) BT: BTA got event 0x1f11
- W (2548) GATTCallback: GATT CALLBACK: 41
- I (2548) GATTCallback: ESP_GATTC_DISCONNECT_EVT, status = 0
- W (2558) GATTC: Unregister -> esp_ble_gattc_app_unregister: 0
- W (2568) GATTCallback: GATT CALLBACK: 2
- E (2568) GATTCallback: open failed, error status = 85
- E (2578) BT: BTA got event 0x1f14
- E (2578) BT: bta_gattc_deregister Deregister Failedm unknown client cif
- ets Jun 8 2016 00:22:57
- rst:0x1 (POWERON_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
- ets Jun 8 2016 00:22:57
- rst:0x10 (RTCWDT_RTC_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
- configsip: 0, SPIWP:0xee
- clk_drv:0x00,q_drv:0x00,d_drv:0x00,cs0_drv:0x00,hd_drv:0x00,wp_drv:0x00
- mode:DIO, clock div:1
- load:0x3fff0018,len:4
- load:0x3fff001c,len:5568
- ho 0 tail 12 room 4
- 0x40078000: ?? ??:0
- load:0x40078000,len:0
- 0x40078000: ?? ??:0
- load:0x40078000,len:12532
- 0x40078f84: ?? ??:0
- entry 0x40078f84
- I (30) boot: ESP-IDF v3.0-dev-1065-g5d332ba0 2nd stage bootloader
- I (30) boot: compile time 14:47:06
- I (30) boot: Enabling RNG early entropy source...
- I (36) boot: SPI Speed : 80MHz
- I (40) boot: SPI Mode : DIO
- I (44) boot: SPI Flash Size : 4MB
- I (48) boot: Partition Table:
- I (52) boot: ## Label Usage Type ST Offset Length
- I (59) boot: 0 nvs WiFi data 01 02 00009000 00004000
- I (67) boot: 1 otadata OTA data 01 00 0000d000 00002000
- I (74) boot: 2 phy_init RF data 01 01 0000f000 00001000
- I (82) boot: 3 factory OTA app 00 10 00010000 00150000
- I (89) boot: 4 ota_0 OTA app 00 11 00160000 00150000
- I (96) boot: 5 storage Unknown data 01 81 002b0000 00150000
- I (104) boot: End of partition table
- I (108) boot: No factory image, trying OTA 0
- I (113) esp_image: segment 0: paddr=0x00010020 vaddr=0x3f400020 size=0x2c36c (181100) map
- I (147) esp_image: segment 1: paddr=0x0003c394 vaddr=0x3ffc0000 size=0x01f4c ( 8012) load
- 0x40080000: _WindowOverflow4 at /home/fhfs/ESP/BEASTv3/esp-idf/components/freertos/./xtensa_vectors.S:1685
- I (148) esp_image: segment 2: paddr=0x0003e2e8 vaddr=0x40080000 size=0x00400 ( 1024) load
- 0x40080400: ?? ??:0
- I (154) esp_image: segment 3: paddr=0x0003e6f0 vaddr=0x40080400 size=0x01920 ( 6432) load
- 0x400d0018: _flash_cache_start at ??:?
- I (163) esp_image: segment 4: paddr=0x00040018 vaddr=0x400d0018 size=0x6771c (423708) map
- 0x40081d20: _xt_coproc_exc at /home/fhfs/ESP/BEASTv3/esp-idf/components/freertos/./xtensa_vectors.S:981
- I (229) esp_image: segment 5: paddr=0x000a773c vaddr=0x40081d20 size=0x104c0 ( 66752) load
- 0x400c0000: ?? ??:0
- I (240) esp_image: segment 6: paddr=0x000b7c04 vaddr=0x400c0000 size=0x00000 ( 0) load
- I (243) boot: Loaded app from partition at offset 0x10000
- I (244) boot: Disabling RNG early entropy source...
- I (250) cpu_start: Pro cpu up.
- I (253) cpu_start: Single core mode
- I (258) heap_init: Initializing. RAM available for dynamic allocation:
- D (265) heap_init: New heap initialised at 0x3ffaff10
- I (270) heap_init: At 3FFAFF10 len 000000F0 (0 KiB): DRAM
- D (276) heap_init: New heap initialised at 0x3ffc9068
- I (281) heap_init: At 3FFC9068 len 00016F98 (91 KiB): DRAM
- I (287) heap_init: At 3FFE0440 len 00003BC0 (14 KiB): D/IRAM
- I (294) heap_init: At 3FFE4350 len 0001BCB0 (111 KiB): D/IRAM
- 0x400921e0: ?? ??:0
- D (300) heap_init: New heap initialised at 0x400921e0
- I (305) heap_init: At 400921E0 len 0000DE20 (55 KiB): IRAM
- I (311) cpu_start: Pro cpu start user code
- D (323) clk: RTC_SLOW_CLK calibration value: 3348352
- ets Jun 8 2016 00:22:57
- rst:0x1 (POWERON_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
- ets Jun 8 2016 00:22:57
- rst:0x10 (RTCWDT_RTC_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
- configsip: 0, SPIWP:0xee
- clk_drv:0x00,q_drv:0x00,d_drv:0x00,cs0_drv:0x00,hd_drv:0x00,wp_drv:0x00
- mode:DIO, clock div:1
- load:0x3fff0018,len:4
- load:0x3fff001c,len:5568
- ho 0 tail 12 room 4
- 0x40078000: ?? ??:0
- load:0x40078000,len:0
- 0x40078000: ?? ??:0
- load:0x40078000,len:12532
- 0x40078f84: ?? ??:0
- entry 0x40078f84
- I (30) boot: ESP-IDF v3.0-dev-1065-g5d332ba0 2nd stage bootloader
- I (30) boot: compile time 14:47:06
- I (30) boot: Enabling RNG early entropy source...
- I (36) boot: SPI Speed : 80MHz
- I (40) boot: SPI Mode : DIO
- I (44) boot: SPI Flash Size : 4MB
- I (48) boot: Partition Table:
- I (52) boot: ## Label Usage Type ST Offset Length
- I (59) boot: 0 nvs WiFi data 01 02 00009000 00004000
- I (67) boot: 1 otadata OTA data 01 00 0000d000 00002000
- I (74) boot: 2 phy_init RF data 01 01 0000f000 00001000
- I (82) boot: 3 factory OTA app 00 10 00010000 00150000
- I (89) boot: 4 ota_0 OTA app 00 11 00160000 00150000
- I (96) boot: 5 storage Unknown data 01 81 002b0000 00150000
- I (104) boot: End of partition table
- I (108) boot: No factory image, trying OTA 0
- I (113) esp_image: segment 0: paddr=0x00010020 vaddr=0x3f400020 size=0x2c36c (181100) map
- I (147) esp_image: segment 1: paddr=0x0003c394 vaddr=0x3ffc0000 size=0x01f4c ( 8012) load
- 0x40080000: _WindowOverflow4 at /home/fhfs/ESP/BEASTv3/esp-idf/components/freertos/./xtensa_vectors.S:1685
- I (148) esp_image: segment 2: paddr=0x0003e2e8 vaddr=0x40080000 size=0x00400 ( 1024) load
- 0x40080400: ?? ??:0
- I (154) esp_image: segment 3: paddr=0x0003e6f0 vaddr=0x40080400 size=0x01920 ( 6432) load
- 0x400d0018: _flash_cache_start at ??:?
- I (163) esp_image: segment 4: paddr=0x00040018 vaddr=0x400d0018 size=0x6771c (423708) map
- 0x40081d20: _xt_coproc_exc at /home/fhfs/ESP/BEASTv3/esp-idf/components/freertos/./xtensa_vectors.S:981
- I (229) esp_image: segment 5: paddr=0x000a773c vaddr=0x40081d20 size=0x104c0 ( 66752) load
- 0x400c0000: ?? ??:0
- I (240) esp_image: segment 6: paddr=0x000b7c04 vaddr=0x400c0000 size=0x00000 ( 0) load
- I (243) boot: Loaded app from partition at offset 0x10000
- I (244) boot: Disabling RNG early entropy source...
- I (250) cpu_start: Pro cpu up.
- I (253) cpu_start: Single core mode
- I (258) heap_init: Initializing. RAM available for dynamic allocation:
- D (265) heap_init: New heap initialised at 0x3ffaff10
- I (270) heap_init: At 3FFAFF10 len 000000F0 (0 KiB): DRAM
- D (276) heap_init: New heap initialised at 0x3ffc9068
- I (281) heap_init: At 3FFC9068 len 00016F98 (91 KiB): DRAM
- I (287) heap_init: At 3FFE0440 len 00003BC0 (14 KiB): D/IRAM
- I (294) heap_init: At 3FFE4350 len 0001BCB0 (111 KiB): D/IRAM
- 0x400921e0: ?? ??:0
- D (300) heap_init: New heap initialised at 0x400921e0
- I (305) heap_init: At 400921E0 len 0000DE20 (55 KiB): IRAM
- I (311) cpu_start: Pro cpu start user code
- D (323) clk: RTC_SLOW_CLK calibration value: 3339469
- V (34) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
- V (35) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0xC0E
- D (40) intr_alloc: Connected src 57 to int 2 (cpu 0)
- V (45) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
- V (51) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0xE
- D (59) intr_alloc: Connected src 16 to int 3 (cpu 0)
- V (64) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
- V (70) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0x40E
- D (78) intr_alloc: Connected src 24 to int 9 (cpu 0)
- I (83) cpu_start: Starting scheduler on PRO CPU.
