Advertisement
Guest User

xbmc4xbox debug

a guest
Mar 21st, 2013
103
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 47.02 KB | None | 0 0
  1. 11:25:07 M: 56471552 NOTICE: -----------------------------------------------------------------------
  2. 11:25:07 M: 56451072 NOTICE: Starting XBMC4Xbox. Built on Mar 12 2013 (SVN:31731, compiler 1310)
  3. 11:25:07 M: 56451072 NOTICE: special://xbmc/ is mapped to: Q:\
  4. 11:25:07 M: 56451072 NOTICE: special://masterprofile/ is mapped to: Q:\UserData
  5. 11:25:07 M: 56451072 NOTICE: special://home/ is mapped to: Q:\
  6. 11:25:07 M: 56451072 NOTICE: special://temp/ is mapped to: Z:\
  7. 11:25:07 M: 56451072 NOTICE: The executable running is: C:\default.xbe
  8. 11:25:07 M: 56451072 NOTICE: Log File is located: Q:\xbmc.log
  9. 11:25:07 M: 56451072 NOTICE: -----------------------------------------------------------------------
  10. 11:25:07 M: 56451072 NOTICE: Unmapped drive T
  11. 11:25:07 M: 56451072 NOTICE: Mapping drive T to Harddisk0\Partition2\UserData\
  12. 11:25:07 M: 56451072 NOTICE: Setup DirectX
  13. 11:25:07 M: 56426496 NOTICE: Mapping drive C to Harddisk0\Partition2
  14. 11:25:07 M: 56426496 NOTICE: Mapping drive E to Harddisk0\Partition1
  15. 11:25:07 M: 56426496 NOTICE: Unmapped drive D
  16. 11:25:07 M: 56426496 NOTICE: Mapping drive D to Cdrom0
  17. 11:25:09 M: 56426496 NOTICE: map extended drive F:
  18. 11:25:09 M: 56426496 NOTICE: Mapping drive F to Harddisk0\Partition6
  19. 11:25:09 M: 56426496 NOTICE: Mapping drive X to Harddisk0\Partition3
  20. 11:25:09 M: 56426496 NOTICE: Mapping drive Y to Harddisk0\Partition4
  21. 11:25:09 M: 56426496 NOTICE: Unmapped drive Z
  22. 11:25:09 M: 56426496 NOTICE: Mapping drive Z to Harddisk0\Partition5
  23. 11:25:09 M: 56422400 NOTICE: load settings...
  24. 11:25:09 M: 56422400 NOTICE: Mapping drive P to Harddisk0\Partition2\UserData\
  25. 11:25:09 M: 56422400 NOTICE: special://profile/ is mapped to: special://masterprofile/
  26. 11:25:09 M: 56422400 NOTICE: loading special://masterprofile/guisettings.xml
  27. 11:25:09 M: 56270848 NOTICE: Getting hardware information now...
  28. 11:25:09 M: 56270848 NOTICE: Checking resolution 10
  29. 11:25:09 M: 56270848 NOTICE: Setting autoresolution mode 5
  30. 11:25:09 M: 56270848 NOTICE: Loading player core factory settings from special://xbmc/system/playercorefactory.xml.
  31. 11:25:09 M: 56270848 NOTICE: Loaded playercorefactory configuration
  32. 11:25:09 M: 56250368 NOTICE: Loading player core factory settings from special://masterprofile/playercorefactory.xml.
  33. 11:25:09 M: 56250368 NOTICE: special://masterprofile/playercorefactory.xml does not exist. Skipping.
  34. 11:25:09 M: 56250368 NOTICE: No advancedsettings.xml to load (special://masterprofile/advancedsettings.xml)
  35. 11:25:09 M: 56250368 NOTICE: Default Video Player: dvdplayer
  36. 11:25:09 M: 56250368 NOTICE: Default Audio Player: paplayer
  37. 11:25:09 M: 56250368 NOTICE: Per AV pack settings are off
  38. 11:25:09 M: 56377344 NOTICE: special://masterprofile/sources.xml
  39. 11:25:10 M: 49876992 NOTICE: Network: Using DHCP IP settings
  40. 11:25:10 M: 49549312 NOTICE: Checking the Date!
  41. 11:25:10 M: 49549312 NOTICE: start dvd mediatype detection
  42. 11:25:10 M: 49483776 NOTICE: initializing playlistplayer
  43. 11:25:10 M: 49483776 NOTICE: DONE initializing playlistplayer
  44. 11:25:10 M: 49475584 NOTICE: load default skin:[Project Mayhem III]
  45. 11:25:11 M: 46501888 NOTICE: initialize done
  46. 11:25:11 M: 46481408 NOTICE: Running the application...
  47. 11:25:12 M: 42401792 NOTICE: XBFileZilla: Starting...
  48. 11:25:12 M: 40886272 NOTICE: XBFileZilla: Started
  49. 11:25:20 M: 43270144 NOTICE: Enabled debug logging due to GUI setting
  50. 11:25:20 M: 43270144 DEBUG: CApplication::OnKey: 257 pressed, action is Back
  51. 11:25:20 M: 43237376 DEBUG: CGUIWindowManager::PreviousWindow: Deactivate
  52. 11:25:20 M: 43237376 DEBUG: ------ Window Deinit (SettingsCategory.xml) ------
  53. 11:25:20 M: 44290048 DEBUG: CGUIWindowManager::PreviousWindow: Activate new
  54. 11:25:20 M: 44290048 DEBUG: ------ Window Init (Settings.xml) ------
  55. 11:25:20 M: 44290048 INFO: Loading skin file: Settings.xml
  56. 11:25:21 M: 42663936 DEBUG: CApplication::OnKey: 257 pressed, action is Back
  57. 11:25:21 M: 42663936 DEBUG: CGUIWindowManager::PreviousWindow: Deactivate
  58. 11:25:21 M: 42663936 DEBUG: ------ Window Deinit (Settings.xml) ------
  59. 11:25:21 M: 44302336 DEBUG: CGUIWindowManager::PreviousWindow: Activate new
  60. 11:25:21 M: 44302336 DEBUG: ------ Window Init (Home.xml) ------
  61. 11:25:21 M: 44302336 INFO: Loading skin file: Home.xml
  62. 11:25:22 M: 40435712 DEBUG: CApplication::OnKey: 271 pressed, action is Down
  63. 11:25:22 M: 39690240 WARNING: XFILE::CCurlFile::CReadState::FillBuffer: curl failed with code 28
  64. 11:25:22 M: 39690240 ERROR: CCurlFile::CReadState::Open, didn't get any data from stream.
  65. 11:25:22 M: 39768064 ERROR: WEATHER: Weather download failed!
  66. 11:25:22 M: 41140224 DEBUG: CApplication::OnKey: 271 pressed, action is Down
  67. 11:25:23 M: 41140224 DEBUG: CApplication::OnKey: 256 pressed, action is Select
  68. 11:25:23 M: 41140224 DEBUG: CApplication::ExecuteXBMCAction : Translating ActivateWindow(MyVideos)
  69. 11:25:23 M: 41140224 DEBUG: CApplication::ExecuteXBMCAction : To ActivateWindow(MyVideos)
  70. 11:25:23 M: 41140224 DEBUG: Activating window ID: 10024
  71. 11:25:23 M: 41140224 DEBUG: Checking if window ID 10024 is locked.
  72. 11:25:23 M: 41140224 DEBUG: ------ Window Deinit (Home.xml) ------
  73. 11:25:23 M: 44982272 DEBUG: ------ Window Init (MyVideo.xml) ------
  74. 11:25:23 M: 44982272 INFO: Loading skin file: MyVideo.xml
  75. 11:25:23 M: 44322816 DEBUG: CGUIMediaWindow::GetDirectory ()
  76. 11:25:23 M: 44359680 DEBUG: ParentPath = []
  77. 11:25:23 M: 44359680 DEBUG: CFileItemList::Sort, sorting took 0 millis
  78. 11:25:24 M: 43184128 DEBUG: CApplication::OnKey: 271 pressed, action is Down
  79. 11:25:24 M: 43184128 DEBUG: CApplication::OnKey: 256 pressed, action is Select
  80. 11:25:24 M: 43184128 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/)
  81. 11:25:24 M: 43184128 DEBUG: ParentPath = []
  82. 11:25:24 M: 43429888 DEBUG: CFileItemList::Sort, sorting took 1 millis
  83. 11:25:24 M: 43401216 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 192 x 192
  84. 11:25:24 M: 43401216 DEBUG: JpegIO::Read - Using scale_num of 8, 192 x 192
  85. 11:25:24 M: 43253760 WARNING: old getenv from python.lib called, library check needed
  86. Previous line repeats 3 times.
  87. 11:25:24 M: 43245568 WARNING: JpegIO: Error 55: Not a JPEG file: starts with 0x%02x 0x%02x
  88. 11:25:25 M: 42205184 DEBUG: Dll MSVCP71.dll was not found in path
  89. 11:25:25 M: 42205184 DEBUG: Unable to load referenced dll MSVCP71.dll - Dll: Q:\system\ImageLib.dll
  90. 11:25:25 M: 42045440 WARNING: JpegIO: Error 55: Not a JPEG file: starts with 0x%02x 0x%02x
  91. 11:25:25 M: 41893888 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 192 x 192
  92. 11:25:25 M: 41893888 DEBUG: JpegIO::Read - Using scale_num of 8, 192 x 192
  93. 11:25:25 M: 41721856 DEBUG: CApplication::OnKey: 270 pressed, action is Up
  94. 11:25:26 M: 41721856 DEBUG: CApplication::OnKey: 256 pressed, action is Select
  95. 11:25:26 M: 41721856 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/YouTube/)
  96. 11:25:26 M: 41721856 DEBUG: ParentPath = [plugin://video/]
  97. 11:25:26 M: 41721856 DEBUG: XFILE::CPluginDirectory::StartScript - URL for plugin settings: YouTube/
  98. 11:25:26 M: 41721856 DEBUG: XFILE::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/YouTube/default.py('plugin://video/YouTube/','0','')
  99. 11:25:26 M: 41721856 INFO: initializing python engine.
  100. 11:25:26 M: 41721856 DEBUG: LoadLibraryA('python24.dll')
  101. 11:25:26 M: 40595456 DEBUG: LoadLibrary('python24.dll') returning: 00923480
  102. 11:25:26 M: 40595456 DEBUG: dllGetProcAddress(00853900(kernel32.dll), 'InterlockedCompareExchange') => 00290D64
  103. 11:25:26 M: 40325120 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  104. 11:25:26 M: 40325120 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  105. Previous line repeats 1 times.
  106. 11:25:26 M: 40259584 DEBUG: LoadLibraryExA called with flags:
  107. - LOAD_WITH_ALTERED_SEARCH_PATH
  108. 11:25:26 M: 40259584 DEBUG: LoadLibraryA('zlib.pyd')
  109. 11:25:26 M: 40189952 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  110. 11:25:26 M: 40189952 DEBUG: LoadLibrary('zlib.pyd') returning: 00C46C20
  111. 11:25:26 M: 40189952 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  112. 11:25:27 M: 39239680 NOTICE: -->Python Initialized<--
  113. 11:25:27 M: 39219200 DEBUG: new python thread created. id=1
  114. 11:25:27 M: 38694912 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - waiting on the YouTube plugin...
  115. 11:25:27 M: 38694912 DEBUG: Python thread: start processing
  116. 11:25:27 M: 38694912 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/YouTube/default.py
  117. 11:25:27 M: 38694912 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\YouTube;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.parsedom\lib;Q:\scripts\.modules\script.module.simplejson\lib;Q:\scripts\.modules\script.module.xbmcvfs\lib;Q:\scripts\.modules\script.common.plugin.cache\lib;Q:\scripts\.modules\script.module.pysqlite2\lib;Q:\scripts\.modules\script.module.metahandler\lib;Q:\scripts\.modules\script.module.elementtree\lib;Q:\scripts\.modules\script.module.t0mm0.common\lib;Q:\scripts\.modules\script.module.urlresolver\lib;Q:\scripts\.modules\script.module.myconnpy\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  118. 11:25:27 M: 38694912 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\YouTube
  119. 11:25:28 M: 37040128 DEBUG: LoadLibraryExA called with flags:
  120. - LOAD_WITH_ALTERED_SEARCH_PATH
  121. 11:25:28 M: 37040128 DEBUG: LoadLibraryA('_socket.pyd')
  122. 11:25:28 M: 36990976 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  123. 11:25:28 M: 36990976 DEBUG: LoadLibrary('_socket.pyd') returning: 00C13890
  124. 11:25:28 M: 36990976 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  125. 11:25:28 M: 36966400 DEBUG: LoadLibraryExA called with flags:
  126. - LOAD_WITH_ALTERED_SEARCH_PATH
  127. 11:25:28 M: 36966400 DEBUG: LoadLibraryA('_ssl.pyd')
  128. 11:25:28 M: 36470784 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  129. 11:25:28 M: 36470784 DEBUG: LoadLibrary('_ssl.pyd') returning: 00EF13A0
  130. 11:25:28 M: 36470784 DEBUG: dllGetProcAddress(01240000(_ssl.pyd), 'init_ssl') => 01241820
  131. 11:25:28 M: 36241408 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  132. 11:25:28 M: 35917824 DEBUG: dllGetProcAddress(00854188(advapi32.dll), 'CryptAcquireContextA') => 00269EA8
  133. 11:25:28 M: 35917824 DEBUG: dllGetProcAddress(00854188(advapi32.dll), 'CryptGenRandom') => 00269EB9
  134. 11:25:28 M: 35917824 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  135. 11:25:28 M: 35459072 INFO: Loading skin file: DialogProgress.xml
  136. 11:25:28 M: 35553280 DEBUG: ------ Window Init (DialogBusy.xml) ------
  137. 11:25:28 M: 35553280 INFO: Loading skin file: DialogBusy.xml
  138. 11:25:28 M: 35385344 DEBUG: ------ Window Init (DialogProgress.xml) ------
  139. 11:25:28 M: 35168256 DEBUG: ------ Window Deinit (DialogBusy.xml) ------
  140. 11:25:29 M: 34951168 DEBUG: xbmcaddon: trying Q:\plugins\video\YouTube
  141. 11:25:29 M: 34934784 DEBUG: LoadLibraryExA called with flags:
  142. - LOAD_WITH_ALTERED_SEARCH_PATH
  143. 11:25:29 M: 34934784 DEBUG: LoadLibraryA('pyexpat.pyd')
  144. 11:25:29 M: 34795520 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  145. 11:25:29 M: 34795520 DEBUG: LoadLibrary('pyexpat.pyd') returning: 010862B0
  146. 11:25:29 M: 34795520 DEBUG: dllGetProcAddress(1D100000(pyexpat.pyd), 'initpyexpat') => 1D102350
  147. 11:25:29 M: 34750464 DEBUG: xbmcaddon: using plugin://video/YouTube
  148. 11:25:29 M: 34729984 NOTICE: YouTube-3.3.0
  149. 11:25:29 M: 34631680 DEBUG: SECTION:Section LIBHTTP loaded count:1 size:80348
  150. 11:25:29 M: 34631680 DEBUG: xbmcHttpShim starts
  151. 11:25:29 M: 34631680 DEBUG: HttpApi Start command: FileExists paras: FileExists; Q:\UserData\plugin_data\video\YouTube
  152. 11:25:29 M: 34631680 DEBUG: [xbmcvfs] true, exists(Q:\UserData\plugin_data\video\YouTube)
  153. 11:25:29 M: 34570240 NOTICE: CommonFunctions-1.4.0
  154. 11:25:29 M: 34533376 DEBUG: xbmcaddon: trying Q:\plugins\video\YouTube
  155. 11:25:29 M: 34471936 DEBUG: xbmcaddon: using plugin://video/YouTube
  156. 11:25:29 M: 34336768 INFO: Scriptresult: Success
  157. 11:25:29 M: 34365440 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
  158. 11:25:29 M: 34365440 INFO: Python script stopped
  159. 11:25:29 M: 34869248 DEBUG: Saving fileitems [plugin://video/YouTube/]
  160. 11:25:29 M: 34869248 DEBUG: -- items: 3, sort method: 0, ascending: false
  161. 11:25:30 M: 34734080 DEBUG: python thread 1 destructed
  162. 11:25:30 M: 34734080 INFO: Python, unloading python24.dll because no scripts are running anymore
  163. 11:25:30 M: 35229696 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01240000): Detected memory leaks: 1647 leaks
  164. 11:25:30 M: 35250176 DEBUG: leak caller address 0124489B, size 20064, counter 1645
  165. 11:25:30 M: 35250176 DEBUG: leak caller address 012448B0, size 4224, counter 2
  166. 11:25:30 M: 35250176 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  167. 11:25:30 M: 35995648 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 721 leaks
  168. 11:25:30 M: 39161856 DEBUG: leak caller address 1E02169B, size 24, counter 1
  169. 11:25:30 M: 39161856 DEBUG: leak caller address 1E047413, size 511296, counter 116
  170. 11:25:30 M: 39161856 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  171. 11:25:30 M: 39161856 DEBUG: leak caller address 1E05928C, size 233, counter 1
  172. 11:25:30 M: 39161856 DEBUG: leak caller address 1E05D47B, size 41496, counter 42
  173. 11:25:30 M: 39161856 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  174. 11:25:30 M: 39161856 DEBUG: leak caller address 1E061589, size 928, counter 34
  175. 11:25:30 M: 39161856 DEBUG: leak caller address 1E06165A, size 140, counter 13
  176. 11:25:30 M: 39161856 DEBUG: leak caller address 1E07365F, size 2621440, counter 10
  177. 11:25:30 M: 39161856 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  178. 11:25:30 M: 39161856 DEBUG: leak caller address 1E073894, size 80015, counter 138
  179. 11:25:30 M: 39161856 DEBUG: leak caller address 1E0739DF, size 13103, counter 343
  180. 11:25:30 M: 39161856 DEBUG: leak caller address 1E092749, size 640, counter 3
  181. 11:25:30 M: 39161856 DEBUG: leak caller address 1E09457C, size 84, counter 7
  182. 11:25:30 M: 39161856 DEBUG: leak caller address 1E0A309A, size 28, counter 3
  183. 11:25:30 M: 39161856 DEBUG: leak caller address 1E0A30EB, size 80, counter 5
  184. 11:25:30 M: 39161856 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
  185. 11:25:30 M: 39161856 DEBUG: python24.dll: Total bytes leaked: 3272549
  186. 11:25:30 M: 40697856 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  187. 11:25:31 M: 41234432 DEBUG: CApplication::OnKey: 271 pressed, action is Down
  188. Previous line repeats 1 times.
  189. 11:25:31 M: 41238528 DEBUG: CApplication::OnKey: 256 pressed, action is Select
  190. 11:25:31 M: 41238528 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/YouTube/?path=/root/search&login=false&folder=true&store=searches&)
  191. 11:25:31 M: 41238528 DEBUG: ParentPath = [plugin://video/YouTube/]
  192. 11:25:31 M: 41238528 DEBUG: XFILE::CPluginDirectory::StartScript - URL for plugin settings: YouTube/
  193. 11:25:32 M: 41238528 DEBUG: XFILE::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/YouTube/default.py('plugin://video/YouTube/','0','?path=/root/search&login=false&folder=true&store=searches&')
  194. 11:25:32 M: 41238528 INFO: initializing python engine.
  195. 11:25:32 M: 41238528 DEBUG: LoadLibraryA('python24.dll')
  196. 11:25:32 M: 40112128 DEBUG: LoadLibrary('python24.dll') returning: 00C48D70
  197. 11:25:32 M: 40112128 DEBUG: dllGetProcAddress(00853900(kernel32.dll), 'InterlockedCompareExchange') => 00290D64
  198. 11:25:32 M: 39845888 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  199. 11:25:32 M: 39845888 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  200. Previous line repeats 1 times.
  201. 11:25:32 M: 39780352 DEBUG: LoadLibraryExA called with flags:
  202. - LOAD_WITH_ALTERED_SEARCH_PATH
  203. 11:25:32 M: 39780352 DEBUG: LoadLibraryA('zlib.pyd')
  204. 11:25:32 M: 39710720 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  205. 11:25:32 M: 39710720 DEBUG: LoadLibrary('zlib.pyd') returning: 009EEB10
  206. 11:25:32 M: 39710720 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  207. 11:25:32 M: 38801408 NOTICE: -->Python Initialized<--
  208. 11:25:32 M: 38801408 DEBUG: new python thread created. id=2
  209. 11:25:32 M: 38277120 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - waiting on the YouTube plugin...
  210. 11:25:32 M: 38277120 DEBUG: Python thread: start processing
  211. 11:25:32 M: 38277120 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/YouTube/default.py
  212. 11:25:32 M: 38277120 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\YouTube;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.parsedom\lib;Q:\scripts\.modules\script.module.simplejson\lib;Q:\scripts\.modules\script.module.xbmcvfs\lib;Q:\scripts\.modules\script.common.plugin.cache\lib;Q:\scripts\.modules\script.module.pysqlite2\lib;Q:\scripts\.modules\script.module.metahandler\lib;Q:\scripts\.modules\script.module.elementtree\lib;Q:\scripts\.modules\script.module.t0mm0.common\lib;Q:\scripts\.modules\script.module.urlresolver\lib;Q:\scripts\.modules\script.module.myconnpy\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  213. 11:25:32 M: 38277120 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\YouTube
  214. 11:25:33 M: 36724736 DEBUG: LoadLibraryExA called with flags:
  215. - LOAD_WITH_ALTERED_SEARCH_PATH
  216. 11:25:33 M: 36724736 DEBUG: LoadLibraryA('_socket.pyd')
  217. 11:25:33 M: 36675584 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  218. 11:25:33 M: 36675584 DEBUG: LoadLibrary('_socket.pyd') returning: 00BE7F80
  219. 11:25:33 M: 36675584 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  220. 11:25:33 M: 36659200 DEBUG: LoadLibraryExA called with flags:
  221. - LOAD_WITH_ALTERED_SEARCH_PATH
  222. 11:25:33 M: 36659200 DEBUG: LoadLibraryA('_ssl.pyd')
  223. 11:25:33 M: 36163584 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  224. 11:25:33 M: 36163584 DEBUG: LoadLibrary('_ssl.pyd') returning: 00BEBED0
  225. 11:25:33 M: 36163584 DEBUG: dllGetProcAddress(01240000(_ssl.pyd), 'init_ssl') => 01241820
  226. 11:25:33 M: 35926016 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  227. 11:25:33 M: 35598336 DEBUG: dllGetProcAddress(00854188(advapi32.dll), 'CryptAcquireContextA') => 00269EA8
  228. 11:25:33 M: 35602432 DEBUG: dllGetProcAddress(00854188(advapi32.dll), 'CryptGenRandom') => 00269EB9
  229. 11:25:33 M: 35602432 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  230. 11:25:33 M: 35168256 DEBUG: ------ Window Init (DialogBusy.xml) ------
  231. 11:25:33 M: 35139584 INFO: Loading skin file: DialogBusy.xml
  232. 11:25:34 M: 35078144 INFO: Loading skin file: DialogProgress.xml
  233. 11:25:34 M: 35053568 DEBUG: ------ Window Init (DialogProgress.xml) ------
  234. 11:25:34 M: 34902016 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://xml.weather.com (easy=00BDB010, multi=009DD1C0)
  235. 11:25:34 M: 34525184 DEBUG: ------ Window Deinit (DialogBusy.xml) ------
  236. 11:25:34 M: 34775040 DEBUG: xbmcaddon: trying Q:\plugins\video\YouTube
  237. 11:25:34 M: 34750464 DEBUG: LoadLibraryExA called with flags:
  238. - LOAD_WITH_ALTERED_SEARCH_PATH
  239. 11:25:34 M: 34750464 DEBUG: LoadLibraryA('pyexpat.pyd')
  240. 11:25:34 M: 34611200 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  241. 11:25:34 M: 34611200 DEBUG: LoadLibrary('pyexpat.pyd') returning: 00B36C30
  242. 11:25:34 M: 34611200 DEBUG: dllGetProcAddress(1D100000(pyexpat.pyd), 'initpyexpat') => 1D102350
  243. 11:25:34 M: 34574336 DEBUG: xbmcaddon: using plugin://video/YouTube
  244. 11:25:34 M: 34553856 NOTICE: YouTube-3.3.0
  245. 11:25:34 M: 34533376 DEBUG: HttpApi Start command: FileExists paras: FileExists; Q:\UserData\plugin_data\video\YouTube
  246. 11:25:34 M: 34533376 DEBUG: [xbmcvfs] true, exists(Q:\UserData\plugin_data\video\YouTube)
  247. 11:25:35 M: 34463744 NOTICE: CommonFunctions-1.4.0
  248. 11:25:35 M: 34426880 DEBUG: xbmcaddon: trying Q:\plugins\video\YouTube
  249. 11:25:35 M: 34369536 DEBUG: xbmcaddon: using plugin://video/YouTube
  250. 11:25:35 M: 34242560 DEBUG: SECTION:UnloadDelayed(DLL: Q:\system\ImageLib.dll)
  251. 11:25:35 M: 35360768 INFO: Scriptresult: Success
  252. 11:25:35 M: 35360768 INFO: Python script stopped
  253. 11:25:35 M: 35876864 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
  254. 11:25:35 M: 36442112 DEBUG: python thread 2 destructed
  255. 11:25:35 M: 36442112 INFO: Python, unloading python24.dll because no scripts are running anymore
  256. 11:25:35 M: 36925440 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01240000): Detected memory leaks: 1647 leaks
  257. 11:25:35 M: 36929536 DEBUG: leak caller address 0124489B, size 20064, counter 1645
  258. 11:25:35 M: 36929536 DEBUG: leak caller address 012448B0, size 4224, counter 2
  259. 11:25:35 M: 36929536 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  260. 11:25:35 M: 37675008 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 721 leaks
  261. 11:25:35 M: 40861696 DEBUG: leak caller address 1E02169B, size 24, counter 1
  262. 11:25:35 M: 40861696 DEBUG: leak caller address 1E047413, size 511296, counter 116
  263. 11:25:35 M: 40861696 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  264. 11:25:35 M: 40861696 DEBUG: leak caller address 1E05928C, size 233, counter 1
  265. 11:25:35 M: 40861696 DEBUG: leak caller address 1E05D47B, size 41496, counter 42
  266. 11:25:35 M: 40861696 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  267. 11:25:35 M: 40861696 DEBUG: leak caller address 1E061589, size 928, counter 34
  268. 11:25:35 M: 40861696 DEBUG: leak caller address 1E06165A, size 140, counter 13
  269. 11:25:35 M: 40861696 DEBUG: leak caller address 1E07365F, size 2621440, counter 10
  270. 11:25:35 M: 40861696 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  271. 11:25:35 M: 40861696 DEBUG: leak caller address 1E073894, size 80015, counter 138
  272. 11:25:35 M: 40861696 DEBUG: leak caller address 1E0739DF, size 13103, counter 343
  273. 11:25:35 M: 40861696 DEBUG: leak caller address 1E092749, size 640, counter 3
  274. 11:25:35 M: 40861696 DEBUG: leak caller address 1E09457C, size 84, counter 7
  275. 11:25:35 M: 40861696 DEBUG: leak caller address 1E0A309A, size 28, counter 3
  276. 11:25:35 M: 40861696 DEBUG: leak caller address 1E0A30EB, size 80, counter 5
  277. 11:25:35 M: 40861696 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
  278. 11:25:35 M: 40861696 DEBUG: python24.dll: Total bytes leaked: 3272549
  279. 11:25:35 M: 42287104 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  280. 11:25:36 M: 42819584 DEBUG: CApplication::OnKey: 271 pressed, action is Down
  281. Previous line repeats 1 times.
  282. 11:25:36 M: 42823680 DEBUG: CApplication::OnKey: 256 pressed, action is Select
  283. 11:25:36 M: 42823680 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/YouTube/?path=/root/search&feed=search&search=movie+reviews&)
  284. 11:25:36 M: 42823680 DEBUG: ParentPath = [plugin://video/YouTube/?path=/root/search&login=false&folder=true&store=searches&]
  285. 11:25:36 M: 42823680 DEBUG: XFILE::CPluginDirectory::StartScript - URL for plugin settings: YouTube/
  286. 11:25:36 M: 42827776 DEBUG: XFILE::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/YouTube/default.py('plugin://video/YouTube/','0','?path=/root/search&feed=search&search=movie+reviews&')
  287. 11:25:36 M: 42827776 INFO: initializing python engine.
  288. 11:25:36 M: 42827776 DEBUG: LoadLibraryA('python24.dll')
  289. 11:25:36 M: 41701376 DEBUG: LoadLibrary('python24.dll') returning: 011A2550
  290. 11:25:36 M: 41701376 DEBUG: dllGetProcAddress(00853900(kernel32.dll), 'InterlockedCompareExchange') => 00290D64
  291. 11:25:36 M: 41426944 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  292. 11:25:36 M: 41426944 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  293. Previous line repeats 1 times.
  294. 11:25:36 M: 41369600 DEBUG: LoadLibraryExA called with flags:
  295. - LOAD_WITH_ALTERED_SEARCH_PATH
  296. 11:25:36 M: 41369600 DEBUG: LoadLibraryA('zlib.pyd')
  297. 11:25:36 M: 41299968 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  298. 11:25:36 M: 41299968 DEBUG: LoadLibrary('zlib.pyd') returning: 00C6EFE0
  299. 11:25:36 M: 41299968 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  300. 11:25:37 M: 40390656 NOTICE: -->Python Initialized<--
  301. 11:25:37 M: 40390656 DEBUG: new python thread created. id=3
  302. 11:25:37 M: 39866368 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - waiting on the YouTube plugin...
  303. 11:25:37 M: 39866368 DEBUG: Python thread: start processing
  304. 11:25:37 M: 39866368 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/YouTube/default.py
  305. 11:25:37 M: 39874560 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\YouTube;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.parsedom\lib;Q:\scripts\.modules\script.module.simplejson\lib;Q:\scripts\.modules\script.module.xbmcvfs\lib;Q:\scripts\.modules\script.common.plugin.cache\lib;Q:\scripts\.modules\script.module.pysqlite2\lib;Q:\scripts\.modules\script.module.metahandler\lib;Q:\scripts\.modules\script.module.elementtree\lib;Q:\scripts\.modules\script.module.t0mm0.common\lib;Q:\scripts\.modules\script.module.urlresolver\lib;Q:\scripts\.modules\script.module.myconnpy\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  306. 11:25:37 M: 39874560 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\YouTube
  307. 11:25:38 M: 38449152 DEBUG: LoadLibraryExA called with flags:
  308. - LOAD_WITH_ALTERED_SEARCH_PATH
  309. 11:25:38 M: 38449152 DEBUG: LoadLibraryA('_socket.pyd')
  310. 11:25:38 M: 38400000 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  311. 11:25:38 M: 38400000 DEBUG: LoadLibrary('_socket.pyd') returning: 0109FA10
  312. 11:25:38 M: 38400000 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  313. 11:25:38 M: 38375424 DEBUG: LoadLibraryExA called with flags:
  314. - LOAD_WITH_ALTERED_SEARCH_PATH
  315. 11:25:38 M: 38375424 DEBUG: LoadLibraryA('_ssl.pyd')
  316. 11:25:38 M: 37875712 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  317. 11:25:38 M: 37875712 DEBUG: LoadLibrary('_ssl.pyd') returning: 01068FC0
  318. 11:25:38 M: 37875712 DEBUG: dllGetProcAddress(01AC0000(_ssl.pyd), 'init_ssl') => 01AC1820
  319. 11:25:38 M: 37662720 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  320. 11:25:38 M: 37326848 DEBUG: dllGetProcAddress(00854188(advapi32.dll), 'CryptAcquireContextA') => 00269EA8
  321. 11:25:38 M: 37326848 DEBUG: dllGetProcAddress(00854188(advapi32.dll), 'CryptGenRandom') => 00269EB9
  322. 11:25:38 M: 37326848 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  323. 11:25:38 M: 36900864 DEBUG: ------ Window Init (DialogBusy.xml) ------
  324. 11:25:38 M: 36892672 INFO: Loading skin file: DialogBusy.xml
  325. 11:25:38 M: 36843520 INFO: Loading skin file: DialogProgress.xml
  326. 11:25:38 M: 36818944 DEBUG: ------ Window Init (DialogProgress.xml) ------
  327. 11:25:38 M: 36200448 DEBUG: ------ Window Deinit (DialogBusy.xml) ------
  328. 11:25:39 M: 36409344 DEBUG: xbmcaddon: trying Q:\plugins\video\YouTube
  329. 11:25:39 M: 36376576 DEBUG: LoadLibraryExA called with flags:
  330. - LOAD_WITH_ALTERED_SEARCH_PATH
  331. 11:25:39 M: 36380672 DEBUG: LoadLibraryA('pyexpat.pyd')
  332. 11:25:39 M: 36241408 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  333. 11:25:39 M: 36241408 DEBUG: LoadLibrary('pyexpat.pyd') returning: 00D19D80
  334. 11:25:39 M: 36241408 DEBUG: dllGetProcAddress(1D100000(pyexpat.pyd), 'initpyexpat') => 1D102350
  335. 11:25:39 M: 36196352 DEBUG: xbmcaddon: using plugin://video/YouTube
  336. 11:25:39 M: 36175872 NOTICE: YouTube-3.3.0
  337. 11:25:39 M: 36155392 DEBUG: HttpApi Start command: FileExists paras: FileExists; Q:\UserData\plugin_data\video\YouTube
  338. 11:25:39 M: 36155392 DEBUG: [xbmcvfs] true, exists(Q:\UserData\plugin_data\video\YouTube)
  339. 11:25:39 M: 36089856 NOTICE: CommonFunctions-1.4.0
  340. 11:25:39 M: 36057088 DEBUG: xbmcaddon: trying Q:\plugins\video\YouTube
  341. 11:25:39 M: 36003840 DEBUG: xbmcaddon: using plugin://video/YouTube
  342. 11:25:39 M: 35856384 DEBUG: LoadLibraryA('ws2_32')
  343. 11:25:39 M: 35856384 DEBUG: LoadLibrary('ws2_32.dll') returning: 008538D8
  344. 11:25:39 M: 35856384 DEBUG: dllGetProcAddress(00853898(ws2_32.dll), 'getaddrinfo') => 0026C8B7
  345. Previous line repeats 1 times.
  346. 11:25:39 M: 35856384 DEBUG: dllGetProcAddress(00853898(ws2_32.dll), 'getnameinfo') => 0026C8D2
  347. 11:25:39 M: 35856384 DEBUG: dllGetProcAddress(00853898(ws2_32.dll), 'freeaddrinfo') => 0026C8F6
  348. 11:25:43 M: 35758080 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
  349. 11:25:43 M: 35762176 INFO: Scriptresult: Success
  350. 11:25:43 M: 35680256 INFO: Python script stopped
  351. 11:25:43 M: 36122624 DEBUG: Saving fileitems [plugin://video/YouTube/?path=/root/search&feed=search&search=movie+reviews&]
  352. 11:25:43 M: 36102144 DEBUG: -- items: 51, sort method: 0, ascending: false
  353. 11:25:43 M: 34648064 DEBUG: python thread 3 destructed
  354. 11:25:43 M: 34652160 INFO: Python, unloading python24.dll because no scripts are running anymore
  355. 11:25:43 M: 35074048 DEBUG: Q:\system\python\DLLs\_socket.pyd: Detected 1 unloaded dll's
  356. 11:25:43 M: 35127296 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01AC0000): Detected memory leaks: 1647 leaks
  357. 11:25:43 M: 35127296 DEBUG: leak caller address 01AC489B, size 20064, counter 1645
  358. 11:25:43 M: 35127296 DEBUG: leak caller address 01AC48B0, size 4224, counter 2
  359. 11:25:43 M: 35127296 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  360. 11:25:43 M: 35819520 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 748 leaks
  361. 11:25:43 M: 38977536 DEBUG: leak caller address 1E02169B, size 24, counter 1
  362. 11:25:43 M: 38977536 DEBUG: leak caller address 1E047413, size 513792, counter 120
  363. 11:25:43 M: 38977536 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  364. 11:25:43 M: 38977536 DEBUG: leak caller address 1E05928C, size 233, counter 1
  365. 11:25:43 M: 39014400 DEBUG: leak caller address 1E05D47B, size 41496, counter 42
  366. 11:25:43 M: 39014400 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  367. 11:25:43 M: 39014400 DEBUG: leak caller address 1E061589, size 944, counter 35
  368. 11:25:43 M: 39014400 DEBUG: leak caller address 1E06165A, size 140, counter 13
  369. 11:25:43 M: 39014400 DEBUG: leak caller address 1E07365F, size 2621440, counter 10
  370. 11:25:43 M: 39014400 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  371. 11:25:43 M: 39014400 DEBUG: leak caller address 1E073894, size 84884, counter 146
  372. 11:25:43 M: 39014400 DEBUG: leak caller address 1E0739DF, size 14117, counter 357
  373. 11:25:43 M: 39014400 DEBUG: leak caller address 1E092749, size 640, counter 3
  374. 11:25:43 M: 39014400 DEBUG: leak caller address 1E09457C, size 84, counter 7
  375. 11:25:43 M: 39014400 DEBUG: leak caller address 1E0A309A, size 28, counter 3
  376. 11:25:43 M: 39014400 DEBUG: leak caller address 1E0A30EB, size 80, counter 5
  377. 11:25:43 M: 39014400 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
  378. 11:25:43 M: 39014400 DEBUG: python24.dll: Total bytes leaked: 3280944
  379. 11:25:44 M: 40366080 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  380. 11:25:44 M: 40366080 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  381. 11:25:44 M: 40194048 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  382. 11:25:44 M: 40194048 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  383. 11:25:44 M: 40026112 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  384. 11:25:44 M: 40026112 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  385. 11:25:44 M: 39841792 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  386. 11:25:44 M: 39841792 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  387. 11:25:44 M: 39665664 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  388. 11:25:44 M: 39665664 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  389. 11:25:44 M: 39489536 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  390. 11:25:44 M: 39489536 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  391. 11:25:44 M: 39321600 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  392. 11:25:44 M: 39321600 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  393. 11:25:44 M: 39133184 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  394. 11:25:44 M: 39133184 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  395. 11:25:44 M: 38957056 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  396. 11:25:44 M: 38957056 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  397. 11:25:44 M: 38780928 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  398. 11:25:44 M: 38780928 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  399. 11:25:44 M: 38604800 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  400. 11:25:44 M: 38604800 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  401. 11:25:44 M: 38428672 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  402. 11:25:44 M: 38428672 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  403. 11:25:44 M: 38256640 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  404. 11:25:44 M: 38256640 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  405. 11:25:44 M: 38105088 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  406. 11:25:44 M: 39165952 DEBUG: CApplication::OnKey: 271 pressed, action is Down
  407. 11:25:44 M: 39141376 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 221 x 166
  408. 11:25:44 M: 39141376 DEBUG: JpegIO::Read - Using scale_num of 8, 240 x 180
  409. 11:25:45 M: 38989824 DEBUG: CApplication::OnKey: 256 pressed, action is Select
  410. 11:25:45 M: 38989824 DEBUG: XFILE::CPluginDirectory::StartScript - URL for plugin settings: YouTube/
  411. 11:25:45 M: 38989824 DEBUG: XFILE::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/YouTube/default.py('plugin://video/YouTube/','0','?path=/root/video&action=play_video&videoid=MOyeKHM5T90')
  412. 11:25:45 M: 38989824 INFO: initializing python engine.
  413. 11:25:45 M: 38989824 DEBUG: LoadLibraryA('python24.dll')
  414. 11:25:45 M: 37863424 DEBUG: LoadLibrary('python24.dll') returning: 009D4140
  415. 11:25:45 M: 37863424 DEBUG: dllGetProcAddress(00853900(kernel32.dll), 'InterlockedCompareExchange') => 00290D64
  416. 11:25:45 M: 37588992 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  417. 11:25:45 M: 37588992 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  418. Previous line repeats 1 times.
  419. 11:25:45 M: 37527552 DEBUG: LoadLibraryExA called with flags:
  420. - LOAD_WITH_ALTERED_SEARCH_PATH
  421. 11:25:45 M: 37527552 DEBUG: LoadLibraryA('zlib.pyd')
  422. 11:25:45 M: 37457920 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  423. 11:25:45 M: 37457920 DEBUG: LoadLibrary('zlib.pyd') returning: 00B69ED0
  424. 11:25:45 M: 37457920 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  425. 11:25:46 M: 36540416 NOTICE: -->Python Initialized<--
  426. 11:25:46 M: 36540416 DEBUG: new python thread created. id=4
  427. 11:25:46 M: 36016128 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - waiting on the YouTube plugin...
  428. 11:25:46 M: 36016128 DEBUG: Python thread: start processing
  429. 11:25:46 M: 36016128 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/YouTube/default.py
  430. 11:25:46 M: 36016128 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\YouTube;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.parsedom\lib;Q:\scripts\.modules\script.module.simplejson\lib;Q:\scripts\.modules\script.module.xbmcvfs\lib;Q:\scripts\.modules\script.common.plugin.cache\lib;Q:\scripts\.modules\script.module.pysqlite2\lib;Q:\scripts\.modules\script.module.metahandler\lib;Q:\scripts\.modules\script.module.elementtree\lib;Q:\scripts\.modules\script.module.t0mm0.common\lib;Q:\scripts\.modules\script.module.urlresolver\lib;Q:\scripts\.modules\script.module.myconnpy\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  431. 11:25:46 M: 36020224 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\YouTube
  432. 11:25:47 M: 34615296 DEBUG: LoadLibraryExA called with flags:
  433. - LOAD_WITH_ALTERED_SEARCH_PATH
  434. 11:25:47 M: 34615296 DEBUG: LoadLibraryA('_socket.pyd')
  435. 11:25:47 M: 34566144 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  436. 11:25:47 M: 34566144 DEBUG: LoadLibrary('_socket.pyd') returning: 00B3B8D0
  437. 11:25:47 M: 34566144 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  438. 11:25:47 M: 34541568 DEBUG: LoadLibraryExA called with flags:
  439. - LOAD_WITH_ALTERED_SEARCH_PATH
  440. 11:25:47 M: 34541568 DEBUG: LoadLibraryA('_ssl.pyd')
  441. 11:25:47 M: 34041856 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  442. 11:25:47 M: 34041856 DEBUG: LoadLibrary('_ssl.pyd') returning: 00C0CD50
  443. 11:25:47 M: 34041856 DEBUG: dllGetProcAddress(01AC0000(_ssl.pyd), 'init_ssl') => 01AC1820
  444. 11:25:47 M: 33992704 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  445. 11:25:47 M: 33689600 DEBUG: dllGetProcAddress(00854188(advapi32.dll), 'CryptAcquireContextA') => 00269EA8
  446. 11:25:47 M: 33689600 DEBUG: dllGetProcAddress(00854188(advapi32.dll), 'CryptGenRandom') => 00269EB9
  447. 11:25:47 M: 33689600 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  448. 11:25:47 M: 33529856 DEBUG: ------ Window Init (DialogBusy.xml) ------
  449. 11:25:47 M: 33546240 INFO: Loading skin file: DialogBusy.xml
  450. 11:25:47 M: 33091584 INFO: Loading skin file: DialogProgress.xml
  451. 11:25:47 M: 33169408 DEBUG: ------ Window Init (DialogProgress.xml) ------
  452. 11:25:47 M: 32604160 DEBUG: ------ Window Deinit (DialogBusy.xml) ------
  453. 11:25:48 M: 32772096 DEBUG: xbmcaddon: trying Q:\plugins\video\YouTube
  454. 11:25:48 M: 32751616 DEBUG: LoadLibraryExA called with flags:
  455. - LOAD_WITH_ALTERED_SEARCH_PATH
  456. 11:25:48 M: 32751616 DEBUG: LoadLibraryA('pyexpat.pyd')
  457. 11:25:48 M: 32612352 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  458. 11:25:48 M: 32608256 DEBUG: LoadLibrary('pyexpat.pyd') returning: 00F44DB0
  459. 11:25:48 M: 32612352 DEBUG: dllGetProcAddress(1D100000(pyexpat.pyd), 'initpyexpat') => 1D102350
  460. 11:25:48 M: 32563200 DEBUG: xbmcaddon: using plugin://video/YouTube
  461. 11:25:48 M: 32542720 NOTICE: YouTube-3.3.0
  462. 11:25:48 M: 32530432 DEBUG: HttpApi Start command: FileExists paras: FileExists; Q:\UserData\plugin_data\video\YouTube
  463. 11:25:48 M: 32530432 DEBUG: [xbmcvfs] true, exists(Q:\UserData\plugin_data\video\YouTube)
  464. 11:25:48 M: 32473088 NOTICE: CommonFunctions-1.4.0
  465. 11:25:48 M: 32432128 DEBUG: xbmcaddon: trying Q:\plugins\video\YouTube
  466. 11:25:48 M: 32370688 DEBUG: xbmcaddon: using plugin://video/YouTube
  467. 11:25:48 M: 32235520 DEBUG: LoadLibraryA('ws2_32')
  468. 11:25:48 M: 32235520 DEBUG: LoadLibrary('ws2_32.dll') returning: 008538D8
  469. 11:25:48 M: 32235520 DEBUG: dllGetProcAddress(00853898(ws2_32.dll), 'getaddrinfo') => 0026C8B7
  470. Previous line repeats 1 times.
  471. 11:25:48 M: 32235520 DEBUG: dllGetProcAddress(00853898(ws2_32.dll), 'getnameinfo') => 0026C8D2
  472. 11:25:48 M: 32235520 DEBUG: dllGetProcAddress(00853898(ws2_32.dll), 'freeaddrinfo') => 0026C8F6
  473. 11:25:49 M: 32198656 DEBUG: HttpApi Start command: FileExists paras: FileExists; The Call movie review-[MOyeKHM5T90].mp4
  474. 11:25:49 M: 32198656 DEBUG: [xbmcvfs] false, exists(The Call movie review-[MOyeKHM5T90].mp4)
  475. 11:25:52 M: 32182272 NOTICE: links: 'dict'
  476. 11:25:52 M: 32182272 INFO: Loading skin file: DialogSelect.xml
  477. 11:25:52 M: 32153600 DEBUG: ------ Window Init (DialogSelect.xml) ------
  478. 11:25:53 M: 31539200 DEBUG: CApplication::OnKey: 257 pressed, action is Back
  479. 11:25:54 M: 31539200 DEBUG: ------ Window Deinit (DialogSelect.xml) ------
  480. 11:25:54 M: 32178176 INFO: Scriptresult: Success
  481. 11:25:54 M: 32178176 DEBUG: ------ Window Init (DialogKaiToast.xml) ------
  482. 11:25:54 M: 32178176 INFO: Python script stopped
  483. 11:25:54 M: 32649216 DEBUG: python thread 4 destructed
  484. 11:25:54 M: 32649216 INFO: Python, unloading python24.dll because no scripts are running anymore
  485. 11:25:54 M: 33046528 DEBUG: Q:\system\python\DLLs\_socket.pyd: Detected 1 unloaded dll's
  486. 11:25:54 M: 33099776 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01AC0000): Detected memory leaks: 1647 leaks
  487. 11:25:54 M: 33103872 DEBUG: leak caller address 01AC489B, size 20064, counter 1645
  488. 11:25:54 M: 33103872 DEBUG: leak caller address 01AC48B0, size 4224, counter 2
  489. 11:25:54 M: 33103872 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  490. 11:25:54 M: 33763328 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 761 leaks
  491. 11:25:54 M: 36929536 DEBUG: leak caller address 1E02169B, size 24, counter 1
  492. 11:25:54 M: 36929536 DEBUG: leak caller address 1E047413, size 515328, counter 124
  493. 11:25:54 M: 36929536 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  494. 11:25:54 M: 36929536 DEBUG: leak caller address 1E05928C, size 233, counter 1
  495. 11:25:54 M: 36929536 DEBUG: leak caller address 1E05D47B, size 41496, counter 42
  496. 11:25:54 M: 36929536 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  497. 11:25:54 M: 36929536 DEBUG: leak caller address 1E061589, size 944, counter 35
  498. 11:25:54 M: 36929536 DEBUG: leak caller address 1E06165A, size 140, counter 13
  499. 11:25:54 M: 36929536 DEBUG: leak caller address 1E07365F, size 2621440, counter 10
  500. 11:25:54 M: 36929536 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  501. 11:25:54 M: 36929536 DEBUG: leak caller address 1E073894, size 85915, counter 148
  502. 11:25:54 M: 36929536 DEBUG: leak caller address 1E0739DF, size 14375, counter 364
  503. 11:25:54 M: 36929536 DEBUG: leak caller address 1E092749, size 640, counter 3
  504. 11:25:54 M: 36929536 DEBUG: leak caller address 1E09457C, size 84, counter 7
  505. 11:25:54 M: 36929536 DEBUG: leak caller address 1E0A309A, size 28, counter 3
  506. 11:25:54 M: 36929536 DEBUG: leak caller address 1E0A30EB, size 80, counter 5
  507. 11:25:54 M: 36929536 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
  508. 11:25:54 M: 36929536 DEBUG: python24.dll: Total bytes leaked: 3283769
  509. 11:25:54 M: 38326272 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - plugin exited prematurely - terminating
  510. 11:25:54 M: 38326272 ERROR: Playlist Player: skipping unplayable item: 0, path [plugin://video/YouTube/?path=/root/video&action=play_video&videoid=MOyeKHM5T90]
  511. 11:25:54 M: 38326272 DEBUG: Playlist Player: no more playable items... aborting playback
  512. 11:25:55 M: 38338560 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  513. 11:25:56 M: 38842368 DEBUG: CApplication::OnKey: 275 pressed, action is PreviousMenu
  514. 11:25:56 M: 38842368 DEBUG: CGUIWindowManager::PreviousWindow: Deactivate
  515. 11:25:56 M: 38854656 DEBUG: ------ Window Deinit (MyVideo.xml) ------
  516. 11:25:56 M: 43806720 DEBUG: CGUIWindowManager::PreviousWindow: Activate new
  517. 11:25:56 M: 43806720 DEBUG: ------ Window Init (Home.xml) ------
  518. 11:25:56 M: 43806720 INFO: Loading skin file: Home.xml
  519. 11:25:57 M: 40386560 DEBUG: CApplication::OnKey: 270 pressed, action is Up
  520. Previous line repeats 1 times.
  521. 11:25:58 M: 40308736 DEBUG: CApplication::OnKey: 256 pressed, action is Select
  522. 11:25:58 M: 40308736 DEBUG: CApplication::ExecuteXBMCAction : Translating ActivateWindow(4)
  523. 11:25:58 M: 40308736 DEBUG: CApplication::ExecuteXBMCAction : To ActivateWindow(4)
  524. 11:25:58 M: 40308736 DEBUG: Activating window ID: 10004
  525. 11:25:58 M: 40308736 DEBUG: Checking if window ID 10004 is locked.
  526. 11:25:58 M: 40308736 DEBUG: ------ Window Deinit (Home.xml) ------
  527. 11:25:58 M: 43806720 DEBUG: ------ Window Init (Settings.xml) ------
  528. 11:25:58 M: 43806720 INFO: Loading skin file: Settings.xml
  529. 11:25:58 M: 42270720 DEBUG: ------ Window Deinit (DialogKaiToast.xml) ------
  530. 11:25:58 M: 42364928 DEBUG: CApplication::OnKey: 256 pressed, action is Select
  531. 11:25:58 M: 42364928 DEBUG: CApplication::ExecuteXBMCAction : Translating ActivateWindow(SystemSettings)
  532. 11:25:58 M: 42364928 DEBUG: CApplication::ExecuteXBMCAction : To ActivateWindow(SystemSettings)
  533. 11:25:58 M: 42364928 DEBUG: Activating window ID: 10016
  534. 11:25:58 M: 42364928 DEBUG: Checking if window ID 10016 is locked.
  535. 11:25:58 M: 42364928 DEBUG: ------ Window Deinit (Settings.xml) ------
  536. 11:25:58 M: 43900928 DEBUG: ------ Window Init (SettingsCategory.xml) ------
  537. 11:25:58 M: 43900928 INFO: Loading skin file: SettingsCategory.xml
  538. 11:25:59 M: 42856448 DEBUG: CApplication::OnKey: 271 pressed, action is Down
  539. Previous line repeats 3 times.
  540. 11:26:00 M: 42864640 DEBUG: CApplication::OnKey: 273 pressed, action is Right
  541. 11:26:01 M: 42864640 DEBUG: CApplication::OnKey: 256 pressed, action is Select
  542. 11:26:01 M: 42864640 NOTICE: Disabled debug logging due to GUI setting
  543. 11:26:03 M: 43896832 NOTICE: Local Source Drive F:
  544. 11:26:22 M: 43065344 NOTICE: ES: Stopping event server
  545. 11:26:22 M: 43065344 NOTICE: Network: Using static IP settings
  546. 11:26:22 M: 42573824 NOTICE: ES: Stopping event server
  547. 11:26:22 M: 42573824 NOTICE: XBFileZilla: Starting...
  548. 11:26:22 M: 41635840 NOTICE: XBFileZilla: Started
  549. 11:26:32 M: 39669760 WARNING: XFILE::CCurlFile::CReadState::FillBuffer: curl failed with code 28
  550. 11:26:32 M: 39669760 ERROR: CCurlFile::CReadState::Open, didn't get any data from stream.
  551. 11:26:32 M: 39751680 ERROR: WEATHER: Weather download failed!
  552. 11:26:35 M: 40570880 NOTICE: ES: Stopping event server
  553. 11:26:43 M: 41082880 WARNING: CNetwork::CheckNetwork - Network error. Trying re-setup
  554. 11:26:43 M: 41082880 NOTICE: Network: Using static IP settings
  555. 11:26:43 M: 40558592 NOTICE: ES: Stopping event server
  556. 11:26:44 M: 41082880 NOTICE: XBFileZilla: Starting...
  557. 11:26:44 M: 40144896 NOTICE: XBFileZilla: Started
  558. 11:26:54 M: 39665664 WARNING: XFILE::CCurlFile::CReadState::FillBuffer: curl failed with code 28
  559. 11:26:54 M: 39665664 ERROR: CCurlFile::CReadState::Open, didn't get any data from stream.
  560. 11:26:54 M: 39747584 ERROR: WEATHER: Weather download failed!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement