Quantcast
Aktuelles
Digital Eliteboard - Das Digitale Technik Forum

Registriere dich noch heute kostenlos, um Mitglied zu werden! Sobald du angemeldet bist, kannst du auf unserer Seite aktiv teilnehmen, indem du deine eigenen Themen und Beiträge erstellst und dich über deinen eigenen Posteingang mit anderen Mitgliedern unterhalten kannst! Zudem bekommst du Zutritt zu Bereichen, welche für Gäste verwehrt bleiben

Registriere dich noch heute kostenlos, um Mitglied zu werden! Sobald du angemeldet bist, kannst du auf unserer Seite aktiv teilnehmen, indem du deine eigenen Themen und Beiträge erstellst und dich über deinen eigenen Posteingang mit anderen Mitgliedern unterhalten kannst! Zudem bekommst du Zutritt zu Bereichen, welche für Gäste verwehrt bleiben

Support Laberthread : Oscam mit Smargo Unterstützung

kannst du den Fix erläutern, bzw wie wird er integriert. Dann baue ich es bei mir ein.
 
Hier ist das angepasste Start Script vom Oscam Addon 1.5.1, Oscam startet dadurch aus dem tmp Ordner, weils ja aus dem InternenSpeicher so nicht mehr möglich ist:
#!/bin/sh
## DEB/NFR Freetz-Team OSCam Addon ##

. /etc/init.d/modlibrc
. /mod/etc/conf/oscam.cfg


WATCHDOG_NAME="DEB/NFR OSCam-Watchdog"

DAEMON=oscam
WATCHDOG=OSCam-Watchdog
PID_FILE=/var/run/oscam.pid
USB_DIR=''
INTERN_DIR=''

if [ "$OSCAM_INTERN" = "no" ]; then
[ -e /var/tmp/intern ] && rm /var/tmp/intern >/dev/null
if [ -z "$OSCAM_PATH" ] || [ -z "$(df|grep "$OSCAM_PATH"|grep "/dev/sd")" ]; then OSCAM_PATH="$(df|grep "/dev/sda"|awk '{print $6}'|tail -1)"; fi
# usblist="$(df|grep "/dev/sda"|awk '{print $6}')"
# for OSCAM_PATH in $usblist; do
# if [ -d "$OSCAM_PATH/addon/oscam" ]; then break; fi
# done
# [ -z $OSCAM_PATH ] && OSCAM_PATH="$(df|grep "/dev/sda"|awk '{print $6}'|tail -1)"
USB_DIR="$OSCAM_PATH"
else
>/var/tmp/intern
if [ "$(mount|grep "yaffs2")" ] || [ "$(mount|grep "ubifs")" ] || [ "$(mount|grep "ext4")" ] >/dev/null; then
INTERN_DIR=/var/media/ftp
else
INTERN_DIR=/data
fi
[ -d "$INTERN_DIR/tam" ] && rm -rf "$INTERN_DIR/tam"
fi


[ -e /var/tmp/intern ] && OSCAM_PATH="$INTERN_DIR"
WORKING_DIR="$OSCAM_PATH/addon/oscam"

if [ ! -d "$WORKING_DIR" ]; then
/etc/init.d/./addon_install.sh >/dev/null
if [ $? -ne 0 ]; then
echo "Fehler: Datei "${WORKING_DIR}/oscam.conf" nicht gefunden."
exit 1
fi
fi

#LOGFILE=$(grep -i "^logfile" "$WORKING_DIR/oscam.conf" | cut -d "=" -f2 | sed 's/^ //')
WATCHDOG_LOG="$OSCAM_PATH/addon/watchdog/watchdog.log"

#if [ "$OSCAM_CHECK_UDEV1" = "yes" -o "$OSCAM_CHECK_UDEV2" = "yes" -o "$OSCAM_CHECK_UDEV3" = "yes" -o "$OSCAM_CHECK_UDEV4" = "yes" -o "$OSCAM_CHECK_UDEV5" = "yes" ]; then
# if [ ! -e /tmp/flash/mod/udev-final.rules ]; then
# touch /tmp/flash/mod/udev-final.rules
# fi
#fi

#if [ -e /tmp/flash/mod/udev-final.rules ]; then
# if [ "$OSCAM_CHECK_UDEV1" = "no" ]; then
# sed -i "/$OSCAM_TEXT_UDEV1/d" /tmp/flash/mod/udev-final.rules
# fi

# if [ "$OSCAM_CHECK_UDEV2" = "no" ]; then
# sed -i "/$OSCAM_TEXT_UDEV2/d" /tmp/flash/mod/udev-final.rules
# fi

# if [ "$OSCAM_CHECK_UDEV3" = "no" ]; then
# sed -i "/$OSCAM_TEXT_UDEV3/d" /tmp/flash/mod/udev-final.rules
# fi

# if [ "$OSCAM_CHECK_UDEV4" = "no" ]; then
# sed -i "/$OSCAM_TEXT_UDEV4/d" /tmp/flash/mod/udev-final.rules
# fi

# if [ "$OSCAM_CHECK_UDEV5" = "no" ]; then
# sed -i "/$OSCAM_TEXT_UDEV5/d" /tmp/flash/mod/udev-final.rules
# fi
#modsave flash >/dev/null
#fi

#if [ "$OSCAM_CHECK_UDEV1" = "yes" ]; then
# echo 'SUBSYSTEMS=="usb", KERNEL=="ttyUSB*", ATTRS{serial}=="'$OSCAM_TEXT_UDEVREADER1'", SYMLINK+="'$OSCAM_TEXT_UDEV1'"' >>/tmp/flash/mod/udev-final.rules
#fi

#if [ "$OSCAM_CHECK_UDEV2" = "yes" ]; then
# echo 'SUBSYSTEMS=="usb", KERNEL=="ttyUSB*", ATTRS{serial}=="'$OSCAM_TEXT_UDEVREADER2'", SYMLINK+="'$OSCAM_TEXT_UDEV2'"' >>/tmp/flash/mod/udev-final.rules
#fi

#if [ "$OSCAM_CHECK_UDEV3" = "yes" ]; then
# echo 'SUBSYSTEMS=="usb", KERNEL=="ttyUSB*", ATTRS{serial}=="'$OSCAM_TEXT_UDEVREADER3'", SYMLINK+="'$OSCAM_TEXT_UDEV3'"' >>/tmp/flash/mod/udev-final.rules
#fi

#if [ "$OSCAM_CHECK_UDEV4" = "yes" ]; then
# echo 'SUBSYSTEMS=="usb", KERNEL=="ttyUSB*", ATTRS{serial}=="'$OSCAM_TEXT_UDEVREADER4'", SYMLINK+="'$OSCAM_TEXT_UDEV4'"' >>/tmp/flash/mod/udev-final.rules
#fi

#if [ "$OSCAM_CHECK_UDEV5" = "yes" ]; then
# echo 'SUBSYSTEMS=="usb", KERNEL=="ttyUSB*", ATTRS{serial}=="'$OSCAM_TEXT_UDEVREADER5'", SYMLINK+="'$OSCAM_TEXT_UDEV5'"' >>/tmp/flash/mod/udev-final.rules
#fi

get_logfile() {
LOGFILE=$(grep -i "^logfile" "$WORKING_DIR/oscam.conf" | cut -d "=" -f2 | sed 's/^ //')
}

ipcheck() {
HOSTIP=$(/usr/bin/get_ip)
DYNIP=$(ping -c 1 "$OSCAM_HOST" | sed -n 1p | sed -e 's/(//g' -e 's/)//g' | cut -d ' ' -f3 | cut -d ':' -f1)
}

cleanup() {
if [ -e /tmp/flash/mod/rc.custom ]; then
if cat /tmp/flash/mod/rc.custom | grep $WATCHDOG >/dev/null; then
sed -i "/rc.oscam c_rb/d" /tmp/flash/mod/rc.custom
sed -i "/$WATCHDOG/d" /tmp/flash/mod/rc.custom
modsave flash >/dev/null
fi
fi

# if [ -n "$(pidof crond)" ]; then
# local RESTART_CROND='y'
# killall crond
# else
# local RESTART_CROND='n'
# if [ -e /tmp/flash/mod/crontab ]; then cp /tmp/flash/mod/crontab /var/spool/cron/crontabs/root; fi
# fi

if [ "$(/etc/init.d/rc.crond status)" = 'stopped' ]; then
local RESTART_CROND='y'
# killall crond
else
local RESTART_CROND='n'
if [ -e /tmp/flash/mod/crontab ]; then cp /tmp/flash/mod/crontab /var/spool/cron/crontabs/root; fi
fi

if [ -n "$(crontab -l 2>/dev/null | grep $WATCHDOG)" ]; then
sed -i "/rc.$DAEMON c/d" /tmp/flash/mod/crontab
sed -i "/$WATCHDOG/d" /tmp/flash/mod/crontab
cp /tmp/flash/mod/crontab /var/spool/cron/crontabs/root
if [ -n "$(crontab -l 2>/dev/null)" ]; then
if [ "$RESTART_CROND" = "y" ]; then
if [ -z "$(pidof crond)" ]; then crond -b; fi
fi
fi
fi
}

udevsave() {
if [ -e /tmp/flash/mod/udev-final.rules ]; then
rm -rf /tmp/flash/mod/udev-final.rules
fi
sleep 1
if [ "$OSCAM_CHECK_UDEV1" = "yes" ]; then
echo 'SUBSYSTEMS=="usb", KERNEL=="ttyUSB*", ATTRS{serial}=="'$OSCAM_TEXT_UDEVREADER1'", SYMLINK+="'$OSCAM_TEXT_UDEV1'"' >>/tmp/flash/mod/udev-final.rules
fi

if [ "$OSCAM_CHECK_UDEV2" = "yes" ]; then
echo 'SUBSYSTEMS=="usb", KERNEL=="ttyUSB*", ATTRS{serial}=="'$OSCAM_TEXT_UDEVREADER2'", SYMLINK+="'$OSCAM_TEXT_UDEV2'"' >>/tmp/flash/mod/udev-final.rules
fi

if [ "$OSCAM_CHECK_UDEV3" = "yes" ]; then
echo 'SUBSYSTEMS=="usb", KERNEL=="ttyUSB*", ATTRS{serial}=="'$OSCAM_TEXT_UDEVREADER3'", SYMLINK+="'$OSCAM_TEXT_UDEV3'"' >>/tmp/flash/mod/udev-final.rules
fi

if [ "$OSCAM_CHECK_UDEV4" = "yes" ]; then
echo 'SUBSYSTEMS=="usb", KERNEL=="ttyUSB*", ATTRS{serial}=="'$OSCAM_TEXT_UDEVREADER4'", SYMLINK+="'$OSCAM_TEXT_UDEV4'"' >>/tmp/flash/mod/udev-final.rules
fi

if [ "$OSCAM_CHECK_UDEV5" = "yes" ]; then
echo 'SUBSYSTEMS=="usb", KERNEL=="ttyUSB*", ATTRS{serial}=="'$OSCAM_TEXT_UDEVREADER5'", SYMLINK+="'$OSCAM_TEXT_UDEV5'"' >>/tmp/flash/mod/udev-final.rules
fi
modsave flash >/dev/null
}

start() {
if [ -e "$WORKING_DIR/$DAEMON" ]; then
[ ! -x "$WORKING_DIR/$DAEMON" ] && chmod 755 "$WORKING_DIR/$DAEMON" >/dev/null
export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/lib/freetz
sleep 1
echo -n "Starte $DAEMON ... "
cp "$WORKING_DIR/$DAEMON" /var/tmp
/var/tmp/"$DAEMON" -b -c "$WORKING_DIR" & 2>/dev/null
sleep 1
if pidof $DAEMON >$PID_FILE; then
echo "fertig."
else
echo "fehlgeschlagen."
[ -e "$PID_FILE" ] && rm "$PID_FILE" >/dev/null
fi
else
echo "$DAEMON ... nicht gefunden."
fi

cleanup

udevsave

echo "# BEGIN: $WATCHDOG" >>/tmp/flash/mod/rc.custom
echo "/etc/init.d/rc.$DAEMON c_rb" >>/tmp/flash/mod/rc.custom
echo "# END: $WATCHDOG" >>/tmp/flash/mod/rc.custom

modsave flash >/dev/null
if [ "$OSCAM_CHECK_CARDINIT" = "yes" -o "$OSCAM_CHECK_CAMRUN" = "yes" -o "$OSCAM_CHECK_BULKWRITE" = "yes" -o "$OSCAM_DYNCHK" = "yes" -o "$OSCAM_CHECK_CUSTOMERR" = "yes" ]; then
if [ -n "$(pidof crond)" ]; then killall crond; fi
if [ -e /tmp/flash/mod/crontab ]; then
echo "# BEGIN: $WATCHDOG" >>/tmp/flash/mod/crontab
else
echo "# BEGIN: $WATCHDOG" >/tmp/flash/mod/crontab
fi
if [ "$OSCAM_CHECK_CARDINIT" = "yes" ]; then
echo "*/$OSCAM_CHECKING_INTERVAL * * * * /etc/init.d/rc.$DAEMON c_ie" >>/tmp/flash/mod/crontab
fi
if [ "$OSCAM_CHECK_CAMRUN" = "yes" ]; then
echo "*/$OSCAM_CHECKING_INTERVAL * * * * /etc/init.d/rc.$DAEMON c_cr" >>/tmp/flash/mod/crontab
fi
if [ "$OSCAM_CHECK_BULKWRITE" = "yes" ]; then
echo "*/$OSCAM_CHECKING_INTERVAL * * * * /etc/init.d/rc.$DAEMON c_bw" >>/tmp/flash/mod/crontab
fi
if [ "$OSCAM_CHECK_CUSTOMERR" = "yes" ]; then
echo "*/$OSCAM_CHECKING_INTERVAL * * * * /etc/init.d/rc.$DAEMON c_ce" >>/tmp/flash/mod/crontab
fi
if [ "$OSCAM_DYNCHK" = "yes" ]; then
echo "*/$OSCAM_CHECKING_INTERVAL * * * * /etc/init.d/rc.$DAEMON c_dd" >>/tmp/flash/mod/crontab
fi
echo "# END: $WATCHDOG" >>/tmp/flash/mod/crontab
cp /tmp/flash/mod/crontab /var/spool/cron/crontabs/root
if [ -z "$(pidof crond)" ]; then crond -b; fi
fi
}

stop() {
while pidof $DAEMON >/dev/null; do
echo -n "Stoppe $DAEMON ... "
killall -q -9 $DAEMON >/dev/null && sleep 1
if pidof $DAEMON >/dev/null; then
echo "fehlgeschlagen."
kill -9 `pidof $DAEMON` >/dev/null
fi
[ -e "$PID_FILE" ] && rm "$PID_FILE" >/dev/null
echo "fertig."

done
cleanup
udevsave
}

loaddriver() {
if ([ "$OSCAM_COMCHK" = "yes" ] && [ "$OSCAM_DUECHK" = "no" ]); then modprobe $OSCAM_COMCHK_IF; sleep 1; fi
if [ "$OSCAM_DUECHK" = "yes" ]; then modprobe ftdi_sio; modprobe pl2303; sleep 2; fi
echo -n "Lade USB-Serial Module ... "
i=0; while [ $i -lt 8 ]; do
[ -f /dev/ttyUSB$i ] && rm /dev/ttyUSB$i >/dev/null
[ ! -e /dev/ttyUSB$i ] && mknod /dev/ttyUSB$i c 188 $i >/dev/null
let i=$i+1; done
sleep 1 && echo "fertig."
if [ "$OSCAM_SMUSBCHK" = "yes" ]; then modprobe -r ftdi_sio && sleep 2
echo -n "USB-Smartmouse Konfiguration ... "
/usr/bin/smusbutil $OSCAM_SMUSBCHK_IF $OSCAM_SMMODE
modprobe ftdi_sio && sleep 1
echo "fertig."
fi
}

unloaddriver() {
if ([ "$OSCAM_COMCHK" = "yes" ] && [ "$OSCAM_DUECHK" = "no" ]); then
echo -n "Entlade USB-Serial Module ... "
modprobe -r $OSCAM_COMCHK_IF
sleep 1
echo "fertig."
fi
if [ "$OSCAM_DUECHK" = "yes" ]; then
echo -n "Entlade USB-Serial Module ... "
modprobe -r ftdi_sio
modprobe -r pl2303
sleep 2
echo "fertig."
fi
}

pcsc_start() {
echo -n "Starte PCSCD ... "
/etc/init.d/./pcscd.sh start >/dev/null 2>&1 &
sleep 2
if pidof "pcscd" >/dev/null; then
echo "fertig."
else
echo "fehlgeschlagen."
fi
}

pcsc_stop() {
echo -n "Stoppe PCSCD ... "
/etc/init.d/./pcscd.sh stop >/dev/null 2>&1 &
sleep 2
if ! pidof "pcscd" >/dev/null; then
echo "fertig."
rm /var/run/pcscd/pcscd.pid
else
echo "fehlgeschlagen."
fi
}

transmit_mail() {
mailer -s "$WATCHDOG_NAME - $ERROR_MSG" -f $OSCAM_MAIL_FROM -t $OSCAM_MAIL_TO -m $OSCAM_MAIL_SERVER -a $OSCAM_MAIL_USER -w $OSCAM_MAIL_PASSWORD
echo "$(date) => Mail gesendet an $OSCAM_MAIL_TO" >>$WATCHDOG_LOG
}

check_dyndns() {
ipcheck
if [ "$DYNIP" != "$HOSTIP" ] && [ -n "$OSCAM_HOST" ]; then
case "$OSCAM_DO_PROVIDER" in
"dyndns")
UPDATE_URL="http://$OSCAM_HOST_USER:$OSCAM_HOST_PASS@members.dyndns.org/nic/update?hostname=$OSCAM_HOST"
;;

"noip")
UPDATE_URL="http://$OSCAM_HOST_USER:$OSCAM_HOST_PASS@dynupdate.no-ip.com/nic/update?hostname=$OSCAM_HOST"
;;

"dnsomatic")
UPDATE_URL="http://$OSCAM_HOST_USER:$OSCAM_HOST_PASS@updates.dnsomatic.com/nic/update?hostname=$OSCAM_HOST"
;;

"dynserv")
UPDATE_URL="http://dynserv.ca/dyn/dynengine.cgi?name=$OSCAM_HOST_USER&pass=$OSCAM_HOST_PASS&func=set&domain=$OSCAM_HOST"
;;

"twodns")
UPDATE_URL="http://$OSCAM_HOST_USER:$OSCAM_HOST_PASS@update.two-dns.de/update?hostname=$OSCAM_HOST"
;;
"custom")
UPDATE_URL="$(echo "$OSCAM_HOST_UURL" | sed -e "s/<user>/$OSCAM_HOST_USER/" -e "s/<pass>/$OSCAM_HOST_PASS/" -e "s/<host>/$OSCAM_HOST/")"
;;
esac

if [ -n "$UPDATE_URL" ]; then
wget -q -O - "$UPDATE_URL"
sleep 120
ipcheck
fi


if [ "$DYNIP" = "$HOSTIP" ]; then
ERROR_MSG="IP-Aenderung: $OSCAM_HOST wurde erfolgreich aktualisiert!"
else
ERROR_MSG="IP-Aenderung: $OSCAM_HOST konnte nicht aktualisiert werden! Einstellungen pruefen."
fi

echo "$(date) => $ERROR_MSG" >>$WATCHDOG_LOG
if [ "$OSCAM_SEND_DYNDNS" = "yes" ]; then transmit_mail; fi
fi
}

check_camrunning() {
if [ -e "$WORKING_DIR/$DAEMON" ] && [ "$(/etc/init.d/rc.$DAEMON status)" = "stopped" ]; then

if [ "$OSCAM_DO_CAMRUN" = "r" ]; then
local RESTART_OF="Router Neustart"
else
local RESTART_OF="$OSCAM_NAME Neustart"
fi

ERROR_MSG="$RESTART_OF - $OSCAM_NAME war gestoppt"

if [ "$OSCAM_DO_CAMRUN" != "r" ]; then /etc/init.d/rc.$DAEMON restart; fi
echo "$(date) => $ERROR_MSG" >>$WATCHDOG_LOG
if [ "$OSCAM_SEND_CAMRUN" = "yes" ]; then transmit_mail; fi
if [ "$OSCAM_DO_CAMRUN" = "r" ]; then /sbin/reboot && exit 0; fi
fi
}

check_initerror() {
get_logfile
if [ -n "$(grep "card initializing error" $LOGFILE)" ]; then
if [ "$OSCAM_DO_CARDINIT" = "r" ]; then
local RESTART_OF="Router Neustart"
else
local RESTART_OF="$OSCAM_NAME Neustart"
fi

ERROR_MSG="$RESTART_OF - $OSCAM_NAME Karteninitialiserungsfehler"

/etc/init.d/rc.$DAEMON stop
echo "$(date) => $ERROR_MSG" >>$WATCHDOG_LOG
mv $LOGFILE $LOGFILE-prev
if [ "$OSCAM_SEND_CARDINIT" = "yes" ]; then transmit_mail; fi
if [ "$OSCAM_DO_CARDINIT" = "r" ]; then /sbin/reboot && exit 0; else /etc/init.d/rc.$DAEMON start; fi
fi
}

check_bulkwrite() {
get_logfile
if [ -n "$(grep "usb bulk write failed" $LOGFILE)" ]; then
if [ "$OSCAM_DO_BULKWRITE" = "r" ]; then
local RESTART_OF="Router Neustart"
else
local RESTART_OF="$OSCAM_NAME Neustart"
fi

ERROR_MSG="$RESTART_OF - $OSCAM_NAME USB Bulk Write fehlgeschlagen"

/etc/init.d/rc.$DAEMON stop
echo "$(date) => $ERROR_MSG" >>$WATCHDOG_LOG
mv $LOGFILE $LOGFILE-prev
if [ "$OSCAM_SEND_BULKWRITE" = "yes" ]; then transmit_mail; fi
if [ "$OSCAM_DO_BULKWRITE" = "r" ]; then /sbin/reboot && exit 0; else /etc/init.d/rc.$DAEMON start; fi
fi
}

check_customerr() {
get_logfile
if [ -n "$OSCAM_TEXT_CUSTOMERR" ] && [ -n "$(grep "$OSCAM_TEXT_CUSTOMERR" $LOGFILE)" ]; then
if [ "$OSCAM_DO_CUSTOMERR" = "r" ]; then
local RESTART_OF="Router Neustart"
else
local RESTART_OF="$OSCAM_NAME Neustart"
fi

ERROR_MSG="$RESTART_OF - $OSCAM_NAME Benutzerdefinierter Fehler: $OSCAM_TEXT_CUSTOMERR"

/etc/init.d/rc.$DAEMON stop
echo "$(date) => $ERROR_MSG" >>$WATCHDOG_LOG
mv $LOGFILE $LOGFILE-prev
if [ "$OSCAM_SEND_CUSTOMERR" = "yes" ]; then transmit_mail; fi
if [ "$OSCAM_DO_CUSTOMERR" = "r" ]; then /sbin/reboot && exit 0; else /etc/init.d/rc.$DAEMON start; fi
fi
}

check_reboot() {
ERROR_MSG="Router Neustart"
echo "$(date) => $ERROR_MSG" >>$WATCHDOG_LOG
if [ "$OSCAM_SEND_REBOOT" = "yes" ]; then transmit_mail; fi
}

case "$1" in
""|load)
modreg cgi $DAEMON $OSCAM_NAME
modreg daemon $DAEMON
modreg file $DAEMON oscamconf 'OSCam Config' 1 oscamconf
modreg file $DAEMON oscamserver 'OSCam Server' 1 oscamserver
modreg file $DAEMON oscamuser 'OSCam User' 1 oscamuser
modreg file $DAEMON oscamird 'OSCam IRD' 1 oscamird
modreg file $DAEMON oscamac 'OSCam AC' 1 oscamac
modreg file $DAEMON oscamcert 'OSCam Cert' 1 oscamcert
modreg file $DAEMON oscamdvbapi 'OSCam DVBAPI' 1 oscamdvbapi
modreg file $DAEMON oscamguess 'OSCam Guess' 1 oscamguess
modreg file $DAEMON oscamservices 'OSCam Services' 1 oscamservices
modreg file $DAEMON oscamsrvid 'OSCam SrvID' 1 oscamsrvid
modreg file $DAEMON oscamsrvid2 'OSCam SrvID2' 1 oscamsrvid2
modreg file $DAEMON oscamtiers 'OSCam Tiers' 1 oscamtiers
modreg file $DAEMON oscamprovid 'OSCam ProvID' 1 oscamprovid
modreg file $DAEMON oscamcacheex 'OSCam CacheEx' 1 oscamcacheex
modreg file $DAEMON oscamwhitelist 'OSCam Whitelist' 1 oscamwhitelist
modreg file $DAEMON softcamkey 'SoftCam.Key' 1 softcamkey
# modreg extra $DAEMON 'OSCam-Info' 2 oscamversion
modreg extra $DAEMON 'OSCam-Setup' 2 oscamup
modreg extra $DAEMON 'OSCam-Tools' 2 oscamtools
modreg extra $DAEMON 'OSCam-Watchdog' 2 oscamwatchdog
# modreg extra $DAEMON 'Hilfe Intern-Modus' 2 internhilfe
# modreg extra $DAEMON 'Hilfe USB-Modus' 2 stickhilfe

if [ "$OSCAM_ENABLED" != "yes" ]; then
echo "OSCam is disabled" 1>&2
exit 1
fi
if [ "$OSCAM_PCSCDCHK" = "yes" ]; then pcsc_start; fi
if [ "$OSCAM_COMCHK" = "yes" ] || [ "$OSCAM_DUECHK" = "yes" ]; then loaddriver; fi
start
;;

start)
if [ "$OSCAM_PCSCDCHK" = "yes" ]; then pcsc_start; fi
if [ "$OSCAM_COMCHK" = "yes" ] || [ "$OSCAM_DUECHK" = "yes" ]; then loaddriver; fi
start
;;

stop)
stop
if [ "$OSCAM_PCSCDCHK" = "yes" ]; then pcsc_stop; fi
if [ "$OSCAM_RELOAD" = "yes" ]; then unloaddriver; fi
;;

restart)
stop
if [ "$OSCAM_RELOAD" = "yes" ]; then unloaddriver; fi
if [ "$OSCAM_COMCHK" = "yes" ] || [ "$OSCAM_DUECHK" = "yes" ]; then loaddriver; fi
start
;;

status)
if ! pidof $DAEMON >/dev/null; then
echo 'stopped'
else
echo 'running'
fi
;;

udev)
udevsave
;;

c_cr)
check_camrunning
;;

c_ie)
check_initerror
;;

c_bw)
check_bulkwrite
;;

c_ce)
check_customerr
;;

c_dd)
check_dyndns
;;

c_rb)
check_reboot
;;

*)
echo "Usage: $0 [start|stop|load|restart|status|udev]" 1>&2
exit 1
;;
esac

exit 0
 
ok. das ist auch eine Lösung.
wo kommt es hin und wie solls benannt werden. etwas passt bei mir nicht..
ist es in freetz?
 
Zuletzt bearbeitet:
Ab Firmware 7.20 läuft der Intern Modus nicht mehr, deshalb:
Code:
/dev/mmcblk0p9 on /var/media/ftp type ext4 (rw,sync,noexec,relatime,barrier=1,data=ordered)

War doch bei der 7.12 glaub ich nicht anders.

Da du ja so eine Box hast kannst du die beiden usgaben mal komplett posten mit OS7.12 und OS7.20

Welche Meldung kommt den im Menu Inter / USB-Modus?

Hier ist das angepasste Start Script vom Oscam Addon 1.5.1, Oscam startet dadurch aus dem tmp Ordner, weils ja aus dem InternenSpeicher so nicht mehr möglich ist:

tmp ist nicht reboot sicher
 
Sorry, ich hab jetzt keine Lust die 7.12 nochmal zu flashen. da lief noch alles wunderbar. Ab Firmware 7.20 wird das ausführen von binarys aus /var/media/ftp verhindert. ( noexec ).
Unsere addon zu verändern, das der intern-Modus nach tmp geht, macht ja überhaupt kein Sinn. Da tmp nach einem reboot leer ist
Bei der 6490 macht das schon Sinn, denn nur von da kann Oscam gestartet werden und bei einem Reboot, Update oder was auch immer wird das Binary Oscam nach tmp kopiert und gestartet. Der User merkt davon garnix. Bei einem Reboot wird das Oscam Start Script aufgerufen, Oscam wird nach tmp kopiert und gestartet.
Hab ich so schon wochenlang im Einsatz.
wo kommt es hin und wie solls benannt werden. etwas passt bei mir nicht..
ist es in freetz?
Das Start Script vom oscam addon 1.51 liegt in /addon /oscam-1.5.1/root/etc/init.d/rc.oscam. Du mußt einfach dieses Script durch meins ersetzen. (siehe Post #13 ) Danach Freetz neu compilieren.
 
Zuletzt bearbeitet:
Hier ist mal meine Änderung vom Start Script rc.oscam detaliert. Mehr war nicht notwendig.
Code:
start() {
    if [ -e "$WORKING_DIR/$DAEMON" ]; then
        [ ! -x "$WORKING_DIR/$DAEMON" ] && chmod 755 "$WORKING_DIR/$DAEMON" >/dev/null
        export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/lib/freetz
        sleep 1
        echo -n "$(lang de:"Starte $DAEMON ... " en:"Starting $DAEMON ... ")"
        cp "$WORKING_DIR/$DAEMON" /var/tmp
        /var/tmp/"$DAEMON" -b -c "$WORKING_DIR" & 2>/dev/null
        sleep 1
        if pidof $DAEMON >$PID_FILE; then
            echo "$(lang de:"fertig." en:"done.")"
        else
            echo "$(lang de:"fehlgeschlagen." en:"failed.")"
            [ -e "$PID_FILE" ] && rm "$PID_FILE" >/dev/null
 
Mit der Änderung von @crazyfreak01 wird egal, ob man den Intern oder USB-Modus wählt die oscam nach
Code:
/var/tmp
kopiert. Daran sollte man denken.

@prisrak

Kannst du mir bitte dann mal die Ausgaben posten, wenn du die 7.20 und 7.12 drauf hast
 
7.12
Code:
Stoppe oscam ... fertig.
Entlade USB-Serial Module ... fertig.
Lade USB-Serial Module ... fertig.
Starte oscam ... fertig.
die oscam.log wird niergendwo geschrieben.. Einstelungen in der OSCam Config intern für Log:
# logfile = /var/media/ftp/addon/oscam/oscam.log
logfile = /var/log/oscam.log
 
Ich habe nur noch die Firmware 7.20 auf meiner 6490. Egal welchen Logpfad ich angebe, oscam.log wird erstellt.
-------------------------------------------------------------------------------
>> OSCam << cardserver log switched at Thu Sep 10 17:34:43 2020
-------------------------------------------------------------------------------
2020/09/10 17:34:43 00000000 s >> OSCam << cardserver log switched, version 1.20_svn, build r11603 (i686-linux-uclibc-libusb)
2020/09/10 17:34:43 00000000 s (main) System name = Linux
2020/09/10 17:34:43 00000000 s (main) Host name = fritz.box
2020/09/10 17:34:43 00000000 s (main) Release = 2.6.39.4
2020/09/10 17:34:43 00000000 s (main) Version = #1 SMP PREEMPT Mon Jul 13 11:40:42 CEST 2020
2020/09/10 17:34:43 00000000 s (main) Machine = i686
2020/09/10 17:34:43 00000000 s (main) creating pidfile /tmp/.oscam/oscam.pid with pid 17855
2020/09/10 17:34:43 00000000 s (config) services reloaded: 0 services freed, 6 services loaded, rejected 0
2020/09/10 17:34:43 00000000 s (config) userdb reloaded: 3 accounts loaded, 0 expired, 0 disabled
2020/09/10 17:34:43 00000000 s (main) signal handling initialized
2020/09/10 17:34:43 00000000 s (config) 3 provid's loaded
2020/09/10 17:34:43 00000000 s (config) 716 service-id's loaded in 7 ms
2020/09/10 17:34:43 00000000 s (config) 81 tier-id's loaded
2020/09/10 17:34:43 00000000 s (config) 22 lengths for caid guessing loaded
2020/09/10 17:34:43 00000000 s (net) monitor: initialized (fd=5, port=988)
2020/09/10 17:34:43 00000000 s (net) newcamd: initialized (fd=6, port=20001)
2020/09/10 17:34:43 00000000 s (net) -> CAID: 098C PROVID: 000000
2020/09/10 17:34:43 00000000 s (net) newcamd: initialized (fd=7, port=20004)
2020/09/10 17:34:43 00000000 s (net) -> CAID: 1843 PROVID: 003411, 000000, 008011
2020/09/10 17:34:43 00000000 s (net) newcamd: initialized (fd=8, port=20005)
2020/09/10 17:34:43 00000000 s (net) -> CAID: 0B00 PROVID: 000000
2020/09/10 17:34:43 00000000 s (net) newcamd: initialized (fd=9, port=20006)
2020/09/10 17:34:43 00000000 s (net) -> CAID: 0D95 PROVID: 000004, 000008, 00000C, 000010
2020/09/10 17:34:43 00000000 s (net) newcamd: initialized (fd=10, port=20008)
2020/09/10 17:34:43 00000000 s (net) -> CAID: 0648 PROVID: 000000
2020/09/10 17:34:43 00000000 s (net) newcamd: initialized (fd=11, port=20009)
2020/09/10 17:34:43 00000000 s (net) -> CAID: 0500 PROVID: 023800, 023810
2020/09/10 17:34:43 00000000 s (net) cccam: initialized (fd=12, port=35001)
2020/09/10 17:34:43 00000000 s (net) gbox: initialized (fd=13, port=3820)
2020/09/10 17:34:43 00000000 s (reader) HD04 [smartreader] creating thread for device Serial:Reader A0DED54
2020/09/10 17:34:43 00000000 s (reader) SRGv6 [smartreader] creating thread for device Serial:Reader 102DC78
2020/09/10 17:34:43 00000000 s (reader) G02-Sky [smartreader] creating thread for device Serial:Reader 699109C
2020/09/10 17:34:43 00000000 s (reader) Plus-Austria-IRD [smartreader] creating thread for device Serial:Reader A436907
2020/09/10 17:34:43 00000000 s (reader) Gbox [gbox] creating thread for device 192.168.178.30
2020/09/10 17:34:43 00000000 s (main) waiting for local card init
2020/09/10 17:34:43 6A6DBB03 p (gbox) we are online - 1 port(s) to monitor
2020/09/10 17:34:43 6A6DBB03 p (reader) 192.168.178.30: resolved ip=192.168.178.30
2020/09/10 17:34:43 6A6DBB03 p (gbox) proxy 192.168.178.30 (fd=18, peer id=444C, my id=C444, my hostname=192.168.178.1, peer's listen port=3820)
2020/09/10 17:34:43 6A6DBB03 p (gbox) <- HelloL to Gbox
2020/09/10 17:34:43 2D78578E h (webif) webif: decompressed 184853 bytes back into 458832 bytes
2020/09/10 17:34:43 2D78578E h (webif) HTTP Server running. ip=0.0.0.0 port=83
2020/09/10 17:34:43 6A6DBB03 p (reader) Gbox [gbox] proxy initialized, server 192.168.178.30:3820
2020/09/10 17:34:43 75E42F13 r (reader) HD04 [smartreader] Reader initialized (device=Serial:Reader A0DED54, detect=cd, mhz=436, cardmhz=369)
2020/09/10 17:34:43 442D5F50 r (reader) SRGv6 [smartreader] Reader initialized (device=Serial:Reader 102DC78, detect=cd, mhz= AUTO, cardmhz=369)
2020/09/10 17:34:43 3F89E557 r (reader) G02-Sky [smartreader] Reader initialized (device=Serial:Reader 699109C, detect=cd, mhz= AUTO, cardmhz=369)
2020/09/10 17:34:43 693BE26B r (reader) Plus-Austria-IRD [smartreader] Reader initialized (device=Serial:Reader A436907, detect=cd, mhz= AUTO, cardmhz=600)
2020/09/10 17:34:44 3F89E557 r (reader) G02-Sky [smartreader] card detected
2020/09/10 17:34:44 75E42F13 r (reader) HD04 [smartreader] card detected
2020/09/10 17:34:44 693BE26B r (reader) Plus-Austria-IRD [smartreader] card detected
2020/09/10 17:34:44 442D5F50 r (reader) SRGv6 [smartreader] card detected
2020/09/10 17:34:45 693BE26B r (reader) Plus-Austria-IRD [smartreader] ATR: 3B 78 12 00 00 54 C4 03 00 8F F1 90 00
2020/09/10 17:34:45 693BE26B r (reader) Plus-Austria-IRD [smartreader] Effective reader settings mhz =534 F= 372 D= 2 N=0 T=0 inv=0 parity=EVEN
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [smartreader] Hist. Bytes: TÄ
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [smartreader] detect irdeto card
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [smartreader] caid: 0648, acs: 0.05, country code: AUT
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [smartreader] providers: 4, ascii serial: ##########, hex serial: ######, hex base: ##
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [smartreader] active providers: 4 (21e9ff,21e9ff,002600,21e9ff)
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [smartreader] found card system irdeto
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [irdeto] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2020/09/10 17:34:47 442D5F50 r (reader) SRGv6 [smartreader] ATR: 3F 77 18 00 00 D3 8A 40 01 64 90 00
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [irdeto] entitlements for provider: 1, id: 21E9FF
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: 000D, date: 2013/02/28 - 2013/03/30
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: 7FF7, date: 2018/10/19 - 2018/10/29
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: 7FFB, date: 2017/11/28 - 2017/12/28
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: FFD8, date: 2014/02/23 - 2014/03/25
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: FFE0, date: 2018/02/22 - 2018/10/31
2020/09/10 17:34:47 442D5F50 r (reader) SRGv6 [smartreader] Effective reader settings mhz =534 F= 372 D= 12 N=0 T=0 inv=1 parity=ODD
2020/09/10 17:34:47 3F89E557 r (reader) G02-Sky [smartreader] ATR: 3F FD 15 25 02 50 00 03 33 B0 15 69 FF 4A 50 F0 80 03 4B 4C 03
2020/09/10 17:34:47 3F89E557 r (reader) G02-Sky [smartreader] Effective reader settings mhz =534 F= 372 D= 16 N=2 T=0 inv=1 parity=ODD
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [irdeto] entitlements for provider: 2, id: 21E9FF
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: 001D, date: 2013/08/05 - 2013/11/05
2020/09/10 17:34:47 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: FFE1, date: 2020/06/27 - 2021/03/05
2020/09/10 17:34:48 693BE26B r (reader) Plus-Austria-IRD [irdeto] entitlements for provider: 4, id: 21E9FF
2020/09/10 17:34:48 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: 0031, date: 2014/08/10 - 2014/11/10
2020/09/10 17:34:48 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: FFE3, date: 2020/07/16 - 2021/03/24
2020/09/10 17:34:48 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: 002A, date: 2020/07/19 - 2020/09/18
2020/09/10 17:34:48 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: 002B, date: 2020/07/19 - 2020/09/18
2020/09/10 17:34:48 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: 002C, date: 2020/07/19 - 2020/09/18
2020/09/10 17:34:48 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: 002D, date: 2020/07/19 - 2020/09/18
2020/09/10 17:34:48 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: 7FF8, date: 2020/06/28 - 2020/07/28
2020/09/10 17:34:48 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: 7FF4, date: 2020/07/20 - 2020/07/30
2020/09/10 17:34:48 693BE26B r (reader) Plus-Austria-IRD [irdeto] chid: FFDB, date: 2020/06/28 - 2020/07/08
2020/09/10 17:34:48 693BE26B r (reader) Plus-Austria-IRD [irdeto] ready for requests
2020/09/10 17:34:48 75E42F13 r (reader) HD04 [smartreader] ATR: 3F FF 95 00 FF 91 81 71 FE 57 00 44 4E 41 53 50 34 32 30 20 52 65 76 53 36 30 17
2020/09/10 17:34:48 75E42F13 r (reader) HD04 [smartreader] Effective reader settings mhz =436 F= 512 D= 16 N=0 T=1 inv=1 parity=ODD
2020/09/10 17:34:48 75E42F13 r (reader) HD04 [smartreader] detected nagra merlin card in CAK7 mode
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [smartreader] Card type: KLTV
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [smartreader] Rom version: 10LM
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [smartreader] Credit available on card: 0 euro
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [smartreader] FuseByte: 25
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [smartreader] Region Code: DEU00001
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [smartreader] Country Code: DEU
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [smartreader] Pincode read: 5017
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [smartreader] PCB settings: FF FF FF FF
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [smartreader] type: VideoGuard Kabel Deutschland G02/G09 (09C7), caid: 09C7
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [smartreader] serial: ########, BoxID: ########, baseyear: 2004
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [smartreader] ready for requests
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [smartreader] found card system videoguard2
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] card detected
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] type: VideoGuard Kabel Deutschland G02/G09 (09C7)
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] ------------------------------------------------------------------
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |- class -|-- tier --|----- valid to ------|--- package name ----|
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] +---------+----------+---------------------+---------------------+
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 000b --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 003c --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 003e --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 004b --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 0068 --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 0065 --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 0066 --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 0067 --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 0071 --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 0072 --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 0074 --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 008e --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 00fa --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 00f3 --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 00f4 --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 00fe --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] |-- 00 ---|-- 00ff --| 2020/11/30-00:00:00 |
2020/09/10 17:34:49 75E42F13 r (reader) HD04 [smartreader] Rom revision: DNASP420 RevS60
2020/09/10 17:34:49 3F89E557 r (reader) G02-Sky [videoguard2] ------------------------------------------------------from-ins70--
2020/09/10 17:34:49 442D5F50 r (reader) SRGv6 [smartreader] using ecm #80b for long viaccess ecm
2020/09/10 17:34:49 442D5F50 r (reader) SRGv6 [smartreader] type: Viaccess (non-standard atr), caid: 0500, serial: ##########
2020/09/10 17:34:50 75E42F13 r (reader) HD04 [smartreader] ready for requests
2020/09/10 17:34:50 75E42F13 r (reader) HD04 [smartreader] found card system nagra merlin
2020/09/10 17:34:50 75E42F13 r (reader) HD04 [nagra merlin] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2020/09/10 17:34:50 75E42F13 r (reader) HD04 [nagra merlin] ROM: D N A S P 4 2 0
2020/09/10 17:34:50 75E42F13 r (reader) HD04 [nagra merlin] REV: R e v S 6 0
2020/09/10 17:34:50 75E42F13 r (reader) HD04 [nagra merlin] SER: ############
2020/09/10 17:34:50 75E42F13 r (reader) HD04 [nagra merlin] CAID: 186A
2020/09/10 17:34:50 75E42F13 r (reader) HD04 [nagra merlin] Prv.ID: 00 00 34 11 (sysid)
2020/09/10 17:34:50 442D5F50 r (reader) SRGv6 [smartreader] providers: 6 (FFF430,060200,060210,060220,060230,060240)
2020/09/10 17:34:50 75E42F13 r (reader) HD04 [nagra merlin] Provider Sys ID: 34 11 is active to: 2020/11/09
2020/09/10 17:34:50 442D5F50 r (reader) SRGv6 [smartreader] Maturity level [0]= older than 0 years
2020/09/10 17:34:50 442D5F50 r (reader) SRGv6 [smartreader] ready for requests
2020/09/10 17:34:50 442D5F50 r (reader) SRGv6 [smartreader] found card system viaccess
2020/09/10 17:34:50 442D5F50 r (reader) SRGv6 [viaccess] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2020/09/10 17:34:50 442D5F50 r (reader) SRGv6 [viaccess] card detected
2020/09/10 17:34:50 442D5F50 r (reader) SRGv6 [viaccess] serial: ##########
2020/09/10 17:34:50 75E42F13 r (reader) HD04 [nagra merlin] -----------------------------------------
2020/09/10 17:34:50 75E42F13 r (reader) HD04 [nagra merlin] |id |tier |valid from |valid to |
2020/09/10 17:34:50 75E42F13 r (reader) HD04 [nagra merlin] +----+--------+------------+------------+
2020/09/10 17:34:51 75E42F13 r (reader) HD04 [nagra merlin] |8011|006A |2019/04/03 |2019/10/06 |
2020/09/10 17:34:51 75E42F13 r (reader) HD04 [nagra merlin] |8011|006B |2014/01/30 |2014/01/31 |
2020/09/10 17:34:51 75E42F13 r (reader) HD04 [nagra merlin] |8011|0BFE |2020/04/26 |2020/07/27 |
2020/09/10 17:34:51 442D5F50 r (reader) SRGv6 [viaccess] provider: 1, id: ####################, sa: ########, geo: empty
2020/09/10 17:34:51 75E42F13 r (reader) HD04 [nagra merlin] -----------------------------------------
2020/09/10 17:34:51 75E42F13 r (reader) HD04 [nagra merlin] Prv.ID: 00 00 00 00
2020/09/10 17:34:51 75E42F13 r (reader) HD04 [nagra merlin] Prv.ID: 00 00 80 11
2020/09/10 17:34:51 442D5F50 r (reader) SRGv6 [viaccess] provider: 2, id: ####################, sa: ########, geo: FF FF FF FF
2020/09/10 17:34:51 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2020/09/07 - 2020/10/22
2020/09/10 17:34:51 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2020/08/03 - 2020/09/17
2020/09/10 17:34:51 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2020/06/29 - 2020/08/13
2020/09/10 17:34:51 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2020/03/16 - 2020/04/30
2020/09/10 17:34:51 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2020/02/10 - 2020/03/26
2020/09/10 17:34:51 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2020/01/06 - 2020/02/20
2020/09/10 17:34:51 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2019/12/02 - 2020/01/16
2020/09/10 17:34:51 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2019/10/28 - 2019/12/12
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2019/09/23 - 2019/11/07
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2019/08/19 - 2019/10/03
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2019/07/16 - 2019/08/29
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2019/06/10 - 2019/07/25
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2019/05/06 - 2019/06/20
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2019/04/01 - 2019/05/16
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2019/02/25 - 2019/04/11
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2019/01/21 - 2019/03/07
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2018/12/17 - 2019/01/31
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2018/11/12 - 2018/12/27
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2018/10/08 - 2018/11/22
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2018/09/03 - 2018/10/18
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2018/07/30 - 2018/09/13
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2018/06/25 - 2018/08/09
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2018/05/21 - 2018/07/05
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2018/04/16 - 2018/05/31
2020/09/10 17:34:52 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2018/03/12 - 2018/04/26
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2018/02/05 - 2018/03/22
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2018/01/01 - 2018/02/15
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2017/11/27 - 2018/01/11
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2017/10/23 - 2017/12/07
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2017/09/18 - 2017/11/02
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2017/08/14 - 2017/09/28
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2017/07/10 - 2017/08/24
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2017/06/05 - 2017/07/20
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2017/05/01 - 2017/06/15
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2017/03/27 - 2017/05/11
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2017/02/21 - 2017/04/06
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2017/02/21 - 2017/03/24
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2017/02/21 - 2017/03/24
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 03, expiry date: 2017/02/21 - 2017/03/24
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 04, expiry date: 2017/02/21 - 2017/03/24
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] class: 05, expiry date: 2017/02/21 - 2017/03/24
2020/09/10 17:34:53 442D5F50 r (reader) SRGv6 [viaccess] provider: 3, id: ######################, sa: ########, geo: FF FF FF FF
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2020/09/07 - 2020/10/22
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2020/08/03 - 2020/09/17
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2020/06/29 - 2020/08/13
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2020/02/10 - 2020/03/26
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2020/01/06 - 2020/02/20
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2019/12/02 - 2020/01/16
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2019/10/28 - 2019/12/12
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2019/09/23 - 2019/11/07
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2019/08/19 - 2019/10/03
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2019/07/16 - 2019/08/29
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2019/05/06 - 2019/06/20
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2019/04/01 - 2019/05/16
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2019/02/25 - 2019/04/11
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2019/01/21 - 2019/03/07
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2018/12/17 - 2019/01/31
2020/09/10 17:34:54 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2018/11/12 - 2018/12/27
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2018/10/08 - 2018/11/22
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2018/09/03 - 2018/10/18
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2018/07/30 - 2018/09/13
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2018/06/25 - 2018/08/09
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2018/05/21 - 2018/07/05
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2018/04/16 - 2018/05/31
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2018/03/12 - 2018/04/26
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2018/02/05 - 2018/03/22
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2018/01/01 - 2018/02/15
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2017/11/27 - 2018/01/11
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2017/10/23 - 2017/12/07
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2017/09/18 - 2017/11/02
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2017/08/14 - 2017/09/28
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2017/07/10 - 2017/08/24
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2017/06/05 - 2017/07/20
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2017/05/01 - 2017/06/15
2020/09/10 17:34:55 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2017/03/27 - 2017/05/11
2020/09/10 17:34:56 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2017/02/21 - 2017/04/06
2020/09/10 17:34:56 442D5F50 r (reader) SRGv6 [viaccess] class: 01, expiry date: 2017/02/21 - 2017/03/24
2020/09/10 17:34:56 442D5F50 r (reader) SRGv6 [viaccess] class: 02, expiry date: 2017/02/21 - 2017/03/24
2020/09/10 17:34:56 442D5F50 r (reader) SRGv6 [viaccess] class: 03, expiry date: 2017/02/21 - 2017/03/24
2020/09/10 17:34:56 442D5F50 r (reader) SRGv6 [viaccess] class: 04, expiry date: 2017/02/21 - 2017/03/24
2020/09/10 17:34:56 442D5F50 r (reader) SRGv6 [viaccess] class: 05, expiry date: 2017/02/21 - 2017/03/24
2020/09/10 17:34:56 442D5F50 r (reader) SRGv6 [viaccess] provider: 4, id: ######################, sa: ########, geo: FF FF FF FF
2020/09/10 17:34:56 442D5F50 r (reader) SRGv6 [viaccess] provider: 5, id: ######################, sa: ########, geo: FF FF FF FF
2020/09/10 17:34:57 442D5F50 r (reader) SRGv6 [viaccess] provider: 6, id: ######################, sa: ########, geo: FF FF FF FF
2020/09/10 17:34:57 00000000 s (main) init for all local cards done
2020/09/10 17:34:57 00000000 s (emmcache) loaded 40 emmcache records from /var/media/ftp/addon/oscam/oscam.emmcache in 1 ms
2020/09/10 17:34:57 00000000 s (emmcache) loaded 44 emmstat records from /var/media/ftp/addon/oscam/oscam.emmstat in 1 ms
2020/09/10 17:34:57 00000000 s (anticasc) anti cascading disabled
2020/09/10 17:34:57 5F3D5648 c (client) anonymous disconnected from 192.168.178.30
2020/09/10 17:35:01 0344EF92 c (client) encrypted cccam-client 192.168.178.30 granted (topgun, au=auto (11 reader))
 
Nein habe ich nicht probiert, Bei mir steht das drin:
logfile = /var/InternerSpeicher/logs/oscam.log
oder auch:
logfile = /var/log/oscam.log
funktioniert beides.
 
So wie ich das mache, reicht mir das vollkommen aus. Das oscam.log landet im InternenSpeicher der 6490 und meine EMM's auf dem NAS, diese Platte ist auch an der Fritte angeschlossen.
 
Zurück
Oben