- D (88) heap_init: New heap initialised at 0x3ffe0440
- D (88) heap_init: New heap initialised at 0x3ffe4350
- I (98) gpio: GPIO[13]| InputEn: 1| OutputEn: 0| OpenDrain: 0| Pullup: 1| Pulldown: 0| Intr:3
- V (98) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
- V (98) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0xE
- D (98) intr_alloc: Connected src 22 to int 12 (cpu 0)
- D (118) rmt: Rmt Tx Channel 1|Gpio 0|Sclk_Hz 80000000|Div 8|Carrier_Hz 100|Duty 50
- V (128) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
- V (138) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0xE
- D (148) intr_alloc: Connected src 47 to int 13 (cpu 0)
- D (148) rmt: RMT INTR : TX END
- E (158) NVSFlashStorage: ret == 1073525696 && length == 0
- E (158) NVSFlashStorage: 0 deviceID err:4354
- E (158) NVSFlashStorage: ret == 1073525696 && length == 0
- E (168) NVSFlashStorage: 1 advertisement err:4354
- E (178) NVSFlashStorage: ret == 1073525696 && length == 0
- E (178) NVSFlashStorage: 2 filter err:4354
- E (188) NVSFlashStorage: ret == 1073525696 && length == 0
- E (188) NVSFlashStorage: 3 primaryKey err:4354
- E (198) NVSFlashStorage: ret == 1073525696 && length == 0
- E (198) NVSFlashStorage: 4 connectionString err:4354
- E (208) NVSFlashStorage: ret == 1073525696 && length == 0
- E (218) NVSFlashStorage: 5 wifissid err:4354
- E (218) NVSFlashStorage: ret == 1073525696 && length == 0
- E (228) NVSFlashStorage: 6 wifipassword err:4354
- E (228) NVSFlashStorage: ret == 1073525696 && length == 0
- E (238) NVSFlashStorage: 7 ota_url err:4354
- E (238) NVSFlashStorage: ret == 1073525696 && length == 0
- E (248) NVSFlashStorage: 8 ipinfo err:4354
- E (248) BEA*ST: Read DeviceContext Failed
- I (258) BEA*ST: Provision: 1
- D (258) rmt: RMT INTR : TX END
- D (268) wl_flash: init - config ID=1, stored ID=1, access_count=0, block_size=4096, max_count=16, pos=0, move_count=0
- D (278) wl_flash: init starts: crc1=456748127, crc2 = 456748127, this->state.crc=456748127, state_copy->crc=456748127
- D (288) wl_flash: init: crc1=456748127, crc2 = 456748127, result=0
- D (288) wl_flash: recoverPos - this->state.pos=0x0000000e, result=00000000
- D (298) vfs_fat_spiflash: using pdrv=0
- I (298) GATTC: Start
- 0x4000d890: ?? ??:0
- D (308) BTDM_INIT: .data initialise [0x3ffae6e0] <== [0x4000d890]
- D (308) BTDM_INIT: .bss initialise [0x3ffb0000] - [0x3ffb09a8]
- D (318) BTDM_INIT: .bss initialise [0x3ffb09a8] - [0x3ffb1ddc]
- D (328) BTDM_INIT: .bss initialise [0x3ffb1ddc] - [0x3ffb2730]
- D (328) BTDM_INIT: .bss initialise [0x3ffb2730] - [0x3ffb8000]
- D (338) BTDM_INIT: .bss initialise [0x3ffb8000] - [0x3ffbbb28]
- D (338) BTDM_INIT: .bss initialise [0x3ffbbb28] - [0x3ffbdb28]
- D (348) BTDM_INIT: .bss initialise [0x3ffbdb28] - [0x3ffc0000]
- I (358) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE
- D (528) phy_init: loading PHY init data from partition at offset 0xf000
- D (528) phy_init: PHY data partition validated
- I (538) phy: phy_version: 362.0, 61e8d92, Sep 8 2017, 18:48:11, 0, 0
- E (538) BT: btm_acl_init
- E (538) BT: L2CA_RegisterFixedChannel() CID: 0x0004, 0x3ffd5b40
- E (548) BT: btm_sec_set_security_level : sec: 0x0
- E (548) BT: BTM_SEC_REG[0]: id 50, is_orig 1, psm 0x001f, proto_id 0, chan_id 0
- E (558) BT: : sec: 0x80, service name [] (up to 21 chars saved)
- E (568) BT: btm_sec_set_security_level : sec: 0x0
- E (568) BT: BTM_SEC_REG[0]: id 50, is_orig 0, psm 0x001f, proto_id 0, chan_id 0
- E (578) BT: : sec: 0x80, service name [] (up to 21 chars saved)
- E (588) BT: SMP_Init
- E (588) BT: SMDBG l2c smp_l2cap_if_init
- E (598) BT: L2CA_RegisterFixedChannel() CID: 0x0006, 0x3ffd5b20
- E (598) BT: btm_ble_init
- E (608) BT: BTA got event 0x100
- E (608) BT: bta_dm_sm_execute event:0x0
- E (618) BT: BTA got event 0x0
- E (618) BT: bta_sys_sm_execute state:0, event:0x0
- E (628) BT: bta_sys_hw_api_enable for 0, active modules 0x0001
- E (628) BT: BTA got event 0x1
- E (638) BT: bta_sys_sm_execute state:1, event:0x1
- E (638) BT: bta_sys_hw_evt_enabled for 0
- E (648) BT: btm_acl_device_down
- E (658) BT: BTM Register For VSEvents is successfully
- E (658) BT: btm_ble_resolving_list_init max_irk_list_sz = 3
- E (658) BT: btm_ble_white_list_init white_list_size = 12
- E (668) BT: #####################################num_lm_ble_bufs = 10
- E (678) BT: BTM_SetPinType: pin type 0 [variable-0, fixed-1], code , length 0
- E (678) BT: btm_decode_ext_features_page page: 0
- E (688) BT: Local supported ACL packet types: 0xcc18
- E (688) BT: Local supported SCO packet types: 0x003d
- E (698) BT: btm_sec_set_security_level : sec: 0x0
- E (708) BT: BTM_SEC_REG[1]: id 42, is_orig 0, psm 0x0003, proto_id 3, chan_id 0
- E (708) BT: : sec: 0x80, service name [RFC_MUX
- ] (up to 21 chars saved)
- E (718) BT: btm_sec_dev_reset sec mode: 4
- E (728) BT: BTM_SetInquiryMode
- E (728) BT: BTM_SetPageScanType
- E (738) BT: BTM_SetInquiryScanType
- E (738) BT: btm_decode_ext_features_page page: 1
- E (748) BT: btm_decode_ext_features_page page: 2
- E (748) BT: bta_sys_hw_btm_cback was called with parameter: 0
- E (758) BT: BTA got event 0x2
- E (758) BT: bta_sys_sm_execute state:1, event:0x2
- E (768) BT: bta_sys_hw_evt_stack_enabled!notify the callers
- E (768) BT: bta_dm_sys_hw_cback with event: 1
- E (778) BT: BTM_BleLoadLocalKeys
- E (778) BT: BTM_BleLoadLocalKeys
- E (788) BT: BTM_SecRegister application registered
- E (788) BT: BTM_SecRegister SMP_Register( btm_proc_smp_cback )
- E (798) BT: SMP_Register state=0
- E (798) BT: BTM_SecRegister application registered
- E (808) BT: BTM_SetDefaultLinkSuperTout
- E (808) BT: BTM: BTM_WritePageTimeout: Timeout: 8192.
- E (818) BT: BTM_SetDefaultLinkPolicy setting:0x000f
- E (818) BT: BTM_SetDefaultLinkPolicy hold not supported (settings: 0x000d)
- E (828) BT: BTM_SetDefaultLinkPolicy park not supported (settings: 0x0005)
- E (838) BT: Set DefaultLinkPolicy:0x0005
- E (838) BT: BTM_RegBusyLevelNotif
- E (848) BT: btm_ble_clear_resolving_list_complete status=0
- E (848) BT: btm_ble_clear_resolving_list_complete resolving_list_avail_size=3
- E (858) BT: BTA got event 0x110
- E (868) BT: bta_dm_sm_execute event:0x10
- E (868) BT: BTM_SecAddBleDevice dev_type=0x2
- E (878) BT: Add a new device
- E (878) BT: allocate a new dev rec idx=0x0
- E (878) BT: BTM_GetHCIConnHandle
- E (888) BT: BTM_GetHCIConnHandle
- E (888) BT: hci_handl=0xffff
- E (898) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
- E (898) BT: BTA got event 0x10f
- E (908) BT: bta_dm_sm_execute event:0xf
- E (908) BT: BTM_SecAddBleKey
- E (908) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x01
- E (918) BT: btm_sec_save_le_key key_type=0x1 pass_to_application=0
- E (928) BT: bd_addr:67-89-c2-b0-71-c6
- E (928) BT: BTM_LE_KEY_PENC key_type=0x1 sec_flags=0x1080 sec_leve=0x1
- E (938) BT: BLE key type 0x01 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- E (948) BT: BTA got event 0x10f
- E (948) BT: bta_dm_sm_execute event:0xf
- E (958) BT: BTM_SecAddBleKey
- E (958) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x02
- E (958) BT: btm_sec_save_le_key key_type=0x2 pass_to_application=0
- E (968) BT: bd_addr:67-89-c2-b0-71-c6
- E (978) BT: BTM_LE_KEY_PID key_type=0x3 save peer IRK
- E (978) BT: btm_consolidate_dev
- E (988) BT: BLE key type 0x02 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- E (988) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 0
- E (998) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 0
- E (1008) BT: btm_ble_resolving_list_load_dev:adding device to controller resolving list
- E (1018) BT: btm_ble_suspend_bg_conn
- E (1018) BT: btm_ble_add_resolving_list_entry_complete status = 0
- E (1028) BT: BTA got event 0x10f
- E (1028) BT: bta_dm_sm_execute event:0xf
- E (1038) BT: BTM_SecAddBleKey
- E (1038) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x04
- E (1048) BT: btm_sec_save_le_key key_type=0x4 pass_to_application=0
- E (1058) BT: bd_addr:67-89-c2-b0-71-c6
- E (1058) BT: BTM_LE_KEY_PCSRK key_type=0x7 sec_flags=0x1080 sec_level=0x1 peer_counter=0
- E (1068) BT: BLE key type 0x04 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- E (1078) BT: BTA got event 0x10f
- E (1078) BT: bta_dm_sm_execute event:0xf
- E (1088) BT: BTM_SecAddBleKey
- E (1088) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x10
- E (1098) BT: btm_sec_save_le_key key_type=0x10 pass_to_application=0
- E (1098) BT: bd_addr:67-89-c2-b0-71-c6
- E (1108) BT: BTM_LE_KEY_LENC key_type=0x17 DIV=0x0 key_size=0x10 sec_level=0x1
- E (1118) BT: BLE key type 0x10 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- I (1118) GATTC: REGISTER GAP CALLBACK
- I (1128) GATTC: REGISTER GATTC CALLBACK
- I (1128) GATTC: REGISTER THIS APPLICATION
- E (1138) BT: btc_gattc_call_handler()
- E (1138) BT: BTA got event 0x1f13
- E (1148) BT: bta_gattc_register state 0
- E (1148) BT: bta_gattc_enable
- E (1148) BT: GATT_Register
- E (1158) BT: UUID=[0x0000]
- E (1158) BT: allocated gatt_if=1
- E (1158) BT: GATTC getbuf sucess.
- E (1168) BT: BTA got event 0x1f12
- E (1168) BT: GATT_StartIf gatt_if=1
- E (1178) BT: gatt_find_the_connected_bda start_idx=0
- E (1178) BT: gatt_find_the_connected_bda found=0 found_idx=4
- W (1188) GATTCallback: GATT CALLBACK: 0
- I (1188) GATTCallback: REG_EVT
- E (1198) BT: BTA got event 0x11e
- E (1198) BT: bta_dm_sm_execute event:0x1e
- E (1208) BT: BTM_BleConfigPrivacy
- E (1208) BT: btm_gen_resolvable_private_addr
- E (1218) BT: btm_ble_rand_enc_complete
- E (1218) BT: btm_gen_resolve_paddr_low
- E (1218) BT: smp_encrypt_data
- E (1228) BT: btm_gen_resolve_paddr_cmpl
- E (1228) BT: BTA got event 0x118
- E (1238) BT: bta_dm_sm_execute event:0x18
- E (1238) BT: BTM_BleSetScanFilterParams
- I (1248) GAPCallback: SCAN PARAMETERS SET; INITIATE A SCAN REQUEST
- E (1248) BT: BTA_DmBleScan:start = 1
- E (1258) BT: BTA got event 0x11a
- E (1258) BT: bta_dm_sm_execute event:0x1a
- I (1268) GAPCallback: scan start success
- E (1348) BT: BLE HCI(id=62) event = 0x02)
- E (1348) BT: btu_ble_process_adv_pkt
- E (1348) BT: btm_identity_addr_to_random_pseudo
- E (1348) BT: BTM_CheckAdvData type=0x01
- E (1358) BT: BTM_CheckAdvData type=0x19
- E (1358) BT: BTM_CheckAdvData type=0x03
- E (1368) BT: Random address, treating device as LE only
- E (1368) BT: BTM_CheckAdvData type=0x01
- E (1378) BT: bta_dm_observe_results_cb
- E (1378) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
- E (1388) BT: BLE HCI(id=62) event = 0x02)
- E (1388) BT: btu_ble_process_adv_pkt
- E (1398) BT: btm_identity_addr_to_random_pseudo
- E (1398) BT: BTM_CheckAdvData type=0x01
- E (1408) BT: BTM_CheckAdvData type=0x19
- E (1408) BT: BTM_CheckAdvData type=0x03
- E (1408) BT: Random address, treating device as LE only
- E (1418) BT: BTM_CheckAdvData type=0x01
- E (1428) BT: bta_dm_observe_results_cb
- E (1428) BT: BTM_InqDbRead: bd addr [18cb72cff238]
- E (1438) BT: BTM_CheckAdvData type=0x07
- E (1438) BT: BTM_CheckAdvData type=0x07
- E (1448) BT: BLE HCI(id=62) event = 0x02)
- E (1448) BT: btu_ble_process_adv_pkt
- E (1448) BT: btm_identity_addr_to_random_pseudo
- E (1458) BT: BTM_CheckAdvData type=0x01
- E (1458) BT: BTM_CheckAdvData type=0x19
- E (1468) BT: BTM_CheckAdvData type=0x03
- E (1468) BT: Random address, treating device as LE only
- E (1478) BT: BTM_CheckAdvData type=0x01
- E (1478) BT: bta_dm_observe_results_cb
- E (1488) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
- E (1488) BT: BLE HCI(id=62) event = 0x02)
- E (1498) BT: btu_ble_process_adv_pkt
- E (1498) BT: btm_identity_addr_to_random_pseudo
- E (1508) BT: BTM_CheckAdvData type=0x01
- E (1508) BT: BTM_CheckAdvData type=0x19
- E (1518) BT: BTM_CheckAdvData type=0x03
- E (1518) BT: Random address, treating device as LE only
- E (1528) BT: BTM_CheckAdvData type=0x01
- E (1528) BT: bta_dm_observe_results_cb
- E (1538) BT: BTM_InqDbRead: bd addr [18cb72cff238]
- E (1538) BT: BTM_CheckAdvData type=0x07
- E (1548) BT: BTM_CheckAdvData type=0x07
- E (1548) BT: BLE HCI(id=62) event = 0x02)
- E (1548) BT: btu_ble_process_adv_pkt
- E (1558) BT: btm_identity_addr_to_random_pseudo
- E (1558) BT: BTM_CheckAdvData type=0x01
- E (1568) BT: BTM_CheckAdvData type=0x19
- E (1568) BT: BTM_CheckAdvData type=0x03
- E (1578) BT: Random address, treating device as LE only
- E (1578) BT: BTM_CheckAdvData type=0x01
- E (1588) BT: bta_dm_observe_results_cb
- E (1588) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
- E (1598) BT: BTM_CheckAdvData type=0x07
- E (1678) BT: BLE HCI(id=62) event = 0x02)
- E (1678) BT: btu_ble_process_adv_pkt
- E (1678) BT: btm_identity_addr_to_random_pseudo
- E (1688) BT: btm_ble_update_inq_result scan_rsp=false, to_report=false, scan_type_active=1
- E (1698) BT: BTM_CheckAdvData type=0x01
- E (1698) BT: BTM_CheckAdvData type=0x19
- E (1708) BT: BTM_CheckAdvData type=0x03
- E (1708) BT: BR/EDR NOT support bit not set, treat as DUMO
- E (1718) BT: BLE HCI(id=62) event = 0x02)
- E (1718) BT: btu_ble_process_adv_pkt
- E (1728) BT: btm_identity_addr_to_random_pseudo
- E (1728) BT: BTM_CheckAdvData type=0x01
- E (1738) BT: BTM_CheckAdvData type=0x19
- E (1738) BT: BTM_CheckAdvData type=0x03
- E (1738) BT: BR/EDR NOT support bit not set, treat as DUMO
- E (1748) BT: BTM_CheckAdvData type=0x01
- E (1758) BT: bta_dm_observe_results_cb
- E (1758) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
- E (1768) BT: BTM_CheckAdvData type=0x07
- I (1768) GAPCallback: OPEN A DIRECT CONNECTION TO DEVICE. application identity: 1 rssi: -68, bda: 3ffd67dc
- E (1778) BT: BTA_DmBleScan:start = 0
- E (1778) BT: BTA got event 0x11a
- E (1788) BT: bta_dm_sm_execute event:0x1a
- E (1788) BT: bta_dm_observe_cmpl_cb
- E (1798) BT: BLE HCI(id=62) event = 0x02)
- E (1798) BT: btu_ble_process_adv_pkt
- E (1808) BT: BLE HCI(id=62) event = 0x02)
- E (1808) BT: btu_ble_process_adv_pkt
- E (1818) BT: BTA got event 0x1f00
- E (1818) BT: GATT_Connect gatt_if=1
- E (1818) BT: gatt_get_ch_state: ch_state=0
- E (1828) BT: gatt_set_ch_state: old=0 new=2
- E (1828) BT: L2CA_ConnectFixedChnl() CID: 0x0004 BDA: 6789c2b071c6
- E (1838) BT: l2c_ble_link_adjust_allocation num_hipri: 0 num_lowpri: 1 low_quota: 10 round_robin_quota: 0 qq: 10
- E (1848) BT: l2c_ble_link_adjust_allocation LCB 0 Priority: 0 XmitQuota: 10
- E (1858) BT: SentNotAcked: 0 RRUnacked: 0
- E (1868) BT: l2cu_allocate_ccb: cid 0x0000
- E (1868) BT: l2c_link_adjust_chnl_allocation
- E (1878) BT: CID:0x0040 FCR Mode:0 Priority:2 TxDataRate:1 RxDataRate:1 Quota:200
- E (1878) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
- E (1888) BT: btm_find_dev_type - device_type = 2 addr_type = 0
- E (1898) BT: btm_find_or_alloc_dev
- E (1898) BT: gatt_update_app_use_link_flag is_add=1 chk_link=0
- E (1908) BT: gatt_update_app_hold_link_status found=1[1-found] idx=0 gatt_if=1 is_add=1
- E (1918) BT: gatt_get_ch_state: ch_state=2
- E (1918) BT: GATT_GetConnIdIfConnected status=0
- I (1928) GAPCallback: stop scan successfully
- E (2108) BT: BLE HCI(id=62) event = 0x0a)
- E (2108) BT: status = 0, handle = 0, role = 0, bda_type = 2
- E (2108) BT: btm_identity_addr_to_random_pseudo
- E (2108) BT: btm_ble_connected
- E (2118) BT: Security Manager: btm_ble_connected : handle:0 enc_mode:0 bda:c2b071c6 RName:
- E (2128) BT: btm_ble_connected sec_flags=0x1080
- E (2128) BT: btm_find_or_alloc_dev
- E (2138) BT: l2cble_scanner_conn_comp: HANDLE=0 addr_type=0 conn_interval=12 slave_latency=0 supervision_tout=600
- E (2148) BT: btm_acl_created hci_handle=0 link_role=0 transport=2
- E (2148) BT: btm_bda_to_acl found
- E (2158) BT: device_type=0x3
- E (2158) BT: btm_bda_to_acl found
- E (2168) BT: btm_ble_refresh_peer_resolvable_private_addr: active_addr_type: 1
- E (2168) BT: btm_bda_to_acl found
- E (2178) BT: p_acl->active_remote_addr_type: 1
- E (2178) BT: btm_ble_refresh_peer_resolvable_private_addr conn_addr: 6b:60:66:6c:8e:23
- E (2188) BT: btm_ble_read_resolving_list_entry_complete status = 0
- E (2198) BT: btm_ble_refresh_peer_resolvable_private_addr: active_addr_type: 1
- E (2208) BT: btm_bda_to_acl found
- E (2208) BT: p_acl->active_remote_addr_type: 1
- E (2218) BT: btm_ble_refresh_peer_resolvable_private_addr conn_addr: 6b:60:66:6c:8e:23
- E (2218) BT: btm_bda_to_acl found
- E (2228) BT: btm_establish_continue
- E (2228) BT: btm_acl_update_busy_level
- E (2238) BT: BTM_BLI_ACL_UP_EVT
- E (2238) BT: l2cu_process_fixed_chnl_resp
- E (2248) BT: GATT ATT protocol channel with BDA: 6789c2b071c6 is connected
- E (2248) BT: gatt_is_bda_in_the_srv_chg_clt_list :67-89-c2-b0-71-c6
- E (2258) BT: btm_sec_is_a_bonded_dev() is_bonded=1
- E (2268) BT: gatt_add_srv_chg_clt
- E (2268) BT: enqueue a srv chg client
- E (2268) BT: gatt_get_ch_state: ch_state=2
- E (2278) BT: gatt_set_ch_state: old=2 new=4
- E (2278) BT: gatt_num_apps_hold_link num=1
- E (2288) BT: GATT_SetIdleTimeout idle_tout=65535 status=1(1-OK 0-not performed)
- E (2298) BT: SMDBG l2c smp_connect_callback
- E (2298) BT: L2CAP - rcv_cid CID: 0x0004
- E (2308) BT: gatt_get_ch_state: ch_state=4
- E (2308) BT: gatt_process_notification
- E (2318) BT: gatt_get_link_encrypt_status status=0x8e
- E (2318) BT: bta_gattc_cmpl_cback: conn_id = 1 op = 7 status = 142
- E (2328) BT: GATT_GetConnectionInfor conn_id=1
- E (2328) BT: bta_gattc_process_indicate no one interested, ack now
- E (2338) BT: GATTC_SendHandleValueConfirm conn_id=1 handle=0x3
- E (2348) BT: notif_count=1
- E (2348) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (2358) BT: l2c_link_check_send_pkts
- E (2358) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (2368) BT: l2c_link_send_to_lower
- E (2368) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (2378) BT: BLE HCI(id=62) event = 0x07)
- E (2388) BT: l2cble_process_data_length_change_event TX data len = 251
- E (2388) BT: btm_handle_to_acl_index
- E (2398) BT: btm_bda_to_acl found
- E (2398) BT: L2CAP - rcv_cid CID: 0x0006
- E (2408) BT: l2cu_allocate_ccb: cid 0x0000
- E (2408) BT: l2c_link_adjust_chnl_allocation
- E (2418) BT: CID:0x0004 FCR Mode:0 Priority:2 TxDataRate:1 RxDataRate:1 Quota:200
- E (2418) BT: CID:0x0041 FCR Mode:0 Priority:2 TxDataRate:1 RxDataRate:1 Quota:200
- E (2428) BT:
- SMDBG l2c smp_data_received
- E (2438) BT: main smp_sm_event
- E (2438) BT: SMP Role: Master
- State: [SMP_STATE_IDLE (0)], Event: [SECURITY_REQ_EVT (11)]
- E (2448) BT: State change: SMP_STATE_IDLE(0) ==> SMP_STATE_WAIT_APP_RSP(1)
- E (2458) BT: smp_proc_sec_req auth_req=0xd
- E (2458) BT: btm_ble_link_sec_check auth_req =0xd
- E (2468) BT: dev_rec sec_flags=0x1080
- E (2468) BT: cur_sec_level=1 req_sec_level=4 sec_req_act=2
- E (2478) BT: smp_proc_sec_req sec_req_act=0x2
- E (2478) BT: smp_send_app_cback p_cb->cb_evt=2
- E (2488) BT: btm_proc_smp_cback event = 2
- 0x40101090: bta_dm_ble_smp_cback at /home/fhfs/ESP/BEASTv3/esp-idf/components/bt/bluedroid/bta/dm/bta_dm_act.c:4189
- E (2488) BT: btm_cb.api.p_le_callback=0x40101090
- E (2498) BT: callback_rc=0 p_cb->cb_evt=2
- E (2498) BT: smp_send_app_cback return
- E (2508) BT: result state = SMP_STATE_WAIT_APP_RSP
- E (2508) BT: btm_bda_to_acl found
- E (2518) BT: L2CAP - rcv_cid CID: 0x0005
- E (2518) BT: l2c_link_check_send_pkts
- E (2528) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (2528) BT: l2c_link_send_to_lower
- E (2538) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
- I (2548) GAPCallback: ESP_GAP_BLE_SEC_REQ_EVT
- E (2548) BT: BLE HCI(id=62) event = 0x04)
- E (2548) BT: btm_ble_read_remote_features_complete
- E (2558) BT: BTA got event 0x104
- E (2558) BT: bta_dm_sm_execute event:0x4
- E (2568) BT: BTM_ReadRemoteFeatures
- E (2568) BT: bta_dm_acl_change info: 0x0
- E (2578) BT: L2CA_SetDesireRole() new:x1, disallow_switch:0
- E (2578) BT: BTA got event 0x104
- E (2588) BT: bta_dm_sm_execute event:0x4
- E (2588) BT: BTA got event 0x1f0d
- E (2598) BT: bta_gattc_conn server cache state=0
- E (2598) BT: bta_gattc_conn conn_id=1
- E (2608) BT: GATT_GetConnectionInfor conn_id=1
- E (2608) BT: bta_gattc_start_discover conn_id=1 p_clcb->p_srcb->state = 3
- E (2618) BT: L2CA_EnableUpdateBleConnParams - BD_ADDR 6789c2b071c6 enable 0 current upd state 0x0c
- E (2628) BT: GATTC_Discover conn_id=1 disc_type=1
- E (2628) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (2638) BT: l2c_link_check_send_pkts
- E (2648) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (2648) BT: l2c_link_send_to_lower
- E (2658) BT: TotalWin=7,Hndl=0x0,Quota=10,Unack=3,RRQuota=0,RRUnack=0
- W (2658) GATTCallback: GATT CALLBACK: 40
- I (2668) GATTCallback: ESP_GATTC_CONNECT_EVT conn_id 0, if 1, status 0
- E (2678) BT: BTA_DmSetEncryption
- E (2678) BT: l2c_link_check_send_pkts
- E (2678) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (2688) BT: TotalWin=8,LinkUnack(0x0)=2,RRCheck=0,RRUnack=0
- E (2698) BT: l2c_link_check_send_pkts
- E (2698) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (2708) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
- E (2718) BT: BTA got event 0x113
- E (2718) BT: bta_dm_sm_execute event:0x13
- E (2718) BT: BTM_SecurityGrant
- E (2728) BT: SMP_SecurityGrant
- E (2728) BT: main smp_sm_event
- E (2738) BT: SMP Role: Master
- State: [SMP_STATE_WAIT_APP_RSP (1)], Event: [API_SEC_GRANT_EVT (21)]
- E (2748) BT: State change: SMP_STATE_WAIT_APP_RSP(1) ==> SMP_STATE_WAIT_APP_RSP(1)
- E (2748) BT: smp_proc_sec_grant
- E (2758) BT: smp_send_app_cback p_cb->cb_evt=1
- E (2758) BT: io_cap = 4
- E (2768) BT: btm_proc_smp_cback event = 1
- E (2768) BT: btm_ble_io_capabilities_req
- E (2778) BT: io mitm: 13 oob_data:0
- E (2778) BT: btm_ble_io_capabilities_req 1: p_dev_rec->security_required = 0 auth_req:13
- E (2788) BT: btm_ble_io_capabilities_req 2: i_keys=0x3 r_keys=0xf (bit 0-LTK 1-IRK 2-CSRK)
- E (2798) BT: btm_ble_io_capabilities_req 3: auth_req:13
- E (2798) BT: btm_ble_io_capabilities_req 4: i_keys=0x3 r_keys=0xf
- E (2808) BT: btm_ble_io_capabilities_req 5: p_data->io_cap = 3 auth_req:13
- E (2818) BT: btm_ble_io_capabilities_req 6: IO_CAP:3 oob_data:0 auth_req:0x09
- E (2828) BT: callback_rc=0 p_cb->cb_evt=1
- E (2828) BT: rcvd auth_req: 0x09, io_cap: 3 loc_oob_flag: 0 loc_enc_size: 16,local_i_key: 0x03, local_r_key: 0x0f
- E (2838) BT: btm_bda_to_acl found
- E (2848) BT: lmp_version_below LMP version 6 < 8
- E (2848) BT: set auth_req: 0x09, local_i_key: 0x03, local_r_key: 0x07
- E (2858) BT: main smp_sm_event
- E (2858) BT: SMP Role: Master
- State: [SMP_STATE_WAIT_APP_RSP (1)], Event: [API_IO_RSP_EVT (20)]
- E (2868) BT: State change: SMP_STATE_WAIT_APP_RSP(1) ==> SMP_STATE_PAIR_REQ_RSP(3)
- E (2878) BT: smp_send_pair_req
- E (2888) BT: btm_sec_clear_ble_keys() Clearing BLE Keys
- E (2888) BT: btm_ble_resolving_list_remove_dev
- E (2898) BT: btm_ble_suspend_bg_conn
- E (2898) BT: btm_ble_suspend_bg_conn
- E (2908) BT: smp_send_cmd on l2cap cmd_code=0x1
- E (2908) BT: smp_build_pairing_cmd
- E (2918) BT: smp_send_msg_to_L2CAP
- E (2918) BT: L2CA_SendFixedChnlData() CID: 0x0006 BDA: 6789c2b071c6
- E (2928) BT: l2c_link_check_send_pkts
- E (2928) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (2938) BT: l2c_link_send_to_lower
- E (2938) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
- W (2948) GATTCallback: GATT CALLBACK: 2
- I (2948) GATTCallback: ESP_GATTC_OPEN_EVT conn_id: 0 (0) gattc_if: 1 (1)
- E (2958) BT: L2CA_EnableUpdateBleConnParams - BD_ADDR 6789c2b071c6 enable 0 current upd state 0x0c
- E (2968) BT: result state = SMP_STATE_PAIR_REQ_RSP
- E (2978) BT: smp_send_app_cback return
- E (2978) BT: result state = SMP_STATE_PAIR_REQ_RSP
- E (2988) BT: BLE HCI(id=62) event = 0x03)
- E (2988) BT: l2cble_process_conn_update_evt: conn_update_mask=8
- E (2998) BT: BTA got event 0x10b
- E (2998) BT: bta_dm_sm_execute event:0xb
- E (3008) BT: bta_dm_set_encryption
- E (3008) BT: Security Manager: BTM_SetEncryption busy, enqueue request
- E (3018) BT: btm_read_remote_version_complete
- E (3018) BT: btm_bda_to_acl found
- E (3028) BT: l2c_link_check_send_pkts
- E (3028) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3038) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
- E (3048) BT: btm_bda_to_acl found
- E (3048) BT: L2CAP - rcv_cid CID: 0x0004
- E (3058) BT: gatt_get_ch_state: ch_state=4
- I (3058) GAPCallback: update connection params status = 0, min_int = 6, max_int = 6,conn_int = 6,latency = 0, timeout = 2000
- E (3068) BT: bta_gattc_add_srvc_to_list handle=1, service type=0x1801
- E (3078) BT: bta_gattc_add_srvc_to_list handle=20, service type=0x1800
- E (3088) BT: bta_gattc_add_srvc_to_list handle=40, service type=0x00ff
- E (3088) BT: gatt_end_operation status=0 op=1 subtype=1
- E (3098) BT: Start service discovery: srvc_idx = 0
- E (3098) BT: GATTC_Discover conn_id=1 disc_type=3
- E (3108) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (3118) BT: l2c_link_check_send_pkts
- E (3118) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3128) BT: l2c_link_send_to_lower
- E (3128) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
- E (3138) BT: BTA got event 0x1f07
- E (3138) BT: btm_ble_remove_resolving_list_entry_complete status = 0
- E (3148) BT: l2c_link_check_send_pkts
- E (3158) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3158) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
- E (3168) BT: btm_bda_to_acl found
- E (3168) BT: L2CAP - rcv_cid CID: 0x0006
- E (3178) BT:
- SMDBG l2c smp_data_received
- E (3178) BT: main smp_sm_event
- E (3188) BT: SMP Role: Master
- State: [SMP_STATE_PAIR_REQ_RSP (3)], Event: [PAIRING_RSP_EVT (2)]
- E (3198) BT: State change: SMP_STATE_PAIR_REQ_RSP(3) ==> SMP_STATE_PAIR_REQ_RSP(3)
- E (3198) BT: smp_proc_pair_cmd
- E (3208) BT: smp_command_has_invalid_parameters for cmd code 0x02
- E (3218) BT: smp_command_has_valid_fixed_length for cmd code 0x02
- E (3218) BT: smp_pairing_request_response_parameters_are_valid for cmd code 0x02
- E (3228) BT: smp_select_association_model
- E (3238) BT: smp_select_association_model p_cb->peer_io_caps = 4 p_cb->local_io_capability = 3
- E (3238) BT: smp_select_association_model p_cb->peer_oob_flag = 0 p_cb->loc_oob_flag = 0
- E (3248) BT: smp_select_association_model p_cb->peer_auth_req = 0x0d p_cb->loc_auth_req = 0x09
- E (3258) BT: smp_select_association_model p_cb->secure_connections_only_mode_required = FALSE
- E (3268) BT: use_sc_process = 1
- E (3278) BT: smp_select_association_model_secure_connections
- E (3278) BT: smp_decide_association_model Association Model = 4
- E (3288) BT: sec_level=0
- E (3288) BT: main smp_sm_event
- E (3298) BT: SMP Role: Master
- State: [SMP_STATE_PAIR_REQ_RSP (3)], Event: [PUBLIC_KEY_EXCHANGE_REQ_EVT (27)]
- E (3308) BT: State change: SMP_STATE_PAIR_REQ_RSP(3) ==> SMP_STATE_PUBLIC_KEY_EXCH(7)
- E (3318) BT: smp_create_private_key
- E (3318) BT: result state = SMP_STATE_PUBLIC_KEY_EXCH
- E (3328) BT: result state = SMP_STATE_PUBLIC_KEY_EXCH
- E (3328) BT: l2c_link_check_send_pkts
- E (3338) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3338) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (3348) BT: btm_bda_to_acl found
- E (3348) BT: L2CAP - rcv_cid CID: 0x0004
- E (3358) BT: gatt_get_ch_state: ch_state=4
- E (3358) BT: gatt_process_error_rsp
- E (3368) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
- E (3368) BT: Discovery completed
- E (3378) BT: gatt_end_operation status=0 op=1 subtype=3
- E (3378) BT: GATTC_Discover conn_id=1 disc_type=4
- E (3388) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (3398) BT: l2c_link_check_send_pkts
- E (3398) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3408) BT: l2c_link_send_to_lower
- E (3408) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (3418) BT: btm_ble_rand_enc_complete
- E (3418) BT: smp_rand_back state=0x9
- E (3428) BT: smp_continue_private_key_creation state=0x9
- E (3428) BT: l2c_link_check_send_pkts
- E (3438) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3448) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (3448) BT: btm_bda_to_acl found
- E (3458) BT: L2CAP - rcv_cid CID: 0x0004
- E (3458) BT: gatt_get_ch_state: ch_state=4
- E (3468) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (3468) BT: l2c_link_check_send_pkts
- E (3478) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3478) BT: l2c_link_send_to_lower
- E (3488) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (3498) BT: btm_ble_rand_enc_complete
- E (3498) BT: smp_rand_back state=0xa
- E (3498) BT: smp_continue_private_key_creation state=0xa
- E (3508) BT: l2c_link_check_send_pkts
- E (3508) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3518) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (3528) BT: btm_bda_to_acl found
- E (3528) BT: L2CAP - rcv_cid CID: 0x0004
- E (3538) BT: gatt_get_ch_state: ch_state=4
- E (3538) BT: gatt_process_error_rsp
- E (3548) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
- E (3548) BT: Discovery completed
- E (3558) BT: gatt_end_operation status=0 op=1 subtype=4
- E (3558) BT: starting discover characteristics descriptor
- E (3568) BT: GATTC_Discover conn_id=1 disc_type=5
- E (3568) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (3578) BT: l2c_link_check_send_pkts
- E (3588) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3588) BT: l2c_link_send_to_lower
- E (3598) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (3598) BT: btm_ble_rand_enc_complete
- E (3608) BT: smp_rand_back state=0xb
- E (3608) BT: smp_continue_private_key_creation state=0xb
- E (3618) BT: l2c_link_check_send_pkts
- E (3618) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3628) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (3638) BT: btm_bda_to_acl found
- E (3638) BT: L2CAP - rcv_cid CID: 0x0004
- E (3648) BT: gatt_get_ch_state: ch_state=4
- E (3648) BT: gatt_process_error_rsp
- E (3648) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0004
- E (3658) BT: Discovery completed
- E (3658) BT: gatt_end_operation status=0 op=1 subtype=5
- E (3668) BT: Start service discovery: srvc_idx = 1
- E (3678) BT: GATTC_Discover conn_id=1 disc_type=3
- E (3678) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (3688) BT: l2c_link_check_send_pkts
- E (3688) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3698) BT: l2c_link_send_to_lower
- E (3698) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (3708) BT: btm_ble_rand_enc_complete
- E (3718) BT: smp_rand_back state=0xc
- E (3718) BT: smp_continue_private_key_creation state=0xc
- E (3728) BT: smp_process_private_key
- E (3778) BT: main smp_sm_event
- E (3778) BT: SMP Role: Master
- State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [LOCAL_PUBLIC_KEY_CRTD_EVT (28)]
- E (3788) BT: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_PUBLIC_KEY_EXCH(7)
- E (3798) BT: smp_send_pair_public_key
- E (3798) BT: smp_send_cmd on l2cap cmd_code=0xc
- E (3808) BT: smp_build_pair_public_key_cmd
- E (3808) BT: smp_send_msg_to_L2CAP
- E (3818) BT: L2CA_SendFixedChnlData() CID: 0x0006 BDA: 6789c2b071c6
- E (3818) BT: l2c_link_check_send_pkts
- E (3828) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3828) BT: l2c_link_send_to_lower
- E (3838) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
- E (3848) BT: result state = SMP_STATE_PUBLIC_KEY_EXCH
- E (3848) BT: l2c_link_check_send_pkts
- E (3858) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3858) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
- E (3868) BT: btm_bda_to_acl found
- E (3868) BT: L2CAP - rcv_cid CID: 0x0004
- E (3878) BT: gatt_get_ch_state: ch_state=4
- E (3878) BT: gatt_process_error_rsp
- E (3888) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
- E (3888) BT: Discovery completed
- E (3898) BT: gatt_end_operation status=0 op=1 subtype=3
- E (3898) BT: GATTC_Discover conn_id=1 disc_type=4
- E (3908) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (3918) BT: l2c_link_check_send_pkts
- E (3918) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3928) BT: l2c_link_send_to_lower
- E (3928) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
- E (3938) BT: l2c_link_check_send_pkts
- E (3938) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (3948) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
- E (3958) BT: btm_bda_to_acl found
- E (3958) BT: L2CAP - rcv_cid CID: 0x0006
- E (3968) BT:
- SMDBG l2c smp_data_received
- E (3968) BT: main smp_sm_event
- E (3968) BT: SMP Role: Master
- State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [PAIR_PUBLIC_KEY_EVT (12)]
- E (3978) BT: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_PUBLIC_KEY_EXCH(7)
- E (3988) BT: smp_process_pairing_public_key
- E (3998) BT: smp_command_has_invalid_parameters for cmd code 0x0c
- E (3998) BT: smp_command_has_valid_fixed_length for cmd code 0x0c
- E (4008) BT: smp_wait_for_both_public_keys
- E (4018) BT: main smp_sm_event
- E (4018) BT: SMP Role: Master
- State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [BOTH_PUBLIC_KEYS_RCVD_EVT (29)]
- E (4028) BT: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
- E (4038) BT: smp_both_have_public_keys
- E (4038) BT: smp_compute_dhkey
- E (4098) BT: main smp_sm_event
- E (4098) BT: SMP Role: Master
- State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [SEC_CONN_DHKEY_COMPLETE_EVT (30)]
- E (4108) BT: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
- E (4118) BT: smp_start_secure_connection_phase1
- E (4118) BT: p_cb->sec_level =1 (SMP_SEC_UNAUTHENTICATE)
- E (4128) BT: smp_start_nonce_generation
- E (4128) BT: result state = SMP_STATE_SEC_CONN_PHS1_START
- E (4138) BT: result state = SMP_STATE_SEC_CONN_PHS1_START
- E (4138) BT: result state = SMP_STATE_SEC_CONN_PHS1_START
- E (4148) BT: btm_bda_to_acl found
- E (4158) BT: L2CAP - rcv_cid CID: 0x0006
- E (4158) BT:
- SMDBG l2c smp_data_received
- E (4168) BT: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x09
- E (4168) BT: main smp_sm_event
- E (4178) BT: SMP Role: Master
- State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
- E (4188) BT: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
- E (4198) BT: smp_process_pairing_commitment
- E (4198) BT: smp_command_has_invalid_parameters for cmd code 0x0f
- E (4208) BT: smp_command_has_valid_fixed_length for cmd code 0x0f
- E (4218) BT: result state = SMP_STATE_SEC_CONN_PHS1_START
- E (4218) BT: l2c_link_check_send_pkts
- E (4228) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (4228) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (4238) BT: btm_bda_to_acl found
- E (4238) BT: L2CAP - rcv_cid CID: 0x0004
- E (4248) BT: gatt_get_ch_state: ch_state=4
- E (4248) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (4258) BT: l2c_link_check_send_pkts
- E (4268) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (4268) BT: l2c_link_send_to_lower
- E (4278) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (4278) BT: btm_ble_rand_enc_complete
- E (4288) BT: smp_rand_back state=0xd
- E (4288) BT: smp_finish_nonce_generation
- E (4298) BT: l2c_link_check_send_pkts
- E (4298) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (4308) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (4318) BT: btm_bda_to_acl found
- E (4318) BT: L2CAP - rcv_cid CID: 0x0004
- E (4318) BT: gatt_get_ch_state: ch_state=4
- E (4328) BT: gatt_process_error_rsp
- E (4328) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
- E (4338) BT: Discovery completed
- E (4338) BT: gatt_end_operation status=0 op=1 subtype=4
- E (4348) BT: starting discover characteristics descriptor
- E (4358) BT: starting discover characteristics descriptor
- E (4358) BT: starting discover characteristics descriptor
- E (4368) BT: GATTC_Discover conn_id=1 disc_type=5
- E (4368) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (4378) BT: l2c_link_check_send_pkts
- E (4378) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (4388) BT: l2c_link_send_to_lower
- E (4398) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (4398) BT: btm_ble_rand_enc_complete
- E (4408) BT: smp_rand_back state=0xe
- E (4408) BT: smp_process_new_nonce round 0
- E (4418) BT: main smp_sm_event
- E (4418) BT: SMP Role: Master
- State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
- E (4428) BT: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
- E (4438) BT: smp_process_local_nonce
- E (4438) BT: master in assoc mode = 4 already rcvd slave commitment - race condition
- E (4448) BT: smp_send_rand
- E (4458) BT: smp_send_cmd on l2cap cmd_code=0x4
- E (4458) BT: smp_build_rand_cmd
- E (4468) BT: smp_send_msg_to_L2CAP
- E (4468) BT: L2CA_SendFixedChnlData() CID: 0x0006 BDA: 6789c2b071c6
- E (4478) BT: l2c_link_check_send_pkts
- E (4478) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (4488) BT: l2c_link_send_to_lower
- E (4488) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
- E (4498) BT: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
- E (4508) BT: result state = SMP_STATE_WAIT_NONCE
- E (4518) BT: l2c_link_check_send_pkts
- E (4518) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (4528) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
- E (4528) BT: btm_bda_to_acl found
- E (4538) BT: L2CAP - rcv_cid CID: 0x0004
- E (4538) BT: gatt_get_ch_state: ch_state=4
- E (4548) BT: gatt_process_error_rsp
- E (4548) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0004
- E (4558) BT: Discovery completed
- E (4558) BT: gatt_end_operation status=0 op=1 subtype=5
- E (4568) BT: Start service discovery: srvc_idx = 2
- E (4568) BT: GATTC_Discover conn_id=1 disc_type=3
- E (4578) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (4588) BT: l2c_link_check_send_pkts
- E (4588) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (4598) BT: l2c_link_send_to_lower
- E (4598) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
- E (4608) BT: l2c_link_check_send_pkts
- E (4608) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (4618) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
- E (4628) BT: btm_bda_to_acl found
- E (4628) BT: L2CAP - rcv_cid CID: 0x0006
- E (4628) BT:
- SMDBG l2c smp_data_received
- E (4638) BT: main smp_sm_event
- E (4638) BT: SMP Role: Master
- State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
- E (4648) BT: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
- E (4658) BT: smp_proc_rand
- E (4658) BT: smp_command_has_invalid_parameters for cmd code 0x04
- E (4668) BT: smp_command_has_valid_fixed_length for cmd code 0x04
- E (4678) BT: smp_process_peer_nonce start
- E (4678) BT: smp_check_commitment
- E (4688) BT: smp_calculate_peer_commitment
- E (4688) BT: smp_calculate_f4
- E (4698) BT: aes_cipher_msg_auth_code
- E (4698) BT: AES128_CMAC started, allocate buffer size = 80
- E (4708) BT: cmac_generate_subkey
- E (4708) BT: smp_encrypt_data
- E (4708) BT: cmac_subkey_cont
- E (4718) BT: leftshift_onebit
- E (4718) BT: leftshift_onebit
- E (4728) BT: smp_xor_128
- E (4728) BT: cmac_prepare_last_block
- E (4728) BT: flag = 0 round = 5
- E (4738) BT: smp_xor_128
- E (4738) BT: cmac_aes_k_calculate
- E (4738) BT: smp_xor_128
- E (4748) BT: smp_encrypt_data
- E (4748) BT: smp_xor_128
- E (4758) BT: smp_encrypt_data
- E (4758) BT: smp_xor_128
- E (4758) BT: smp_encrypt_data
- E (4768) BT: smp_xor_128
- E (4768) BT: smp_encrypt_data
- E (4768) BT: smp_xor_128
- E (4778) BT: smp_encrypt_data
- E (4778) BT: tlen = 16 p_mac = 0x3ffd5964
- E (4788) BT: p_mac[0] = 0x52 p_mac[1] = 0xef p_mac[2] = 0x5e p_mac[3] = 0x49
- E (4788) BT: p_mac[4] = 0x03 p_mac[5] = 0x25 p_mac[6] = 0xc6 p_mac[7] = 0x1b
- E (4798) BT: peer commitment calculation is completed
- E (4808) BT: Commitment check succeeds
- E (4808) BT: main smp_sm_event
- E (4818) BT: SMP Role: Master
- State: [SMP_STATE_SEC_CONN_PHS2_START (11)], Event: [SEC_CONN_PHASE1_CMPLT_EVT (32)]
- E (4828) BT: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_WAIT_DHK_CHECK(12)
- E (4838) BT: smp_calculate_local_dhkey_check
- E (4838) BT: smp_calculate_f5_mackey_and_long_term_key
- E (4848) BT: smp_collect_local_ble_address
- E (4848) BT: btm_bda_to_acl found
- E (4858) BT: BTM_ReadConnectionAddr address type: 1 addr: 0x78
- E (4858) BT: smp_collect_peer_ble_address
- E (4868) BT: btm_bda_to_acl found
- E (4868) BT: smp_calculate_f5
- E (4878) BT: smp_calculate_f5_key
- E (4878) BT: aes_cipher_msg_auth_code
- E (4878) BT: AES128_CMAC started, allocate buffer size = 32
- E (4888) BT: cmac_generate_subkey
- E (4888) BT: smp_encrypt_data
- E (4898) BT: cmac_subkey_cont
- E (4898) BT: leftshift_onebit
- E (4908) BT: smp_xor_128
- E (4908) BT: leftshift_onebit
- E (4908) BT: cmac_prepare_last_block
- E (4918) BT: flag = 1 round = 2
- E (4918) BT: smp_xor_128
- E (4918) BT: cmac_aes_k_calculate
- E (4928) BT: smp_xor_128
- E (4928) BT: smp_encrypt_data
- E (4938) BT: smp_xor_128
- E (4938) BT: smp_encrypt_data
- E (4938) BT: tlen = 16 p_mac = 0x3ffd58b4
- E (4948) BT: p_mac[0] = 0x53 p_mac[1] = 0xd1 p_mac[2] = 0x42 p_mac[3] = 0xda
- E (4948) BT: p_mac[4] = 0x90 p_mac[5] = 0x8f p_mac[6] = 0x6b p_mac[7] = 0x43
- E (4958) BT: smp_calculate_f5_mackey_or_long_term_key
- E (4968) BT: aes_cipher_msg_auth_code
- E (4968) BT: AES128_CMAC started, allocate buffer size = 64
- E (4978) BT: cmac_generate_subkey
- E (4978) BT: smp_encrypt_data
- E (4988) BT: cmac_subkey_cont
- E (4988) BT: leftshift_onebit
- E (4988) BT: leftshift_onebit
- E (4998) BT: cmac_prepare_last_block
- E (4998) BT: flag = 0 round = 4
- E (5008) BT: smp_xor_128
- E (5008) BT: cmac_aes_k_calculate
- E (5008) BT: smp_xor_128
- E (5018) BT: smp_encrypt_data
- E (5018) BT: smp_xor_128
- E (5018) BT: smp_encrypt_data
- E (5028) BT: smp_xor_128
- E (5028) BT: smp_encrypt_data
- E (5038) BT: smp_xor_128
- E (5038) BT: smp_encrypt_data
- E (5038) BT: tlen = 16 p_mac = 0x3ffd5894
- E (5048) BT: p_mac[0] = 0x24 p_mac[1] = 0xef p_mac[2] = 0x08 p_mac[3] = 0x48
- E (5048) BT: p_mac[4] = 0xd3 p_mac[5] = 0x0f p_mac[6] = 0x25 p_mac[7] = 0x16
- E (5058) BT: smp_calculate_f5_mackey_or_long_term_key
- E (5068) BT: aes_cipher_msg_auth_code
- E (5068) BT: AES128_CMAC started, allocate buffer size = 64
- E (5078) BT: cmac_generate_subkey
- E (5078) BT: smp_encrypt_data
- E (5088) BT: cmac_subkey_cont
- E (5088) BT: leftshift_onebit
- E (5088) BT: leftshift_onebit
- E (5098) BT: cmac_prepare_last_block
- E (5098) BT: flag = 0 round = 4
- E (5108) BT: smp_xor_128
- E (5108) BT: cmac_aes_k_calculate
- E (5108) BT: smp_xor_128
- E (5118) BT: smp_encrypt_data
- E (5118) BT: smp_xor_128
- E (5118) BT: smp_encrypt_data
- E (5128) BT: smp_xor_128
- E (5128) BT: smp_encrypt_data
- E (5138) BT: smp_xor_128
- E (5138) BT: smp_encrypt_data
- E (5138) BT: tlen = 16 p_mac = 0x3ffd5894
- E (5148) BT: p_mac[0] = 0x11 p_mac[1] = 0x61 p_mac[2] = 0x6d p_mac[3] = 0x56
- E (5148) BT: p_mac[4] = 0xb0 p_mac[5] = 0x65 p_mac[6] = 0x10 p_mac[7] = 0xc2
- E (5158) BT: smp_calculate_f5_mackey_and_long_term_key is completed
- E (5168) BT: smp_collect_local_io_capabilities
- E (5168) BT: smp_collect_local_ble_address
- E (5178) BT: btm_bda_to_acl found
- E (5178) BT: BTM_ReadConnectionAddr address type: 1 addr: 0x78
- E (5188) BT: smp_collect_peer_ble_address
- E (5198) BT: btm_bda_to_acl found
- E (5198) BT: smp_calculate_f6
- E (5198) BT: aes_cipher_msg_auth_code
- E (5208) BT: AES128_CMAC started, allocate buffer size = 80
- E (5208) BT: cmac_generate_subkey
- E (5218) BT: smp_encrypt_data
- E (5218) BT: cmac_subkey_cont
- E (5228) BT: leftshift_onebit
- E (5228) BT: leftshift_onebit
- E (5228) BT: cmac_prepare_last_block
- E (5238) BT: flag = 0 round = 5
- E (5238) BT: smp_xor_128
- E (5238) BT: cmac_aes_k_calculate
- E (5248) BT: smp_xor_128
- E (5248) BT: smp_encrypt_data
- E (5258) BT: smp_xor_128
- E (5258) BT: smp_encrypt_data
- E (5258) BT: smp_xor_128
- E (5268) BT: smp_encrypt_data
- E (5268) BT: smp_xor_128
- E (5268) BT: smp_encrypt_data
- E (5278) BT: smp_xor_128
- E (5278) BT: smp_encrypt_data
- E (5278) BT: tlen = 16 p_mac = 0x3ffd5914
- E (5288) BT: p_mac[0] = 0xe9 p_mac[1] = 0x76 p_mac[2] = 0xfe p_mac[3] = 0x83
- E (5298) BT: p_mac[4] = 0xfe p_mac[5] = 0xde p_mac[6] = 0xad p_mac[7] = 0x7b
- E (5298) BT: local DHKey check calculation is completed
- E (5308) BT: smp_send_dhkey_check
- E (5308) BT: smp_send_cmd on l2cap cmd_code=0xd
- E (5318) BT: smp_build_pair_dhkey_check_cmd
- E (5318) BT: smp_send_msg_to_L2CAP
- E (5328) BT: L2CA_SendFixedChnlData() CID: 0x0006 BDA: 6789c2b071c6
- E (5338) BT: l2c_link_check_send_pkts
- E (5338) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (5348) BT: l2c_link_send_to_lower
- E (5348) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
- E (5358) BT: result state = SMP_STATE_WAIT_DHK_CHECK
- E (5358) BT: smp_process_peer_nonce end
- E (5368) BT: result state = SMP_STATE_WAIT_DHK_CHECK
- E (5378) BT: l2c_link_check_send_pkts
- E (5378) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (5388) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
- E (5388) BT: btm_bda_to_acl found
- E (5398) BT: L2CAP - rcv_cid CID: 0x0004
- E (5398) BT: gatt_get_ch_state: ch_state=4
- E (5408) BT: gatt_process_error_rsp
- E (5408) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
- E (5418) BT: Discovery completed
- E (5418) BT: gatt_end_operation status=0 op=1 subtype=3
- E (5428) BT: GATTC_Discover conn_id=1 disc_type=4
- E (5428) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (5438) BT: l2c_link_check_send_pkts
- E (5438) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (5448) BT: l2c_link_send_to_lower
- E (5458) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
- E (5458) BT: l2c_link_check_send_pkts
- E (5468) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (5468) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
- E (5478) BT: btm_bda_to_acl found
- E (5478) BT: L2CAP - rcv_cid CID: 0x0006
- E (5488) BT:
- SMDBG l2c smp_data_received
- E (5488) BT: main smp_sm_event
- E (5498) BT: SMP Role: Master
- State: [SMP_STATE_WAIT_DHK_CHECK (12)], Event: [PAIR_DHKEY_CHECK_EVT (13)]
- E (5508) BT: State change: SMP_STATE_WAIT_DHK_CHECK(12) ==> SMP_STATE_DHK_CHECK(13)
- E (5518) BT: smp_process_dhkey_check
- E (5518) BT: smp_command_has_invalid_parameters for cmd code 0x0d
- E (5528) BT: smp_command_has_valid_fixed_length for cmd code 0x0d
- E (5528) BT: smp_calculate_peer_dhkey_check
- E (5538) BT: smp_collect_peer_io_capabilities
- E (5538) BT: smp_collect_local_ble_address
- E (5548) BT: btm_bda_to_acl found
- E (5548) BT: BTM_ReadConnectionAddr address type: 1 addr: 0x78
- E (5558) BT: smp_collect_peer_ble_address
- E (5568) BT: btm_bda_to_acl found
- E (5568) BT: smp_calculate_f6
- E (5568) BT: aes_cipher_msg_auth_code
- E (5578) BT: AES128_CMAC started, allocate buffer size = 80
- E (5578) BT: cmac_generate_subkey
- E (5588) BT: smp_encrypt_data
- E (5588) BT: cmac_subkey_cont
- E (5598) BT: leftshift_onebit
- E (5598) BT: leftshift_onebit
- E (5598) BT: cmac_prepare_last_block
- E (5608) BT: flag = 0 round = 5
- E (5608) BT: smp_xor_128
- E (5608) BT: cmac_aes_k_calculate
- E (5618) BT: smp_xor_128
- E (5618) BT: smp_encrypt_data
- E (5628) BT: smp_xor_128
- E (5628) BT: smp_encrypt_data
- E (5628) BT: smp_xor_128
- E (5638) BT: smp_encrypt_data
- E (5638) BT: smp_xor_128
- E (5638) BT: smp_encrypt_data
- E (5648) BT: smp_xor_128
- E (5648) BT: smp_encrypt_data
- E (5648) BT: tlen = 16 p_mac = 0x3ffd5974
- E (5658) BT: p_mac[0] = 0xdf p_mac[1] = 0x25 p_mac[2] = 0xdb p_mac[3] = 0xca
- E (5668) BT: p_mac[4] = 0x43 p_mac[5] = 0x8f p_mac[6] = 0xe4 p_mac[7] = 0x5b
- E (5668) BT: peer DHKey check calculation is completed
- E (5678) BT: main smp_sm_event
- E (5678) BT: SMP Role: Master
- State: [SMP_STATE_DHK_CHECK (13)], Event: [SEC_CONN_KEY_READY_EVT (37)]
- E (5688) BT: State change: SMP_STATE_DHK_CHECK(13) ==> SMP_STATE_DHK_CHECK(13)
- E (5698) BT: smp_match_dhkey_checks
- E (5708) BT: dhkey chcks match
- E (5708) BT: main smp_sm_event
- E (5708) BT: SMP Role: Master
- State: [SMP_STATE_DHK_CHECK (13)], Event: [ENC_REQ_EVT (24)]
- E (5718) BT: State change: SMP_STATE_DHK_CHECK(13) ==> SMP_STATE_ENCRYPTION_PENDING(14)
- E (5728) BT: smp_generate_stk
- E (5738) BT: FOR LE SC LTK IS USED INSTEAD OF STK
- E (5738) BT: smp_process_stk
- E (5738) BT: smp_mask_enc_key
- E (5748) BT: main smp_sm_event
- E (5748) BT: SMP Role: Master
- State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [KEY_READY_EVT (16)]
- E (5758) BT: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_ENCRYPTION_PENDING(14)
- E (5768) BT: smp_start_enc
- E (5778) BT: btm_ble_start_encrypt
- E (5778) BT: result state = SMP_STATE_ENCRYPTION_PENDING
- E (5788) BT: result state = SMP_STATE_ENCRYPTION_PENDING
- E (5788) BT: result state = SMP_STATE_ENCRYPTION_PENDING
- E (5798) BT: result state = SMP_STATE_ENCRYPTION_PENDING
- E (5798) BT: l2c_link_check_send_pkts
- E (5808) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (5818) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (5818) BT: btm_bda_to_acl found
- E (5828) BT: L2CAP - rcv_cid CID: 0x0004
- E (5828) BT: gatt_get_ch_state: ch_state=4
- E (5838) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (5838) BT: l2c_link_check_send_pkts
- E (5848) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (5848) BT: l2c_link_send_to_lower
- E (5858) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (5868) BT: btm_acl_encrypt_change handle=0 status=0 encr_enabl=1
- E (5868) BT: btm_handle_to_acl_index
- E (5878) BT: btm_handle_to_acl_index
- E (5878) BT: Security Manager: encrypt_change status:0 State:1, encr_enable = 1
- E (5888) BT: before update p_dev_rec->sec_flags=0x1080
- E (5898) BT: after update p_dev_rec->sec_flags=0x1680
- E (5898) BT: btm_ble_link_encrypted encr_enable=1
- E (5908) BT: smp_link_encrypted encr_enable=1
- E (5908) BT: btm_ble_update_sec_key_size enc_key_size = 16
- E (5918) BT: main smp_sm_event
- E (5918) BT: SMP Role: Master
- State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [ENCRYPTED_EVT (17)]
- E (5928) BT: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_ENCRYPTION_PENDING(14)
- E (5938) BT: smp_check_auth_req rcvs enc_enable=1 i_keys=0x3 r_keys=0x7 (i-initiator r-responder)
- E (5948) BT: smp_check_auth_req rcvs upgrades: i_keys=0x3 r_keys=0x6 (i-initiator r-responder)
- E (5958) BT: main smp_sm_event
- E (5958) BT: SMP Role: Master
- State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [BOND_REQ_EVT (25)]
- E (5968) BT: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_BOND_PENDING(15)
- E (5978) BT:
- smp_key_distribution role=0 (0-master) r_keys=0x6 i_keys=0x3
- E (5988) BT: result state = SMP_STATE_BOND_PENDING
- E (5998) BT: result state = SMP_STATE_BOND_PENDING
- E (5998) BT: p_dev_rec->sec_flags=0x1680
- E (6008) BT: bta_gattc_enc_cmpl_cback: cif = 1
- E (6008) BT: btm_bda_to_acl found
- E (6018) BT: L2CAP - rcv_cid CID: 0x0006
- E (6018) BT:
- SMDBG l2c smp_data_received
- E (6028) BT: main smp_sm_event
- E (6028) BT: SMP Role: Master
- State: [SMP_STATE_BOND_PENDING (15)], Event: [ID_INFO_EVT (8)]
- E (6038) BT: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15)
- E (6048) BT: smp_proc_id_info
- E (6048) BT: smp_key_distribution_by_transport
- E (6058) BT:
- smp_key_distribution role=0 (0-master) r_keys=0x6 i_keys=0x3
- E (6068) BT: result state = SMP_STATE_BOND_PENDING
- E (6068) BT: btm_bda_to_acl found
- E (6068) BT: L2CAP - rcv_cid CID: 0x0006
- E (6078) BT:
- SMDBG l2c smp_data_received
- E (6078) BT: main smp_sm_event
- E (6088) BT: SMP Role: Master
- State: [SMP_STATE_BOND_PENDING (15)], Event: [ID_ADDR_EVT (9)]
- E (6098) BT: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15)
- E (6108) BT: smp_proc_id_addr
- E (6108) BT: smp_update_key_mask before update role=0 recv=1 local_i_key = 03, local_r_key = 06
- E (6118) BT: updated local_i_key = 03, local_r_key = 04
- E (6128) BT: btm_sec_save_le_key key_type=0x2 pass_to_application=1
- E (6128) BT: bd_addr:67-89-c2-b0-71-c6
- E (6138) BT: BTM_LE_KEY_PID key_type=0x2 save peer IRK
- E (6138) BT: btm_consolidate_dev
- E (6148) BT: BLE key type 0x02 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- E (6158) BT: smp_key_distribution_by_transport
- E (6158) BT:
- smp_key_distribution role=0 (0-master) r_keys=0x4 i_keys=0x3
- E (6168) BT: result state = SMP_STATE_BOND_PENDING
- E (6168) BT: btm_bda_to_acl found
- E (6178) BT: L2CAP - rcv_cid CID: 0x0006
- E (6178) BT:
- SMDBG l2c smp_data_received
- I (6188) GAPCallback: key type = ESP_LE_KEY_PID
- E (6188) BT: main smp_sm_event
- E (6198) BT: SMP Role: Master
- State: [SMP_STATE_BOND_PENDING (15)], Event: [SIGN_INFO_EVT (10)]
- E (6208) BT: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15)
- E (6208) BT: smp_proc_srk_info
- E (6218) BT: smp_update_key_mask before update role=0 recv=1 local_i_key = 03, local_r_key = 04
- E (6228) BT: updated local_i_key = 03, local_r_key = 00
- E (6228) BT: btm_sec_save_le_key key_type=0x4 pass_to_application=1
- E (6238) BT: bd_addr:67-89-c2-b0-71-c6
- E (6248) BT: BTM_LE_KEY_PCSRK key_type=0x6 sec_flags=0x1680 sec_level=0x1 peer_counter=0
- E (6248) BT: BLE key type 0x04 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- E (6258) BT: smp_key_distribution_by_transport
- E (6268) BT:
- smp_key_distribution role=0 (0-master) r_keys=0x0 i_keys=0x3
- E (6278) BT: smp_key_pick_key key_to_dist=0x3
- E (6278) BT: key to send = 03, i = 0
- E (6288) BT: smp_distribute_act[0]
- E (6288) BT: smp_generate_ltk
- E (6288) BT: smp_process_secure_connection_long_term_key
- E (6298) BT: smp_save_secure_connections_long_term_key-Save LTK as local LTK key
- E (6308) BT: btm_sec_save_le_key key_type=0x10 pass_to_application=1
- E (6308) BT: bd_addr:67-89-c2-b0-71-c6
- E (6318) BT: BTM_LE_KEY_LENC key_type=0x16 DIV=0x0 key_size=0x10 sec_level=0x1
- E (6328) BT: BLE key type 0x10 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- E (6338) BT: smp_save_secure_connections_long_term_key-Save LTK as peer LTK key
- E (6338) BT: btm_sec_save_le_key key_type=0x1 pass_to_application=1
- E (6348) BT: bd_addr:67-89-c2-b0-71-c6
- E (6348) BT: BTM_LE_KEY_PENC key_type=0x17 sec_flags=0x1680 sec_leve=0x1
- E (6358) BT: BLE key type 0x01 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- E (6368) BT: smp_update_key_mask before update role=0 recv=0 local_i_key = 03, local_r_key = 00
- E (6378) BT: updated local_i_key = 02, local_r_key = 00
- E (6388) BT:
- smp_key_distribution role=0 (0-master) r_keys=0x0 i_keys=0x2
- E (6388) BT: smp_key_pick_key key_to_dist=0x2
- E (6398) BT: key to send = 02, i = 0
- E (6398) BT: key to send = 02, i = 1
- E (6408) BT: smp_distribute_act[1]
- E (6408) BT: smp_send_id_info
- E (6418) BT: smp_update_key_mask before update role=0 recv=0 local_i_key = 02, local_r_key = 00
- E (6428) BT: updated local_i_key = 00, local_r_key = 00
- E (6428) BT: smp_send_cmd on l2cap cmd_code=0x8
- E (6438) BT: smp_build_identity_info_cmd
- E (6438) BT: BTM_GetDeviceIDRoot
- E (6448) BT: smp_send_msg_to_L2CAP
- E (6448) BT: L2CA_SendFixedChnlData() CID: 0x0006 BDA: 6789c2b071c6
- E (6458) BT: l2c_link_check_send_pkts
- E (6458) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (6468) BT: l2c_link_send_to_lower
- E (6468) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
- I (6478) GAPCallback: key type = ESP_LE_KEY_PCSRK
- I (6478) GAPCallback: key type = ESP_LE_KEY_LENC
- I (6488) GAPCallback: key type = ESP_LE_KEY_PENC
- E (6498) BT: smp_send_cmd on l2cap cmd_code=0x9
- E (6498) BT: smp_build_id_addr_cmd
- E (6508) BT: smp_send_msg_to_L2CAP
- E (6508) BT: L2CA_SendFixedChnlData() CID: 0x0006 BDA: 6789c2b071c6
- E (6518) BT: l2c_link_check_send_pkts
- E (6518) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (6528) BT: l2c_link_send_to_lower
- E (6528) BT: TotalWin=7,Hndl=0x0,Quota=10,Unack=3,RRQuota=0,RRUnack=0
- E (6538) BT: btm_sec_save_le_key key_type=0x20 pass_to_application=1
- E (6548) BT: bd_addr:67-89-c2-b0-71-c6
- E (6548) BT: BLE key type 0x20 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
- E (6558) BT: smp_key_distribution_by_transport
- E (6558) BT:
- smp_key_distribution role=0 (0-master) r_keys=0x0 i_keys=0x0
- E (6568) BT: smp_key_pick_key key_to_dist=0x0
- E (6578) BT: key to send = 00, i = 0
- E (6578) BT: key to send = 00, i = 1
- E (6588) BT: key to send = 00, i = 2
- E (6588) BT: key to send = 00, i = 3
- E (6588) BT: main smp_sm_event
- E (6598) BT: SMP Role: Master
- State: [SMP_STATE_BOND_PENDING (15)], Event: [AUTH_CMPL_EVT (23)]
- E (6608) BT: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_IDLE(0)
- E (6618) BT: smp_send_pair_fail status=0 failure=0
- E (6618) BT: smp_proc_pairing_cmpl
- E (6628) BT: send SMP_COMPLT_EVT reason=0x0 sec_level=0x1
- E (6628) BT: smp_reset_control_value
- I (6638) GAPCallback: key type = ESP_LE_KEY_LID
- E (6638) BT: smp_remove_fixed_channel
- E (6648) BT: L2CA_RemoveFixedChnl() CID: 0x0006 BDA: 6789c2b071c6
- E (6648) BT: l2cu_release_ccb: cid 0x0006 in_use: 1
- E (6658) BT: smp_cb_cleanup
- E (6658) BT: btm_proc_smp_cback event = 7
- 0x40101090: bta_dm_ble_smp_cback at /home/fhfs/ESP/BEASTv3/esp-idf/components/bt/bluedroid/bta/dm/bta_dm_act.c:4189
- E (6668) BT: btm_cb.api.p_le_callback=0x40101090
- E (6668) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
- E (6678) BT: btm_find_dev_type - device_type = 2 addr_type = 0
- E (6678) BT: evt=SMP_COMPLT_EVT before update sec_level=0x1 sec_flags=0x1680
- E (6688) BT: after update result=0 sec_level=0x1 sec_flags=0x1680
- E (6698) BT: btm_cb pairing_state=0 pairing_flags=80 pin_code_len=0
- E (6708) BT: btm_cb.pairing_bda 67:89:c2:b0:71:c6
- E (6708) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 2
- E (6718) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 2
- E (6728) BT: btm_ble_suspend_bg_conn
- E (6728) BT: btm_ble_resolving_list_load_dev:adding device to controller resolving list
- E (6738) BT: btm_ble_suspend_bg_conn
- E (6748) BT: btm_bda_to_acl found
- E (6748) BT: Security Manager: BTM_SetEncryption already encrypted
- 0x40137024: btc_set_encryption_callback at /home/fhfs/ESP/BEASTv3/esp-idf/components/bt/bluedroid/btc/profile/std/gap/btc_gap_ble.c:722
- E (6758) BT: bta_dm_encrypt_cback status =0 p_callback=0x40137024
- E (6758) BT: result state = SMP_STATE_IDLE
- E (6768) BT: result state = SMP_STATE_IDLE
- E (6768) BT: l2c_link_check_send_pkts
- E (6778) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (6778) BT: TotalWin=8,LinkUnack(0x0)=2,RRCheck=0,RRUnack=0
- E (6788) BT: btm_bda_to_acl found
- E (6798) BT: L2CAP - rcv_cid CID: 0x0004
- E (6798) BT: gatt_get_ch_state: ch_state=4
- I (6858) GAPCallback: remote BD_ADDR: 6789c2b071c6
- I (6858) GAPCallback: address type = 0
- I (6858) GAPCallback: pair status = success
- E (6868) BT: gatt_process_error_rsp
- E (6868) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
- E (6878) BT: Discovery completed
- E (6878) BT: gatt_end_operation status=0 op=1 subtype=4
- E (6888) BT: starting discover characteristics descriptor
- E (6888) BT: GATTC_Discover conn_id=1 disc_type=5
- E (6898) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (6908) BT: l2c_link_check_send_pkts
- E (6908) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (6918) BT: l2c_link_send_to_lower
- E (6918) BT: TotalWin=7,Hndl=0x0,Quota=10,Unack=3,RRQuota=0,RRUnack=0
- E (6928) BT: BTA got event 0x1f18
- E (6928) BT: l2c_link_check_send_pkts
- E (6938) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (6938) BT: TotalWin=8,LinkUnack(0x0)=2,RRCheck=0,RRUnack=0
- E (6948) BT: l2c_link_check_send_pkts
- E (6948) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (6958) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
- E (6968) BT: btm_bda_to_acl found
- E (6968) BT: L2CAP - rcv_cid CID: 0x0005
- E (6978) BT: l2c_link_check_send_pkts
- E (6978) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (6988) BT: l2c_link_send_to_lower
- E (6988) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
- E (6998) BT: btm_bda_to_acl found
- E (6998) BT: L2CAP - rcv_cid CID: 0x0004
- E (7008) BT: gatt_get_ch_state: ch_state=4
- E (7008) BT: btm_ble_add_resolving_list_entry_complete status = 0
- E (7018) BT: l2c_link_check_send_pkts
- E (7018) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (7028) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
- E (7038) BT: btm_bda_to_acl found
- E (7038) BT: L2CAP - rcv_cid CID: 0x0004
- E (7048) BT: gatt_get_ch_state: ch_state=4
- E (7048) BT: gatt_end_operation status=0 op=1 subtype=5
- E (7058) BT: starting discover characteristics descriptor
- E (7058) BT: GATTC_Discover conn_id=1 disc_type=5
- E (7068) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (7078) BT: l2c_link_check_send_pkts
- E (7078) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (7088) BT: l2c_link_send_to_lower
- E (7088) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
- E (7098) BT: l2c_link_check_send_pkts
- E (7098) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (7108) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
- E (7118) BT: BLE HCI(id=62) event = 0x03)
- E (7118) BT: l2cble_process_conn_update_evt: conn_update_mask=8
- E (7128) BT: l2c_link_check_send_pkts
- E (7128) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (7138) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (7148) BT: btm_bda_to_acl found
- E (7148) BT: L2CAP - rcv_cid CID: 0x0004
- E (7148) BT: gatt_get_ch_state: ch_state=4
- I (7158) GAPCallback: update connection params status = 0, min_int = 12, max_int = 12,conn_int = 12,latency = 0, timeout = 600
- E (7168) BT: gatt_end_operation status=0 op=1 subtype=5
- E (7178) BT: starting discover characteristics descriptor
- E (7178) BT: GATTC_Discover conn_id=1 disc_type=5
- E (7188) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (7198) BT: l2c_link_check_send_pkts
- E (7198) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (7208) BT: l2c_link_send_to_lower
- E (7208) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (7218) BT: l2c_link_check_send_pkts
- E (7218) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (7228) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (7238) BT: btm_bda_to_acl found
- E (7238) BT: L2CAP - rcv_cid CID: 0x0004
- E (7238) BT: gatt_get_ch_state: ch_state=4
- E (7248) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (7258) BT: l2c_link_check_send_pkts
- E (7258) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (7268) BT: l2c_link_send_to_lower
- E (7268) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (7278) BT: l2c_link_check_send_pkts
- E (7278) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (7288) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (7298) BT: btm_bda_to_acl found
- E (7298) BT: L2CAP - rcv_cid CID: 0x0004
- E (7308) BT: gatt_get_ch_state: ch_state=4
- E (7308) BT: gatt_process_error_rsp
- E (7318) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0004
- E (7318) BT: Discovery completed
- E (7328) BT: gatt_end_operation status=0 op=1 subtype=5
- E (7328) BT: Start service discovery: srvc_idx = 3
- E (7338) BT: L2CA_EnableUpdateBleConnParams - BD_ADDR 6789c2b071c6 enable 1 current upd state 0x08
- E (7348) BT: btm_sec_is_a_bonded_dev() is_bonded=1
- E (7638) BT: bta_gattc_disc_cmpl conn_id=1, status = 0
- E (7638) BT: +++++++++++++++++++++++++++++++++++++++++++++++++++++++= 0x3ffcaac4
- E (7638) BT: GATTC_ConfigureMTU conn_id=1 mtu=200
- E (7638) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (7648) BT: l2c_link_check_send_pkts
- E (7658) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (7658) BT: l2c_link_send_to_lower
- E (7668) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (7678) BT: l2c_link_check_send_pkts
- E (7678) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (7688) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (7688) BT: btm_bda_to_acl found
- E (7698) BT: L2CAP - rcv_cid CID: 0x0004
- E (7698) BT: gatt_get_ch_state: ch_state=4
- E (7708) BT: l2cble_set_fixed_channel_tx_data_length TX MTU = 200
- E (7708) BT: l2cble_update_data_length
- E (7718) BT: btm_bda_to_acl found
- E (7718) BT: BTM_SetBleDataLength: tx_pdu_length =204
- E (7728) BT: gatt_end_operation status=0 op=5 subtype=0
- E (7728) BT: bta_gattc_cmpl_cback: conn_id = 1 op = 5 status = 0
- E (7738) BT: BTA got event 0x1f10
- E (7738) BT: bta_gattc_op_cmpl op = 5
- W (7748) GATTCallback: GATT CALLBACK: 18
- I (7748) GATTCallback: ESP_GATTC_CFG_MTU_EVT status 0 mtu 200, conn_id 0
- E (7748) BT: BLE HCI(id=62) event = 0x07)
- E (7768) BT: l2cble_process_data_length_change_event TX data len = 204
- E (7768) BT: btm_handle_to_acl_index
- E (7778) BT: BTA got event 0x1f09
- E (7778) BT: bta_gattc_search conn_id=1
- W (7788) GATTCallback: GATT CALLBACK: 7
- I (7788) GATTCallback: SEARCH_RES_EVT ff, conn_id: 0
- W (7798) GATTCallback: GATT CALLBACK: 6
- I (7798) GATTCallback: SEARCH_CMPL_EVT
- E (17798) BT: BTA got event 0x1f04
- E (17798) BT: GATTC_Read conn_id=1 type=2
- E (17798) BT: btm_ble_link_sec_check auth_req =0x3
- E (17798) BT: dev_rec sec_flags=0x1680
- E (17798) BT: cur_sec_level=4 req_sec_level=1 sec_req_act=1
- E (17808) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (17818) BT: l2c_link_check_send_pkts
- E (17818) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (17828) BT: l2c_link_send_to_lower
- E (17828) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (17838) BT: l2c_link_check_send_pkts
- E (17838) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (17848) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (17858) BT: btm_bda_to_acl found
- E (17858) BT: L2CAP - rcv_cid CID: 0x0004
- E (17868) BT: gatt_get_ch_state: ch_state=4
- E (17868) BT: gatt_process_error_rsp
- E (17878) BT: gatt_end_operation status=1 op=2 subtype=2
- E (17878) BT: bta_gattc_cmpl_cback: conn_id = 1 op = 2 status = 1
- E (17888) BT: BTA got event 0x1f10
- E (17888) BT: bta_gattc_op_cmpl op = 2
- W (17898) GATTCallback: GATT CALLBACK: 3
- E (17898) GATTCallback: read_char called with status 0x1
- E (27908) BT: BTA got event 0x1f04
- E (27908) BT: GATTC_Read conn_id=1 type=2
- E (27908) BT: btm_ble_link_sec_check auth_req =0x3
- E (27908) BT: dev_rec sec_flags=0x1680
- E (27908) BT: cur_sec_level=4 req_sec_level=1 sec_req_act=1
- E (27918) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
- E (27928) BT: l2c_link_check_send_pkts
- E (27928) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (27938) BT: l2c_link_send_to_lower
- E (27938) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
- E (27948) BT: l2c_link_check_send_pkts
- E (27948) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
- E (27958) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
- E (27968) BT: btm_bda_to_acl found
- E (27968) BT: L2CAP - rcv_cid CID: 0x0004
- E (27978) BT: gatt_get_ch_state: ch_state=4
- E (27978) BT: gatt_process_error_rsp
- E (27988) BT: gatt_end_operation status=1 op=2 subtype=2
- E (27988) BT: bta_gattc_cmpl_cback: conn_id = 1 op = 2 status = 1
- E (27998) BT: BTA got event 0x1f10
- E (27998) BT: bta_gattc_op_cmpl op = 2
- W (28008) GATTCallback: GATT CALLBACK: 3
- E (28008) GATTCallback: read_char called with status 0x1
- E (36578) BT: l2cu_release_ccb: cid 0x0004 in_use: 1
- E (36578) BT: GATT ATT protocol channel with BDA: 6789c2b071c6 is disconnected
- E (36588) BT: gatt_is_bda_in_the_srv_chg_clt_list :67-89-c2-b0-71-c6
- E (36588) BT: bda is in the srv chg clt list
- E (36598) BT: btm_sec_is_a_bonded_dev() is_bonded=1
- E (36598) BT: gatt_add_srv_chg_clt
- E (36608) BT: enqueue a srv chg client
- E (36608) BT: gatt_cleanup_upon_disc
- E (36618) BT: found p_tcb
- E (36618) BT: gatt_set_ch_state: old=4 new=0
- E (36628) BT: gatt_free_pending_ind
- E (36628) BT: gatt_free_pending_enc_queue
- E (36628) BT: gatt_free_pending_prepare_write_queue
- E (36638) BT: found p_reg tcb_idx=0 gatt_if=1 conn_id=0x1
- E (36648) BT: bta_gattc_conn_cback() - cif=1 connected=0 conn_id=1 reason=0x0013
- E (36648) BT: ATT disconnected
- E (36658) BT: SMDBG l2c smp_connect_callback
- E (36658) BT: btm_acl_removed
- E (36668) BT: btm_bda_to_acl found
- E (36668) BT: btm_acl_report_role_change
- E (36678) BT: btm_acl_update_busy_level
- E (36678) BT: BTM_BLI_ACL_DOWN_EVT
- E (36688) BT: acl hci_handle=0 transport=2 connectable_mode=0x0 link_role=0
- E (36688) BT: before update p_dev_rec->sec_flags=0x1680
- E (36698) BT: LE link down
- E (36698) BT: Bonded
- E (36708) BT: after update p_dev_rec->sec_flags=0x1280
- E (36708) BT: btm_acl_resubmit_page
- E (36718) BT: btm_sec_disconnected sec_req:x0 state:IDLE reason:19 bd_addr:00:ec:0a:47:ba:e3 remote_name:
- E (36728) BT: btm_sec_disconnected before update sec_flags=0x1280
- E (36728) BT: btm_sec_disconnected after update sec_flags=0x1080
- E (36738) BT: BTA got event 0x1f11
- E (36738) BT: bta_gattc_close conn_id=1
- E (36748) BT: BTA got event 0x104
- E (36748) BT: bta_dm_sm_execute event:0x4
- E (36758) BT: btm_get_acl_disc_reason_code
- E (36758) BT: L2CA_SetDesireRole() new:x1, disallow_switch:0
- E (36768) BT: BTA got event 0x104
- E (36768) BT: bta_dm_sm_execute event:0x4
- W (38018) GATTCallback: GATT CALLBACK: 41
- I (38018) GATTCallback: ESP_GATTC_DISCONNECT_EVT, status = 0
- W (38018) GATTC: Unregister -> esp_ble_gattc_app_unregister: 0
- W (38018) GATTCallback: GATT CALLBACK: 5
- E (38028) BT: BTA got event 0x1f04
- E (38028) BT: Ignore unknown conn ID: 1
- E (38038) BT: BTA got event 0x1f14
- E (38038) BT: bta_gattc_deregister Deregister Failedm unknown client cif
Advertisement
Add Comment
Please, Sign In to add comment