Skip to content

TX fails #6

@rigid

Description

@rigid

on samsung s3 and tab, tx fails. Although the file contains some 100 packets, only a small amount is sent. Log:
--------- beginning of /dev/log/main
D/dalvikvm(21452): Late-enabling CheckJNI
D/ActivityThread(21452): handleBindApplication:com.mantz_it.hackrf_test
D/ActivityThread(21452): setTargetHeapUtilization:0.75
D/ActivityThread(21452): setTargetHeapMinFree:2097152
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
D/libEGL (21452): loaded /system/lib/egl/libEGL_mali.so
D/libEGL (21452): loaded /system/lib/egl/libGLESv1_CM_mali.so
D/libEGL (21452): loaded /system/lib/egl/libGLESv2_mali.so
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
D/OpenGLRenderer(21452): Enabling debug mode 0
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072675547
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072689799
W/InputEventReceiver(21452): Attempted to finish an input event but the input event receiver has already been disposed.
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072805849
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
--------- beginning of /dev/log/main
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
D/dalvikvm(21452): Late-enabling CheckJNI
D/ActivityThread(21452): handleBindApplication:com.mantz_it.hackrf_test
D/ActivityThread(21452): setTargetHeapUtilization:0.75
D/ActivityThread(21452): setTargetHeapMinFree:2097152
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
D/libEGL (21452): loaded /system/lib/egl/libEGL_mali.so
D/libEGL (21452): loaded /system/lib/egl/libGLESv1_CM_mali.so
D/libEGL (21452): loaded /system/lib/egl/libGLESv2_mali.so
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
D/OpenGLRenderer(21452): Enabling debug mode 0
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072675547
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072689799
W/InputEventReceiver(21452): Attempted to finish an input event but the input event receiver has already been disposed.
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072805849
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075112768
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075112768
I/hackrf_android(21452): initHackrf: Found 2 USB devices.
I/hackrf_android(21452): initHackrf: Found 2 USB devices.
D/hackrf_android(21452): initHackrf: deviceList: vendor=7504 product=24713
D/hackrf_android(21452): initHackrf: deviceList: vendor=7504 product=24713
I/hackrf_android(21452): initHackrf: Found HackRF One at /dev/bus/usb/001/017
I/hackrf_android(21452): initHackrf: Found HackRF One at /dev/bus/usb/001/017
D/hackrf_android(21452): initHackrf: deviceList: vendor=5401 product=32
D/hackrf_android(21452): initHackrf: deviceList: vendor=5401 product=32
D/hackrf_android(21452): Permission request for device /dev/bus/usb/001/017 was send. waiting...
D/hackrf_android(21452): Permission request for device /dev/bus/usb/001/017 was send. waiting...
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075177136
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075177136
D/hackrf_android(21452): initHackrf: Permission granted for device /dev/bus/usb/001/017
I/hackrf_android(21452): constructor: create Hackrf instance from /dev/bus/usb/001/017. Vendor ID: 7504 Product ID: 24713
I/hackrf_android(21452): constructor: device protocol: 0
I/hackrf_android(21452): constructor: device class: 0 subclass: 0
I/hackrf_android(21452): constructor: interface count: 2
I/hackrf_android(21452): constructor: [interface 0] interface protocol: 255 subclass: 255
I/hackrf_android(21452): constructor: [interface 0] interface class: 255
I/hackrf_android(21452): constructor: [interface 0] endpoint count: 2
I/hackrf_android(21452): constructor: [endpoint 0 (IN)] address: 129 attributes: 2 direction: 128 max_packet_size: 512
D/hackrf_android(21452): initHackrf: Permission granted for device /dev/bus/usb/001/017
I/hackrf_android(21452): constructor: create Hackrf instance from /dev/bus/usb/001/017. Vendor ID: 7504 Product ID: 24713
I/hackrf_android(21452): constructor: device protocol: 0
I/hackrf_android(21452): constructor: device class: 0 subclass: 0
I/hackrf_android(21452): constructor: interface count: 2
I/hackrf_android(21452): constructor: [interface 0] interface protocol: 255 subclass: 255
I/hackrf_android(21452): constructor: [interface 0] interface class: 255
I/hackrf_android(21452): constructor: [interface 0] endpoint count: 2
I/hackrf_android(21452): constructor: [endpoint 0 (IN)] address: 129 attributes: 2 direction: 128 max_packet_size: 512
I/hackrf_android(21452): constructor: [endpoint 1 (OUT)] address: 2 attributes: 2 direction: 0 max_packet_size: 512
I/hackrf_android(21452): constructor: [endpoint 1 (OUT)] address: 2 attributes: 2 direction: 0 max_packet_size: 512
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b2898
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b2898
D/UsbRequestJNI(21452): close
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b6938
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b6938
D/UsbRequestJNI(21452): close
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425baab0
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425baab0
D/UsbRequestJNI(21452): close
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425bf170
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425bf170
D/UsbRequestJNI(21452): close
D/UsbRequestJNI(21452): close
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@4262eb88
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@4262eb88
D/UsbRequestJNI(21452): close
D/UsbRequestJNI(21452): close
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1075231051
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1075231051
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
--------- beginning of /dev/log/main
D/dalvikvm(21452): Late-enabling CheckJNI
D/ActivityThread(21452): handleBindApplication:com.mantz_it.hackrf_test
D/ActivityThread(21452): setTargetHeapUtilization:0.75
D/ActivityThread(21452): setTargetHeapMinFree:2097152
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
D/libEGL (21452): loaded /system/lib/egl/libEGL_mali.so
D/libEGL (21452): loaded /system/lib/egl/libGLESv1_CM_mali.so
D/libEGL (21452): loaded /system/lib/egl/libGLESv2_mali.so
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
D/OpenGLRenderer(21452): Enabling debug mode 0
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072675547
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072689799
W/InputEventReceiver(21452): Attempted to finish an input event but the input event receiver has already been disposed.
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072805849
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075112768
I/hackrf_android(21452): initHackrf: Found 2 USB devices.
D/hackrf_android(21452): initHackrf: deviceList: vendor=7504 product=24713
I/hackrf_android(21452): initHackrf: Found HackRF One at /dev/bus/usb/001/017
D/hackrf_android(21452): initHackrf: deviceList: vendor=5401 product=32
D/hackrf_android(21452): Permission request for device /dev/bus/usb/001/017 was send. waiting...
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075177136
D/hackrf_android(21452): initHackrf: Permission granted for device /dev/bus/usb/001/017
I/hackrf_android(21452): constructor: create Hackrf instance from /dev/bus/usb/001/017. Vendor ID: 7504 Product ID: 24713
I/hackrf_android(21452): constructor: device protocol: 0
I/hackrf_android(21452): constructor: device class: 0 subclass: 0
I/hackrf_android(21452): constructor: interface count: 2
I/hackrf_android(21452): constructor: [interface 0] interface protocol: 255 subclass: 255
I/hackrf_android(21452): constructor: [interface 0] interface class: 255
I/hackrf_android(21452): constructor: [interface 0] endpoint count: 2
I/hackrf_android(21452): constructor: [endpoint 0 (IN)] address: 129 attributes: 2 direction: 128 max_packet_size: 512
I/hackrf_android(21452): constructor: [endpoint 1 (OUT)] address: 2 attributes: 2 direction: 0 max_packet_size: 512
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b2898
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b6938
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425baab0
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425bf170
D/UsbRequestJNI(21452): close
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@4262eb88
D/UsbRequestJNI(21452): close
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1075231051
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@424e94a8 time:1075244449
W/IInputConnectionWrapper(21452): clearMetaKeyStates on inactive InputConnection
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@424e94a8 time:1075537655
I/hackrf_android(21452): initHackrf: Found 2 USB devices.
D/hackrf_android(21452): initHackrf: deviceList: vendor=7504 product=24713
I/hackrf_android(21452): initHackrf: Found HackRF One at /dev/bus/usb/001/017
D/hackrf_android(21452): initHackrf: deviceList: vendor=5401 product=32
D/hackrf_android(21452): Permission request for device /dev/bus/usb/001/017 was send. waiting...
D/hackrf_android(21452): initHackrf: Permission granted for device /dev/bus/usb/001/017
I/hackrf_android(21452): constructor: create Hackrf instance from /dev/bus/usb/001/017. Vendor ID: 7504 Product ID: 24713
I/hackrf_android(21452): constructor: device protocol: 0
I/hackrf_android(21452): constructor: device class: 0 subclass: 0
I/hackrf_android(21452): constructor: interface count: 2
I/hackrf_android(21452): constructor: [interface 0] interface protocol: 255 subclass: 255
I/hackrf_android(21452): constructor: [interface 0] interface class: 255
I/hackrf_android(21452): constructor: [interface 0] endpoint count: 2
I/hackrf_android(21452): constructor: [endpoint 0 (IN)] address: 129 attributes: 2 direction: 128 max_packet_size: 512
I/hackrf_android(21452): constructor: [endpoint 1 (OUT)] address: 2 attributes: 2 direction: 0 max_packet_size: 512
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42612908
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42494d80
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42494d40
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425967a8
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42596830
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425968b8
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42596940
D/UsbRequestJNI(21452): close
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@424e94a8 time:1075666938
D/hackrf_android(21452): Tune HackRF to 433.660000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 433.660000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@4309c450
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@430a0510
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@430a8d28
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@430b0de0
D/UsbRequestJNI(21452): close
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 433.660000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
W/InputEventReceiver(21452): Attempted to finish an input event but the input event receiver has already been disposed.
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions