demantz / hackrf_android

A ported version of Michael Ossmann's libhackrf library to use with Android 3.1+
GNU General Public License v2.0
388 stars 91 forks source link

TX fails #6

Open rigid opened 8 years ago

rigid commented 8 years ago

on samsung s3 and tab, tx fails. Although the file contains some 100 packets, only a small amount is sent. Log: --------- beginning of /dev/log/main D/dalvikvm(21452): Late-enabling CheckJNI D/ActivityThread(21452): handleBindApplication:com.mantz_it.hackrf_test D/ActivityThread(21452): setTargetHeapUtilization:0.75 D/ActivityThread(21452): setTargetHeapMinFree:2097152 I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt D/libEGL (21452): loaded /system/lib/egl/libEGL_mali.so D/libEGL (21452): loaded /system/lib/egl/libGLESv1_CM_mali.so D/libEGL (21452): loaded /system/lib/egl/libGLESv2_mali.so E/ (21452): Device driver API match E/ (21452): Device driver API version: 23 E/ (21452): User space API version: 23 E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014 D/OpenGLRenderer(21452): Enabling debug mode 0 I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072675547 I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072689799 W/InputEventReceiver(21452): Attempted to finish an input event but the input event receiver has already been disposed. I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072805849 W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection --------- beginning of /dev/log/main I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt D/dalvikvm(21452): Late-enabling CheckJNI D/ActivityThread(21452): handleBindApplication:com.mantz_it.hackrf_test D/ActivityThread(21452): setTargetHeapUtilization:0.75 D/ActivityThread(21452): setTargetHeapMinFree:2097152 I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt D/libEGL (21452): loaded /system/lib/egl/libEGL_mali.so D/libEGL (21452): loaded /system/lib/egl/libGLESv1_CM_mali.so D/libEGL (21452): loaded /system/lib/egl/libGLESv2_mali.so E/ (21452): Device driver API match E/ (21452): Device driver API version: 23 E/ (21452): User space API version: 23 E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014 D/OpenGLRenderer(21452): Enabling debug mode 0 I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072675547 I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072689799 W/InputEventReceiver(21452): Attempted to finish an input event but the input event receiver has already been disposed. I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072805849 W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt E/ (21452): Device driver API match E/ (21452): Device driver API version: 23 E/ (21452): User space API version: 23 E/ (21452): Device driver API match E/ (21452): Device driver API version: 23 E/ (21452): User space API version: 23 E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014 E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014 I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075112768 I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075112768 I/hackrf_android(21452): initHackrf: Found 2 USB devices. I/hackrf_android(21452): initHackrf: Found 2 USB devices. D/hackrf_android(21452): initHackrf: deviceList: vendor=7504 product=24713 D/hackrf_android(21452): initHackrf: deviceList: vendor=7504 product=24713 I/hackrf_android(21452): initHackrf: Found HackRF One at /dev/bus/usb/001/017 I/hackrf_android(21452): initHackrf: Found HackRF One at /dev/bus/usb/001/017 D/hackrf_android(21452): initHackrf: deviceList: vendor=5401 product=32 D/hackrf_android(21452): initHackrf: deviceList: vendor=5401 product=32 D/hackrf_android(21452): Permission request for device /dev/bus/usb/001/017 was send. waiting... D/hackrf_android(21452): Permission request for device /dev/bus/usb/001/017 was send. waiting... I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075177136 I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075177136 D/hackrf_android(21452): initHackrf: Permission granted for device /dev/bus/usb/001/017 I/hackrf_android(21452): constructor: create Hackrf instance from /dev/bus/usb/001/017. Vendor ID: 7504 Product ID: 24713 I/hackrf_android(21452): constructor: device protocol: 0 I/hackrf_android(21452): constructor: device class: 0 subclass: 0 I/hackrf_android(21452): constructor: interface count: 2 I/hackrf_android(21452): constructor: [interface 0] interface protocol: 255 subclass: 255 I/hackrf_android(21452): constructor: [interface 0] interface class: 255 I/hackrf_android(21452): constructor: [interface 0] endpoint count: 2 I/hackrf_android(21452): constructor: [endpoint 0 (IN)] address: 129 attributes: 2 direction: 128 max_packet_size: 512 D/hackrf_android(21452): initHackrf: Permission granted for device /dev/bus/usb/001/017 I/hackrf_android(21452): constructor: create