Liebes Forum,
mein Setup lief nun wieder ein Jahr problemlos; seit ein paar Tagen habe ich manchmal sehr lange Lesezeiten der Karte; was zu Bildaussetzern führt:
in der History sehe ich dann wie am Bild einige rote Balken (Zeiten teilweise 15000+ ms), dann wieder einige normal und sehr flott, dann wieder ewig langsam.
Meine Daten: Raspberry 3 mit Smartmouse/Easymouse Reader über USB, oscam-1.20-unstable_svn-r11211, raspbian jessie
Ich habe an meiner Konfiguration nichts verändert; ich nehme an, ich sollte nicht lauter globale EMM schreiben? Wie blocke ich die; bzw. wie schreibe ich trotzdem die EMMs, die ich benötige, damit die Karte aktiv bleibt? Ist meine Karte jetzt beschädigt durch das dauernde schreiben?
keine dvbapi.
ich habe Kartenname, passwörter & keys durch xxx ersetzt; falls da sonst noch Infos drin sind, die da nicht sein sollten, lasst es mich bitte wissen...
Habt ihr ideen, wie ich das behebe? Brauche ich eine neue Karte? und was sollte ich blocken/was nicht?
vielen Dank im Voraus & schönen Sonntag Abend!
mein Setup lief nun wieder ein Jahr problemlos; seit ein paar Tagen habe ich manchmal sehr lange Lesezeiten der Karte; was zu Bildaussetzern führt:
Du musst Regestriert sein, um das angehängte Bild zusehen.
Meine Daten: Raspberry 3 mit Smartmouse/Easymouse Reader über USB, oscam-1.20-unstable_svn-r11211, raspbian jessie
Ich habe an meiner Konfiguration nichts verändert; ich nehme an, ich sollte nicht lauter globale EMM schreiben? Wie blocke ich die; bzw. wie schreibe ich trotzdem die EMMs, die ich benötige, damit die Karte aktiv bleibt? Ist meine Karte jetzt beschädigt durch das dauernde schreiben?
2020/02/09 19:49:49 00000000 s >> OSCam << cardserver log switched, version 1.20-unstable_svn, build r11211 (arm-linux-gnueabihf)
2020/02/09 19:49:49 00000000 s (main) System name = Linux
2020/02/09 19:49:49 00000000 s (main) Host name = tvhserver
2020/02/09 19:49:49 00000000 s (main) Release = 4.9.35-v7+
2020/02/09 19:49:49 00000000 s (main) Version = #1014 SMP Fri Jun 30 14:47:43 BST 2017
2020/02/09 19:49:49 00000000 s (main) Machine = armv7l
2020/02/09 19:49:49 00000000 s (main) creating pidfile /tmp/.oscam/oscam.pid with pid 780
2020/02/09 19:49:49 00000000 s (config) services reloaded: 0 services freed, 1 services loaded, rejected 0
2020/02/09 19:49:49 00000000 s (config) userdb reloaded: 1 accounts loaded, 0 expired, 0 disabled
2020/02/09 19:49:49 00000000 s (main) signal handling initialized
2020/02/09 19:49:49 00000000 s (net) newcamd: initialized (fd=5, port=15000)
2020/02/09 19:49:49 00000000 s (net) -> CAID: 0648 PROVID: 000000, 000004, 00000C, 000010, 000008
2020/02/09 19:49:49 57E65D6F h (webif) webif: decompressed 158936 bytes back into 382792 bytes
2020/02/09 19:49:49 57E65D6F h (webif) HTTP Server running. ip=0.0.0.0 port=8888
2020/02/09 19:49:49 00000000 s (reader) XXX [mouse] creating thread for device /dev/ttyUSB0
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Buffers readed 0 bytes total time_us 75126
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 1 value 3b time_us 4030
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 2 value 78 time_us 32761
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 3 value 12 time_us 18
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 4 value 00 time_us 10
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 5 value 00 time_us 9
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 6 value 54 time_us 9
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 7 value c4 time_us 9
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 8 value 03 time_us 10
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 9 value 00 time_us 10
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 10 value 8f time_us 9
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 11 value f1 time_us 10
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 12 value 90 time_us 10
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 13 value 00 time_us 9
2020/02/09 19:49:50 5B254FC3 r (reader) XXX [mouse] Buffers readed 13 bytes total time_us 112351
2020/02/09 19:49:50 5B254FC3 r (reader) XXX [mouse] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=600, cardmhz=368)
2020/02/09 19:49:50 5B254FC3 r (reader) XXX [mouse] card detected
2020/02/09 19:49:50 5B254FC3 r (reader) XXX [mouse] Buffers readed 0 bytes total time_us 75121
