-
Notifications
You must be signed in to change notification settings - Fork 105
Description
on samsung s3 and tab, tx fails. Although the file contains some 100 packets, only a small amount is sent. Log:
--------- beginning of /dev/log/main
D/dalvikvm(21452): Late-enabling CheckJNI
D/ActivityThread(21452): handleBindApplication:com.mantz_it.hackrf_test
D/ActivityThread(21452): setTargetHeapUtilization:0.75
D/ActivityThread(21452): setTargetHeapMinFree:2097152
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
D/libEGL (21452): loaded /system/lib/egl/libEGL_mali.so
D/libEGL (21452): loaded /system/lib/egl/libGLESv1_CM_mali.so
D/libEGL (21452): loaded /system/lib/egl/libGLESv2_mali.so
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
D/OpenGLRenderer(21452): Enabling debug mode 0
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072675547
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072689799
W/InputEventReceiver(21452): Attempted to finish an input event but the input event receiver has already been disposed.
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072805849
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
--------- beginning of /dev/log/main
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
D/dalvikvm(21452): Late-enabling CheckJNI
D/ActivityThread(21452): handleBindApplication:com.mantz_it.hackrf_test
D/ActivityThread(21452): setTargetHeapUtilization:0.75
D/ActivityThread(21452): setTargetHeapMinFree:2097152
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
D/libEGL (21452): loaded /system/lib/egl/libEGL_mali.so
D/libEGL (21452): loaded /system/lib/egl/libGLESv1_CM_mali.so
D/libEGL (21452): loaded /system/lib/egl/libGLESv2_mali.so
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
D/OpenGLRenderer(21452): Enabling debug mode 0
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072675547
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072689799
W/InputEventReceiver(21452): Attempted to finish an input event but the input event receiver has already been disposed.
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072805849
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075112768
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075112768
I/hackrf_android(21452): initHackrf: Found 2 USB devices.
I/hackrf_android(21452): initHackrf: Found 2 USB devices.
D/hackrf_android(21452): initHackrf: deviceList: vendor=7504 product=24713
D/hackrf_android(21452): initHackrf: deviceList: vendor=7504 product=24713
I/hackrf_android(21452): initHackrf: Found HackRF One at /dev/bus/usb/001/017
I/hackrf_android(21452): initHackrf: Found HackRF One at /dev/bus/usb/001/017
D/hackrf_android(21452): initHackrf: deviceList: vendor=5401 product=32
D/hackrf_android(21452): initHackrf: deviceList: vendor=5401 product=32
D/hackrf_android(21452): Permission request for device /dev/bus/usb/001/017 was send. waiting...
D/hackrf_android(21452): Permission request for device /dev/bus/usb/001/017 was send. waiting...
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075177136
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075177136
D/hackrf_android(21452): initHackrf: Permission granted for device /dev/bus/usb/001/017
I/hackrf_android(21452): constructor: create Hackrf instance from /dev/bus/usb/001/017. Vendor ID: 7504 Product ID: 24713
I/hackrf_android(21452): constructor: device protocol: 0
I/hackrf_android(21452): constructor: device class: 0 subclass: 0
I/hackrf_android(21452): constructor: interface count: 2
I/hackrf_android(21452): constructor: [interface 0] interface protocol: 255 subclass: 255
I/hackrf_android(21452): constructor: [interface 0] interface class: 255
I/hackrf_android(21452): constructor: [interface 0] endpoint count: 2
I/hackrf_android(21452): constructor: [endpoint 0 (IN)] address: 129 attributes: 2 direction: 128 max_packet_size: 512
D/hackrf_android(21452): initHackrf: Permission granted for device /dev/bus/usb/001/017
I/hackrf_android(21452): constructor: create Hackrf instance from /dev/bus/usb/001/017. Vendor ID: 7504 Product ID: 24713
I/hackrf_android(21452): constructor: device protocol: 0
I/hackrf_android(21452): constructor: device class: 0 subclass: 0
I/hackrf_android(21452): constructor: interface count: 2
I/hackrf_android(21452): constructor: [interface 0] interface protocol: 255 subclass: 255
I/hackrf_android(21452): constructor: [interface 0] interface class: 255
I/hackrf_android(21452): constructor: [interface 0] endpoint count: 2
I/hackrf_android(21452): constructor: [endpoint 0 (IN)] address: 129 attributes: 2 direction: 128 max_packet_size: 512
I/hackrf_android(21452): constructor: [endpoint 1 (OUT)] address: 2 attributes: 2 direction: 0 max_packet_size: 512
I/hackrf_android(21452): constructor: [endpoint 1 (OUT)] address: 2 attributes: 2 direction: 0 max_packet_size: 512
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b2898
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b2898
D/UsbRequestJNI(21452): close
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b6938
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b6938
D/UsbRequestJNI(21452): close
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425baab0
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425baab0
D/UsbRequestJNI(21452): close
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425bf170
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425bf170
D/UsbRequestJNI(21452): close
D/UsbRequestJNI(21452): close
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@4262eb88
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@4262eb88
D/UsbRequestJNI(21452): close
D/UsbRequestJNI(21452): close
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1075231051
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1075231051
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
--------- beginning of /dev/log/main
D/dalvikvm(21452): Late-enabling CheckJNI
D/ActivityThread(21452): handleBindApplication:com.mantz_it.hackrf_test
D/ActivityThread(21452): setTargetHeapUtilization:0.75
D/ActivityThread(21452): setTargetHeapMinFree:2097152
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
D/libEGL (21452): loaded /system/lib/egl/libEGL_mali.so
D/libEGL (21452): loaded /system/lib/egl/libGLESv1_CM_mali.so
D/libEGL (21452): loaded /system/lib/egl/libGLESv2_mali.so
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
D/OpenGLRenderer(21452): Enabling debug mode 0
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072675547
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072689799
W/InputEventReceiver(21452): Attempted to finish an input event but the input event receiver has already been disposed.
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072805849
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075112768
I/hackrf_android(21452): initHackrf: Found 2 USB devices.
D/hackrf_android(21452): initHackrf: deviceList: vendor=7504 product=24713
I/hackrf_android(21452): initHackrf: Found HackRF One at /dev/bus/usb/001/017
D/hackrf_android(21452): initHackrf: deviceList: vendor=5401 product=32
D/hackrf_android(21452): Permission request for device /dev/bus/usb/001/017 was send. waiting...
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075177136
D/hackrf_android(21452): initHackrf: Permission granted for device /dev/bus/usb/001/017
I/hackrf_android(21452): constructor: create Hackrf instance from /dev/bus/usb/001/017. Vendor ID: 7504 Product ID: 24713
I/hackrf_android(21452): constructor: device protocol: 0
I/hackrf_android(21452): constructor: device class: 0 subclass: 0
I/hackrf_android(21452): constructor: interface count: 2
I/hackrf_android(21452): constructor: [interface 0] interface protocol: 255 subclass: 255
I/hackrf_android(21452): constructor: [interface 0] interface class: 255
I/hackrf_android(21452): constructor: [interface 0] endpoint count: 2
I/hackrf_android(21452): constructor: [endpoint 0 (IN)] address: 129 attributes: 2 direction: 128 max_packet_size: 512
I/hackrf_android(21452): constructor: [endpoint 1 (OUT)] address: 2 attributes: 2 direction: 0 max_packet_size: 512
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b2898
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b6938
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425baab0
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425bf170
D/UsbRequestJNI(21452): close
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@4262eb88
D/UsbRequestJNI(21452): close
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1075231051
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@424e94a8 time:1075244449
W/IInputConnectionWrapper(21452): clearMetaKeyStates on inactive InputConnection
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
E/ (21452): Device driver API match
E/ (21452): Device driver API version: 23
E/ (21452): User space API version: 23
E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@424e94a8 time:1075537655
I/hackrf_android(21452): initHackrf: Found 2 USB devices.
D/hackrf_android(21452): initHackrf: deviceList: vendor=7504 product=24713
I/hackrf_android(21452): initHackrf: Found HackRF One at /dev/bus/usb/001/017
D/hackrf_android(21452): initHackrf: deviceList: vendor=5401 product=32
D/hackrf_android(21452): Permission request for device /dev/bus/usb/001/017 was send. waiting...
D/hackrf_android(21452): initHackrf: Permission granted for device /dev/bus/usb/001/017
I/hackrf_android(21452): constructor: create Hackrf instance from /dev/bus/usb/001/017. Vendor ID: 7504 Product ID: 24713
I/hackrf_android(21452): constructor: device protocol: 0
I/hackrf_android(21452): constructor: device class: 0 subclass: 0
I/hackrf_android(21452): constructor: interface count: 2
I/hackrf_android(21452): constructor: [interface 0] interface protocol: 255 subclass: 255
I/hackrf_android(21452): constructor: [interface 0] interface class: 255
I/hackrf_android(21452): constructor: [interface 0] endpoint count: 2
I/hackrf_android(21452): constructor: [endpoint 0 (IN)] address: 129 attributes: 2 direction: 128 max_packet_size: 512
I/hackrf_android(21452): constructor: [endpoint 1 (OUT)] address: 2 attributes: 2 direction: 0 max_packet_size: 512
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 4336.600000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42612908
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42494d80
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42494d40
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425967a8
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42596830
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425968b8
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42596940
D/UsbRequestJNI(21452): close
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection
I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@424e94a8 time:1075666938
D/hackrf_android(21452): Tune HackRF to 433.660000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 433.660000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@4309c450
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@430a0510
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@430a8d28
D/UsbRequestJNI(21452): close
V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@430b0de0
D/UsbRequestJNI(21452): close
D/UsbRequestJNI(21452): init
D/hackrf_android(21452): Tune HackRF to 433.660000MHz...
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
D/UsbRequestJNI(21452): init
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting.
W/InputEventReceiver(21452): Attempted to finish an input event but the input event receiver has already been disposed.
W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection