2019/08/16 13:53:53 00000000 s (main) System name = Linux
2019/08/16 13:53:53 00000000 s (main) Host name = cf2252f0f701
2019/08/16 13:53:53 00000000 s (main) Release = 4.19.56-Unraid
2019/08/16 13:53:53 00000000 s (main) Version = #1 SMP Tue Jun 25 10:19:34 PDT 2019
2019/08/16 13:53:53 00000000 s (main) Machine = x86_64
2019/08/16 13:53:53 00000000 s (main) creating pidfile /tmp/.oscam/oscam.pid with pid 3784
2019/08/16 13:53:53 00000000 s (config) userdb reloaded: 1 accounts loaded, 0 expired, 0 disabled
2019/08/16 13:53:53 00000000 s (main) signal handling initialized
2019/08/16 13:53:53 00000000 s (config) 5 provid's loaded
2019/08/16 13:53:53 00000000 s (config) 4 service-id's loaded in 0 ms
2019/08/16 13:53:53 00000000 s (reader) myusbmousereader [mouse] creating thread for device /dev/ttyUSB0
2019/08/16 13:53:53 00000000 s (main) waiting for local card init
2019/08/16 13:53:53 26133212 h (webif) webif: decompressed 178854 bytes back into 441720 bytes
2019/08/16 13:53:53 26133212 h (webif) HTTP Server running. ip=0.0.0.0 port=8888
2019/08/16 13:53:54 0E5C1212 r (reader) myusbmousereader [mouse] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=357, cardmhz=357)
2019/08/16 13:53:54 0E5C1212 r (reader) myusbmousereader [mouse] card detected
2019/08/16 13:53:56 0E5C1212 r (reader) myusbmousereader [mouse] ATR: 3B 78 12 00 00 54 C4 03 00 8F F1 90 00
2019/08/16 13:53:56 0E5C1212 r (reader) myusbmousereader [mouse] Setting baudrate to 19200 bps
2019/08/16 13:53:57 0E5C1212 r (reader) myusbmousereader [mouse] card detected
2019/08/16 13:53:57 0E5C1212 r (reader) myusbmousereader [mouse] type: CryptoWorks
2019/08/16 13:53:57 0E5C1212 r (reader) myusbmousereader [mouse] type: CryptoWorks, caid: 0D98, ascii serial: #########, hex serial: ##########
2019/08/16 13:53:57 0E5C1212 r (reader) myusbmousereader [mouse] issuer: CryptoWorks, id: 04, bios: v3, pin: unknown, mfid: 3F00
2019/08/16 13:53:57 0E5C1212 r (reader) myusbmousereader [mouse] providers: 4 (04,08,0C,10)
2019/08/16 13:53:57 0E5C1212 r (reader) myusbmousereader [mouse] found card system cryptoworks
2019/08/16 13:53:57 0E5C1212 r (reader) myusbmousereader [cryptoworks] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2019/08/16 13:53:57 0E5C1212 r (reader) myusbmousereader [cryptoworks] provider: 1, id: 04, name: Operator: FFFF
2019/08/16 13:53:58 0E5C1212 r (reader) myusbmousereader [cryptoworks] chid: FFE0, date: 2019/08/16 - 2020/04/22, name: Product FFE0
2019/08/16 13:53:58 0E5C1212 r (reader) myusbmousereader [cryptoworks] chid: 0001, date: 2019/08/16 - 2020/04/22, name: Product 0001
2019/08/16 13:53:58 0E5C1212 r (reader) myusbmousereader [cryptoworks] chid: 0002, date: 2019/08/16 - 2020/04/22, name: Product 0002
2019/08/16 13:53:58 0E5C1212 r (reader) myusbmousereader [cryptoworks] chid: 7FFB, date: 2019/08/16 - 2019/09/15, name: Product 7FFB
2019/08/16 13:53:58 0E5C1212 r (reader) myusbmousereader [cryptoworks] chid: 7FF7, date: 2019/08/16 - 2019/08/26, name: Product 7FF7
2019/08/16 13:53:58 0E5C1212 r (reader) myusbmousereader [cryptoworks] chid: FFD8, date: 2019/08/16 - 2019/09/15, name: Product FFD8
2019/08/16 13:53:58 0E5C1212 r (reader) myusbmousereader [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2019/08/16 13:53:58 0E5C1212 r (reader) myusbmousereader [cryptoworks] provider: 2, id: 08, name: Operator: FFFF
2019/08/16 13:53:58 0E5C1212 r (reader) myusbmousereader [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2019/08/16 13:53:58 0E5C1212 r (reader) myusbmousereader [cryptoworks] provider: 3, id: 0C, name: Operator: FFFF
2019/08/16 13:53:58 0E5C1212 r (reader) myusbmousereader [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2019/08/16 13:53:59 0E5C1212 r (reader) myusbmousereader [cryptoworks] provider: 4, id: 10, name: Operator: FFFF