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] ATR: 3B 78 12 00 00 54 C4 03 00 8F F1 90 00
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] Buffers readed 0 bytes total time_us 75119
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] Init card protocol T0, FI=1, F=372, D=2, N=0
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] Setting baudrate to 19819 bps
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] Calculated work ETU is 31.00 us reader mhz = 600
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] Buffers readed 0 bytes total time_us 75114
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] ATR Fsmax is 5 MHz, clocking card to wanted user cardspeed off 6.00 MHz (specified in reader->mhz)
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [mouse] card detected
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [mouse] type: CryptoWorks
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [mouse] type: CryptoWorks, caid: 0D98, ascii serial: #########, hex serial: ##########
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [mouse] issuer: CryptoWorks, id: 04, bios: v3, pin: unknown, mfid: 3F00
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [mouse] providers: 4 (04,08,0C,10)
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [mouse] found card system cryptoworks
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [cryptoworks] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max alloted of 1
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [cryptoworks] provider: 1, id: 04, name: Operator: FFFF
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] chid: FFE0, date: 2019/11/15 - 2020/07/23, name: Product FFE0
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] chid: 0001, date: 2019/11/15 - 2020/07/23, name: Product 0001
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] chid: 0002, date: 2019/11/15 - 2020/07/23, name: Product 0002
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] provider: 2, id: 08, name: Operator: FFFF
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] provider: 3, id: 0C, name: Operator: FFFF
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] provider: 4, id: 10, name: Operator: FFFF
2020/02/09 19:49:55 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 19:49:55 5B254FC3 r (reader) XXX [cryptoworks] ready for requests
2020/02/09 19:49:56 00000000 s (emmcache) loaded 212094 emmcache records from /usr/local/etc/oscam.emmcache in 6837 ms
2020/02/09 20:09:10 00000000 s (emmcache) loaded 213098 emmstat records from /usr/local/etc/oscam.emmstat in 1153502 ms
2020/02/09 20:09:10 00000000 s (anticasc) anti cascading disabled
2020/02/09 20:09:10 2AFDA360 c (client) plain dvbapi-client granted (benutzer, au=auto (2 reader))
2020/02/09 20:09:10 2AFDA360 c (dvbapi) dvbapi channelcache loaded from /usr/local/etc/oscam.ccache
2020/02/09 20:09:10 2AFDA360 c (dvbapi) Using /tmp/camd.socket listen socket, API forced to DVBAPIv3 (0), userconfig boxtype: 12
2020/02/09 20:11:38 57E65D6F h (webif) Reader XXX stats resetted by WebIF from 192.168.10.23
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] provider: 1, id: 04, name: Operator: FFFF
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] chid: FFE0, date: 2019/11/15 - 2020/07/23, name: Product FFE0
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] chid: 0001, date: 2019/11/15 - 2020/07/23, name: Product 0001
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] chid: 0002, date: 2019/11/15 - 2020/07/23, name: Product 0002
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] provider: 2, id: 08, name: Operator: FFFF
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 20:11:57 5B254FC3 r (reader) XXX [cryptoworks] provider: 3, id: 0C, name: Operator: FFFF
2020/02/09 20:11:57 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 20:11:57 5B254FC3 r (reader) XXX [cryptoworks] provider: 4, id: 10, name: Operator: FFFF
2020/02/09 20:11:57 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 20:11:57 5B254FC3 r (reader) XXX [cryptoworks] ready for requests
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 ecmpid 0 CAID: 0D98 ECM_PID: 00FD PROVID: 000000
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 ecmpid 1 CAID: 0D95 ECM_PID: 00FB PROVID: 000000
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 ecmpid 2 CAID: 0650 ECM_PID: 0067 PROVID: 000000
