oh, and after further investigation, seems that this commit:
http://sourceforge.n...043a751829d871/
did 'adapt' a bit to much,
blindscan binaries are not located inside the plugin dir anymore...
diff --git a/blindscan/src/plugin.py b/blindscan/src/plugin.py
index a123053..250b98c 100644
--- a/blindscan/src/plugin.py
+++ b/blindscan/src/plugin.py
@@ -29,7 +29,6 @@ except:
from time import strftime, time
XML_BLINDSCAN_DIR = "/tmp"
-BIN_BLINDSCAN_DIR = "/usr/lib/enigma2/python/Plugins/SystemPlugins/Blindscan/bin/"
XML_FILE = None
_supportNimType = { 'AVL1208':'', 'AVL6222':'6222_', 'AVL6211':'6211_', 'BCM7356':'bcm7346_'}
@@ -602,18 +601,12 @@ class Blindscan(ConfigListScreen, Screen):
status_box_start_freq = temp_start_int_freq + uni_lnb_loc_osc[band]
status_box_end_freq = temp_end_int_freq + uni_lnb_loc_osc[band]
- try:
- if os.path.exists(BIN_BLINDSCAN_DIR):
- os.system('chmod 755 %s/*' % BIN_BLINDSCAN_DIR)
- except:
- pass
-
if boxtype.startswith('vu'):
try:
- cmd = "%s%s %d %d %d %d %d %d %d %d" % (BIN_BLINDSCAN_DIR, self.binName, temp_start_int_freq, temp_end_int_freq, self.blindscan_start_symbol.value, self.blindscan_stop_symbol.value, tab_pol[pol], tab_hilow[band], self.feid, self.getNimSocket(self.feid))
+ cmd = "%s %d %d %d %d %d %d %d %d" % (self.binName, temp_start_int_freq, temp_end_int_freq, self.blindscan_start_symbol.value, self.blindscan_stop_symbol.value, tab_pol[pol], tab_hilow[band], self.feid, self.getNimSocket(self.feid))
except: return
elif boxtype.startswith('et'):
- cmd = "%savl_xtrend_blindscan %d %d %d %d %d %d %d %d" % (BIN_BLINDSCAN_DIR, temp_start_int_freq, temp_end_int_freq, self.blindscan_start_symbol.value, self.blindscan_stop_symbol.value, tab_pol[pol], tab_hilow[band], self.feid, self.getNimSocket(self.feid)) # commented out by Huevos cmd = "avl_xtrend_blindscan %d %d %d %d %d %d %d %d" % (self.blindscan_start_frequency.value/1000000, self.blindscan_stop_frequency.value/1000000, self.blindscan_start_symbol.value, self.blindscan_stop_symbol.value, tab_pol[pol], tab_hilow[band], self.feid, self.getNimSocket(self.feid))
+ cmd = "avl_xtrend_blindscan %d %d %d %d %d %d %d %d" % (temp_start_int_freq, temp_end_int_freq, self.blindscan_start_symbol.value, self.blindscan_stop_symbol.value, tab_pol[pol], tab_hilow[band], self.feid, self.getNimSocket(self.feid)) # commented out by Huevos cmd = "avl_xtrend_blindscan %d %d %d %d %d %d %d %d" % (self.blindscan_start_frequency.value/1000000, self.blindscan_stop_frequency.value/1000000, self.blindscan_start_symbol.value, self.blindscan_stop_symbol.value, tab_pol[pol], tab_hilow[band], self.feid, self.getNimSocket(self.feid))
print "prepared command : [%s]" % (cmd)
self.thisRun = [] # used to check result corresponds with values used above
on my et9500 this modified blindscan plugin.py works, but someone would need to check what's with vu+ boxes /?/
Pushed this, I didn't realise there was already a patch for this.