2019/08/16 13:53:59 0E5C1212 r (reader) myusbmousereader [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2019/08/16 13:53:59 0E5C1212 r (reader) myusbmousereader [cryptoworks] ready for requests
2019/08/16 13:53:59 00000000 s (main) init for all local cards done
2019/08/16 13:53:59 00000000 s (emmcache) loaded 39077 emmcache records from /tmp/.oscam/oscam.emmcache in 210 ms
2019/08/16 13:54:00 00000000 s (emmcache) loaded 39077 emmstat records from /tmp/.oscam/oscam.emmstat in 77 ms
2019/08/16 13:54:00 00000000 s (anticasc) anti cascading disabled
2019/08/16 13:54:00 40C6746A c (client) plain dvbapi-client granted (tvheadend, au=auto (1 reader))
2019/08/16 13:54:00 40C6746A c (dvbapi) dvbapi channelcache loaded from /config/oscam/oscam.ccache
2019/08/16 13:54:00 40C6746A c (dvbapi) Using TCP listen socket, API forced to DVBAPIv3 (0), userconfig boxtype: 11
2019/08/16 13:54:02 40C6746A c (dvbapi) Client connected: 'Tvheadend 4.3-1804~gebb096804' (protocol version = 2)
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 0 ecmpid 0 CAID: 0D95 ECM_PID: 00FB PROVID: 000000
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 0 ecmpid 1 CAID: 0648 ECM_PID: 0065 PROVID: 000000
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 0 ecmpid 2 CAID: 0650 ECM_PID: 0067 PROVID: 000000
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 0 ecmpid 3 CAID: 0D98 ECM_PID: 00FD PROVID: 000000
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 0 found 4 ECM pids and 5 STREAM pids in CA PMT
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 0D98 PROVID 000000 ECMPID 00FD ANY CHID PMTPID 03E9 VPID 00A0
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 1 ecmpid 0 CAID: 0650 ECM_PID: 0068 PROVID: 000000
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 1 ecmpid 1 CAID: 0648 ECM_PID: 0066 PROVID: 000000
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 1 ecmpid 2 CAID: 0D95 ECM_PID: 00FC PROVID: 000000
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 1 ecmpid 3 CAID: 0D98 ECM_PID: 00FE PROVID: 000000
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 1 found 4 ECM pids and 5 STREAM pids in CA PMT
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 1 trying to descramble PID 3 CAID 0D98 PROVID 000000 ECMPID 00FE ANY CHID PMTPID 03EA VPID 01F4
2019/08/16 13:54:14 40C6746A c (dvbapi) Demuxer 0 continues descrambling for program 32C9
2019/08/16 13:54:14 40C6746A c (ecm) tvheadend (0D98@000004/0000/32C9/80:6C502656A419803044549883CECB8784): found (158 ms) by myusbmousereader - ORF1
2019/08/16 13:54:14 40C6746A c (ecm) tvheadend (0D98@000004/0000/32CA/80

81AA2F69C44819A17728491E1AA2540): found (152 ms) by myusbmousereader - ORF2
2019/08/16 13:54:17 0E5C1212 r (reader) myusbmousereader [cryptoworks] tvheadend emmtype=global, len=55 (hex: 0x37), cnt=1: written (107 ms)
2019/08/16 13:54:18 40C6746A c (ecm) tvheadend (0D98@000004/0000/32C9/80:3E9CADC397AC4E8A94CE062FEBF1700F): found (147 ms) by myusbmousereader - ORF1
2019/08/16 13:54:19 40C6746A c (ecm) tvheadend (0D98@000004/0000/32CA/80:80FDF7776091EF109D58D88367EA180F): found (139 ms) by myusbmousereader - ORF2
2019/08/16 13:54:26 40C6746A c (dvbapi) Demuxer 0 received updated CA PMT for program 32C9
2019/08/16 13:54:26 40C6746A c (dvbapi) Demuxer 0 continues descrambling for program 32C9
2019/08/16 13:54:26 40C6746A c (dvbapi) Demuxer 1 stopped descrambling for program 32CA (ORF2)
2019/08/16 13:54:26 40C6746A c (dvbapi) Demuxer 0 found 4 ECM pids and 5 STREAM pids in CA PMT
2019/08/16 13:54:28 40C6746A c (ecm) tvheadend (0D98@000004/0000/32C9/80:37D7447D7AFF205C83A0DF9BB6347DDF): found (148 ms) by myusbmousereader - ORF1