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 ecmpid 3 CAID: 0648 ECM_PID: 0065 PROVID: 000000
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 stream Videostream (MPEG-1)(type: 01 pid: 0001 length: 6)
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 found 4 ECMpids and 1 STREAMpids in caPMT
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 serving srvid 32C9 (0D98@000000:32C9 unknown) on adapter 0000 camask 0001 index 0000 pmtpid 0000
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 found channel in cache and matching prio -> start descrambling ecmpid 0
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 trying to descramble PID 0 CAID 0D98 PROVID 000000 ECMPID 00FD ANY CHID PMTPID 0000 VPID 0001
2020/02/09 20:31:31 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:998C64C630C706E85E49044C454FBA39): found (111 ms) by XXX
2020/02/09 20:31:34 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:C193A6A28EC22DC1F4B088EB4A1A041E): found (85 ms) by XXX
2020/02/09 20:31:44 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:B705EFFE09A28F2931FFFD396778AC0C): found (109 ms) by XXX
2020/02/09 20:31:54 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:82C077E6971A0874287811340C4849EC): found (98 ms) by XXX
2020/02/09 20:32:03 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1197 ms)
2020/02/09 20:32:04 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:17138AC063E6DCF221D5B8BBB96AA83A): found (92 ms) by XXX
2020/02/09 20:32:08 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (882 ms)
2020/02/09 20:32:12 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (781 ms)
2020/02/09 20:32:14 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:A3A9A4A60C14E3D4772BAB5AA4E66C30): found (89 ms) by XXX
2020/02/09 20:32:21 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (886 ms)
2020/02/09 20:32:24 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (794 ms)
2020/02/09 20:32:25 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:0AFB2F5C2C30E1AD087C2B1B034C2391): found (525 ms) by XXX
2020/02/09 20:32:28 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1673 ms)
2020/02/09 20:32:29 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (847 ms)
2020/02/09 20:32:33 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (882 ms)
2020/02/09 20:32:36 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1627 ms)
2020/02/09 20:32:36 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:8C99330AE8FC722573CDBE6F7DDAF61D): found (1725 ms) by XXX
2020/02/09 20:32:37 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1021 ms)
2020/02/09 20:32:38 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (798 ms)
2020/02/09 20:32:44 2AFDA360 c (-) -- Skipped 1 duplicated log lines --
2020/02/09 20:32:44 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:71CFC5A4BD5BC26E869E4F7B9EF7D6C9): found (106 ms) by XXX
2020/02/09 20:32:47 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (821 ms)
2020/02/09 20:32:52 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (822 ms)
2020/02/09 20:32:54 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:4D60C54A0290ECA0BF724B85015233DB): found (93 ms) by XXX
2020/02/09 20:32:58 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1565 ms)
2020/02/09 20:33:00 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1447 ms)
2020/02/09 20:33:02 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1832 ms)
2020/02/09 20:33:03 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1291 ms)
2020/02/09 20:33:05 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1452 ms)
2020/02/09 20:33:06 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1390 ms)
2020/02/09 20:33:08 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1758 ms)
2020/02/09 20:33:09 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1244 ms)
2020/02/09 20:33:09 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:CF4AFF0D94EB84B1355267A667AB1983): found (3319 ms) by XXX
2020/02/09 19:49:49 00000000 s (main) System name = Linux
2020/02/09 19:49:49 00000000 s (main) Host name = tvhserver
2020/02/09 19:49:49 00000000 s (main) Release = 4.9.35-v7+
2020/02/09 19:49:49 00000000 s (main) Version = #1014 SMP Fri Jun 30 14:47:43 BST 2017
2020/02/09 19:49:49 00000000 s (main) Machine = armv7l
2020/02/09 19:49:49 00000000 s (main) creating pidfile /tmp/.oscam/oscam.pid with pid 780
2020/02/09 19:49:49 00000000 s (config) services reloaded: 0 services freed, 1 services loaded, rejected 0
2020/02/09 19:49:49 00000000 s (config) userdb reloaded: 1 accounts loaded, 0 expired, 0 disabled
2020/02/09 19:49:49 00000000 s (main) signal handling initialized
2020/02/09 19:49:49 00000000 s (net) newcamd: initialized (fd=5, port=15000)
2020/02/09 19:49:49 00000000 s (net) -> CAID: 0648 PROVID: 000000, 000004, 00000C, 000010, 000008
2020/02/09 19:49:49 57E65D6F h (webif) webif: decompressed 158936 bytes back into 382792 bytes
2020/02/09 19:49:49 57E65D6F h (webif) HTTP Server running. ip=0.0.0.0 port=8888
2020/02/09 19:49:49 00000000 s (reader) XXX [mouse] creating thread for device /dev/ttyUSB0
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Buffers readed 0 bytes total time_us 75126
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 1 value 3b time_us 4030
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 2 value 78 time_us 32761
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 3 value 12 time_us 18
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 4 value 00 time_us 10
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 5 value 00 time_us 9
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 6 value 54 time_us 9
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 7 value c4 time_us 9
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 8 value 03 time_us 10
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 9 value 00 time_us 10
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 10 value 8f time_us 9
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 11 value f1 time_us 10
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 12 value 90 time_us 10
2020/02/09 19:49:49 5B254FC3 r (reader) XXX [mouse] Flush readed byte Nr 13 value 00 time_us 9
2020/02/09 19:49:50 5B254FC3 r (reader) XXX [mouse] Buffers readed 13 bytes total time_us 112351
2020/02/09 19:49:50 5B254FC3 r (reader) XXX [mouse] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=600, cardmhz=368)
2020/02/09 19:49:50 5B254FC3 r (reader) XXX [mouse] card detected
2020/02/09 19:49:50 5B254FC3 r (reader) XXX [mouse] Buffers readed 0 bytes total time_us 75121
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] ATR: 3B 78 12 00 00 54 C4 03 00 8F F1 90 00
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] Buffers readed 0 bytes total time_us 75119
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] Init card protocol T0, FI=1, F=372, D=2, N=0
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] Setting baudrate to 19819 bps
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] Calculated work ETU is 31.00 us reader mhz = 600
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] Buffers readed 0 bytes total time_us 75114
2020/02/09 19:49:52 5B254FC3 r (reader) XXX [mouse] ATR Fsmax is 5 MHz, clocking card to wanted user cardspeed off 6.00 MHz (specified in reader->mhz)
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [mouse] card detected
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [mouse] type: CryptoWorks
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [mouse] type: CryptoWorks, caid: 0D98, ascii serial: #########, hex serial: ##########
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [mouse] issuer: CryptoWorks, id: 04, bios: v3, pin: unknown, mfid: 3F00
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [mouse] providers: 4 (04,08,0C,10)
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [mouse] found card system cryptoworks
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [cryptoworks] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max alloted of 1
2020/02/09 19:49:53 5B254FC3 r (reader) XXX [cryptoworks] provider: 1, id: 04, name: Operator: FFFF
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] chid: FFE0, date: 2019/11/15 - 2020/07/23, name: Product FFE0
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] chid: 0001, date: 2019/11/15 - 2020/07/23, name: Product 0001
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] chid: 0002, date: 2019/11/15 - 2020/07/23, name: Product 0002
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] provider: 2, id: 08, name: Operator: FFFF
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] provider: 3, id: 0C, name: Operator: FFFF
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 19:49:54 5B254FC3 r (reader) XXX [cryptoworks] provider: 4, id: 10, name: Operator: FFFF
2020/02/09 19:49:55 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 19:49:55 5B254FC3 r (reader) XXX [cryptoworks] ready for requests
2020/02/09 19:49:56 00000000 s (emmcache) loaded 212094 emmcache records from /usr/local/etc/oscam.emmcache in 6837 ms
2020/02/09 20:09:10 00000000 s (emmcache) loaded 213098 emmstat records from /usr/local/etc/oscam.emmstat in 1153502 ms
2020/02/09 20:09:10 00000000 s (anticasc) anti cascading disabled
2020/02/09 20:09:10 2AFDA360 c (client) plain dvbapi-client granted (benutzer, au=auto (2 reader))
2020/02/09 20:09:10 2AFDA360 c (dvbapi) dvbapi channelcache loaded from /usr/local/etc/oscam.ccache
2020/02/09 20:09:10 2AFDA360 c (dvbapi) Using /tmp/camd.socket listen socket, API forced to DVBAPIv3 (0), userconfig boxtype: 12
2020/02/09 20:11:38 57E65D6F h (webif) Reader XXX stats resetted by WebIF from 192.168.10.23
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] provider: 1, id: 04, name: Operator: FFFF
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] chid: FFE0, date: 2019/11/15 - 2020/07/23, name: Product FFE0
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] chid: 0001, date: 2019/11/15 - 2020/07/23, name: Product 0001
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] chid: 0002, date: 2019/11/15 - 2020/07/23, name: Product 0002
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] provider: 2, id: 08, name: Operator: FFFF
2020/02/09 20:11:56 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 20:11:57 5B254FC3 r (reader) XXX [cryptoworks] provider: 3, id: 0C, name: Operator: FFFF
2020/02/09 20:11:57 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 20:11:57 5B254FC3 r (reader) XXX [cryptoworks] provider: 4, id: 10, name: Operator: FFFF
2020/02/09 20:11:57 5B254FC3 r (reader) XXX [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/02/09 20:11:57 5B254FC3 r (reader) XXX [cryptoworks] ready for requests
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 ecmpid 0 CAID: 0D98 ECM_PID: 00FD PROVID: 000000
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 ecmpid 1 CAID: 0D95 ECM_PID: 00FB PROVID: 000000
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 ecmpid 2 CAID: 0650 ECM_PID: 0067 PROVID: 000000
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 ecmpid 3 CAID: 0648 ECM_PID: 0065 PROVID: 000000
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 stream Videostream (MPEG-1)(type: 01 pid: 0001 length: 6)
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 found 4 ECMpids and 1 STREAMpids in caPMT
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 serving srvid 32C9 (0D98@000000:32C9 unknown) on adapter 0000 camask 0001 index 0000 pmtpid 0000
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 found channel in cache and matching prio -> start descrambling ecmpid 0
2020/02/09 20:31:30 2AFDA360 c (dvbapi) Demuxer 0 trying to descramble PID 0 CAID 0D98 PROVID 000000 ECMPID 00FD ANY CHID PMTPID 0000 VPID 0001
2020/02/09 20:31:31 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:998C64C630C706E85E49044C454FBA39): found (111 ms) by XXX
2020/02/09 20:31:34 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:C193A6A28EC22DC1F4B088EB4A1A041E): found (85 ms) by XXX
2020/02/09 20:31:44 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:B705EFFE09A28F2931FFFD396778AC0C): found (109 ms) by XXX
2020/02/09 20:31:54 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:82C077E6971A0874287811340C4849EC): found (98 ms) by XXX
2020/02/09 20:32:03 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1197 ms)
2020/02/09 20:32:04 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:17138AC063E6DCF221D5B8BBB96AA83A): found (92 ms) by XXX
2020/02/09 20:32:08 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (882 ms)
2020/02/09 20:32:12 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (781 ms)
2020/02/09 20:32:14 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:A3A9A4A60C14E3D4772BAB5AA4E66C30): found (89 ms) by XXX
2020/02/09 20:32:21 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (886 ms)
2020/02/09 20:32:24 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (794 ms)
2020/02/09 20:32:25 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:0AFB2F5C2C30E1AD087C2B1B034C2391): found (525 ms) by XXX
2020/02/09 20:32:28 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1673 ms)
2020/02/09 20:32:29 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (847 ms)
2020/02/09 20:32:33 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (882 ms)
2020/02/09 20:32:36 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1627 ms)
2020/02/09 20:32:36 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:8C99330AE8FC722573CDBE6F7DDAF61D): found (1725 ms) by XXX
2020/02/09 20:32:37 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1021 ms)
2020/02/09 20:32:38 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (798 ms)
2020/02/09 20:32:44 2AFDA360 c (-) -- Skipped 1 duplicated log lines --
2020/02/09 20:32:44 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:71CFC5A4BD5BC26E869E4F7B9EF7D6C9): found (106 ms) by XXX
2020/02/09 20:32:47 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (821 ms)
2020/02/09 20:32:52 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (822 ms)
2020/02/09 20:32:54 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:4D60C54A0290ECA0BF724B85015233DB): found (93 ms) by XXX
2020/02/09 20:32:58 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1565 ms)
2020/02/09 20:33:00 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1447 ms)
2020/02/09 20:33:02 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1832 ms)
2020/02/09 20:33:03 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1291 ms)
2020/02/09 20:33:05 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1452 ms)
2020/02/09 20:33:06 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1390 ms)
2020/02/09 20:33:08 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1758 ms)
2020/02/09 20:33:09 5B254FC3 r (reader) XXX [cryptoworks] benutzer emmtype=global, len=55 (hex: 0x37), cnt=1: written (1244 ms)
2020/02/09 20:33:09 2AFDA360 c (ecm) benutzer (0D98@000004/0000/32C9/80:CF4AFF0D94EB84B1355267A667AB1983): found (3319 ms) by XXX
[global]
logfile = /tmp/oscam.log
clienttimeout = 15000
clientmaxidle = 160
nice = -1
maxlogsize = 2048
waitforcards = 0
emmlogdir = /usr/local/etc
lb_mode = 1
lb_save = 100
lb_savepath = /usr/local/stat
lb_auto_timeout_t = 26000
[cache]
max_time = 18
[newcamd]
port = 15000@0648:000000,000004,00000C,000010,000008
key = 01...xxx...14
[dvbapi]
enabled = 1
au = 1
pmt_mode = 0
request_mode = 1
ecminfo_type = 4
user = benutzer
boxtype = pc-nodmx
#listen_port = 9000
[webif]
httpport = 8888
httpuser = xxxx
httppwd = xxxx
httphelplang = de
httphideidleclients = 0
httpallowed = 127.0.0.1,192.168.xx.x-192.168.xx.xxx
logfile = /tmp/oscam.log
clienttimeout = 15000
clientmaxidle = 160
nice = -1
maxlogsize = 2048
waitforcards = 0
emmlogdir = /usr/local/etc
lb_mode = 1
lb_save = 100
lb_savepath = /usr/local/stat
lb_auto_timeout_t = 26000
[cache]
max_time = 18
[newcamd]
port = 15000@0648:000000,000004,00000C,000010,000008
key = 01...xxx...14
[dvbapi]
enabled = 1
au = 1
pmt_mode = 0
request_mode = 1
ecminfo_type = 4
user = benutzer
boxtype = pc-nodmx
#listen_port = 9000
[webif]
httpport = 8888
httpuser = xxxx
httppwd = xxxx
httphelplang = de
httphideidleclients = 0
httpallowed = 127.0.0.1,192.168.xx.x-192.168.xx.xxx
[reader]
label = XXX
description = ICE
protocol = mouse
device = /dev/ttyUSB0
services = orf
caid = 0D98
detect = cd
mhz = 600
cardmhz = 368
group = 1
emmcache = 1,1,2,0
blockemm-unknown = 1
[orf]
caid = 0D98
provid = 000000
srvid = 3332,32C9,32CA,32CB,32CC,32CD,32CE,32CF,32D0,32D1, 32D2,32D3,32D4,4E27,132F,1330,33A7,332D,33A5,33AC
label = XXX
description = ICE
protocol = mouse
device = /dev/ttyUSB0
services = orf
caid = 0D98
detect = cd
mhz = 600
cardmhz = 368
group = 1
emmcache = 1,1,2,0
blockemm-unknown = 1
[orf]
caid = 0D98
provid = 000000
srvid = 3332,32C9,32CA,32CB,32CC,32CD,32CE,32CF,32D0,32D1, 32D2,32D3,32D4,4E27,132F,1330,33A7,332D,33A5,33AC
[account]
user = xxx
pwd = xxx
caid = 0D98
monlevel = 4
au = 1
group = 1
preferlocalcards = 0
max_connections = 5
user = xxx
pwd = xxx
caid = 0D98
monlevel = 4
au = 1
group = 1
preferlocalcards = 0
max_connections = 5
keine dvbapi.
ich habe Kartenname, passwörter & keys durch xxx ersetzt; falls da sonst noch Infos drin sind, die da nicht sein sollten, lasst es mich bitte wissen...
Habt ihr ideen, wie ich das behebe? Brauche ich eine neue Karte? und was sollte ich blocken/was nicht?
vielen Dank im Voraus & schönen Sonntag Abend!
Anhänge
Du musst angemeldet sein, um die Anhangsliste zu sehen.
Zuletzt bearbeitet von einem Moderator: