0) версия 2.1.2 1) стер нрф, добавил логи conn, smp [00:00:54.053,985] UartTerminal: Uart frame 7e 10 00 01 16 00 06 50 1d 4f 69 e1 00 50 d9 de |~......P .Oi..P.. ed b5 cb 03 3b 7e |....;~ [00:00:54.153,778] ble: Provisioning mac 00 e1 69 4f 1d 50 |..iO.P [00:00:54.153,808] ble: Provisioning mac cb b5 ed de d9 50 |.....P [00:00:54.153,808] App: Callback result, true [00:00:54.552,001] ble: [DEVICE]: 50:D9:DE:ED:B5:CB (random), AD evt type 0, AD data len 28, RSSI -65 [00:00:54.552,642] ble: [DEVICE]: 50:D9:DE:ED:B5:CB (random), AD evt type 4, AD data len 6, RSSI -64 [00:00:54.660,278] UartTerminal: Uart frame 7e 0d 00 01 17 00 08 cb b5 ed de d9 50 05 01 05 |~....... ....P... f7 cf 7e |..~ [00:00:54.757,995] ble: Process command to 'Start process', mac: 50d9deedb5cb, type: eSurgeGuard [00:00:54.758,056] App: Callback result, true [00:00:54.800,323] ble: Attempt connection [00:00:54.800,689] bt_conn: [00:00:54.800,781] bt_conn: disconnected -> connecting [00:00:54.800,781] bt_conn: handle 0 ref 1 -> 2 [00:00:54.801,025] bt_conn: [00:00:54.801,483] bt_conn: [00:00:54.801,544] bt_conn: handle 0 ref 2 -> 3 [00:00:54.801,635] ble: Create process for mac: 50d9deedb5cb [00:00:54.801,666] bt_conn: handle 0 ref 3 -> 4 [00:00:54.801,757] registry: OnPaired set flag, false [00:00:54.801,788] ble: Process was created [00:00:54.801,788] bt_conn: handle 0 ref 4 -> 5 [00:00:54.802,001] ble: [DEVICE]: 50:D9:DE:ED:B5:CB (random), AD evt type 0, AD data len 28, RSSI -53 [00:00:54.802,062] bt_conn: handle 0 ref 5 -> 6 [00:00:54.802,093] bt_conn: handle 0 ref 6 -> 5 Security level is setted --- 16 messages dropped --- [00:00:55.061,370] bt_conn: handle 0 ref 6 -> 7 [00:00:55.061,401] ble: Connected: 50d9deedb5cb [00:00:55.061,553] bt_conn: conn 0x20002ba8 [00:00:55.061,584] bt_conn: conn 0x20002ba8 buf 0x20012028 len 11 [00:00:55.061,614] bt_conn: conn 0x20002ba8 buf 0x20012028 len 11 flags 0x02 [00:00:55.062,011] bt_conn: handle 0 ref 7 -> 8 [00:00:55.062,042] bt_conn: handle 0 ref 8 -> 7 [00:00:55.062,225] bt_conn: [00:00:55.062,225] bt_conn: Adding conn 0x20002ba8 to poll list [00:00:55.062,530] bt_conn: [00:00:55.062,561] bt_conn: Adding conn 0x20002ba8 to poll list [00:00:55.062,927] bt_conn: [00:00:55.062,957] bt_conn: Adding conn 0x20002ba8 to poll list [00:00:55.063,232] bt_conn: [00:00:55.063,262] bt_conn: Adding conn 0x20002ba8 to poll list [00:00:55.063,323] bt_conn: handle 0 ref 7 -> 6 [00:00:55.063,354] bt_conn: handle 0 ref 6 -> 7 [00:00:55.063,385] bt_conn: conn 0x20002ba8 [00:00:55.063,385] bt_conn: tx 0x200040d8 cb 0x52261 user_data 0x200042e4 [00:00:55.063,446] bt_conn: handle 0 len 6 flags 02 [00:00:55.063,446] bt_conn: First, len 6 final 2 [00:00:55.063,476] bt_conn: Successfully parsed 6 byte L2CAP packet [00:00:55.063,476] bt_smp: Received SMP code 0x0b len 1 [00:00:55.063,507] bt_smp: [00:00:55.063,537] bt_conn: handle 0 ref 7 -> 6 [00:00:55.063,568] bt_conn: conn 0x20002ba8 [00:00:55.063,598] bt_conn: conn 0x20002ba8 [00:00:55.063,659] registry: OnConnected set flag [00:00:55.063,659] bt_conn: handle 0 ref 6 -> 5 [00:00:55.122,070] bt_conn: handle 0 ref 5 -> 6 [00:00:55.122,100] bt_conn: handle 0 ref 6 -> 5 [00:00:55.182,189] bt_conn: handle 0 ref 5 -> 6 [00:00:55.182,220] ble: le_data_len_updated [00:00:55.182,220] bt_conn: handle 0 ref 6 -> 5 [00:00:55.182,281] bt_conn: handle 0 ref 5 -> 6 [00:00:55.182,281] bt_conn: conn 0x20002ba8 [00:00:55.182,312] bt_conn: handle 0 len 7 flags 02 [00:00:55.182,312] bt_conn: First, len 7 final 3 [00:00:55.182,312] bt_conn: Successfully parsed 7 byte L2CAP packet MTU exchange successful Current MTU: 64 [00:00:55.182,403] bt_conn: handle 0 ref 6 -> 5 [00:00:55.242,187] bt_conn: handle 0 ref 5 -> 6 [00:00:55.242,218] bt_conn: handle 0 ref 6 -> 5 [00:00:55.302,124] bt_conn: handle 0 ref 5 -> 6 [00:00:55.302,124] bt_conn: conn 0x20002ba8 [00:00:55.302,154] bt_conn: handle 0 len 11 flags 02 [00:00:55.302,154] bt_conn: First, len 11 final 7 [00:00:55.302,185] bt_conn: Successfully parsed 11 byte L2CAP packet [00:00:55.302,185] bt_smp: Received SMP code 0x02 len 6 [00:00:55.302,215] bt_smp: [00:00:55.302,215] ble: pairing_accept [00:00:55.302,246] bt_conn: conn handle 0 buf len 69 cb (nil) user_data (nil) [00:00:55.302,307] bt_conn: handle 0 ref 6 -> 5 [00:00:55.302,337] bt_conn: conn 0x20002ba8 [00:00:55.302,337] bt_conn: conn 0x20002ba8 buf 0x20012028 len 69 [00:00:55.302,368] bt_conn: conn 0x20002ba8 buf 0x20012028 len 69 flags 0x02 [00:00:55.302,398] bt_conn: [00:00:55.302,429] bt_conn: Adding conn 0x20002ba8 to poll list [00:00:55.422,912] bt_conn: handle 0 ref 5 -> 6 [00:00:55.422,943] bt_conn: handle 0 ref 6 -> 5 [00:00:55.482,543] bt_conn: handle 0 ref 5 -> 6 [00:00:55.482,543] bt_conn: conn 0x20002ba8 [00:00:55.482,574] bt_conn: handle 0 len 68 flags 02 [00:00:55.482,574] bt_conn: First, len 68 final 65 [00:00:55.482,604] bt_conn: handle 0 ref 6 -> 5 [00:00:55.483,032] bt_conn: handle 0 ref 5 -> 6 [00:00:55.483,062] bt_conn: conn 0x20002ba8 [00:00:55.483,062] bt_conn: handle 0 len 1 flags 01 [00:00:55.483,093] bt_conn: Successfully parsed 69 byte L2CAP packet [00:00:55.483,123] bt_smp: Received SMP code 0x0c len 64 [00:00:55.483,123] bt_smp: [00:00:55.483,154] ble: passkey_entry [00:00:55.483,398] bt_conn: [00:00:55.483,428] bt_conn: Adding conn 0x20002ba8 to poll list [00:00:55.483,459] bt_conn: handle 0 ref 6 -> 5 [00:00:55.509,674] bt_smp: 0x20012226 [00:01:07.893,341] UartTerminal: Uart frame 7e 0e 00 01 18 00 0c 50 d9 de ed b5 cb 9e dc 01 |~......P ........ 00 41 c3 7e |.A.~ [00:01:07.976,562] ble: Set passkey: 122014, mac: 50d9deedb5cb [00:01:07.976,593] ble: Mac: 50d9deedb5cb is connected [00:01:07.976,654] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:07.976,684] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:07.976,715] bt_smp: x 6c4c399a3020630beb1d8c023b1bd66f z 0x80 [00:01:07.977,813] bt_smp: res 0a069d9b640bb7269a084d4bf247bba6 [00:01:07.977,844] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:07.977,874] bt_conn: conn 0x20002ba8 [00:01:07.977,874] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:07.977,905] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:07.977,966] bt_conn: [00:01:07.977,966] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:07.978,027] App: Callback result, true [00:01:08.022,064] bt_conn: handle 0 ref 5 -> 6 [00:01:08.022,094] bt_conn: handle 0 ref 6 -> 5 [00:01:08.082,214] bt_conn: handle 0 ref 5 -> 6 [00:01:08.082,214] bt_conn: conn 0x20002ba8 [00:01:08.082,214] bt_conn: handle 0 len 21 flags 02 [00:01:08.082,244] bt_conn: First, len 21 final 17 [00:01:08.082,244] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:08.082,275] bt_smp: Received SMP code 0x03 len 16 [00:01:08.082,275] bt_smp: [00:01:08.082,305] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:08.082,336] bt_conn: handle 0 ref 6 -> 5 [00:01:08.082,397] bt_conn: conn 0x20002ba8 [00:01:08.082,397] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:08.082,427] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:08.082,458] bt_conn: [00:01:08.082,489] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:08.142,059] bt_conn: handle 0 ref 5 -> 6 --- 9 messages dropped --- [00:01:08.202,362] bt_smp: v efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:08.202,392] bt_smp: x dfe2b868422f7a49dd8a9f420a86fcab z 0x80 [00:01:08.203,491] bt_smp: res ad2072365da59d05a57ff0b454bfa2bd [00:01:08.203,521] bt_smp: pcnf ad2072365da59d05a57ff0b454bfa2bd [00:01:08.203,552] bt_smp: cfm ad2072365da59d05a57ff0b454bfa2bd [00:01:08.204,040] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:08.204,071] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:08.204,132] bt_smp: x 1a557d846f6a7d30c03a56d39dc918f7 z 0x81 [00:01:08.205,230] bt_smp: res 96279d1fa5981c41d58ee91383622b92 [00:01:08.205,261] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:08.205,322] bt_conn: handle 0 ref 6 -> 5 [00:01:08.205,352] bt_conn: conn 0x20002ba8 [00:01:08.205,352] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:08.205,383] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:08.205,413] bt_conn: [00:01:08.205,444] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:08.262,054] bt_conn: handle 0 ref 5 -> 6 [00:01:08.262,084] bt_conn: handle 0 ref 6 -> 5 [00:01:08.322,204] bt_conn: handle 0 ref 5 -> 6 [00:01:08.322,204] bt_conn: conn 0x20002ba8 [00:01:08.322,235] bt_conn: handle 0 len 21 flags 02 [00:01:08.322,235] bt_conn: First, len 21 final 17 [00:01:08.322,265] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:08.322,265] bt_smp: Received SMP code 0x03 len 16 [00:01:08.322,296] bt_smp: [00:01:08.322,296] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:08.322,357] bt_conn: handle 0 ref 6 -> 5 [00:01:08.322,387] bt_conn: conn 0x20002ba8 [00:01:08.322,387] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:08.322,418] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:08.322,448] bt_conn: [00:01:08.322,479] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:08.382,080] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:08.442,382] bt_smp: x f5199d1c422ee450025594b1c6e7feba z 0x81 [00:01:08.443,481] bt_smp: res 16a848878f4fba4d33d02cfe1b247b28 [00:01:08.443,511] bt_smp: pcnf 16a848878f4fba4d33d02cfe1b247b28 [00:01:08.443,542] bt_smp: cfm 16a848878f4fba4d33d02cfe1b247b28 [00:01:08.444,030] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:08.444,061] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:08.444,122] bt_smp: x 2851278f290508583e5169c285f094fc z 0x81 [00:01:08.445,251] bt_smp: res ef1a1b9bc9fcf9a5398c5f6fd3464fea [00:01:08.445,251] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:08.445,312] bt_conn: handle 0 ref 6 -> 5 [00:01:08.445,343] bt_conn: conn 0x20002ba8 [00:01:08.445,343] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:08.445,373] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:08.445,434] bt_conn: [00:01:08.445,434] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:08.502,075] bt_conn: handle 0 ref 5 -> 6 [00:01:08.502,075] bt_conn: handle 0 ref 6 -> 5 [00:01:08.562,194] bt_conn: handle 0 ref 5 -> 6 [00:01:08.562,225] bt_conn: conn 0x20002ba8 [00:01:08.562,225] bt_conn: handle 0 len 21 flags 02 [00:01:08.562,255] bt_conn: First, len 21 final 17 [00:01:08.562,255] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:08.562,255] bt_smp: Received SMP code 0x03 len 16 [00:01:08.562,286] bt_smp: [00:01:08.562,316] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:08.562,347] bt_conn: handle 0 ref 6 -> 5 [00:01:08.562,377] bt_conn: conn 0x20002ba8 [00:01:08.562,408] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:08.562,408] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:08.562,469] bt_conn: [00:01:08.562,469] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:08.622,070] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:08.682,403] bt_smp: x 624117b90341bec1a94d6f79c4c5214d z 0x81 [00:01:08.683,502] bt_smp: res 2ded281d914f57c9691c0cc84fa29328 [00:01:08.683,532] bt_smp: pcnf 2ded281d914f57c9691c0cc84fa29328 [00:01:08.683,563] bt_smp: cfm 2ded281d914f57c9691c0cc84fa29328 [00:01:08.684,020] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:08.684,082] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:08.684,112] bt_smp: x bafca9ea9cd37c2aec77b9714254bfe0 z 0x81 [00:01:08.685,241] bt_smp: res a0f0587814731813b8ac5d072044331b [00:01:08.685,241] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:08.685,302] bt_conn: handle 0 ref 6 -> 5 [00:01:08.685,333] bt_conn: conn 0x20002ba8 [00:01:08.685,363] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:08.685,363] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:08.685,424] bt_conn: [00:01:08.685,424] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:08.742,065] bt_conn: handle 0 ref 5 -> 6 [00:01:08.742,095] bt_conn: handle 0 ref 6 -> 5 [00:01:08.862,213] bt_conn: handle 0 ref 5 -> 6 [00:01:08.862,213] bt_conn: conn 0x20002ba8 [00:01:08.862,243] bt_conn: handle 0 len 21 flags 02 [00:01:08.862,243] bt_conn: First, len 21 final 17 [00:01:08.862,243] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:08.862,274] bt_smp: Received SMP code 0x03 len 16 [00:01:08.862,274] bt_smp: [00:01:08.862,304] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:08.862,335] bt_conn: handle 0 ref 6 -> 5 [00:01:08.862,396] bt_conn: conn 0x20002ba8 [00:01:08.862,396] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:08.862,426] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:08.862,457] bt_conn: [00:01:08.862,487] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:08.922,058] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:08.982,391] bt_smp: x 55fe10c7061476444890d1d3f184dea5 z 0x81 [00:01:08.983,489] bt_smp: res 6b6556428bc97a737b60a33976fc6a09 [00:01:08.983,520] bt_smp: pcnf 6b6556428bc97a737b60a33976fc6a09 [00:01:08.983,551] bt_smp: cfm 6b6556428bc97a737b60a33976fc6a09 [00:01:08.984,008] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:08.984,069] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:08.984,100] bt_smp: x fcd80e01cbd11ad0a17a25e21220a308 z 0x81 [00:01:08.985,229] bt_smp: res b99d4c3a3f1c2fcc2d1643d97845139f [00:01:08.985,229] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:08.985,290] bt_conn: handle 0 ref 6 -> 5 [00:01:08.985,321] bt_conn: conn 0x20002ba8 [00:01:08.985,351] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:08.985,351] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:08.985,412] bt_conn: [00:01:08.985,412] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:09.042,053] bt_conn: handle 0 ref 5 -> 6 [00:01:09.042,083] bt_conn: handle 0 ref 6 -> 5 [00:01:09.102,203] bt_conn: handle 0 ref 5 -> 6 [00:01:09.102,203] bt_conn: conn 0x20002ba8 [00:01:09.102,233] bt_conn: handle 0 len 21 flags 02 [00:01:09.102,233] bt_conn: First, len 21 final 17 [00:01:09.102,264] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:09.102,264] bt_smp: Received SMP code 0x03 len 16 [00:01:09.102,294] bt_smp: [00:01:09.102,325] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:09.102,355] bt_conn: handle 0 ref 6 -> 5 [00:01:09.102,386] bt_conn: conn 0x20002ba8 [00:01:09.102,416] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:09.102,416] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:09.102,478] bt_conn: [00:01:09.102,478] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:09.162,078] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:09.222,412] bt_smp: x f29942531c017f8ade53606c9c8ce24b z 0x81 [00:01:09.223,480] bt_smp: res 32cc254c949e85477586c28e906e3d3e [00:01:09.223,510] bt_smp: pcnf 32cc254c949e85477586c28e906e3d3e [00:01:09.223,541] bt_smp: cfm 32cc254c949e85477586c28e906e3d3e [00:01:09.224,029] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:09.224,060] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:09.224,121] bt_smp: x d443549f72a0407ca0aeb33d4d64fcc8 z 0x80 [00:01:09.225,219] bt_smp: res 1248237e93b0464e0560ca15496594d7 [00:01:09.225,250] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:09.225,280] bt_conn: handle 0 ref 6 -> 5 [00:01:09.225,341] bt_conn: conn 0x20002ba8 [00:01:09.225,341] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:09.225,372] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:09.225,402] bt_conn: [00:01:09.225,433] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:09.282,073] bt_conn: handle 0 ref 5 -> 6 [00:01:09.282,073] bt_conn: handle 0 ref 6 -> 5 [00:01:09.342,193] bt_conn: handle 0 ref 5 -> 6 [00:01:09.342,224] bt_conn: conn 0x20002ba8 [00:01:09.342,224] bt_conn: handle 0 len 21 flags 02 [00:01:09.342,254] bt_conn: First, len 21 final 17 [00:01:09.342,254] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:09.342,254] bt_smp: Received SMP code 0x03 len 16 [00:01:09.342,285] bt_smp: [00:01:09.342,315] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:09.342,346] bt_conn: handle 0 ref 6 -> 5 [00:01:09.342,376] bt_conn: conn 0x20002ba8 [00:01:09.342,407] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:09.342,407] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:09.342,468] bt_conn: [00:01:09.342,468] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:09.402,069] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:09.462,402] bt_smp: x 0291a5d159184f373385d503031cda92 z 0x80 [00:01:09.463,500] bt_smp: res 2da4cd35fa3a40c3d999fe0f8f590d63 [00:01:09.463,531] bt_smp: pcnf 2da4cd35fa3a40c3d999fe0f8f590d63 [00:01:09.463,562] bt_smp: cfm 2da4cd35fa3a40c3d999fe0f8f590d63 [00:01:09.464,019] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:09.464,080] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:09.464,111] bt_smp: x fc275f5799e38a9c0893194dd2cc7607 z 0x80 [00:01:09.465,240] bt_smp: res 7dd0ce627a394ae8bc7b01602f8a0a5a [00:01:09.465,240] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:09.465,301] bt_conn: handle 0 ref 6 -> 5 [00:01:09.465,332] bt_conn: conn 0x20002ba8 [00:01:09.465,362] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:09.465,362] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:09.465,423] bt_conn: [00:01:09.465,423] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:09.522,064] bt_conn: handle 0 ref 5 -> 6 [00:01:09.522,094] bt_conn: handle 0 ref 6 -> 5 [00:01:09.582,214] bt_conn: handle 0 ref 5 -> 6 [00:01:09.582,214] bt_conn: conn 0x20002ba8 [00:01:09.582,244] bt_conn: handle 0 len 21 flags 02 [00:01:09.582,244] bt_conn: First, len 21 final 17 [00:01:09.582,244] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:09.582,275] bt_smp: Received SMP code 0x03 len 16 [00:01:09.582,275] bt_smp: [00:01:09.582,305] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:09.582,336] bt_conn: handle 0 ref 6 -> 5 [00:01:09.582,397] bt_conn: conn 0x20002ba8 [00:01:09.582,397] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:09.582,427] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:09.582,458] bt_conn: [00:01:09.582,489] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:09.642,059] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:09.762,390] bt_smp: x 353eb84fca84080c953561553ca81201 z 0x80 [00:01:09.763,488] bt_smp: res 6b9935666b0335e88b12af7e61b30b27 [00:01:09.763,519] bt_smp: pcnf 6b9935666b0335e88b12af7e61b30b27 [00:01:09.763,549] bt_smp: cfm 6b9935666b0335e88b12af7e61b30b27 [00:01:09.764,007] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:09.764,068] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:09.764,099] bt_smp: x 672316eeea2b5a0e04ca17e23cbb4aab z 0x81 [00:01:09.765,228] bt_smp: res c4f514a6f1e368b418dc541cb86d6e60 [00:01:09.765,258] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:09.765,289] bt_conn: handle 0 ref 6 -> 5 [00:01:09.765,319] bt_conn: conn 0x20002ba8 [00:01:09.765,350] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:09.765,350] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:09.765,411] bt_conn: [00:01:09.765,441] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:09.941,986] bt_conn: handle 0 ref 5 -> 6 [00:01:09.941,986] bt_conn: handle 0 ref 6 -> 5 [00:01:09.942,840] bt_conn: handle 0 ref 5 -> 6 [00:01:09.942,840] bt_conn: conn 0x20002ba8 [00:01:09.942,871] bt_conn: handle 0 len 21 flags 02 [00:01:09.942,871] bt_conn: First, len 21 final 17 [00:01:09.942,871] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:09.942,901] bt_smp: Received SMP code 0x03 len 16 [00:01:09.942,901] bt_smp: [00:01:09.942,932] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:09.942,962] bt_conn: handle 0 ref 6 -> 5 [00:01:09.943,023] bt_conn: conn 0x20002ba8 [00:01:09.943,023] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:09.943,054] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:09.943,084] bt_conn: [00:01:09.943,115] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:10.002,075] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:10.062,408] bt_smp: x 1eae826ebb45343c5292f3f9bcea4889 z 0x81 [00:01:10.063,476] bt_smp: res 24e2b84853d41f2002bebdfbd3cb0eb7 [00:01:10.063,537] bt_smp: pcnf 24e2b84853d41f2002bebdfbd3cb0eb7 [00:01:10.063,568] bt_smp: cfm 24e2b84853d41f2002bebdfbd3cb0eb7 [00:01:10.064,025] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:10.064,086] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:10.064,117] bt_smp: x 146af1f3e7b429b68d21fbe1332c3a79 z 0x80 [00:01:10.065,246] bt_smp: res f91f07c1da6fe27df632fa417ed74f64 [00:01:10.065,246] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:10.065,307] bt_conn: handle 0 ref 6 -> 5 [00:01:10.065,338] bt_conn: conn 0x20002ba8 [00:01:10.065,368] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:10.065,368] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:10.065,429] bt_conn: [00:01:10.065,429] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:10.122,070] bt_conn: handle 0 ref 5 -> 6 [00:01:10.122,100] bt_conn: handle 0 ref 6 -> 5 [00:01:10.182,189] bt_conn: handle 0 ref 5 -> 6 [00:01:10.182,220] bt_conn: conn 0x20002ba8 [00:01:10.182,220] bt_conn: handle 0 len 21 flags 02 [00:01:10.182,250] bt_conn: First, len 21 final 17 [00:01:10.182,250] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:10.182,281] bt_smp: Received SMP code 0x03 len 16 [00:01:10.182,281] bt_smp: [00:01:10.182,312] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:10.182,342] bt_conn: handle 0 ref 6 -> 5 [00:01:10.182,403] bt_conn: conn 0x20002ba8 [00:01:10.182,403] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:10.182,403] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:10.182,464] bt_conn: [00:01:10.182,495] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:10.242,065] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:10.302,398] bt_smp: x 66805a2dd9fe5a8c42c2361655b3c144 z 0x80 [00:01:10.303,497] bt_smp: res deba3e55a1f72c200128b5c27e77ddf4 [00:01:10.303,527] bt_smp: pcnf deba3e55a1f72c200128b5c27e77ddf4 [00:01:10.303,558] bt_smp: cfm deba3e55a1f72c200128b5c27e77ddf4 [00:01:10.304,016] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:10.304,077] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:10.304,138] bt_smp: x 28cda964f366916759adcad059390a88 z 0x80 [00:01:10.305,236] bt_smp: res ca22ade18bb0876bd7311508af1f0521 [00:01:10.305,267] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:10.305,297] bt_conn: handle 0 ref 6 -> 5 [00:01:10.305,328] bt_conn: conn 0x20002ba8 [00:01:10.305,358] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:10.305,358] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:10.305,419] bt_conn: [00:01:10.305,450] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:10.362,060] bt_conn: handle 0 ref 5 -> 6 [00:01:10.362,091] bt_conn: handle 0 ref 6 -> 5 [00:01:10.422,210] bt_conn: handle 0 ref 5 -> 6 [00:01:10.422,210] bt_conn: conn 0x20002ba8 [00:01:10.422,241] bt_conn: handle 0 len 21 flags 02 [00:01:10.422,241] bt_conn: First, len 21 final 17 [00:01:10.422,241] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:10.422,271] bt_smp: Received SMP code 0x03 len 16 [00:01:10.422,271] bt_smp: [00:01:10.422,302] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:10.422,363] bt_conn: handle 0 ref 6 -> 5 [00:01:10.422,393] bt_conn: conn 0x20002ba8 [00:01:10.422,393] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:10.422,424] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:10.422,454] bt_conn: [00:01:10.422,485] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:10.482,055] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:10.542,388] bt_smp: x 230260fe1b6edc2d333219f53ad1ae42 z 0x80 [00:01:10.543,487] bt_smp: res b17edf3eedada053ad144df5265e727e [00:01:10.543,518] bt_smp: pcnf b17edf3eedada053ad144df5265e727e [00:01:10.543,548] bt_smp: cfm b17edf3eedada053ad144df5265e727e [00:01:10.544,036] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:10.544,067] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:10.544,128] bt_smp: x c23fc7b987c22581bbea8b8d519db848 z 0x81 [00:01:10.545,227] bt_smp: res 82e5a9eba6a82ed2523eea95125410b8 [00:01:10.545,257] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:10.545,288] bt_conn: handle 0 ref 6 -> 5 [00:01:10.545,349] bt_conn: conn 0x20002ba8 [00:01:10.545,349] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:10.545,379] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:10.545,410] bt_conn: [00:01:10.545,440] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:10.602,081] bt_conn: handle 0 ref 5 -> 6 [00:01:10.602,081] bt_conn: handle 0 ref 6 -> 5 [00:01:10.662,200] bt_conn: handle 0 ref 5 -> 6 [00:01:10.662,231] bt_conn: conn 0x20002ba8 [00:01:10.662,231] bt_conn: handle 0 len 21 flags 02 [00:01:10.662,231] bt_conn: First, len 21 final 17 [00:01:10.662,261] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:10.662,261] bt_smp: Received SMP code 0x03 len 16 [00:01:10.662,292] bt_smp: [00:01:10.662,322] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:10.662,353] bt_conn: handle 0 ref 6 -> 5 [00:01:10.662,384] bt_conn: conn 0x20002ba8 [00:01:10.662,414] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:10.662,414] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:10.662,475] bt_conn: [00:01:10.662,475] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:10.722,076] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:10.782,409] bt_smp: x 40dd66ef596ac83e7ef750ce86897ddc z 0x81 [00:01:10.783,477] bt_smp: res d4e388b77a8b0db09f717c7ae5f0c815 [00:01:10.783,508] bt_smp: pcnf d4e388b77a8b0db09f717c7ae5f0c815 [00:01:10.783,538] bt_smp: cfm d4e388b77a8b0db09f717c7ae5f0c815 [00:01:10.784,027] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:10.784,057] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:10.784,118] bt_smp: x 30ebe0883be8399e6f15e8ba418dca11 z 0x81 [00:01:10.785,247] bt_smp: res e8fff6c2a3e3146ba879242b7f9cd61f [00:01:10.785,247] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:10.785,308] bt_conn: handle 0 ref 6 -> 5 [00:01:10.785,339] bt_conn: conn 0x20002ba8 [00:01:10.785,369] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:10.785,369] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:10.785,430] bt_conn: [00:01:10.785,430] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:10.902,069] bt_conn: handle 0 ref 5 -> 6 [00:01:10.902,099] bt_conn: handle 0 ref 6 -> 5 [00:01:10.962,188] bt_conn: handle 0 ref 5 -> 6 [00:01:10.962,219] bt_conn: conn 0x20002ba8 [00:01:10.962,219] bt_conn: handle 0 len 21 flags 02 [00:01:10.962,249] bt_conn: First, len 21 final 17 [00:01:10.962,249] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:10.962,280] bt_smp: Received SMP code 0x03 len 16 [00:01:10.962,280] bt_smp: [00:01:10.962,310] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:10.962,341] bt_conn: handle 0 ref 6 -> 5 [00:01:10.962,402] bt_conn: conn 0x20002ba8 [00:01:10.962,402] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:10.962,402] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:10.962,463] bt_conn: [00:01:10.962,493] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:11.022,064] bt_conn: handle 0 ref 5 -> 6 --- 11 messages dropped --- [00:01:11.083,496] bt_smp: res e044518a2f7af066f839bd148d8bc03a [00:01:11.083,526] bt_smp: pcnf e044518a2f7af066f839bd148d8bc03a [00:01:11.083,557] bt_smp: cfm e044518a2f7af066f839bd148d8bc03a [00:01:11.084,014] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:11.084,075] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:11.084,136] bt_smp: x bde8a984d2f26895bf9b8a03468f3928 z 0x81 [00:01:11.085,235] bt_smp: res 00479d05e861636892f9ce11ad07466f [00:01:11.085,266] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:11.085,296] bt_conn: handle 0 ref 6 -> 5 [00:01:11.085,327] bt_conn: conn 0x20002ba8 [00:01:11.085,357] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:11.085,357] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:11.085,418] bt_conn: [00:01:11.085,449] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:11.142,059] bt_conn: handle 0 ref 5 -> 6 [00:01:11.142,089] bt_conn: handle 0 ref 6 -> 5 [00:01:11.202,209] bt_conn: handle 0 ref 5 -> 6 [00:01:11.202,209] bt_conn: conn 0x20002ba8 [00:01:11.202,239] bt_conn: handle 0 len 21 flags 02 [00:01:11.202,239] bt_conn: First, len 21 final 17 [00:01:11.202,239] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:11.202,270] bt_smp: Received SMP code 0x03 len 16 [00:01:11.202,270] bt_smp: [00:01:11.202,301] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:11.202,362] bt_conn: handle 0 ref 6 -> 5 [00:01:11.202,392] bt_conn: conn 0x20002ba8 [00:01:11.202,392] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:11.202,423] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:11.202,453] bt_conn: [00:01:11.202,484] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:11.262,054] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:11.322,387] bt_smp: x cf8a321a1b554adc5d00fc4755e5bdb0 z 0x81 [00:01:11.323,486] bt_smp: res 49dcb0da2ae1e990eed9f13ee9df3e77 [00:01:11.323,516] bt_smp: pcnf 49dcb0da2ae1e990eed9f13ee9df3e77 [00:01:11.323,547] bt_smp: cfm 49dcb0da2ae1e990eed9f13ee9df3e77 [00:01:11.324,035] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:11.324,066] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:11.324,127] bt_smp: x b879033ef8d2e10543437ee57c573342 z 0x80 [00:01:11.325,225] bt_smp: res c7d505587fdc6fad457b12113e9b9f1c [00:01:11.325,256] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:11.325,286] bt_conn: handle 0 ref 6 -> 5 [00:01:11.325,347] bt_conn: conn 0x20002ba8 [00:01:11.325,347] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:11.325,378] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:11.325,408] bt_conn: [00:01:11.325,439] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:11.382,080] bt_conn: handle 0 ref 5 -> 6 [00:01:11.382,110] bt_conn: handle 0 ref 6 -> 5 [00:01:11.442,199] bt_conn: handle 0 ref 5 -> 6 [00:01:11.442,230] bt_conn: conn 0x20002ba8 [00:01:11.442,230] bt_conn: handle 0 len 21 flags 02 [00:01:11.442,230] bt_conn: First, len 21 final 17 [00:01:11.442,260] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:11.442,260] bt_smp: Received SMP code 0x03 len 16 [00:01:11.442,291] bt_smp: [00:01:11.442,321] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:11.442,352] bt_conn: handle 0 ref 6 -> 5 [00:01:11.442,382] bt_conn: conn 0x20002ba8 [00:01:11.442,413] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:11.442,413] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:11.442,474] bt_conn: [00:01:11.442,474] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:11.502,075] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:11.562,408] bt_smp: x a6fae339bb56c4c68115974a2e71977d z 0x80 [00:01:11.563,507] bt_smp: res 640f3f4a0439d279f13b46390a0ac6d1 [00:01:11.563,537] bt_smp: pcnf 640f3f4a0439d279f13b46390a0ac6d1 [00:01:11.563,568] bt_smp: cfm 640f3f4a0439d279f13b46390a0ac6d1 [00:01:11.564,025] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:11.564,056] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:11.564,117] bt_smp: x 19d079f65526df12995509f3bd92d5de z 0x81 [00:01:11.565,216] bt_smp: res dd6d34317404c2171a85651ffb9f2d15 [00:01:11.565,246] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:11.565,277] bt_conn: handle 0 ref 6 -> 5 [00:01:11.565,338] bt_conn: conn 0x20002ba8 [00:01:11.565,338] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:11.565,368] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:11.565,399] bt_conn: [00:01:11.565,429] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:11.622,070] bt_conn: handle 0 ref 5 -> 6 [00:01:11.622,100] bt_conn: handle 0 ref 6 -> 5 [00:01:11.682,189] bt_conn: handle 0 ref 5 -> 6 [00:01:11.682,220] bt_conn: conn 0x20002ba8 [00:01:11.682,220] bt_conn: handle 0 len 21 flags 02 [00:01:11.682,250] bt_conn: First, len 21 final 17 [00:01:11.682,250] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:11.682,281] bt_smp: Received SMP code 0x03 len 16 [00:01:11.682,281] bt_smp: [00:01:11.682,312] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:11.682,342] bt_conn: handle 0 ref 6 -> 5 [00:01:11.682,403] bt_conn: conn 0x20002ba8 [00:01:11.682,403] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:11.682,403] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:11.682,464] bt_conn: [00:01:11.682,495] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:11.742,065] bt_conn: handle 0 ref 5 -> 6 --- 11 messages dropped --- [00:01:11.803,497] bt_smp: res 2896faa5978e9d6ee4e3bd9644ace7a3 [00:01:11.803,527] bt_smp: pcnf 2896faa5978e9d6ee4e3bd9644ace7a3 [00:01:11.803,558] bt_smp: cfm 2896faa5978e9d6ee4e3bd9644ace7a3 [00:01:11.804,016] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:11.804,107] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:11.804,138] bt_smp: x ae68ccaf61766aa39d8b91e5b9f4df31 z 0x81 [00:01:11.805,236] bt_smp: res 4d5281bdab25c1c1fb1006b711748a2d [00:01:11.805,267] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:11.805,328] bt_conn: handle 0 ref 6 -> 5 [00:01:11.805,358] bt_conn: conn 0x20002ba8 [00:01:11.805,358] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:11.805,389] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:11.805,419] bt_conn: [00:01:11.805,450] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:11.922,058] bt_conn: handle 0 ref 5 -> 6 [00:01:11.922,088] bt_conn: handle 0 ref 6 -> 5 [00:01:11.982,208] bt_conn: handle 0 ref 5 -> 6 [00:01:11.982,208] bt_conn: conn 0x20002ba8 [00:01:11.982,238] bt_conn: handle 0 len 21 flags 02 [00:01:11.982,238] bt_conn: First, len 21 final 17 [00:01:11.982,269] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:11.982,269] bt_smp: Received SMP code 0x03 len 16 [00:01:11.982,269] bt_smp: [00:01:11.982,299] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:11.982,360] bt_conn: handle 0 ref 6 -> 5 [00:01:11.982,391] bt_conn: conn 0x20002ba8 [00:01:11.982,391] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:11.982,421] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:11.982,452] bt_conn: [00:01:11.982,482] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:12.042,053] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:12.102,386] bt_smp: x ef17480ee19b00dd89d11092b2bd15a8 z 0x81 [00:01:12.103,485] bt_smp: res e7032d933ff4adec63f0e6d3546c8dc5 [00:01:12.103,515] bt_smp: pcnf e7032d933ff4adec63f0e6d3546c8dc5 [00:01:12.103,546] bt_smp: cfm e7032d933ff4adec63f0e6d3546c8dc5 [00:01:12.104,003] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:12.104,064] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:12.104,125] bt_smp: x cbdb2d03ab1348156ca1ac178b5d32c8 z 0x81 [00:01:12.105,224] bt_smp: res e91ea325aa672d73393f218c1f6716cb [00:01:12.105,255] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:12.105,285] bt_conn: handle 0 ref 6 -> 5 [00:01:12.105,316] bt_conn: conn 0x20002ba8 [00:01:12.105,346] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:12.105,346] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:12.105,407] bt_conn: [00:01:12.105,438] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:12.162,078] bt_conn: handle 0 ref 5 -> 6 [00:01:12.162,078] bt_conn: handle 0 ref 6 -> 5 [00:01:12.222,198] bt_conn: handle 0 ref 5 -> 6 [00:01:12.222,229] bt_conn: conn 0x20002ba8 [00:01:12.222,229] bt_conn: handle 0 len 21 flags 02 [00:01:12.222,229] bt_conn: First, len 21 final 17 [00:01:12.222,259] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:12.222,259] bt_smp: Received SMP code 0x03 len 16 [00:01:12.222,290] bt_smp: [00:01:12.222,320] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:12.222,351] bt_conn: handle 0 ref 6 -> 5 [00:01:12.222,381] bt_conn: conn 0x20002ba8 [00:01:12.222,412] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:12.222,412] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:12.222,473] bt_conn: [00:01:12.222,473] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:12.282,073] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:12.342,407] bt_smp: x 06d0d8568f139f4b7fe5d767987d3fdc z 0x81 [00:01:12.343,505] bt_smp: res 2a8e0b49ecc2cccf59e15f4c754b5e7a [00:01:12.343,536] bt_smp: pcnf 2a8e0b49ecc2cccf59e15f4c754b5e7a [00:01:12.343,536] bt_smp: cfm 2a8e0b49ecc2cccf59e15f4c754b5e7a [00:01:12.344,024] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:12.344,085] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:12.344,116] bt_smp: x db52416aeab4c97cdbed0046605bb27a z 0x80 [00:01:12.345,245] bt_smp: res 6ac4b96930f37e52a31e86ab36a3eedb [00:01:12.345,245] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:12.345,306] bt_conn: handle 0 ref 6 -> 5 [00:01:12.345,336] bt_conn: conn 0x20002ba8 [00:01:12.345,367] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:12.345,367] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:12.345,428] bt_conn: [00:01:12.345,428] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:12.402,069] bt_conn: handle 0 ref 5 -> 6 [00:01:12.402,099] bt_conn: handle 0 ref 6 -> 5 [00:01:12.462,188] bt_conn: handle 0 ref 5 -> 6 [00:01:12.462,219] bt_conn: conn 0x20002ba8 [00:01:12.462,219] bt_conn: handle 0 len 21 flags 02 [00:01:12.462,249] bt_conn: First, len 21 final 17 [00:01:12.462,249] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:12.462,280] bt_smp: Received SMP code 0x03 len 16 [00:01:12.462,280] bt_smp: [00:01:12.462,310] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:12.462,341] bt_conn: handle 0 ref 6 -> 5 [00:01:12.462,402] bt_conn: conn 0x20002ba8 [00:01:12.462,402] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:12.462,402] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:12.462,463] bt_conn: [00:01:12.462,493] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:12.522,064] bt_conn: handle 0 ref 5 -> 6 --- 11 messages dropped --- [00:01:12.583,526] bt_smp: res 94dbd3bdb53ddfc69d5927b060867b00 [00:01:12.583,557] bt_smp: pcnf 94dbd3bdb53ddfc69d5927b060867b00 [00:01:12.583,587] bt_smp: cfm 94dbd3bdb53ddfc69d5927b060867b00 [00:01:12.584,045] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:12.584,106] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:12.584,136] bt_smp: x 48400827dcd02655232ff938ffdae37b z 0x80 [00:01:12.585,266] bt_smp: res 538f59eb613ece6727992bf89ad17708 [00:01:12.585,296] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:12.585,327] bt_conn: handle 0 ref 6 -> 5 [00:01:12.585,357] bt_conn: conn 0x20002ba8 [00:01:12.585,388] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:12.585,388] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:12.585,449] bt_conn: [00:01:12.585,449] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:12.642,059] bt_conn: handle 0 ref 5 -> 6 [00:01:12.642,089] bt_conn: handle 0 ref 6 -> 5 [00:01:12.702,209] bt_conn: handle 0 ref 5 -> 6 [00:01:12.702,209] bt_conn: conn 0x20002ba8 [00:01:12.702,239] bt_conn: handle 0 len 21 flags 02 [00:01:12.702,239] bt_conn: First, len 21 final 17 [00:01:12.702,239] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:12.702,270] bt_smp: Received SMP code 0x03 len 16 [00:01:12.702,270] bt_smp: [00:01:12.702,301] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:12.702,362] bt_conn: handle 0 ref 6 -> 5 [00:01:12.702,392] bt_conn: conn 0x20002ba8 [00:01:12.702,392] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:12.702,423] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:12.702,453] bt_conn: [00:01:12.702,484] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:12.762,054] bt_conn: handle 0 ref 5 -> 6 --- 10 messages dropped --- [00:01:12.822,387] bt_smp: x 0a1bcfa97f813e08c3a7ad5b80e66abb z 0x80 [00:01:12.823,486] bt_smp: res a6ad2ae8d1ec87a29f99be97b470e768 [00:01:12.823,516] bt_smp: pcnf a6ad2ae8d1ec87a29f99be97b470e768 [00:01:12.823,547] bt_smp: cfm a6ad2ae8d1ec87a29f99be97b470e768 [00:01:12.824,035] bt_smp: u efd311607cf39ea2a08467a1884daf9a755440bf5f7c42f2e38283ebd9a7a1ee [00:01:12.824,066] bt_smp: v 7f0677cef986eab718fecef7dbd45c752d19df42fda5eef8a63038a6840eaef9 [00:01:12.824,127] bt_smp: x fd7f42841821a22cfebe3db1a995727a z 0x80 [00:01:12.825,256] bt_smp: res dbfa8d6782b9b1cba785cbd1b0b65f39 [00:01:12.825,256] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:12.825,317] bt_conn: handle 0 ref 6 -> 5 [00:01:12.825,347] bt_conn: conn 0x20002ba8 [00:01:12.825,347] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:12.825,378] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:12.825,408] bt_conn: [00:01:12.825,439] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:12.942,077] bt_conn: handle 0 ref 5 -> 6 [00:01:12.942,077] bt_conn: handle 0 ref 6 -> 5 [00:01:13.002,197] bt_conn: handle 0 ref 5 -> 6 [00:01:13.002,227] bt_conn: conn 0x20002ba8 [00:01:13.002,227] bt_conn: handle 0 len 21 flags 02 [00:01:13.002,227] bt_conn: First, len 21 final 17 [00:01:13.002,258] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:13.002,258] bt_smp: Received SMP code 0x03 len 16 [00:01:13.002,288] bt_smp: [00:01:13.002,319] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:13.002,349] bt_conn: handle 0 ref 6 -> 5 [00:01:13.002,380] bt_conn: conn 0x20002ba8 [00:01:13.002,410] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:13.002,410] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:13.002,471] bt_conn: [00:01:13.002,471] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:13.123,657] bt_smp: n2 7e47c28d29ab522dc365e10e3a849b15 --- 17 messages dropped --- [00:01:13.124,237] bt_smp: t b45ec32192c432f9f80c5967149c64be [00:01:13.125,183] bt_smp: mackey 8f000c596e7c17953d682398aa1c4eb5 [00:01:13.126,098] bt_smp: ltk ead4dd6c78b9923d8b6871aefa4cde25 [00:01:13.126,129] bt_smp: w b54e1caa9823683d95177c6e590c008f [00:01:13.126,159] bt_smp: n1 fd7f42841821a22cfebe3db1a995727a [00:01:13.126,190] bt_smp: n2 7e47c28d29ab522dc365e10e3a849b15 [00:01:13.126,251] bt_smp: r 9edc0100000000000000000000000000 [00:01:13.126,281] bt_smp: io_cap 04000d [00:01:13.126,281] bt_smp: a1 01a7eec8626fef [00:01:13.126,312] bt_smp: a2 01cbb5edded950 [00:01:13.127,441] bt_smp: res 22a9bffbdc25e7208a706865ebb7d468 [00:01:13.127,441] bt_smp: [00:01:13.127,471] bt_conn: conn handle 0 buf len 21 cb (nil) user_data (nil) [00:01:13.127,502] bt_conn: handle 0 ref 6 -> 5 [00:01:13.127,532] bt_conn: conn 0x20002ba8 [00:01:13.127,563] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 [00:01:13.127,593] bt_conn: conn 0x20002ba8 buf 0x20012028 len 21 flags 0x02 [00:01:13.127,624] bt_conn: [00:01:13.127,655] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:13.182,067] bt_conn: handle 0 ref 5 -> 6 [00:01:13.182,098] bt_conn: handle 0 ref 6 -> 5 [00:01:13.242,187] bt_conn: handle 0 ref 5 -> 6 [00:01:13.242,218] bt_conn: conn 0x20002ba8 [00:01:13.242,218] bt_conn: handle 0 len 21 flags 02 [00:01:13.242,248] bt_conn: First, len 21 final 17 [00:01:13.242,248] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:13.242,279] bt_smp: Received SMP code 0x0d len 16 [00:01:13.242,279] bt_smp: [00:01:13.242,309] bt_smp: w b54e1caa9823683d95177c6e590c008f [00:01:13.242,340] bt_smp: n1 7e47c28d29ab522dc365e10e3a849b15 [00:01:13.242,370] bt_smp: n2 fd7f42841821a22cfebe3db1a995727a [00:01:13.242,401] bt_smp: r 9edc0100000000000000000000000000 [00:01:13.242,431] bt_smp: io_cap 00000d [00:01:13.242,462] bt_smp: a1 01cbb5edded950 [00:01:13.242,492] bt_smp: a2 01a7eec8626fef [00:01:13.243,591] bt_smp: res f52805a6a97cbe74bd52f0f2c2d4bb5d [00:01:13.243,835] bt_conn: [00:01:13.243,865] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:13.243,896] bt_conn: handle 0 ref 6 -> 5 [00:01:13.662,078] bt_conn: handle 0 ref 5 -> 6 [00:01:13.662,139] bt_smp: chan 0x20002fc4 conn 0x20002ba8 handle 0 encrypt 0x01 hci status 0x00 Security is changed: 50:D9:DE:ED:B5:CB (random) level 4 [00:01:13.662,322] bt_conn: handle 0 ref 6 -> 5 [00:01:13.722,229] bt_conn: handle 0 ref 5 -> 6 [00:01:13.722,259] bt_conn: conn 0x20002ba8 [00:01:13.722,259] bt_conn: handle 0 len 21 flags 02 [00:01:13.722,290] bt_conn: First, len 21 final 17 [00:01:13.722,290] bt_conn: Successfully parsed 21 byte L2CAP packet [00:01:13.722,320] bt_smp: Received SMP code 0x08 len 16 [00:01:13.722,320] bt_smp: [00:01:13.722,351] bt_conn: handle 0 ref 6 -> 5 [00:01:13.782,165] bt_conn: handle 0 ref 5 -> 6 [00:01:13.782,196] bt_conn: conn 0x20002ba8 [00:01:13.782,196] bt_conn: handle 0 len 12 flags 02 [00:01:13.782,226] bt_conn: First, len 12 final 8 [00:01:13.782,226] bt_conn: Successfully parsed 12 byte L2CAP packet [00:01:13.782,226] bt_smp: Received SMP code 0x09 len 7 [00:01:13.782,379] bt_smp: identity C7:AD:65:12:8B:2B (random) [00:01:13.782,409] ble: identity_resolved [00:01:13.782,409] bt_smp: status 0x0 [00:01:13.782,562] ble: Pairing is completed: C7:AD:65:12:8B:2B (random), bonded: 1 [00:01:13.782,592] bt_conn: handle 0 ref 6 -> 7 [00:01:13.782,623] bt_conn: handle 0 ref 7 -> 6 [00:01:13.784,820] registry: OnPaired set flag, true [00:01:13.784,851] bt_conn: handle 0 ref 6 -> 5 [00:01:13.884,948] SurgeGuard: Discover Surge Guard Service UUID [00:01:13.885,009] bt_conn: conn handle 0 buf len 27 cb 0x52261 user_data 0x200042f8 [00:01:13.885,040] bt_conn: conn 0x20002ba8 [00:01:13.885,040] bt_conn: conn 0x20002ba8 buf 0x20012028 len 27 [00:01:13.885,070] bt_conn: conn 0x20002ba8 buf 0x20012028 len 27 flags 0x02 [00:01:13.885,131] bt_conn: [00:01:13.885,131] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:13.885,162] SurgeGuard: Curr state: 1 [00:01:13.885,192] SurgeGuard: Set state: 2 [00:01:13.962,158] bt_conn: handle 0 ref 5 -> 6 [00:01:13.962,188] bt_conn: handle 0 ref 6 -> 5 [00:01:13.962,341] bt_conn: conn 0x20002ba8 [00:01:13.962,341] bt_conn: conn 0x20002ba8 [00:01:13.962,371] bt_conn: tx 0x200040e8 cb 0x52261 user_data 0x200042f8 [00:01:14.022,155] bt_conn: handle 0 ref 5 -> 6 [00:01:14.022,155] bt_conn: conn 0x20002ba8 [00:01:14.022,186] bt_conn: handle 0 len 9 flags 02 [00:01:14.022,186] bt_conn: First, len 9 final 5 [00:01:14.022,216] bt_conn: Successfully parsed 9 byte L2CAP packet [00:01:14.022,247] SurgeGuard: DiscoverFunc [00:01:14.022,247] SurgeGuard: [ATTRIBUTE] handle 11 [00:01:14.022,247] SurgeGuard: Discover uuidCharMeasurements [00:01:14.022,308] bt_conn: conn handle 0 buf len 11 cb 0x52261 user_data 0x2000430c [00:01:14.022,338] bt_conn: handle 0 ref 6 -> 5 [00:01:14.022,369] bt_conn: conn 0x20002ba8 [00:01:14.022,369] bt_conn: conn 0x20002ba8 buf 0x20012028 len 11 [00:01:14.022,399] bt_conn: conn 0x20002ba8 buf 0x20012028 len 11 flags 0x02 [00:01:14.022,460] bt_conn: [00:01:14.022,460] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:14.082,031] bt_conn: handle 0 ref 5 -> 6 [00:01:14.082,061] bt_conn: handle 0 ref 6 -> 5 [00:01:14.082,214] bt_conn: conn 0x20002ba8 [00:01:14.082,214] bt_conn: conn 0x20002ba8 [00:01:14.082,244] bt_conn: tx 0x200040f8 cb 0x52261 user_data 0x2000430c [00:01:14.142,333] bt_conn: handle 0 ref 5 -> 6 [00:01:14.142,364] bt_conn: conn 0x20002ba8 [00:01:14.142,364] bt_conn: handle 0 len 38 flags 02 [00:01:14.142,395] bt_conn: First, len 38 final 44 [00:01:14.142,395] bt_conn: handle 0 ref 6 -> 5 [00:01:14.142,944] bt_conn: handle 0 ref 5 -> 6 [00:01:14.142,974] bt_conn: conn 0x20002ba8 [00:01:14.142,974] bt_conn: handle 0 len 10 flags 01 [00:01:14.143,005] bt_conn: Successfully parsed 48 byte L2CAP packet [00:01:14.143,035] SurgeGuard: DiscoverFunc [00:01:14.143,035] SurgeGuard: [ATTRIBUTE] handle 12 [00:01:14.143,066] SurgeGuard: uuidCharMeasurements value_handle: 13 [00:01:14.143,066] SurgeGuard: Discover uuidCharMeasurements config index [00:01:14.143,127] bt_conn: conn handle 0 buf len 9 cb 0x52261 user_data 0x200042e4 [00:01:14.143,157] bt_conn: handle 0 ref 6 -> 5 [00:01:14.143,188] bt_conn: conn 0x20002ba8 [00:01:14.143,188] bt_conn: conn 0x20002ba8 buf 0x20012028 len 9 [00:01:14.143,218] bt_conn: conn 0x20002ba8 buf 0x20012028 len 9 flags 0x02 [00:01:14.143,249] bt_conn: [00:01:14.143,280] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:14.201,995] bt_conn: handle 0 ref 5 -> 6 [00:01:14.202,056] bt_conn: handle 0 ref 6 -> 5 [00:01:14.202,209] bt_conn: conn 0x20002ba8 [00:01:14.202,209] bt_conn: conn 0x20002ba8 [00:01:14.202,209] bt_conn: tx 0x200040d8 cb 0x52261 user_data 0x200042e4 [00:01:14.262,268] bt_conn: handle 0 ref 5 -> 6 [00:01:14.262,268] bt_conn: conn 0x20002ba8 [00:01:14.262,298] bt_conn: handle 0 len 24 flags 02 [00:01:14.262,298] bt_conn: First, len 24 final 20 [00:01:14.262,329] bt_conn: Successfully parsed 24 byte L2CAP packet [00:01:14.262,390] bt_conn: conn handle 0 buf len 9 cb 0x52261 user_data 0x200042f8 [00:01:14.262,420] bt_conn: handle 0 ref 6 -> 5 [00:01:14.262,451] bt_conn: conn 0x20002ba8 [00:01:14.262,451] bt_conn: conn 0x20002ba8 buf 0x20012028 len 9 [00:01:14.262,481] bt_conn: conn 0x20002ba8 buf 0x20012028 len 9 flags 0x02 [00:01:14.262,542] bt_conn: [00:01:14.262,542] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:14.322,021] bt_conn: handle 0 ref 5 -> 6 [00:01:14.322,052] bt_conn: handle 0 ref 6 -> 5 [00:01:14.322,204] bt_conn: conn 0x20002ba8 [00:01:14.322,204] bt_conn: conn 0x20002ba8 [00:01:14.322,204] bt_conn: tx 0x200040e8 cb 0x52261 user_data 0x200042f8 [00:01:14.382,171] bt_conn: handle 0 ref 5 -> 6 [00:01:14.382,202] bt_conn: conn 0x20002ba8 [00:01:14.382,202] bt_conn: handle 0 len 14 flags 02 [00:01:14.382,232] bt_conn: First, len 14 final 10 [00:01:14.382,232] bt_conn: Successfully parsed 14 byte L2CAP packet [00:01:14.382,263] SurgeGuard: DiscoverFunc [00:01:14.382,293] SurgeGuard: [ATTRIBUTE] handle 14 [00:01:14.382,293] SurgeGuard: Discover uuidCharAuxData [00:01:14.382,354] bt_conn: conn handle 0 buf len 11 cb 0x52261 user_data 0x2000430c [00:01:14.382,385] bt_conn: handle 0 ref 6 -> 5 [00:01:14.382,415] bt_conn: conn 0x20002ba8 [00:01:14.382,415] bt_conn: conn 0x20002ba8 buf 0x20012028 len 11 [00:01:14.382,446] bt_conn: conn 0x20002ba8 buf 0x20012028 len 11 flags 0x02 [00:01:14.382,476] bt_conn: [00:01:14.382,507] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:14.442,016] bt_conn: handle 0 ref 5 -> 6 [00:01:14.442,077] bt_conn: handle 0 ref 6 -> 5 [00:01:14.442,199] bt_conn: conn 0x20002ba8 [00:01:14.442,230] bt_conn: conn 0x20002ba8 [00:01:14.442,230] bt_conn: tx 0x200040f8 cb 0x52261 user_data 0x2000430c [00:01:14.502,471] bt_conn: handle 0 ref 5 -> 6 [00:01:14.502,471] bt_conn: conn 0x20002ba8 [00:01:14.502,502] bt_conn: handle 0 len 48 flags 02 [00:01:14.502,502] bt_conn: First, len 48 final 44 [00:01:14.502,502] bt_conn: Successfully parsed 48 byte L2CAP packet [00:01:14.502,563] SurgeGuard: DiscoverFunc [00:01:14.502,563] SurgeGuard: [ATTRIBUTE] handle 15 [00:01:14.502,593] SurgeGuard: uuidCharFaultHistory value_handle: 16 [00:01:14.502,593] SurgeGuard: Discover uuidCharFaultHistory [00:01:14.502,624] bt_conn: conn handle 0 buf len 11 cb 0x52261 user_data 0x200042e4 [00:01:14.502,655] bt_conn: handle 0 ref 6 -> 5 [00:01:14.502,685] bt_conn: conn 0x20002ba8 [00:01:14.502,716] bt_conn: conn 0x20002ba8 buf 0x20012028 len 11 [00:01:14.502,716] bt_conn: conn 0x20002ba8 buf 0x20012028 len 11 flags 0x02 [00:01:14.502,777] bt_conn: [00:01:14.502,777] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:14.562,011] bt_conn: handle 0 ref 5 -> 6 [00:01:14.562,072] bt_conn: handle 0 ref 6 -> 5 [00:01:14.562,225] bt_conn: conn 0x20002ba8 [00:01:14.562,225] bt_conn: conn 0x20002ba8 [00:01:14.562,225] bt_conn: tx 0x200040d8 cb 0x52261 user_data 0x200042e4 [00:01:14.622,467] bt_conn: handle 0 ref 5 -> 6 [00:01:14.622,467] bt_conn: conn 0x20002ba8 [00:01:14.622,497] bt_conn: handle 0 len 48 flags 02 [00:01:14.622,497] bt_conn: First, len 48 final 44 [00:01:14.622,528] bt_conn: Successfully parsed 48 byte L2CAP packet [00:01:14.622,558] SurgeGuard: DiscoverFunc [00:01:14.622,558] SurgeGuard: [ATTRIBUTE] handle 17 [00:01:14.622,589] SurgeGuard: uuidCharFaultHistory value_handle: 18 [00:01:14.622,589] SurgeGuard: Discover uuidCharFaultHistory config index [00:01:14.622,650] bt_conn: conn handle 0 buf len 9 cb 0x52261 user_data 0x200042f8 [00:01:14.622,680] bt_conn: handle 0 ref 6 -> 5 [00:01:14.622,711] bt_conn: conn 0x20002ba8 [00:01:14.622,711] bt_conn: conn 0x20002ba8 buf 0x20012028 len 9 [00:01:14.622,741] bt_conn: conn 0x20002ba8 buf 0x20012028 len 9 flags 0x02 [00:01:14.622,772] bt_conn: [00:01:14.622,802] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:14.682,006] bt_conn: handle 0 ref 5 -> 6 [00:01:14.682,037] bt_conn: handle 0 ref 6 -> 5 [00:01:14.682,189] bt_conn: conn 0x20002ba8 [00:01:14.682,220] bt_conn: conn 0x20002ba8 [00:01:14.682,220] bt_conn: tx 0x200040e8 cb 0x52261 user_data 0x200042f8 [00:01:14.742,279] bt_conn: handle 0 ref 5 -> 6 [00:01:14.742,279] bt_conn: conn 0x20002ba8 [00:01:14.742,279] bt_conn: handle 0 len 24 flags 02 [00:01:14.742,309] bt_conn: First, len 24 final 20 [00:01:14.742,309] bt_conn: Successfully parsed 24 byte L2CAP packet [00:01:14.742,370] bt_conn: conn handle 0 buf len 9 cb 0x52261 user_data 0x2000430c [00:01:14.742,431] bt_conn: handle 0 ref 6 -> 5 [00:01:14.742,462] bt_conn: conn 0x20002ba8 [00:01:14.742,462] bt_conn: conn 0x20002ba8 buf 0x20012028 len 9 [00:01:14.742,492] bt_conn: conn 0x20002ba8 buf 0x20012028 len 9 flags 0x02 [00:01:14.742,523] bt_conn: [00:01:14.742,553] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:14.802,001] bt_conn: handle 0 ref 5 -> 6 [00:01:14.802,062] bt_conn: handle 0 ref 6 -> 5 [00:01:14.802,185] bt_conn: conn 0x20002ba8 [00:01:14.802,215] bt_conn: conn 0x20002ba8 [00:01:14.802,215] bt_conn: tx 0x200040f8 cb 0x52261 user_data 0x2000430c [00:01:14.862,213] bt_conn: handle 0 ref 5 -> 6 [00:01:14.862,243] bt_conn: conn 0x20002ba8 [00:01:14.862,243] bt_conn: handle 0 len 18 flags 02 [00:01:14.862,243] bt_conn: First, len 18 final 14 [00:01:14.862,274] bt_conn: Successfully parsed 18 byte L2CAP packet [00:01:14.862,304] SurgeGuard: DiscoverFunc [00:01:14.862,335] SurgeGuard: [ATTRIBUTE] handle 19 [00:01:14.862,335] SurgeGuard: Curr state: 2 [00:01:14.862,365] SurgeGuard: Set state: 7 [00:01:14.862,365] bt_conn: handle 0 ref 6 -> 5 [00:01:14.886,199] SurgeGuard: eFinished [00:01:14.886,230] SurgeGuard: Curr state: 7 [00:01:14.886,260] SurgeGuard: Set state: 0 [00:01:14.886,260] bt_conn: handle 0 ref 5 -> 6 [00:01:14.886,322] IAdvAdapter: Start timer, 5 sec [00:01:19.886,322] IAdvAdapter: Process timerinfo collection [00:01:19.886,352] IAdvAdapter: Found timer call cb [00:01:19.886,352] SurgeGuard: Curr state: 0 [00:01:19.886,383] SurgeGuard: Set state: 3 [00:01:19.891,632] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x200042e4 [00:01:19.891,662] bt_conn: conn 0x20002ba8 [00:01:19.891,693] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:01:19.891,693] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:01:19.891,754] bt_conn: [00:01:19.891,754] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:19.891,784] SurgeGuard: RequestMeasurement: is sended [00:01:19.891,815] SurgeGuard: Curr state: 3 [00:01:19.891,815] SurgeGuard: Set state: 4 [00:01:19.902,008] bt_conn: handle 0 ref 6 -> 7 [00:01:19.902,038] bt_conn: handle 0 ref 7 -> 6 [00:01:19.902,191] bt_conn: conn 0x20002ba8 [00:01:19.902,191] bt_conn: conn 0x20002ba8 [00:01:19.902,191] bt_conn: tx 0x200040d8 cb 0x52261 user_data 0x200042e4 [00:01:19.962,280] bt_conn: handle 0 ref 6 -> 7 [00:01:19.962,280] bt_conn: conn 0x20002ba8 [00:01:19.962,310] bt_conn: handle 0 len 25 flags 02 [00:01:19.962,310] bt_conn: First, len 25 final 21 [00:01:19.962,341] bt_conn: Successfully parsed 25 byte L2CAP packet [00:01:19.962,341] SurgeGuard: RequestMeasurement: received, data size: 20 [00:01:19.962,402] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:01:19.962,524] SurgeGuard: Curr state: 4 [00:01:19.962,524] SurgeGuard: Set state: 7 [00:01:19.962,554] bt_conn: handle 0 ref 7 -> 6 [00:01:19.993,804] SurgeGuard: eFinished [00:01:19.993,865] SurgeGuard: Curr state: 7 [00:01:19.993,865] SurgeGuard: Set state: 0 [00:01:19.993,896] IAdvAdapter: Start timer, 5 sec [00:01:24.993,896] IAdvAdapter: Process timerinfo collection [00:01:24.993,927] IAdvAdapter: Found timer call cb [00:01:24.993,927] SurgeGuard: Curr state: 0 [00:01:24.993,957] SurgeGuard: Set state: 3 [00:01:24.999,176] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x200042f8 [00:01:24.999,206] bt_conn: conn 0x20002ba8 [00:01:24.999,237] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:01:24.999,237] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:01:24.999,298] bt_conn: [00:01:24.999,298] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:24.999,328] SurgeGuard: RequestMeasurement: is sended [00:01:24.999,359] SurgeGuard: Curr state: 3 [00:01:24.999,359] SurgeGuard: Set state: 4 [00:01:25.001,983] bt_conn: handle 0 ref 6 -> 7 [00:01:25.002,014] bt_conn: handle 0 ref 7 -> 6 [00:01:25.002,166] bt_conn: conn 0x20002ba8 [00:01:25.002,197] bt_conn: conn 0x20002ba8 [00:01:25.002,197] bt_conn: tx 0x200040e8 cb 0x52261 user_data 0x200042f8 [00:01:25.062,286] bt_conn: handle 0 ref 6 -> 7 [00:01:25.062,286] bt_conn: conn 0x20002ba8 [00:01:25.062,316] bt_conn: handle 0 len 25 flags 02 [00:01:25.062,316] bt_conn: First, len 25 final 21 [00:01:25.062,316] bt_conn: Successfully parsed 25 byte L2CAP packet [00:01:25.062,347] SurgeGuard: RequestMeasurement: received, data size: 20 [00:01:25.062,377] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:01:25.062,500] SurgeGuard: Curr state: 4 [00:01:25.062,530] SurgeGuard: Set state: 7 [00:01:25.062,561] bt_conn: handle 0 ref 7 -> 6 [00:01:25.101,348] SurgeGuard: eFinished [00:01:25.101,348] SurgeGuard: Curr state: 7 [00:01:25.101,379] SurgeGuard: Set state: 0 [00:01:25.101,379] IAdvAdapter: Start timer, 5 sec [00:01:30.101,409] IAdvAdapter: Process timerinfo collection [00:01:30.101,440] IAdvAdapter: Found timer call cb [00:01:30.101,440] SurgeGuard: Curr state: 0 [00:01:30.101,501] SurgeGuard: Set state: 3 [00:01:30.106,353] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x2000430c [00:01:30.106,384] bt_conn: conn 0x20002ba8 [00:01:30.106,384] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:01:30.106,414] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:01:30.106,475] bt_conn: [00:01:30.106,475] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:30.106,506] SurgeGuard: RequestMeasurement: is sended [00:01:30.106,536] SurgeGuard: Curr state: 3 [00:01:30.106,536] SurgeGuard: Set state: 4 [00:01:30.161,987] bt_conn: handle 0 ref 6 -> 7 [00:01:30.162,048] bt_conn: handle 0 ref 7 -> 6 [00:01:30.162,170] bt_conn: conn 0x20002ba8 [00:01:30.162,200] bt_conn: conn 0x20002ba8 [00:01:30.162,200] bt_conn: tx 0x200040f8 cb 0x52261 user_data 0x2000430c [00:01:30.282,287] bt_conn: handle 0 ref 6 -> 7 [00:01:30.282,287] bt_conn: conn 0x20002ba8 [00:01:30.282,287] bt_conn: handle 0 len 25 flags 02 [00:01:30.282,318] bt_conn: First, len 25 final 21 [00:01:30.282,318] bt_conn: Successfully parsed 25 byte L2CAP packet [00:01:30.282,348] SurgeGuard: RequestMeasurement: received, data size: 20 [00:01:30.282,379] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:01:30.282,501] SurgeGuard: Curr state: 4 [00:01:30.282,531] SurgeGuard: Set state: 7 [00:01:30.282,562] bt_conn: handle 0 ref 7 -> 6 [00:01:30.308,624] SurgeGuard: eFinished [00:01:30.308,685] SurgeGuard: Curr state: 7 [00:01:30.308,685] SurgeGuard: Set state: 0 [00:01:30.308,715] IAdvAdapter: Start timer, 5 sec [00:01:35.308,715] IAdvAdapter: Process timerinfo collection [00:01:35.308,746] IAdvAdapter: Found timer call cb [00:01:35.308,746] SurgeGuard: Curr state: 0 [00:01:35.308,776] SurgeGuard: Set state: 3 [00:01:35.314,147] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x200042e4 [00:01:35.314,178] bt_conn: conn 0x20002ba8 [00:01:35.314,178] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:01:35.314,208] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:01:35.314,239] bt_conn: [00:01:35.314,270] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:35.314,300] SurgeGuard: RequestMeasurement: is sended [00:01:35.314,331] SurgeGuard: Curr state: 3 [00:01:35.314,331] SurgeGuard: Set state: 4 [00:01:35.321,990] bt_conn: handle 0 ref 6 -> 7 [00:01:35.322,021] bt_conn: handle 0 ref 7 -> 6 [00:01:35.322,174] bt_conn: conn 0x20002ba8 [00:01:35.322,204] bt_conn: conn 0x20002ba8 [00:01:35.322,204] bt_conn: tx 0x200040d8 cb 0x52261 user_data 0x200042e4 [00:01:35.382,263] bt_conn: handle 0 ref 6 -> 7 [00:01:35.382,293] bt_conn: conn 0x20002ba8 [00:01:35.382,293] bt_conn: handle 0 len 25 flags 02 [00:01:35.382,324] bt_conn: First, len 25 final 21 [00:01:35.382,324] bt_conn: Successfully parsed 25 byte L2CAP packet [00:01:35.382,354] SurgeGuard: RequestMeasurement: received, data size: 20 [00:01:35.382,385] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:01:35.382,507] SurgeGuard: Curr state: 4 [00:01:35.382,537] SurgeGuard: Set state: 7 [00:01:35.382,568] bt_conn: handle 0 ref 7 -> 6 [00:01:35.416,320] SurgeGuard: eFinished [00:01:35.416,351] SurgeGuard: Curr state: 7 [00:01:35.416,381] SurgeGuard: Set state: 0 [00:01:35.416,412] IAdvAdapter: Start timer, 5 sec [00:01:40.416,412] IAdvAdapter: Process timerinfo collection [00:01:40.416,442] IAdvAdapter: Found timer call cb [00:01:40.416,442] SurgeGuard: Curr state: 0 [00:01:40.416,473] SurgeGuard: Set state: 3 [00:01:40.421,569] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x200042f8 [00:01:40.421,630] bt_conn: conn 0x20002ba8 [00:01:40.421,630] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:01:40.421,661] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:01:40.421,844] bt_conn: [00:01:40.421,875] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:40.421,905] SurgeGuard: RequestMeasurement: is sended [00:01:40.421,936] SurgeGuard: Curr state: 3 [00:01:40.421,936] SurgeGuard: Set state: 4 [00:01:40.481,994] bt_conn: handle 0 ref 6 -> 7 [00:01:40.482,025] bt_conn: handle 0 ref 7 -> 6 [00:01:40.482,177] bt_conn: conn 0x20002ba8 [00:01:40.482,177] bt_conn: conn 0x20002ba8 [00:01:40.482,208] bt_conn: tx 0x200040e8 cb 0x52261 user_data 0x200042f8 [00:01:40.542,266] bt_conn: handle 0 ref 6 -> 7 [00:01:40.542,297] bt_conn: conn 0x20002ba8 [00:01:40.542,297] bt_conn: handle 0 len 25 flags 02 [00:01:40.542,327] bt_conn: First, len 25 final 21 [00:01:40.542,327] bt_conn: Successfully parsed 25 byte L2CAP packet [00:01:40.542,358] SurgeGuard: RequestMeasurement: received, data size: 20 [00:01:40.542,388] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:01:40.542,510] SurgeGuard: Curr state: 4 [00:01:40.542,510] SurgeGuard: Set state: 7 [00:01:40.542,572] bt_conn: handle 0 ref 7 -> 6 [00:01:40.624,053] SurgeGuard: eFinished [00:01:40.624,084] SurgeGuard: Curr state: 7 [00:01:40.624,084] SurgeGuard: Set state: 0 [00:01:40.624,114] IAdvAdapter: Start timer, 5 sec [00:01:45.624,114] IAdvAdapter: Process timerinfo collection [00:01:45.624,145] IAdvAdapter: Found timer call cb [00:01:45.624,145] SurgeGuard: Curr state: 0 [00:01:45.624,176] SurgeGuard: Set state: 3 [00:01:45.629,058] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x2000430c [00:01:45.629,089] bt_conn: conn 0x20002ba8 [00:01:45.629,089] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:01:45.629,119] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:01:45.629,150] bt_conn: [00:01:45.629,180] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:45.629,211] SurgeGuard: RequestMeasurement: is sended [00:01:45.629,241] SurgeGuard: Curr state: 3 [00:01:45.629,241] SurgeGuard: Set state: 4 [00:01:45.642,456] bt_conn: handle 0 ref 6 -> 7 [00:01:45.642,486] bt_conn: handle 0 ref 7 -> 6 [00:01:45.642,639] bt_conn: conn 0x20002ba8 [00:01:45.642,639] bt_conn: conn 0x20002ba8 [00:01:45.642,669] bt_conn: tx 0x200040f8 cb 0x52261 user_data 0x2000430c [00:01:45.702,270] bt_conn: handle 0 ref 6 -> 7 [00:01:45.702,301] bt_conn: conn 0x20002ba8 [00:01:45.702,301] bt_conn: handle 0 len 25 flags 02 [00:01:45.702,301] bt_conn: First, len 25 final 21 [00:01:45.702,331] bt_conn: Successfully parsed 25 byte L2CAP packet [00:01:45.702,362] SurgeGuard: RequestMeasurement: received, data size: 20 [00:01:45.702,392] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:01:45.702,514] SurgeGuard: Curr state: 4 [00:01:45.702,514] SurgeGuard: Set state: 7 [00:01:45.702,575] bt_conn: handle 0 ref 7 -> 6 [00:01:45.731,262] SurgeGuard: eFinished [00:01:45.731,292] SurgeGuard: Curr state: 7 [00:01:45.731,292] SurgeGuard: Set state: 0 [00:01:45.731,323] IAdvAdapter: Start timer, 5 sec [00:01:50.731,323] IAdvAdapter: Process timerinfo collection [00:01:50.731,353] IAdvAdapter: Found timer call cb [00:01:50.731,353] SurgeGuard: Curr state: 0 [00:01:50.731,384] SurgeGuard: Set state: 3 [00:01:50.736,602] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x200042e4 [00:01:50.736,633] bt_conn: conn 0x20002ba8 [00:01:50.736,633] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:01:50.736,663] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:01:50.736,724] bt_conn: [00:01:50.736,724] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:50.736,755] SurgeGuard: RequestMeasurement: is sended [00:01:50.736,785] SurgeGuard: Curr state: 3 [00:01:50.736,785] SurgeGuard: Set state: 4 [00:01:50.742,004] bt_conn: handle 0 ref 6 -> 7 [00:01:50.742,034] bt_conn: handle 0 ref 7 -> 6 [00:01:50.742,187] bt_conn: conn 0x20002ba8 [00:01:50.742,187] bt_conn: conn 0x20002ba8 [00:01:50.742,218] bt_conn: tx 0x200040d8 cb 0x52261 user_data 0x200042e4 [00:01:50.802,276] bt_conn: handle 0 ref 6 -> 7 [00:01:50.802,276] bt_conn: conn 0x20002ba8 [00:01:50.802,307] bt_conn: handle 0 len 25 flags 02 [00:01:50.802,307] bt_conn: First, len 25 final 21 [00:01:50.802,337] bt_conn: Successfully parsed 25 byte L2CAP packet [00:01:50.802,368] SurgeGuard: RequestMeasurement: received, data size: 20 [00:01:50.802,398] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:01:50.802,520] SurgeGuard: Curr state: 4 [00:01:50.802,520] SurgeGuard: Set state: 7 [00:01:50.802,551] bt_conn: handle 0 ref 7 -> 6 [00:01:50.839,172] SurgeGuard: eFinished [00:01:50.839,202] SurgeGuard: Curr state: 7 [00:01:50.839,233] SurgeGuard: Set state: 0 [00:01:50.839,233] IAdvAdapter: Start timer, 5 sec [00:01:55.839,233] IAdvAdapter: Process timerinfo collection [00:01:55.839,263] IAdvAdapter: Found timer call cb [00:01:55.839,263] SurgeGuard: Curr state: 0 [00:01:55.839,294] SurgeGuard: Set state: 3 [00:01:55.844,299] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x200042f8 [00:01:55.844,329] bt_conn: conn 0x20002ba8 [00:01:55.844,329] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:01:55.844,360] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:01:55.844,421] bt_conn: [00:01:55.844,421] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:55.844,451] SurgeGuard: RequestMeasurement: is sended [00:01:55.844,482] SurgeGuard: Curr state: 3 [00:01:55.844,482] SurgeGuard: Set state: 4 [00:01:55.902,008] bt_conn: handle 0 ref 6 -> 7 [00:01:55.902,038] bt_conn: handle 0 ref 7 -> 6 [00:01:55.902,191] bt_conn: conn 0x20002ba8 [00:01:55.902,191] bt_conn: conn 0x20002ba8 [00:01:55.902,191] bt_conn: tx 0x200040e8 cb 0x52261 user_data 0x200042f8 [00:01:55.962,280] bt_conn: handle 0 ref 6 -> 7 [00:01:55.962,280] bt_conn: conn 0x20002ba8 [00:01:55.962,310] bt_conn: handle 0 len 25 flags 02 [00:01:55.962,310] bt_conn: First, len 25 final 21 [00:01:55.962,341] bt_conn: Successfully parsed 25 byte L2CAP packet [00:01:55.962,371] SurgeGuard: RequestMeasurement: received, data size: 20 [00:01:55.962,402] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:01:55.962,524] SurgeGuard: Curr state: 4 [00:01:55.962,524] SurgeGuard: Set state: 7 [00:01:55.962,554] bt_conn: handle 0 ref 7 -> 6 [00:01:56.046,600] SurgeGuard: eFinished [00:01:56.046,630] SurgeGuard: Curr state: 7 [00:01:56.046,630] SurgeGuard: Set state: 0 [00:01:56.046,661] IAdvAdapter: Start timer, 5 sec [00:02:01.046,661] IAdvAdapter: Process timerinfo collection [00:02:01.046,691] IAdvAdapter: Found timer call cb [00:02:01.046,691] SurgeGuard: Curr state: 0 [00:02:01.046,722] SurgeGuard: Set state: 3 [00:02:01.052,062] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x2000430c [00:02:01.052,093] bt_conn: conn 0x20002ba8 [00:02:01.052,093] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:02:01.052,124] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:02:01.052,154] bt_conn: [00:02:01.052,185] bt_conn: Adding conn 0x20002ba8 to poll list [00:02:01.052,215] SurgeGuard: RequestMeasurement: is sended [00:02:01.052,246] SurgeGuard: Curr state: 3 [00:02:01.052,246] SurgeGuard: Set state: 4 [00:02:01.061,981] bt_conn: handle 0 ref 6 -> 7 [00:02:01.062,042] bt_conn: handle 0 ref 7 -> 6 [00:02:01.062,164] bt_conn: conn 0x20002ba8 [00:02:01.062,194] bt_conn: conn 0x20002ba8 [00:02:01.062,194] bt_conn: tx 0x200040f8 cb 0x52261 user_data 0x2000430c [00:02:01.122,283] bt_conn: handle 0 ref 6 -> 7 [00:02:01.122,283] bt_conn: conn 0x20002ba8 [00:02:01.122,314] bt_conn: handle 0 len 25 flags 02 [00:02:01.122,314] bt_conn: First, len 25 final 21 [00:02:01.122,314] bt_conn: Successfully parsed 25 byte L2CAP packet [00:02:01.122,344] SurgeGuard: RequestMeasurement: received, data size: 20 [00:02:01.122,375] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:02:01.122,528] SurgeGuard: Curr state: 4 [00:02:01.122,528] SurgeGuard: Set state: 7 [00:02:01.122,558] bt_conn: handle 0 ref 7 -> 6 [00:02:01.154,571] SurgeGuard: eFinished [00:02:01.154,602] SurgeGuard: Curr state: 7 [00:02:01.154,632] SurgeGuard: Set state: 0 [00:02:01.154,632] IAdvAdapter: Start timer, 5 sec [00:02:06.154,663] IAdvAdapter: Process timerinfo collection [00:02:06.154,693] IAdvAdapter: Found timer call cb [00:02:06.154,693] SurgeGuard: Curr state: 0 [00:02:06.154,724] SurgeGuard: Set state: 3 [00:02:06.160,064] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x200042e4 [00:02:06.160,095] bt_conn: conn 0x20002ba8 [00:02:06.160,125] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:02:06.160,125] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:02:06.160,186] bt_conn: [00:02:06.160,186] bt_conn: Adding conn 0x20002ba8 to poll list [00:02:06.160,217] SurgeGuard: RequestMeasurement: is sended [00:02:06.160,247] SurgeGuard: Curr state: 3 [00:02:06.160,278] SurgeGuard: Set state: 4 [00:02:06.161,987] bt_conn: handle 0 ref 6 -> 7 [00:02:06.162,017] bt_conn: handle 0 ref 7 -> 6 [00:02:06.162,170] bt_conn: conn 0x20002ba8 [00:02:06.162,200] bt_conn: conn 0x20002ba8 [00:02:06.162,200] bt_conn: tx 0x200040d8 cb 0x52261 user_data 0x200042e4 [00:02:06.222,290] bt_conn: handle 0 ref 6 -> 7 [00:02:06.222,290] bt_conn: conn 0x20002ba8 [00:02:06.222,320] bt_conn: handle 0 len 25 flags 02 [00:02:06.222,320] bt_conn: First, len 25 final 21 [00:02:06.222,320] bt_conn: Successfully parsed 25 byte L2CAP packet [00:02:06.222,351] SurgeGuard: RequestMeasurement: received, data size: 20 [00:02:06.222,381] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:02:06.222,503] SurgeGuard: Curr state: 4 [00:02:06.222,534] SurgeGuard: Set state: 7 [00:02:06.222,564] bt_conn: handle 0 ref 7 -> 6 [00:02:06.262,237] SurgeGuard: eFinished [00:02:06.262,268] SurgeGuard: Curr state: 7 [00:02:06.262,268] SurgeGuard: Set state: 0 [00:02:06.262,298] IAdvAdapter: Start timer, 5 sec [00:02:11.262,298] IAdvAdapter: Process timerinfo collection [00:02:11.262,329] IAdvAdapter: Found timer call cb [00:02:11.262,329] SurgeGuard: Curr state: 0 [00:02:11.262,359] SurgeGuard: Set state: 3 [00:02:11.267,303] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x200042f8 [00:02:11.267,333] bt_conn: conn 0x20002ba8 [00:02:11.267,333] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:02:11.267,364] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:02:11.267,425] bt_conn: [00:02:11.267,425] bt_conn: Adding conn 0x20002ba8 to poll list [00:02:11.267,456] SurgeGuard: RequestMeasurement: is sended [00:02:11.267,486] SurgeGuard: Curr state: 3 [00:02:11.267,486] SurgeGuard: Set state: 4 [00:02:11.321,990] bt_conn: handle 0 ref 6 -> 7 [00:02:11.322,021] bt_conn: handle 0 ref 7 -> 6 [00:02:11.322,174] bt_conn: conn 0x20002ba8 [00:02:11.322,204] bt_conn: conn 0x20002ba8 [00:02:11.322,204] bt_conn: tx 0x200040e8 cb 0x52261 user_data 0x200042f8 [00:02:11.382,263] bt_conn: handle 0 ref 6 -> 7 [00:02:11.382,293] bt_conn: conn 0x20002ba8 [00:02:11.382,293] bt_conn: handle 0 len 25 flags 02 [00:02:11.382,324] bt_conn: First, len 25 final 21 [00:02:11.382,324] bt_conn: Successfully parsed 25 byte L2CAP packet [00:02:11.382,354] SurgeGuard: RequestMeasurement: received, data size: 20 [00:02:11.382,385] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:02:11.382,507] SurgeGuard: Curr state: 4 [00:02:11.382,537] SurgeGuard: Set state: 7 [00:02:11.382,568] bt_conn: handle 0 ref 7 -> 6 [00:02:11.469,573] SurgeGuard: eFinished [00:02:11.469,635] SurgeGuard: Curr state: 7 [00:02:11.469,635] SurgeGuard: Set state: 0 [00:02:11.470,062] IAdvAdapter: Start timer, 5 sec [00:02:16.470,062] IAdvAdapter: Process timerinfo collection [00:02:16.470,092] IAdvAdapter: Found timer call cb [00:02:16.470,092] SurgeGuard: Curr state: 0 [00:02:16.470,123] SurgeGuard: Set state: 3 [00:02:16.476,013] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x2000430c [00:02:16.476,043] bt_conn: conn 0x20002ba8 [00:02:16.476,043] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:02:16.476,074] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:02:16.476,104] bt_conn: [00:02:16.476,135] bt_conn: Adding conn 0x20002ba8 to poll list [00:02:16.476,165] SurgeGuard: RequestMeasurement: is sended [00:02:16.476,196] SurgeGuard: Curr state: 3 [00:02:16.476,196] SurgeGuard: Set state: 4 [00:02:16.481,994] bt_conn: handle 0 ref 6 -> 7 [00:02:16.482,025] bt_conn: handle 0 ref 7 -> 6 [00:02:16.482,177] bt_conn: conn 0x20002ba8 [00:02:16.482,177] bt_conn: conn 0x20002ba8 [00:02:16.482,208] bt_conn: tx 0x200040f8 cb 0x52261 user_data 0x2000430c [00:02:16.542,266] bt_conn: handle 0 ref 6 -> 7 [00:02:16.542,297] bt_conn: conn 0x20002ba8 [00:02:16.542,297] bt_conn: handle 0 len 25 flags 02 [00:02:16.542,297] bt_conn: First, len 25 final 21 [00:02:16.542,327] bt_conn: Successfully parsed 25 byte L2CAP packet [00:02:16.542,358] SurgeGuard: RequestMeasurement: received, data size: 20 [00:02:16.542,388] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:02:16.542,510] SurgeGuard: Curr state: 4 [00:02:16.542,510] SurgeGuard: Set state: 7 [00:02:16.542,572] bt_conn: handle 0 ref 7 -> 6 [00:02:16.578,643] SurgeGuard: eFinished [00:02:16.578,674] SurgeGuard: Curr state: 7 [00:02:16.578,704] SurgeGuard: Set state: 0 [00:02:16.578,704] IAdvAdapter: Start timer, 5 sec [00:02:21.578,735] IAdvAdapter: Process timerinfo collection [00:02:21.578,765] IAdvAdapter: Found timer call cb [00:02:21.578,765] SurgeGuard: Curr state: 0 [00:02:21.578,796] SurgeGuard: Set state: 3 [00:02:21.584,411] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x200042e4 [00:02:21.584,442] bt_conn: conn 0x20002ba8 [00:02:21.584,442] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:02:21.584,472] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:02:21.584,533] bt_conn: [00:02:21.584,533] bt_conn: Adding conn 0x20002ba8 to poll list [00:02:21.584,564] SurgeGuard: RequestMeasurement: is sended [00:02:21.584,594] SurgeGuard: Curr state: 3 [00:02:21.584,594] SurgeGuard: Set state: 4 [00:02:21.641,998] bt_conn: handle 0 ref 6 -> 7 [00:02:21.642,028] bt_conn: handle 0 ref 7 -> 6 [00:02:21.642,181] bt_conn: conn 0x20002ba8 [00:02:21.642,181] bt_conn: conn 0x20002ba8 [00:02:21.642,211] bt_conn: tx 0x200040d8 cb 0x52261 user_data 0x200042e4 [00:02:21.702,270] bt_conn: handle 0 ref 6 -> 7 [00:02:21.702,301] bt_conn: conn 0x20002ba8 [00:02:21.702,301] bt_conn: handle 0 len 25 flags 02 [00:02:21.702,301] bt_conn: First, len 25 final 21 [00:02:21.702,331] bt_conn: Successfully parsed 25 byte L2CAP packet [00:02:21.702,362] SurgeGuard: RequestMeasurement: received, data size: 20 [00:02:21.702,392] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:02:21.702,514] SurgeGuard: Curr state: 4 [00:02:21.702,514] SurgeGuard: Set state: 7 [00:02:21.702,575] bt_conn: handle 0 ref 7 -> 6 [00:02:21.786,682] SurgeGuard: eFinished [00:02:21.786,743] SurgeGuard: Curr state: 7 [00:02:21.786,743] SurgeGuard: Set state: 0 [00:02:21.786,773] IAdvAdapter: Start timer, 5 sec [00:02:26.786,773] IAdvAdapter: Process timerinfo collection [00:02:26.786,804] IAdvAdapter: Found timer call cb [00:02:26.786,804] SurgeGuard: Curr state: 0 [00:02:26.786,834] SurgeGuard: Set state: 3 [00:02:26.791,717] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x200042f8 [00:02:26.791,748] bt_conn: conn 0x20002ba8 [00:02:26.791,748] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:02:26.791,778] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:02:26.791,839] bt_conn: [00:02:26.791,839] bt_conn: Adding conn 0x20002ba8 to poll list [00:02:26.791,870] SurgeGuard: RequestMeasurement: is sended [00:02:26.791,900] SurgeGuard: Curr state: 3 [00:02:26.791,900] SurgeGuard: Set state: 4 [00:02:26.802,001] bt_conn: handle 0 ref 6 -> 7 [00:02:26.802,032] bt_conn: handle 0 ref 7 -> 6 [00:02:26.802,185] bt_conn: conn 0x20002ba8 [00:02:26.802,185] bt_conn: conn 0x20002ba8 [00:02:26.802,215] bt_conn: tx 0x200040e8 cb 0x52261 user_data 0x200042f8 [00:02:26.862,274] bt_conn: handle 0 ref 6 -> 7 [00:02:26.862,274] bt_conn: conn 0x20002ba8 [00:02:26.862,304] bt_conn: handle 0 len 25 flags 02 [00:02:26.862,304] bt_conn: First, len 25 final 21 [00:02:26.862,335] bt_conn: Successfully parsed 25 byte L2CAP packet [00:02:26.862,365] SurgeGuard: RequestMeasurement: received, data size: 20 [00:02:26.862,396] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:02:26.862,518] SurgeGuard: Curr state: 4 [00:02:26.862,518] SurgeGuard: Set state: 7 [00:02:26.862,548] bt_conn: handle 0 ref 7 -> 6 [00:02:26.893,920] SurgeGuard: eFinished [00:02:26.893,951] SurgeGuard: Curr state: 7 [00:02:26.893,951] SurgeGuard: Set state: 0 [00:02:26.893,981] IAdvAdapter: Start timer, 5 sec [00:02:31.893,981] IAdvAdapter: Process timerinfo collection [00:02:31.894,012] IAdvAdapter: Found timer call cb [00:02:31.894,012] SurgeGuard: Curr state: 0 [00:02:31.894,042] SurgeGuard: Set state: 3 [00:02:31.899,444] bt_conn: conn handle 0 buf len 7 cb 0x52261 user_data 0x2000430c [00:02:31.899,475] bt_conn: conn 0x20002ba8 [00:02:31.899,475] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 [00:02:31.899,505] bt_conn: conn 0x20002ba8 buf 0x20012028 len 7 flags 0x02 [00:02:31.899,566] bt_conn: [00:02:31.899,566] bt_conn: Adding conn 0x20002ba8 to poll list [00:02:31.899,597] SurgeGuard: RequestMeasurement: is sended [00:02:31.899,627] SurgeGuard: Curr state: 3 [00:02:31.899,627] SurgeGuard: Set state: 4 [00:02:31.901,977] bt_conn: handle 0 ref 6 -> 7 [00:02:31.902,038] bt_conn: handle 0 ref 7 -> 6 [00:02:31.902,160] bt_conn: conn 0x20002ba8 [00:02:31.902,191] bt_conn: conn 0x20002ba8 [00:02:31.902,191] bt_conn: tx 0x200040f8 cb 0x52261 user_data 0x2000430c [00:02:31.962,280] bt_conn: handle 0 ref 6 -> 7 [00:02:31.962,280] bt_conn: conn 0x20002ba8 [00:02:31.962,310] bt_conn: handle 0 len 25 flags 02 [00:02:31.962,310] bt_conn: First, len 25 final 21 [00:02:31.962,341] bt_conn: Successfully parsed 25 byte L2CAP packet [00:02:31.962,371] SurgeGuard: RequestMeasurement: received, data size: 20 [00:02:31.962,371] SurgeGuard: Received data 01 00 f6 04 f6 04 00 00 00 00 00 00 00 00 00 1a |........ ........ 23 00 00 00 |#... [00:02:31.962,524] SurgeGuard: Curr state: 4 [00:02:31.962,524] SurgeGuard: Set state: 7 [00:02:31.962,554] bt_conn: handle 0 ref 7 -> 6 [00:02:32.001,586] SurgeGuard: eFinished [00:02:32.001,617] SurgeGuard: Curr state: 7 [00:02:32.001,647] SurgeGuard: Set state: 0 [00:02:32.001,647] IAdvAdapter: Start timer, 5 sec 2) reboot hub [00:01:43.048,736] UartTerminal: Uart frame 7e 0a 00 01 03 00 06 73 58 53 4f ee 34 ed 7c 7e |~......s XSO.4.|~ [00:01:43.100,555] ble: Provisioning mac 34 ee 4f 53 58 73 |4.OSXs [00:01:43.100,585] App: Callback result, true [00:01:43.313,690] ble: [DEVICE]: 73:58:53:4F:EE:34 (random), AD evt type 0, AD data len 28, RSSI -57 [00:01:43.314,300] ble: [DEVICE]: 73:58:53:4F:EE:34 (random), AD evt type 4, AD data len 6, RSSI -57 [00:01:43.455,230] UartTerminal: Uart frame 7e 0d 00 01 04 00 08 34 ee 4f 53 58 73 05 01 05 |~......4 .OSXs... 52 77 7e |Rw~ [00:01:43.504,791] ble: Process command to 'Start process', mac: 7358534fee34, type: eSurgeGuard [00:01:43.504,852] App: Callback result, true [00:01:43.567,718] ble: Attempt connection [00:01:43.568,054] bt_conn: [00:01:43.568,145] bt_conn: disconnected -> connecting [00:01:43.568,145] bt_conn: handle 0 ref 1 -> 2 [00:01:43.568,389] bt_conn: [00:01:43.568,878] bt_conn: [00:01:43.568,908] bt_conn: handle 0 ref 2 -> 3 [00:01:43.569,000] ble: Create process for mac: 7358534fee34 [00:01:43.569,030] bt_conn: handle 0 ref 3 -> 4 [00:01:43.569,122] registry: OnPaired set flag, false [00:01:43.569,152] ble: Process was created [00:01:43.569,183] bt_conn: handle 0 ref 4 -> 5 [00:01:43.569,366] ble: [DEVICE]: 73:58:53:4F:EE:34 (random), AD evt type 0, AD data len 28, RSSI -54 [00:01:43.569,458] bt_conn: handle 0 ref 5 -> 6 [00:01:43.569,458] bt_conn: handle 0 ref 6 -> 5 [00:01:44.080,963] bt_conn: conn handle 0 buf len 11 cb (nil) user_data (nil) --- 15 messages dropped --- Security level is setted [00:01:44.081,146] bt_conn: handle 0 ref 6 -> 7 [00:01:44.081,207] ble: Connected: 7358534fee34 [00:01:44.081,329] bt_conn: conn 0x20002ba8 [00:01:44.081,359] bt_conn: conn 0x20002ba8 buf 0x20012028 len 11 [00:01:44.081,359] bt_conn: conn 0x20002ba8 buf 0x20012028 len 11 flags 0x02 [00:01:44.081,787] bt_conn: handle 0 ref 7 -> 8 [00:01:44.081,817] bt_conn: handle 0 ref 8 -> 7 [00:01:44.082,000] bt_conn: [00:01:44.082,000] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:44.082,305] bt_conn: [00:01:44.082,305] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:44.082,672] bt_conn: [00:01:44.082,702] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:44.082,977] bt_conn: [00:01:44.083,007] bt_conn: Adding conn 0x20002ba8 to poll list [00:01:44.083,038] bt_conn: handle 0 ref 7 -> 6 [00:01:44.083,099] bt_conn: handle 0 ref 6 -> 7 [00:01:44.083,099] bt_conn: conn 0x20002ba8 [00:01:44.083,129] bt_conn: tx 0x200040d8 cb 0x52261 user_data 0x200042e4 [00:01:44.083,160] bt_conn: handle 0 len 6 flags 02 [00:01:44.083,190] bt_conn: First, len 6 final 2 [00:01:44.083,190] bt_conn: Successfully parsed 6 byte L2CAP packet [00:01:44.083,221] bt_smp: Received SMP code 0x0b len 1 [00:01:44.083,221] bt_smp: [00:01:44.083,251] bt_conn: handle 0 ref 7 -> 6 [00:01:44.083,312] bt_conn: conn 0x20002ba8 [00:01:44.083,312] bt_conn: conn 0x20002ba8 [00:01:44.108,001] registry: OnConnected set flag [00:01:44.108,032] bt_conn: handle 0 ref 6 -> 5 [00:01:44.141,815] bt_conn: handle 0 ref 5 -> 6 [00:01:44.141,845] bt_conn: handle 0 ref 6 -> 5 [00:01:44.201,965] bt_conn: handle 0 ref 5 -> 6 [00:01:44.201,965] ble: le_data_len_updated [00:01:44.201,965] bt_conn: handle 0 ref 6 -> 5 [00:01:44.202,026] bt_conn: handle 0 ref 5 -> 6 [00:01:44.202,056] bt_conn: conn 0x20002ba8 [00:01:44.202,056] bt_conn: handle 0 len 7 flags 02 [00:01:44.202,056] bt_conn: First, len 7 final 3 [00:01:44.202,087] bt_conn: Successfully parsed 7 byte L2CAP packet MTU exchange successful Current MTU: 64 [00:01:44.202,178] bt_conn: handle 0 ref 6 -> 5 [00:01:44.321,411] bt_conn: handle 0 ref 5 -> 6 [00:01:44.321,441] bt_conn: connected -> disconnect-complete [00:01:44.321,441] bt_conn: handle 0 ref 6 -> 5 [00:01:44.321,655] bt_conn: handle 0 ref 5 -> 6 [00:01:44.321,655] bt_conn: disconnect-complete -> disconnected [00:01:44.321,685] bt_conn: conn 0x20002ba8 [00:01:44.321,685] bt_conn: handle 0 ref 6 -> 5 [00:01:44.321,746] bt_conn: [00:01:44.321,807] bt_conn: conn 0x20002ba8 [00:01:44.321,807] bt_smp: chan 0x20002fc4 cid 0x0006 [00:01:44.321,838] bt_smp: status 0x8 [00:01:44.321,868] bt_smp: chan 0x20002fc4 conn 0x20002ba8 handle 0 encrypt 0x00 hci status 0x1f Security is failed: 73:58:53:4F:EE:34 (random) level 1 err 9 [00:01:44.322,052] ble: Pairing is failed, reason code: (9). Disconnecting. [00:01:44.322,052] bt_conn: handle 0 ref 5 -> 6 [00:01:44.322,082] bt_conn: handle 0 ref 6 -> 5 [00:01:44.322,174] ble: Disconnected: 7358534fee34 (reason 0x05) [00:01:44.322,204] bt_conn: handle 0 ref 5 -> 6 [00:01:44.322,204] bt_conn: handle 0 ref 6 -> 5 [00:01:44.322,235] bt_conn: handle 0 ref 5 -> 4 [00:01:44.408,416] App: Push to output queue, size: 11 [00:01:44.408,569] ble: Process is finished, addr: 7358534fee34, result: failed [00:01:44.408,599] bt_conn: handle 0 ref 4 -> 3 [00:01:44.408,630] ble: Process is removed [00:01:44.408,660] bt_conn: handle 0 ref 3 -> 2 [00:01:44.408,691] bt_conn: handle 0 ref 2 -> 1