Advertisement
Guest User

XBMC4XBOX-3.2-STABLE

a guest
Aug 6th, 2012
276
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 87.95 KB | None | 0 0
  1. 22:42:13 M: 56860672 NOTICE: -----------------------------------------------------------------------
  2. 22:42:13 M: 56840192 NOTICE: Starting XBMC4Xbox. Built on Jul 25 2012 (SVN:31195, compiler 1310)
  3. 22:42:13 M: 56840192 NOTICE: special://xbmc/ is mapped to: Q:\
  4. 22:42:13 M: 56840192 NOTICE: special://masterprofile/ is mapped to: q:\UserData
  5. 22:42:13 M: 56840192 NOTICE: special://home/ is mapped to: Q:\
  6. 22:42:13 M: 56840192 NOTICE: special://temp/ is mapped to: Z:\
  7. 22:42:13 M: 56840192 NOTICE: The executable running is: E:\Apps\XBMC4XBOX-3.2-STABLE\default.xbe
  8. 22:42:13 M: 56840192 NOTICE: Log File is located: Q:\xbmc.log
  9. 22:42:13 M: 56840192 NOTICE: -----------------------------------------------------------------------
  10. 22:42:13 M: 56840192 NOTICE: Unmapped drive T
  11. 22:42:13 M: 56840192 NOTICE: Mapping drive T to Harddisk0\Partition1\Apps\XBMC4XBOX-3.2-STABLE\UserData
  12. 22:42:13 M: 56840192 NOTICE: Setup DirectX
  13. 22:42:13 M: 56811520 NOTICE: Mapping drive C to Harddisk0\Partition2
  14. 22:42:13 M: 56811520 NOTICE: Mapping drive E to Harddisk0\Partition1
  15. 22:42:13 M: 56811520 NOTICE: Unmapped drive D
  16. 22:42:13 M: 56811520 NOTICE: Mapping drive D to Cdrom0
  17. 22:42:15 M: 56811520 NOTICE: map extended drive F:
  18. 22:42:15 M: 56811520 NOTICE: Mapping drive F to Harddisk0\Partition6
  19. 22:42:18 M: 56811520 NOTICE: map extended drive G:
  20. 22:42:18 M: 56811520 NOTICE: Mapping drive G to Harddisk0\Partition7
  21. 22:42:18 M: 56811520 NOTICE: map extended drive R:
  22. 22:42:18 M: 56811520 NOTICE: Mapping drive R to Harddisk0\Partition8
  23. 22:42:18 M: 56811520 NOTICE: Mapping drive X to Harddisk0\Partition3
  24. 22:42:18 M: 56811520 NOTICE: Mapping drive Y to Harddisk0\Partition4
  25. 22:42:18 M: 56811520 NOTICE: Unmapped drive Z
  26. 22:42:18 M: 56811520 NOTICE: Mapping drive Z to Harddisk0\Partition5
  27. 22:42:18 M: 56811520 NOTICE: load settings...
  28. 22:42:18 M: 56811520 NOTICE: Mapping drive P to Harddisk0\Partition1\Apps\XBMC4XBOX-3.2-STABLE\UserData
  29. 22:42:18 M: 56811520 NOTICE: special://profile/ is mapped to: q:\UserData
  30. 22:42:18 M: 56811520 NOTICE: loading special://masterprofile/guisettings.xml
  31. 22:42:18 M: 56659968 NOTICE: Getting hardware information now...
  32. 22:42:18 M: 56659968 NOTICE: Checking resolution 10
  33. 22:42:18 M: 56659968 NOTICE: Setting autoresolution mode 4
  34. 22:42:18 M: 56659968 NOTICE: Loading player core factory settings from special://xbmc/system/playercorefactory.xml.
  35. 22:42:18 M: 56659968 NOTICE: Loaded playercorefactory configuration
  36. 22:42:18 M: 56639488 NOTICE: Loading player core factory settings from special://masterprofile/playercorefactory.xml.
  37. 22:42:18 M: 56639488 NOTICE: special://masterprofile/playercorefactory.xml does not exist. Skipping.
  38. 22:42:18 M: 56639488 NOTICE: No advancedsettings.xml to load (special://masterprofile/advancedsettings.xml)
  39. 22:42:18 M: 56639488 NOTICE: Default Video Player: dvdplayer
  40. 22:42:18 M: 56639488 NOTICE: Default Audio Player: paplayer
  41. 22:42:18 M: 56639488 NOTICE: Enabled debug logging due to GUI setting
  42. 22:42:18 M: 56639488 NOTICE: Per AV pack settings are off
  43. 22:42:18 M: 56762368 NOTICE: q:\UserData\sources.xml
  44. 22:42:18 M: 56762368 INFO: Checking skinpath existence, and existence of keymap.xml:Q:\skin...
  45. 22:42:19 M: 51118080 INFO: load language info file:special://xbmc/language/English/langinfo.xml
  46. 22:42:19 M: 51118080 INFO: load keyboard layout configuration info file: Q:\language\english\keyboardmap.xml
  47. 22:42:19 M: 51118080 INFO: unable to load Q:\language\english\keyboardmap.xml: Failed to open file at line 0
  48. 22:42:19 M: 50593792 INFO: load language file:special://xbmc/language/English/strings.xml
  49. 22:42:19 M: 47050752 INFO: load keymapping
  50. 22:42:19 M: 47050752 INFO: Loading special://xbmc/system/Keymap.xml
  51. 22:42:19 M: 50233344 DEBUG: CButtonTranslator::Load - no userdata Keymap.xml found, skipping
  52. 22:42:19 M: 50233344 INFO: Checking skin version of: Project Mayhem III
  53. 22:42:19 M: 50233344 INFO: Skin version is: 2.11 (2.110000)
  54. 22:42:19 M: 50233344 INFO: GUI format 720x480 NTSC 4:3
  55. 22:42:19 M: 50233344 INFO: install unhandled exception filter
  56. 22:42:19 M: 50233344 INFO: creating subdirectories
  57. 22:42:19 M: 50233344 INFO: userdata folder: q:\UserData
  58. 22:42:19 M: 50233344 INFO: recording folder:
  59. 22:42:19 M: 50233344 INFO: screenshots folder:
  60. 22:42:19 M: 50233344 INFO: thumbnails folder: q:\UserData\Thumbnails
  61. 22:42:19 M: 50233344 DEBUG: CNetwork::SetupNetwork - Setting up network...
  62. 22:42:19 M: 50233344 NOTICE: Network: Using dashboard IP settings
  63. 22:42:19 M: 49905664 NOTICE: Checking the Date!
  64. 22:42:19 M: 49905664 INFO: Current Date is: 1-7-2004
  65. 22:42:19 M: 49905664 NOTICE: start dvd mediatype detection
  66. 22:42:19 M: 49840128 NOTICE: initializing playlistplayer
  67. 22:42:19 M: 49840128 DEBUG: Compiled with libcdio Version 0.72
  68. 22:42:19 M: 49840128 NOTICE: DONE initializing playlistplayer
  69. 22:42:19 M: 49840128 INFO: lcd not used
  70. 22:42:19 M: 49827840 NOTICE: load default skin:[Project Mayhem III]
  71. 22:42:19 M: 49827840 INFO: load skin from:Q:\skin\Project Mayhem III
  72. 22:42:19 M: 49827840 INFO: delete old skin...