Hackrf instance from /dev/bus/usb/001/017. Vendor ID: 7504 Product ID: 24713 I/hackrf_android(21452): constructor: device protocol: 0 I/hackrf_android(21452): constructor: device class: 0 subclass: 0 I/hackrf_android(21452): constructor: interface count: 2 I/hackrf_android(21452): constructor: [interface 0] interface protocol: 255 subclass: 255 I/hackrf_android(21452): constructor: [interface 0] interface class: 255 I/hackrf_android(21452): constructor: [interface 0] endpoint count: 2 I/hackrf_android(21452): constructor: [endpoint 0 (IN)] address: 129 attributes: 2 direction: 128 max_packet_size: 512 I/hackrf_android(21452): constructor: [endpoint 1 (OUT)] address: 2 attributes: 2 direction: 0 max_packet_size: 512 I/hackrf_android(21452): constructor: [endpoint 1 (OUT)] address: 2 attributes: 2 direction: 0 max_packet_size: 512 D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b2898 V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b2898 D/UsbRequestJNI(21452): close D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b6938 V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b6938 D/UsbRequestJNI(21452): close D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425baab0 V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425baab0 D/UsbRequestJNI(21452): close D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425bf170 V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425bf170 D/UsbRequestJNI(21452): close D/UsbRequestJNI(21452): close E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting. E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting. D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@4262eb88 V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@4262eb88 D/UsbRequestJNI(21452): close D/UsbRequestJNI(21452): close E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting. E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting. D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1075231051 I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1075231051 W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection --------- beginning of /dev/log/main D/dalvikvm(21452): Late-enabling CheckJNI D/ActivityThread(21452): handleBindApplication:com.mantz_it.hackrf_test D/ActivityThread(21452): setTargetHeapUtilization:0.75 D/ActivityThread(21452): setTargetHeapMinFree:2097152 I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt D/libEGL (21452): loaded /system/lib/egl/libEGL_mali.so D/libEGL (21452): loaded /system/lib/egl/libGLESv1_CM_mali.so D/libEGL (21452): loaded /system/lib/egl/libGLESv2_mali.so E/ (21452): Device driver API match E/ (21452): Device driver API version: 23 E/ (21452): User space API version: 23 E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014 D/OpenGLRenderer(21452): Enabling debug mode 0 I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072675547 I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072689799 W/InputEventReceiver(21452): Attempted to finish an input event but the input event receiver has already been disposed. I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1072805849 W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt E/ (21452): Device driver API match E/ (21452): Device driver API version: 23 E/ (21452): User space API version: 23 E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014 I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075112768 I/hackrf_android(21452): initHackrf: Found 2 USB devices. D/hackrf_android(21452): initHackrf: deviceList: vendor=7504 product=24713 I/hackrf_android(21452): initHackrf: Found HackRF One at /dev/bus/usb/001/017 D/hackrf_android(21452): initHackrf: deviceList: vendor=5401 product=32 D/hackrf_android(21452): Permission request for device /dev/bus/usb/001/017 was send. waiting... I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4254aee8 time:1075177136 D/hackrf_android(21452): initHackrf: Permission granted for device /dev/bus/usb/001/017 I/hackrf_android(21452): constructor: create Hackrf instance from /dev/bus/usb/001/017. Vendor ID: 7504 Product ID: 24713 I/hackrf_android(21452): constructor: device protocol: 0 I/hackrf_android(21452): constructor: device class: 0 subclass: 0 I/hackrf_android(21452): constructor: interface count: 2 I/hackrf_android(21452): constructor: [interface 0] interface protocol: 255 subclass: 255 I/hackrf_android(21452): constructor: [interface 0] interface class: 255 I/hackrf_android(21452): constructor: [interface 0] endpoint count: 2 I/hackrf_android(21452): constructor: [endpoint 0 (IN)] address: 129 attributes: 2 direction: 128 max_packet_size: 512 I/hackrf_android(21452): constructor: [endpoint 1 (OUT)] address: 2 attributes: 2 direction: 0 max_packet_size: 512 D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b2898 D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425b6938 D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425baab0 D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425bf170 D/UsbRequestJNI(21452): close E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting. D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@4262eb88 D/UsbRequestJNI(21452): close E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting. D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@4247d800 time:1075231051 W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting. E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting. I/MainActivity(21452): onCreate: log path: /storage/emulated/0/Test_HackRF/log.txt I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@424e94a8 time:1075244449 W/IInputConnectionWrapper(21452): clearMetaKeyStates on inactive InputConnection W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection E/ (21452): Device driver API match E/ (21452): Device driver API version: 23 E/ (21452): User space API version: 23 E/ (21452): mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Fri Mar 21 13:52:50 KST 2014 I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@424e94a8 time:1075537655 I/hackrf_android(21452): initHackrf: Found 2 USB devices. D/hackrf_android(21452): initHackrf: deviceList: vendor=7504 product=24713 I/hackrf_android(21452): initHackrf: Found HackRF One at /dev/bus/usb/001/017 D/hackrf_android(21452): initHackrf: deviceList: vendor=5401 product=32 D/hackrf_android(21452): Permission request for device /dev/bus/usb/001/017 was send. waiting... D/hackrf_android(21452): initHackrf: Permission granted for device /dev/bus/usb/001/017 I/hackrf_android(21452): constructor: create Hackrf instance from /dev/bus/usb/001/017. Vendor ID: 7504 Product ID: 24713 I/hackrf_android(21452): constructor: device protocol: 0 I/hackrf_android(21452): constructor: device class: 0 subclass: 0 I/hackrf_android(21452): constructor: interface count: 2 I/hackrf_android(21452): constructor: [interface 0] interface protocol: 255 subclass: 255 I/hackrf_android(21452): constructor: [interface 0] interface class: 255 I/hackrf_android(21452): constructor: [interface 0] endpoint count: 2 I/hackrf_android(21452): constructor: [endpoint 0 (IN)] address: 129 attributes: 2 direction: 128 max_packet_size: 512 I/hackrf_android(21452): constructor: [endpoint 1 (OUT)] address: 2 attributes: 2 direction: 0 max_packet_size: 512 D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/hackrf_android(21452): Tune HackRF to 4336.600000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42612908 D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42494d80 D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42494d40 D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425967a8 D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42596830 D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@425968b8 D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@42596940 D/UsbRequestJNI(21452): close E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting. W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection I/Timeline(21452): Timeline: Activity_idle id: android.os.BinderProxy@424e94a8 time:1075666938 D/hackrf_android(21452): Tune HackRF to 433.660000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/hackrf_android(21452): Tune HackRF to 433.660000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@4309c450 D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@430a0510 D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@430a8d28 D/UsbRequestJNI(21452): close V/UsbRequest(21452): endpoint still open in finalize(): android.hardware.usb.UsbRequest@430b0de0 D/UsbRequestJNI(21452): close D/UsbRequestJNI(21452): init D/hackrf_android(21452): Tune HackRF to 433.660000MHz... D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init D/UsbRequestJNI(21452): init E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting. E/hackrf_android(21452): transmitLoop: Queue empty or wrong packet format. Stop transmitting. W/InputEventReceiver(21452): Attempted to finish an input event but the input event receiver has already been disposed. W/IInputConnectionWrapper(21452): showStatusIcon on inactive InputConnection

demantz commented 8 years ago

Hmm some parts of the log look weird. It almost seems that the app (or at least the action) was running twice and in parallel.

Did you try to force quit the app and run it again? The actual error why TX stops is that the transmit buffer is empty. Might be because the file cannot be read from memory fast enough. And there are also errors from the USB request that shouldn't be there..

Honestly I don't know what's causing the errors. I can't reproduce it on my nexus 7.

By the way at which sample rate did you receive and transmit?