  73. 22:42:19 M: 49827840 DEBUG: ------ Window Deinit (Pointer.xml) ------
  74. 22:42:19 M: 49827840 DEBUG: ------ Window Deinit (DialogMuteBug.xml) ------
  75. 22:42:19 M: 49827840 INFO: Default 4:3 resolution directory is Q:\skin\Project Mayhem III\PAL
  76. 22:42:19 M: 49827840 INFO: Default 16:9 resolution directory is Q:\skin\Project Mayhem III\PAL16x9
  77. 22:42:19 M: 49827840 INFO: Skin version is: 2.11
  78. 22:42:19 M: 49827840 INFO: Loading skin includes from Q:\skin\Project Mayhem III\PAL\includes.xml
  79. 22:42:20 M: 48427008 INFO: load fonts for skin...
  80. 22:42:20 M: 48427008 INFO: Loading fonts from Q:\skin\Project Mayhem III\NTSC\Font.xml
  81. 22:42:20 M: 48078848 DEBUG: unable to load Q:\skin\Project Mayhem III\language\english\strings.xml: Failed to open file at line 0
  82. 22:42:20 M: 48078848 DEBUG: unable to load Q:\skin\Project Mayhem III\language\English\strings.xml: Failed to open file at line 0
  83. 22:42:20 M: 48078848 INFO: load new skin...
  84. 22:42:20 M: 48078848 INFO: Skin version is: 2.11 (2.110000)
  85. 22:42:20 M: 48058368 INFO: Loading skin file: Home.xml
  86. 22:42:20 M: 47706112 INFO: Loading user windows, path Q:\skin\Project Mayhem III\PAL
  87. 22:42:20 M: 47710208 INFO: Loading skin file: Q:\skin\Project Mayhem III\PAL\custom2_SkinSettings.xml
  88. 22:42:20 M: 47710208 DEBUG: Load Skin XML: 101.15ms
  89. 22:42:20 M: 47710208 INFO: initialize new skin...
  90. 22:42:20 M: 47710208 INFO: Loading skin file: Pointer.xml
  91. 22:42:20 M: 47677440 INFO: Loading skin file: DialogVolumeBar.xml
  92. 22:42:20 M: 47669248 INFO: Loading skin file: DialogSeekBar.xml
  93. 22:42:20 M: 47632384 INFO: Loading skin file: DialogKaiToast.xml
  94. 22:42:20 M: 47632384 INFO: Loading skin file: DialogMuteBug.xml
  95. 22:42:20 M: 47235072 INFO: Loading special://home/skin/Project Mayhem III/sounds/sounds.xml
  96. 22:42:20 M: 47235072 INFO: skin loaded...
  97. 22:42:20 M: 46350336 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  98. 22:42:20 M: 46317568 INFO: Loading skin file: DialogBusy.xml
  99. 22:42:20 M: 46874624 DEBUG: Activating window ID: 12999
  100. 22:42:20 M: 46874624 DEBUG: Checking if window ID 12999 is locked.
  101. 22:42:20 M: 46444544 DEBUG: ------ Window Init (Startup.xml) ------
  102. 22:42:20 M: 46444544 INFO: Loading skin file: Startup.xml
  103. 22:42:20 M: 46444544 INFO: removing tempfiles
  104. 22:42:20 M: 46444544 NOTICE: initialize done
  105. 22:42:20 M: 46444544 NOTICE: Running the application...
  106. 22:42:20 M: 46444544 DEBUG: XBPython::Process - no system autoexec.py (Q:\scripts\autoexec.py) found, skipping
  107. 22:42:20 M: 43429888 DEBUG: CApplication::OnMessage : Translating ReplaceWindow(Home)
  108. 22:42:20 M: 43429888 DEBUG: CApplication::OnMessage : To ReplaceWindow(Home)
  109. 22:42:20 M: 43429888 DEBUG: Activating window ID: 10000
  110. 22:42:20 M: 43429888 DEBUG: Checking if window ID 10000 is locked.
  111. 22:42:20 M: 43429888 DEBUG: ------ Window Deinit (Startup.xml) ------
  112. 22:42:21 M: 46436352 DEBUG: ------ Window Init (Home.xml) ------
  113. 22:42:21 M: 46211072 INFO: CNetwork::LogState - Link: full duplex
  114. 22:42:21 M: 46211072 INFO: CNetwork::LogState - Link: 100 mbps
  115. 22:42:21 M: 46211072 INFO: CNetwork::LogState - ip:
  116. 22:42:21 M: 46211072 INFO: CNetwork::LogState - subnet:
  117. 22:42:21 M: 46211072 INFO: CNetwork::LogState - gateway:
  118. 22:42:21 M: 46211072 INFO: CNetwork::LogState - dns: ,
  119. 22:42:22 M: 43003904 DEBUG: CNetwork::NetworkUp - Network service is up
  120. 22:42:22 M: 43003904 INFO: CNetwork::LogState - Link: full duplex
  121. 22:42:22 M: 43003904 INFO: CNetwork::LogState - Link: 100 mbps
  122. 22:42:22 M: 43003904 INFO: CNetwork::LogState - State: dns
  123. 22:42:22 M: 43003904 INFO: CNetwork::LogState - State: dhcp
  124. 22:42:22 M: 43003904 INFO: CNetwork::LogState - ip: 192.168.0.102
  125. 22:42:22 M: 43003904 INFO: CNetwork::LogState - subnet: 255.255.255.0
  126. 22:42:22 M: 43003904 INFO: CNetwork::LogState - gateway: 192.168.0.1
  127. 22:42:22 M: 43003904 INFO: CNetwork::LogState - dns: 192.168.0.1, 0.0.0.0
  128. 22:42:22 M: 43003904 DEBUG: CNetwork::NetworkMessage - Starting network services
  129. 22:42:22 M: 43003904 NOTICE: XBFileZilla: Starting...
  130. 22:42:22 M: 42938368 NOTICE: ES: Starting event server
  131. 22:42:22 M: 42401792 DEBUG: CLastfmScrobbler: Clearing session.
  132. 22:42:22 M: 42401792 NOTICE: ES: Starting UDP Event server on 0.0.0.0:9777
  133. 22:42:22 M: 42389504 DEBUG: CLibrefmScrobbler: Clearing session.
  134. 22:42:22 M: 41799680 NOTICE: UDP: Listening on port 9777
  135. 22:42:22 M: 41799680 INFO: WEATHER: Downloading weather
  136. 22:42:22 M: 41799680 DEBUG: FileCurl::Open(D035F8D4) http://feeds.feedburner.com/xbmc4xbox
  137. 22:42:22 M: 41734144 DEBUG: FileCurl::Open(D034E9DC) http://xml.weather.com/weather/local/USNY0996?cc=*&unit=m&dayf=4&prod=xoap&link=xoap&par=1004124588&key=079f24145f208494
  138. 22:42:22 M: 41697280 INFO: XCURL::DllLibCurlGlobal::easy_aquire - Created session to http://feeds.feedburner.com
  139. 22:42:22 M: 41426944 INFO: XCURL::DllLibCurlGlobal::easy_aquire - Created session to http://xml.weather.com
  140. 22:42:22 M: 40550400 NOTICE: XBFileZilla: Started
  141. 22:42:22 M: 40501248 DEBUG: Got rss feed: http://feeds.feedburner.com/xbmc4xbox
  142. 22:42:22 M: 40501248 DEBUG: RSS feed encoding: UTF-8
  143. 22:42:22 M: 40501248 DEBUG: Parsed rss feed: http://feeds.feedburner.com/xbmc4xbox
  144. 22:42:22 M: 40660992 INFO: WEATHER: Weather download successful
  145. 22:42:22 M: 36282368 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  146. Previous line repeats 2 times.
  147. 22:42:23 M: 41164800 DEBUG: CApplication::OnKey: 270 pressed, action is 3
  148. Previous line repeats 1 times.
  149. 22:42:23 M: 41164800 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  150. Previous line repeats 2 times.
  151. 22:42:24 M: 41066496 DEBUG: CApplication::OnKey: 273 pressed, action is 2
  152. 22:42:25 M: 40996864 DEBUG: CApplication::OnKey: 272 pressed, action is 1
  153. 22:42:25 M: 41066496 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  154. 22:42:25 M: 41426944 DEBUG: CApplication::OnKey: 273 pressed, action is 2
  155. Previous line repeats 1 times.
  156. 22:42:26 M: 41357312 DEBUG: CApplication::OnKey: 272 pressed, action is 1
  157. Previous line repeats 1 times.
  158. 22:42:27 M: 41357312 DEBUG: CApplication::OnKey: 273 pressed, action is 2
  159. Previous line repeats 1 times.
  160. 22:42:27 M: 41357312 DEBUG: CApplication::OnKey: 272 pressed, action is 1
  161. Previous line repeats 1 times.
  162. 22:42:28 M: 41357312 DEBUG: CApplication::OnKey: 270 pressed, action is 3
  163. 22:42:29 M: 41357312 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  164. 22:42:29 M: 41357312 DEBUG: CApplication::OnKey: 273 pressed, action is 2
  165. Previous line repeats 1 times.
  166. 22:42:32 M: 41357312 DEBUG: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://feeds.feedburner.com (easy=00CBC010, multi=00CC4890)
  167. 22:42:32 M: 41525248 DEBUG: CApplication::OnKey: 272 pressed, action is 1
  168. Previous line repeats 1 times.
  169. 22:42:33 M: 41525248 DEBUG: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://xml.weather.com (easy=00CF1070, multi=009B6F50)
  170. 22:42:33 M: 41713664 DEBUG: CApplication::OnKey: 273 pressed, action is 2
  171. 22:42:34 M: 42192896 DEBUG: CApplication::OnKey: 270 pressed, action is 3
  172. Previous line repeats 4 times.
  173. 22:42:35 M: 41717760 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  174. 22:42:35 M: 41721856 DEBUG: CApplication::OnMessage : Translating ActivateWindow(MyPrograms)
  175. 22:42:35 M: 41721856 DEBUG: CApplication::OnMessage : To ActivateWindow(MyPrograms)
  176. 22:42:35 M: 41721856 DEBUG: Activating window ID: 10001
  177. 22:42:35 M: 41721856 DEBUG: Checking if window ID 10001 is locked.
  178. 22:42:35 M: 41721856 DEBUG: ------ Window Deinit (Home.xml) ------
  179. 22:42:36 M: 45412352 INFO: Attempting to default to:
  180. 22:42:36 M: 45400064 INFO: Set page size
  181. 22:42:36 M: 45400064 INFO: Set default cache size
  182. 22:42:36 M: 45400064 INFO: creating version table
  183. 22:42:36 M: 45400064 INFO: create files table
  184. 22:42:36 M: 45400064 INFO: create trainers table
  185. 22:42:36 M: 45400064 INFO: create files index
  186. 22:42:36 M: 45400064 INFO: create files - titleid index
  187. 22:42:36 M: 45400064 DEBUG: ------ Window Init (MyPrograms.xml) ------
  188. 22:42:36 M: 45400064 INFO: Loading skin file: MyPrograms.xml
  189. 22:42:36 M: 44912640 DEBUG: CGUIMediaWindow::GetDirectory ()
  190. 22:42:36 M: 44957696 DEBUG: ParentPath = []
  191. 22:42:36 M: 44957696 DEBUG: CFileItemList::Sort, sorting took 0 millis
  192. 22:42:37 M: 43589632 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  193. 22:42:37 M: 43753472 DEBUG: CGUIMediaWindow::GetDirectory (plugin://programs/)
  194. 22:42:37 M: 43753472 DEBUG: ParentPath = []
  195. 22:42:37 M: 43753472 INFO: Caching image from: special://home/plugins/programs/SVN Repo Installer/default.tbn to q:\UserData\Thumbnails\Programs\8\840ea47f.tbn with width 192 and height 192
  196. 22:42:37 M: 43712512 WARNING: old getenv from python.lib called, library check needed
  197. 22:42:37 M: 43712512 WARNING: JpegIO: Error 55: Not a JPEG file: starts with 0x%02x 0x%02x
  198. 22:42:38 M: 42631168 DEBUG: Dll MSVCP71.dll was not found in path
  199. 22:42:38 M: 42631168 DEBUG: Unable to load referenced dll MSVCP71.dll - Dll: Q:\system\ImageLib.dll
  200. 22:42:38 M: 42672128 DEBUG: CFileItemList::Sort, sorting took 0 millis
  201. 22:42:38 M: 42643456 WARNING: old getenv from python.lib called, library check needed
  202. 22:42:38 M: 42643456 WARNING: JpegIO: Error 55: Not a JPEG file: starts with 0x%02x 0x%02x
  203. 22:42:38 M: 42479616 DEBUG: CApplication::OnKey: 257 pressed, action is 9
  204. 22:42:38 M: 42676224 DEBUG: CGUIMediaWindow::GetDirectory ()
  205. 22:42:38 M: 42676224 DEBUG: ParentPath = []
  206. 22:42:38 M: 42676224 DEBUG: CFileItemList::Sort, sorting took 0 millis
  207. 22:42:39 M: 42508288 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  208. 22:42:39 M: 42483712 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  209. 22:42:39 M: 42496000 INFO: Loading skin file: DialogMediaSource.xml
  210. 22:42:39 M: 42496000 DEBUG: ------ Window Init (DialogMediaSource.xml) ------
  211. 22:42:40 M: 41811968 DEBUG: CApplication::OnKey: 257 pressed, action is 9
  212. 22:42:41 M: 41811968 DEBUG: CApplication::OnKey: 275 pressed, action is 10
  213. 22:42:42 M: 41811968 DEBUG: ------ Window Deinit (DialogMediaSource.xml) ------
  214. 22:42:43 M: 42508288 DEBUG: CApplication::OnKey: 257 pressed, action is 9
  215. 22:42:43 M: 42500096 DEBUG: CGUIWindowManager::PreviousWindow: Deactivate
  216. 22:42:43 M: 42512384 DEBUG: ------ Window Deinit (MyPrograms.xml) ------
  217. 22:42:43 M: 44171264 DEBUG: CGUIWindowManager::PreviousWindow: Activate new
  218. 22:42:43 M: 44171264 DEBUG: ------ Window Init (Home.xml) ------
  219. 22:42:43 M: 44171264 INFO: Loading skin file: Home.xml
  220. 22:42:44 M: 39657472 DEBUG: CApplication::OnKey: 270 pressed, action is 3
  221. 22:42:44 M: 39555072 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  222. Previous line repeats 1 times.
  223. 22:42:45 M: 39579648 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  224. 22:42:45 M: 39567360 DEBUG: CApplication::OnMessage : Translating ActivateWindow(MyVideos)
  225. 22:42:45 M: 39567360 DEBUG: CApplication::OnMessage : To ActivateWindow(MyVideos)
  226. 22:42:45 M: 39567360 DEBUG: Activating window ID: 10024
  227. 22:42:45 M: 39567360 DEBUG: Checking if window ID 10024 is locked.
  228. 22:42:45 M: 39567360 DEBUG: ------ Window Deinit (Home.xml) ------
  229. 22:42:45 M: 44142592 INFO: Attempting to default to:
  230. 22:42:45 M: 44130304 DEBUG: ------ Window Init (MyVideo.xml) ------
  231. 22:42:45 M: 44130304 INFO: Loading skin file: MyVideo.xml
  232. 22:42:45 M: 43556864 DEBUG: CGUIMediaWindow::GetDirectory ()
  233. 22:42:45 M: 43593728 DEBUG: ParentPath = []
  234. 22:42:45 M: 43597824 DEBUG: CFileItemList::Sort, sorting took 0 millis
  235. 22:42:46 M: 42233856 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  236. 22:42:46 M: 42397696 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/)
  237. 22:42:46 M: 42397696 DEBUG: ParentPath = []
  238. 22:42:46 M: 42397696 DEBUG: CFileItemList::Sort, sorting took 0 millis
  239. 22:42:46 M: 42360832 WARNING: old getenv from python.lib called, library check needed
  240. 22:42:46 M: 42360832 WARNING: JpegIO: Error 55: Not a JPEG file: starts with 0x%02x 0x%02x
  241. 22:42:47 M: 42205184 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  242. 22:42:47 M: 42180608 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  243. 22:42:47 M: 42397696 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/Icefilms4Xbox-0.25.2/)
  244. 22:42:47 M: 42397696 DEBUG: ParentPath = [plugin://video/]
  245. 22:42:47 M: 42397696 DEBUG: XFILE::CPluginDirectory::StartScript - URL for plugin settings: Icefilms4Xbox-0.25.2/
  246. 22:42:47 M: 42397696 DEBUG: XFILE::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/Icefilms4Xbox-0.25.2/default.py('plugin://video/Icefilms4Xbox-0.25.2/','0','')
  247. 22:42:47 M: 42397696 INFO: initializing python engine.
  248. 22:42:47 M: 42397696 DEBUG: LoadLibraryA('python24.dll')
  249. 22:42:47 M: 41271296 DEBUG: LoadLibrary('python24.dll') returning: 00CEBF50
  250. 22:42:47 M: 41271296 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'InterlockedCompareExchange') => 0030CD24
  251. 22:42:47 M: 41005056 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  252. 22:42:47 M: 41005056 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  253. Previous line repeats 1 times.
  254. 22:42:47 M: 40947712 DEBUG: LoadLibraryExA called with flags:
  255. - LOAD_WITH_ALTERED_SEARCH_PATH
  256. 22:42:47 M: 40955904 DEBUG: LoadLibraryA('zlib.pyd')
  257. 22:42:47 M: 40886272 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  258. 22:42:47 M: 40886272 DEBUG: LoadLibrary('zlib.pyd') returning: 00CC5EB0
  259. 22:42:47 M: 40886272 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  260. 22:42:47 M: 39993344 NOTICE: -->Python Initialized<--
  261. 22:42:47 M: 39993344 DEBUG: new python thread created. id=1
  262. 22:42:47 M: 39469056 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - waiting on the Icefilms4Xbox-0.25.2 plugin...
  263. 22:42:47 M: 39469056 DEBUG: Python thread: start processing
  264. 22:42:47 M: 39469056 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/Icefilms4Xbox-0.25.2/default.py
  265. 22:42:47 M: 39469056 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\Icefilms4Xbox-0.25.2;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  266. 22:42:47 M: 39469056 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\Icefilms4Xbox-0.25.2
  267. 22:42:48 M: 37036032 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  268. 22:42:48 M: 37023744 DEBUG: LoadLibraryExA called with flags:
  269. - LOAD_WITH_ALTERED_SEARCH_PATH
  270. 22:42:48 M: 37023744 DEBUG: LoadLibraryA('_socket.pyd')
  271. 22:42:48 M: 36974592 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  272. 22:42:48 M: 36974592 DEBUG: LoadLibrary('_socket.pyd') returning: 0155DCE0
  273. 22:42:48 M: 36974592 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  274. 22:42:48 M: 36950016 DEBUG: LoadLibraryExA called with flags:
  275. - LOAD_WITH_ALTERED_SEARCH_PATH
  276. 22:42:48 M: 36950016 DEBUG: LoadLibraryA('_ssl.pyd')
  277. 22:42:48 M: 36454400 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  278. 22:42:48 M: 36454400 DEBUG: LoadLibrary('_ssl.pyd') returning: 00CCF9F0
  279. 22:42:48 M: 36454400 DEBUG: dllGetProcAddress(01730000(_ssl.pyd), 'init_ssl') => 01731820
  280. 22:42:48 M: 36110336 DEBUG: dllGetProcAddress(00881C88(advapi32.dll), 'CryptAcquireContextA') => 00246587
  281. 22:42:48 M: 36110336 DEBUG: dllGetProcAddress(00881C88(advapi32.dll), 'CryptGenRandom') => 00246598
  282. 22:42:48 M: 36110336 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  283. 22:42:49 M: 35545088 INFO: Loading skin file: DialogProgress.xml
  284. 22:42:49 M: 35512320 DEBUG: ------ Window Init (DialogBusy.xml) ------
  285. 22:42:49 M: 35487744 INFO: Loading skin file: DialogBusy.xml
  286. 22:42:49 M: 35438592 DEBUG: ------ Window Init (DialogProgress.xml) ------
  287. 22:42:49 M: 35356672 DEBUG: ------ Window Deinit (DialogBusy.xml) ------
  288. 22:42:49 M: 35049472 DEBUG: LoadLibraryExA called with flags:
  289. - LOAD_WITH_ALTERED_SEARCH_PATH
  290. 22:42:49 M: 35049472 DEBUG: LoadLibraryA('unicodedata.pyd')
  291. 22:42:49 M: 34639872 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  292. 22:42:49 M: 34639872 DEBUG: LoadLibrary('unicodedata.pyd') returning: 0155AB60
  293. 22:42:49 M: 34639872 DEBUG: dllGetProcAddress(1D120000(unicodedata.pyd), 'initunicodedata') => 1D1224F0
  294. 22:42:50 M: 34443264 DEBUG: LoadLibraryExA called with flags:
  295. - LOAD_WITH_ALTERED_SEARCH_PATH
  296. 22:42:50 M: 34443264 DEBUG: LoadLibraryA('_sqlite.pyd')
  297. 22:42:50 M: 34156544 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  298. 22:42:50 M: 34156544 DEBUG: LoadLibrary('_sqlite.pyd') returning: 0157CD40
  299. 22:42:50 M: 34156544 DEBUG: dllGetProcAddress(01FB0000(_sqlite.pyd), 'init_sqlite') => 01FB12B0
  300. 22:42:50 M: 34115584 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  301. 22:42:50 M: 34103296 DEBUG: LoadLibraryExA called with flags:
  302. - LOAD_WITH_ALTERED_SEARCH_PATH
  303. 22:42:50 M: 34103296 DEBUG: LoadLibraryA('pyexpat.pyd')
  304. 22:42:50 M: 33964032 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  305. 22:42:50 M: 33964032 DEBUG: LoadLibrary('pyexpat.pyd') returning: 0160C7F0
  306. 22:42:50 M: 33964032 DEBUG: dllGetProcAddress(02000000(pyexpat.pyd), 'initpyexpat') => 02002350
  307. 22:42:50 M: 33951744 DEBUG: xbmcaddon: trying plugin://video/icefilms
  308. 22:42:50 M: 33931264 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  309. 22:42:50 M: 33931264 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  310. 22:42:50 M: 33931264 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  311. 22:42:50 M: 33931264 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  312. 22:42:50 M: 33951744 DEBUG: xbmcaddon: trying plugin://video/icefilms
  313. 22:42:50 M: 33931264 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  314. 22:42:50 M: 33931264 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  315. 22:42:50 M: 33931264 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  316. 22:42:50 M: 33931264 NOTICE: ==========================PARAMS:
  317. URL: None
  318. NAME: None
  319. MODE: None
  320. IMDBNUM: None
  321. MYHANDLE: 0
  322. PARAMS: []
  323. 22:42:50 M: 33931264 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  324. 22:42:50 M: 33927168 DEBUG: xbmcaddon: trying plugin://video/icefilms
  325. 22:42:50 M: 33906688 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  326. 22:42:50 M: 33906688 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  327. 22:42:50 M: 33906688 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  328. 22:42:50 M: 33906688 NOTICE: Homescreen
  329. 22:42:50 M: 33894400 INFO: Scriptresult: Success
  330. 22:42:50 M: 33873920 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
  331. 22:42:50 M: 33873920 INFO: Python script stopped
  332. 22:42:50 M: 33894400 DEBUG: Saving fileitems [plugin://video/Icefilms4Xbox-0.25.2/]
  333. 22:42:50 M: 34418688 DEBUG: -- items: 8, sort method: 0, ascending: false
  334. 22:42:50 M: 32817152 WARNING: CGUITextureManager::Load - Texture file Q:\plugins\video\Icefilms4Xbox-0.25.2/resources/art\favourites.png (9551025 x 0) is too big! Reloading resized
  335. 22:42:50 M: 32796672 ERROR: CGUITextureManager::Load - Texture manager unable to load file: Q:\plugins\video\Icefilms4Xbox-0.25.2/resources/art\favourites.png
  336. 22:42:50 M: 32546816 DEBUG: python thread 1 destructed
  337. 22:42:50 M: 32526336 INFO: Python, unloading python24.dll because no scripts are running anymore
  338. 22:42:50 M: 32808960 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01730000): Detected memory leaks: 1647 leaks
  339. 22:42:50 M: 32829440 DEBUG: leak caller address 0173489B, size 20064, counter 1645
  340. 22:42:50 M: 32829440 DEBUG: leak caller address 017348B0, size 4224, counter 2
  341. 22:42:50 M: 32829440 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  342. 22:42:50 M: 34271232 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 906 leaks
  343. 22:42:50 M: 38215680 DEBUG: leak caller address 1E02169B, size 24, counter 1
  344. 22:42:50 M: 38215680 DEBUG: leak caller address 1E047413, size 534912, counter 145
  345. 22:42:50 M: 38215680 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  346. 22:42:50 M: 38215680 DEBUG: leak caller address 1E05928C, size 233, counter 1
  347. 22:42:50 M: 38215680 DEBUG: leak caller address 1E05D47B, size 45448, counter 46
  348. 22:42:50 M: 38215680 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  349. 22:42:50 M: 38215680 DEBUG: leak caller address 1E061589, size 1184, counter 46
  350. 22:42:50 M: 38215680 DEBUG: leak caller address 1E06165A, size 252, counter 28
  351. 22:42:50 M: 38215680 DEBUG: leak caller address 1E07365F, size 3407872, counter 13
  352. 22:42:50 M: 38215680 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  353. 22:42:50 M: 38215680 DEBUG: leak caller address 1E073894, size 114628, counter 202
  354. 22:42:50 M: 38215680 DEBUG: leak caller address 1E0739DF, size 15479, counter 395
  355. 22:42:51 M: 38215680 DEBUG: leak caller address 1E092749, size 640, counter 3
  356. 22:42:51 M: 38215680 DEBUG: leak caller address 1E09457C, size 84, counter 7
  357. 22:42:51 M: 38215680 DEBUG: leak caller address 1E0A2F8B, size 46, counter 3
  358. 22:42:51 M: 38215680 DEBUG: leak caller address 1E0A309A, size 4, counter 1
  359. 22:42:51 M: 38215680 DEBUG: leak caller address 1E0A30EB, size 158, counter 10
  360. 22:42:51 M: 38215680 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
  361. 22:42:51 M: 38215680 DEBUG: python24.dll: Total bytes leaked: 4124006
  362. 22:42:51 M: 39702528 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  363. 22:42:51 M: 40222720 DEBUG: CApplication::OnKey: 279 pressed, action is 112
  364. Previous line repeats 4 times.
  365. 22:42:51 M: 40222720 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  366. 22:42:51 M: 42176512 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/Icefilms4Xbox-0.25.2/?url=http%3A%2F%2Fwww.icefilms.info%2Findex&mode=56&name=Homepage)
  367. 22:42:51 M: 42176512 DEBUG: ParentPath = [plugin://video/Icefilms4Xbox-0.25.2/]
  368. 22:42:51 M: 42176512 DEBUG: XFILE::CPluginDirectory::StartScript - URL for plugin settings: Icefilms4Xbox-0.25.2/
  369. 22:42:52 M: 42176512 DEBUG: XFILE::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/Icefilms4Xbox-0.25.2/default.py('plugin://video/Icefilms4Xbox-0.25.2/','0','?url=http%3A%2F%2Fwww.icefilms.info%2Findex&mode=56&name=Homepage')
  370. 22:42:52 M: 42176512 INFO: initializing python engine.
  371. 22:42:52 M: 42176512 DEBUG: LoadLibraryA('python24.dll')
  372. 22:42:52 M: 41050112 DEBUG: LoadLibrary('python24.dll') returning: 00CD0270
  373. 22:42:52 M: 41050112 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'InterlockedCompareExchange') => 0030CD24
  374. 22:42:52 M: 40783872 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  375. 22:42:52 M: 40783872 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  376. Previous line repeats 1 times.
  377. 22:42:52 M: 40726528 DEBUG: LoadLibraryExA called with flags:
  378. - LOAD_WITH_ALTERED_SEARCH_PATH
  379. 22:42:52 M: 40734720 DEBUG: LoadLibraryA('zlib.pyd')
  380. 22:42:52 M: 40665088 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  381. 22:42:52 M: 40665088 DEBUG: LoadLibrary('zlib.pyd') returning: 015FA440
  382. 22:42:52 M: 40665088 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  383. 22:42:52 M: 39780352 NOTICE: -->Python Initialized<--
  384. 22:42:52 M: 39780352 DEBUG: new python thread created. id=2
  385. 22:42:52 M: 39256064 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - waiting on the Icefilms4Xbox-0.25.2 plugin...
  386. 22:42:52 M: 39256064 DEBUG: Python thread: start processing
  387. 22:42:52 M: 39256064 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/Icefilms4Xbox-0.25.2/default.py
  388. 22:42:52 M: 39256064 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\Icefilms4Xbox-0.25.2;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  389. 22:42:52 M: 39256064 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\Icefilms4Xbox-0.25.2
  390. 22:42:52 M: 36888576 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  391. 22:42:52 M: 36855808 DEBUG: LoadLibraryExA called with flags:
  392. - LOAD_WITH_ALTERED_SEARCH_PATH
  393. 22:42:52 M: 36855808 DEBUG: LoadLibraryA('_socket.pyd')
  394. 22:42:52 M: 36806656 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  395. 22:42:52 M: 36806656 DEBUG: LoadLibrary('_socket.pyd') returning: 0160C640
  396. 22:42:52 M: 36806656 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  397. 22:42:52 M: 36782080 DEBUG: LoadLibraryExA called with flags:
  398. - LOAD_WITH_ALTERED_SEARCH_PATH
  399. 22:42:52 M: 36782080 DEBUG: LoadLibraryA('_ssl.pyd')
  400. 22:42:52 M: 36278272 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  401. 22:42:52 M: 36278272 DEBUG: LoadLibrary('_ssl.pyd') returning: 00DD2B50
  402. 22:42:52 M: 36278272 DEBUG: dllGetProcAddress(01FB0000(_ssl.pyd), 'init_ssl') => 01FB1820
  403. 22:42:53 M: 36077568 DEBUG: dllGetProcAddress(00881C88(advapi32.dll), 'CryptAcquireContextA') => 00246587
  404. 22:42:53 M: 36077568 DEBUG: dllGetProcAddress(00881C88(advapi32.dll), 'CryptGenRandom') => 00246598
  405. 22:42:53 M: 36077568 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  406. 22:42:53 M: 35500032 INFO: Loading skin file: DialogProgress.xml
  407. 22:42:53 M: 35577856 DEBUG: ------ Window Init (DialogProgress.xml) ------
  408. 22:42:54 M: 35016704 DEBUG: LoadLibraryExA called with flags:
  409. - LOAD_WITH_ALTERED_SEARCH_PATH
  410. 22:42:54 M: 35016704 DEBUG: LoadLibraryA('unicodedata.pyd')
  411. 22:42:54 M: 34607104 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  412. 22:42:54 M: 34607104 DEBUG: LoadLibrary('unicodedata.pyd') returning: 00D82610
  413. 22:42:54 M: 34607104 DEBUG: dllGetProcAddress(1D120000(unicodedata.pyd), 'initunicodedata') => 1D1224F0
  414. 22:42:54 M: 34410496 DEBUG: LoadLibraryExA called with flags:
  415. - LOAD_WITH_ALTERED_SEARCH_PATH
  416. 22:42:54 M: 34414592 DEBUG: LoadLibraryA('_sqlite.pyd')
  417. 22:42:54 M: 34131968 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  418. 22:42:54 M: 34131968 DEBUG: LoadLibrary('_sqlite.pyd') returning: 01543560
  419. 22:42:54 M: 34131968 DEBUG: dllGetProcAddress(02030000(_sqlite.pyd), 'init_sqlite') => 020312B0
  420. 22:42:54 M: 34082816 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  421. 22:42:55 M: 34066432 DEBUG: LoadLibraryExA called with flags:
  422. - LOAD_WITH_ALTERED_SEARCH_PATH
  423. 22:42:55 M: 34066432 DEBUG: LoadLibraryA('pyexpat.pyd')
  424. 22:42:55 M: 33931264 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  425. 22:42:55 M: 33931264 DEBUG: LoadLibrary('pyexpat.pyd') returning: 012E4DC0
  426. 22:42:55 M: 33931264 DEBUG: dllGetProcAddress(02080000(pyexpat.pyd), 'initpyexpat') => 02082350
  427. 22:42:55 M: 33923072 DEBUG: xbmcaddon: trying plugin://video/icefilms
  428. 22:42:55 M: 33923072 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  429. 22:42:55 M: 33923072 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  430. 22:42:55 M: 33923072 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  431. 22:42:55 M: 33902592 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  432. 22:42:55 M: 33923072 DEBUG: xbmcaddon: trying plugin://video/icefilms
  433. 22:42:55 M: 33923072 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  434. 22:42:55 M: 33923072 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  435. 22:42:55 M: 33923072 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  436. 22:42:55 M: 33902592 NOTICE: ==========================PARAMS:
  437. URL: http://www.icefilms.info/index
  438. NAME: Homepage
  439. MODE: 56
  440. IMDBNUM: None
  441. MYHANDLE: 0
  442. PARAMS: {'url': 'http%3A%2F%2Fwww.icefilms.info%2Findex', 'mode': '56', 'name': 'Homepage'}
  443. 22:42:55 M: 33902592 NOTICE: http://www.icefilms.info/index
  444. 22:42:55 M: 33902592 INFO: Scriptresult: Success
  445. 22:42:55 M: 33882112 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
  446. 22:42:55 M: 33882112 INFO: Python script stopped
  447. 22:42:55 M: 34430976 DEBUG: Saving fileitems [plugin://video/Icefilms4Xbox-0.25.2/?url=http%3A%2F%2Fwww.icefilms.info%2Findex&mode=56&name=Homepage]
  448. 22:42:55 M: 34430976 DEBUG: -- items: 3, sort method: 0, ascending: false
  449. 22:42:55 M: 33886208 WARNING: CGUITextureManager::Load - Texture file Q:\plugins\video\Icefilms4Xbox-0.25.2/resources/art\recently added.png (14185713 x 0) is too big! Reloading resized
  450. 22:42:55 M: 33906688 ERROR: CGUITextureManager::Load - Texture manager unable to load file: Q:\plugins\video\Icefilms4Xbox-0.25.2/resources/art\recently added.png
  451. 22:42:55 M: 33906688 WARNING: CGUITextureManager::Load - Texture file Q:\plugins\video\Icefilms4Xbox-0.25.2/resources/art\latest releases.png (19006321 x 0) is too big! Reloading resized
  452. 22:42:55 M: 33906688 ERROR: CGUITextureManager::Load - Texture manager unable to load file: Q:\plugins\video\Icefilms4Xbox-0.25.2/resources/art\latest releases.png
  453. 22:42:55 M: 33906688 WARNING: CGUITextureManager::Load - Texture file Q:\plugins\video\Icefilms4Xbox-0.25.2/resources/art\being watched now.png (23151137 x 0) is too big! Reloading resized
  454. 22:42:55 M: 33886208 ERROR: CGUITextureManager::Load - Texture manager unable to load file: Q:\plugins\video\Icefilms4Xbox-0.25.2/resources/art\being watched now.png
  455. 22:42:55 M: 34390016 DEBUG: python thread 2 destructed
  456. 22:42:55 M: 34390016 INFO: Python, unloading python24.dll because no scripts are running anymore
  457. 22:42:55 M: 34701312 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01FB0000): Detected memory leaks: 1647 leaks
  458. 22:42:55 M: 34701312 DEBUG: leak caller address 01FB489B, size 20064, counter 1645
  459. 22:42:55 M: 34701312 DEBUG: leak caller address 01FB48B0, size 4224, counter 2
  460. 22:42:55 M: 34701312 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  461. 22:42:55 M: 36052992 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 906 leaks
  462. 22:42:55 M: 39985152 DEBUG: leak caller address 1E02169B, size 24, counter 1
  463. 22:42:55 M: 39985152 DEBUG: leak caller address 1E047413, size 534912, counter 145
  464. 22:42:55 M: 39985152 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  465. 22:42:55 M: 39985152 DEBUG: leak caller address 1E05928C, size 233, counter 1
  466. 22:42:55 M: 39985152 DEBUG: leak caller address 1E05D47B, size 45448, counter 46
  467. 22:42:55 M: 39985152 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  468. 22:42:55 M: 39985152 DEBUG: leak caller address 1E061589, size 1184, counter 46
  469. 22:42:55 M: 39985152 DEBUG: leak caller address 1E06165A, size 252, counter 28
  470. 22:42:55 M: 39985152 DEBUG: leak caller address 1E07365F, size 3407872, counter 13
  471. 22:42:55 M: 39985152 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  472. 22:42:55 M: 39985152 DEBUG: leak caller address 1E073894, size 114628, counter 202
  473. 22:42:55 M: 39985152 DEBUG: leak caller address 1E0739DF, size 15479, counter 395
  474. 22:42:55 M: 39985152 DEBUG: leak caller address 1E092749, size 640, counter 3
  475. 22:42:55 M: 39985152 DEBUG: leak caller address 1E09457C, size 84, counter 7
  476. 22:42:55 M: 39985152 DEBUG: leak caller address 1E0A2F8B, size 46, counter 3
  477. 22:42:55 M: 39985152 DEBUG: leak caller address 1E0A309A, size 4, counter 1
  478. 22:42:55 M: 39985152 DEBUG: leak caller address 1E0A30EB, size 158, counter 10
  479. 22:42:55 M: 39985152 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
  480. 22:42:55 M: 39985152 DEBUG: python24.dll: Total bytes leaked: 4124006
  481. 22:42:55 M: 41500672 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  482. 22:42:56 M: 42053632 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  483. 22:42:56 M: 42029056 WARNING: CGUITextureManager::Load - Texture file Q:\plugins\video\Icefilms4Xbox-0.25.2/resources/art\recently added.png (13514513 x 0) is too big! Reloading resized
  484. 22:42:56 M: 42029056 ERROR: CGUITextureManager::Load - Texture manager unable to load file: Q:\plugins\video\Icefilms4Xbox-0.25.2/resources/art\recently added.png
  485. 22:42:56 M: 42029056 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  486. 22:42:56 M: 42029056 WARNING: CGUITextureManager::Load - Texture file Q:\plugins\video\Icefilms4Xbox-0.25.2/resources/art\latest releases.png (22326945 x 0) is too big! Reloading resized
  487. 22:42:56 M: 42029056 ERROR: CGUITextureManager::Load - Texture manager unable to load file: Q:\plugins\video\Icefilms4Xbox-0.25.2/resources/art\latest releases.png
  488. 22:42:56 M: 42029056 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  489. 22:42:56 M: 42106880 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/Icefilms4Xbox-0.25.2/?url=http%3A%2F%2Fwww.icefilms.info%2Findex&mode=61&name=Latest+Releases)
  490. 22:42:56 M: 42106880 DEBUG: ParentPath = [plugin://video/Icefilms4Xbox-0.25.2/?url=http%3A%2F%2Fwww.icefilms.info%2Findex&mode=56&name=Homepage]
  491. 22:42:56 M: 42106880 DEBUG: XFILE::CPluginDirectory::StartScript - URL for plugin settings: Icefilms4Xbox-0.25.2/
  492. 22:42:56 M: 42106880 DEBUG: XFILE::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/Icefilms4Xbox-0.25.2/default.py('plugin://video/Icefilms4Xbox-0.25.2/','0','?url=http%3A%2F%2Fwww.icefilms.info%2Findex&mode=61&name=Latest+Releases')
  493. 22:42:56 M: 42106880 INFO: initializing python engine.
  494. 22:42:56 M: 42106880 DEBUG: LoadLibraryA('python24.dll')
  495. 22:42:56 M: 40980480 DEBUG: LoadLibrary('python24.dll') returning: 00CDFEF0
  496. 22:42:56 M: 40980480 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'InterlockedCompareExchange') => 0030CD24
  497. 22:42:56 M: 40714240 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  498. 22:42:56 M: 40714240 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  499. Previous line repeats 1 times.
  500. 22:42:56 M: 40656896 DEBUG: LoadLibraryExA called with flags:
  501. - LOAD_WITH_ALTERED_SEARCH_PATH
  502. 22:42:56 M: 40656896 DEBUG: LoadLibraryA('zlib.pyd')
  503. 22:42:56 M: 40587264 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  504. 22:42:56 M: 40587264 DEBUG: LoadLibrary('zlib.pyd') returning: 00CC2970
  505. 22:42:56 M: 40587264 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  506. 22:42:57 M: 39706624 NOTICE: -->Python Initialized<--
  507. 22:42:57 M: 39706624 DEBUG: new python thread created. id=3
  508. 22:42:57 M: 39182336 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - waiting on the Icefilms4Xbox-0.25.2 plugin...
  509. 22:42:57 M: 39182336 DEBUG: Python thread: start processing
  510. 22:42:57 M: 39182336 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/Icefilms4Xbox-0.25.2/default.py
  511. 22:42:57 M: 39182336 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\Icefilms4Xbox-0.25.2;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  512. 22:42:57 M: 39182336 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\Icefilms4Xbox-0.25.2
  513. 22:42:57 M: 36818944 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  514. 22:42:57 M: 36782080 DEBUG: LoadLibraryExA called with flags:
  515. - LOAD_WITH_ALTERED_SEARCH_PATH
  516. 22:42:57 M: 36782080 DEBUG: LoadLibraryA('_socket.pyd')
  517. 22:42:57 M: 36732928 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  518. 22:42:57 M: 36732928 DEBUG: LoadLibrary('_socket.pyd') returning: 017BEC30
  519. 22:42:57 M: 36732928 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  520. 22:42:57 M: 36708352 DEBUG: LoadLibraryExA called with flags:
  521. - LOAD_WITH_ALTERED_SEARCH_PATH
  522. 22:42:57 M: 36708352 DEBUG: LoadLibraryA('_ssl.pyd')
  523. 22:42:57 M: 36204544 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  524. 22:42:57 M: 36204544 DEBUG: LoadLibrary('_ssl.pyd') returning: 017C0100
  525. 22:42:57 M: 36204544 DEBUG: dllGetProcAddress(01FB0000(_ssl.pyd), 'init_ssl') => 01FB1820
  526. 22:42:58 M: 36089856 DEBUG: dllGetProcAddress(00881C88(advapi32.dll), 'CryptAcquireContextA') => 00246587
  527. 22:42:58 M: 36089856 DEBUG: dllGetProcAddress(00881C88(advapi32.dll), 'CryptGenRandom') => 00246598
  528. 22:42:58 M: 36089856 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  529. 22:42:58 M: 35495936 INFO: Loading skin file: DialogProgress.xml
  530. 22:42:58 M: 35590144 DEBUG: ------ Window Init (DialogProgress.xml) ------
  531. 22:42:58 M: 35536896 DEBUG: SECTION:UnloadDelayed(DLL: Q:\system\ImageLib.dll)
  532. 22:42:59 M: 36134912 DEBUG: LoadLibraryExA called with flags:
  533. - LOAD_WITH_ALTERED_SEARCH_PATH
  534. 22:42:59 M: 36134912 DEBUG: LoadLibraryA('unicodedata.pyd')
  535. 22:42:59 M: 35725312 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  536. 22:42:59 M: 35725312 DEBUG: LoadLibrary('unicodedata.pyd') returning: 012E0B70
  537. 22:42:59 M: 35725312 DEBUG: dllGetProcAddress(1D120000(unicodedata.pyd), 'initunicodedata') => 1D1224F0
  538. 22:42:59 M: 35549184 DEBUG: LoadLibraryExA called with flags:
  539. - LOAD_WITH_ALTERED_SEARCH_PATH
  540. 22:42:59 M: 35549184 DEBUG: LoadLibraryA('_sqlite.pyd')
  541. 22:42:59 M: 35266560 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  542. 22:42:59 M: 35266560 DEBUG: LoadLibrary('_sqlite.pyd') returning: 01578BA0
  543. 22:42:59 M: 35266560 DEBUG: dllGetProcAddress(02030000(_sqlite.pyd), 'init_sqlite') => 020312B0
  544. 22:42:59 M: 35229696 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  545. 22:42:59 M: 35196928 DEBUG: LoadLibraryExA called with flags:
  546. - LOAD_WITH_ALTERED_SEARCH_PATH
  547. 22:42:59 M: 35196928 DEBUG: LoadLibraryA('pyexpat.pyd')
  548. 22:42:59 M: 35061760 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  549. 22:42:59 M: 35061760 DEBUG: LoadLibrary('pyexpat.pyd') returning: 0180CF90
  550. 22:42:59 M: 35061760 DEBUG: dllGetProcAddress(02080000(pyexpat.pyd), 'initpyexpat') => 02082350
  551. 22:42:59 M: 35061760 DEBUG: xbmcaddon: trying plugin://video/icefilms
  552. 22:42:59 M: 35065856 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  553. 22:42:59 M: 35065856 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  554. 22:42:59 M: 35061760 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  555. 22:42:59 M: 35041280 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  556. 22:42:59 M: 35061760 DEBUG: xbmcaddon: trying plugin://video/icefilms
  557. 22:42:59 M: 35061760 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  558. 22:42:59 M: 35061760 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  559. 22:42:59 M: 35061760 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  560. 22:42:59 M: 35041280 NOTICE: ==========================PARAMS:
  561. URL: http://www.icefilms.info/index
  562. NAME: Latest Releases
  563. MODE: 61
  564. IMDBNUM: None
  565. MYHANDLE: 0
  566. PARAMS: {'url': 'http%3A%2F%2Fwww.icefilms.info%2Findex', 'mode': '61', 'name': 'Latest+Releases'}
  567. 22:42:59 M: 35041280 NOTICE: http://www.icefilms.info/index
  568. 22:42:59 M: 35037184 DEBUG: LoadLibraryA('ws2_32')
  569. 22:42:59 M: 35037184 DEBUG: LoadLibrary('ws2_32.dll') returning: 008813D8
  570. 22:42:59 M: 35037184 DEBUG: dllGetProcAddress(00881398(ws2_32.dll), 'getaddrinfo') => 00247682
  571. Previous line repeats 1 times.
  572. 22:42:59 M: 35037184 DEBUG: dllGetProcAddress(00881398(ws2_32.dll), 'getnameinfo') => 0024769D
  573. 22:42:59 M: 35037184 DEBUG: dllGetProcAddress(00881398(ws2_32.dll), 'freeaddrinfo') => 002476C1
  574. 22:43:00 M: 34840576 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
  575. 22:43:00 M: 34865152 INFO: Scriptresult: Success
  576. 22:43:00 M: 34803712 DEBUG: Saving fileitems [plugin://video/Icefilms4Xbox-0.25.2/?url=http%3A%2F%2Fwww.icefilms.info%2Findex&mode=61&name=Latest+Releases]
  577. 22:43:00 M: 34803712 INFO: Python script stopped
  578. 22:43:00 M: 35319808 DEBUG: -- items: 30, sort method: 0, ascending: false
  579. 22:43:00 M: 34660352 DEBUG: python thread 3 destructed
  580. 22:43:00 M: 34639872 INFO: Python, unloading python24.dll because no scripts are running anymore
  581. 22:43:00 M: 34848768 DEBUG: Q:\system\python\DLLs\_socket.pyd: Detected 1 unloaded dll's
  582. 22:43:00 M: 34918400 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01FB0000): Detected memory leaks: 1647 leaks
  583. 22:43:00 M: 34918400 DEBUG: leak caller address 01FB489B, size 20064, counter 1645
  584. 22:43:00 M: 34918400 DEBUG: leak caller address 01FB48B0, size 4224, counter 2
  585. 22:43:00 M: 34918400 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  586. 22:43:00 M: 36253696 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 919 leaks
  587. 22:43:00 M: 40185856 DEBUG: leak caller address 1E02169B, size 24, counter 1
  588. 22:43:00 M: 40185856 DEBUG: leak caller address 1E047413, size 536448, counter 149
  589. 22:43:00 M: 40185856 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  590. 22:43:00 M: 40185856 DEBUG: leak caller address 1E05928C, size 233, counter 1
  591. 22:43:00 M: 40185856 DEBUG: leak caller address 1E05D47B, size 45448, counter 46
  592. 22:43:00 M: 40185856 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  593. 22:43:00 M: 40185856 DEBUG: leak caller address 1E061589, size 1184, counter 46
  594. 22:43:00 M: 40185856 DEBUG: leak caller address 1E06165A, size 252, counter 28
  595. 22:43:00 M: 40185856 DEBUG: leak caller address 1E07365F, size 3407872, counter 13
  596. 22:43:00 M: 40185856 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  597. 22:43:00 M: 40185856 DEBUG: leak caller address 1E073894, size 115659, counter 204
  598. 22:43:00 M: 40185856 DEBUG: leak caller address 1E0739DF, size 15737, counter 402
  599. 22:43:00 M: 40185856 DEBUG: leak caller address 1E092749, size 640, counter 3
  600. 22:43:00 M: 40185856 DEBUG: leak caller address 1E09457C, size 84, counter 7
  601. 22:43:00 M: 40185856 DEBUG: leak caller address 1E0A2F8B, size 46, counter 3
  602. 22:43:00 M: 40185856 DEBUG: leak caller address 1E0A309A, size 4, counter 1
  603. 22:43:00 M: 40185856 DEBUG: leak caller address 1E0A30EB, size 158, counter 10
  604. 22:43:00 M: 40185856 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
  605. 22:43:00 M: 40185856 DEBUG: python24.dll: Total bytes leaked: 4126831
  606. 22:43:00 M: 42119168 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  607. 22:43:01 M: 42598400 DEBUG: CApplication::OnKey: 279 pressed, action is 112
  608. Previous line repeats 10 times.
  609. 22:43:01 M: 42643456 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  610. 22:43:01 M: 42790912 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/Icefilms4Xbox-0.25.2/?url=http%3A%2F%2Fwww.icefilms.info%2Fip.php%3Fv%3D156653%26&mode=100&name=True+Blood+5x09+Everybody+Wants+to+Rule+the+World+%282012%29)
  611. 22:43:01 M: 42790912 DEBUG: ParentPath = [plugin://video/Icefilms4Xbox-0.25.2/?url=http%3A%2F%2Fwww.icefilms.info%2Findex&mode=61&name=Latest+Releases]
  612. 22:43:01 M: 42790912 DEBUG: XFILE::CPluginDirectory::StartScript - URL for plugin settings: Icefilms4Xbox-0.25.2/
  613. 22:43:01 M: 42790912 DEBUG: XFILE::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/Icefilms4Xbox-0.25.2/default.py('plugin://video/Icefilms4Xbox-0.25.2/','0','?url=http%3A%2F%2Fwww.icefilms.info%2Fip.php%3Fv%3D156653%26&mode=100&name=True+Blood+5x09+Everybody+Wants+to+Rule+the+World+%282012%29')
  614. 22:43:01 M: 42790912 INFO: initializing python engine.
  615. 22:43:01 M: 42790912 DEBUG: LoadLibraryA('python24.dll')
  616. 22:43:01 M: 41664512 DEBUG: LoadLibrary('python24.dll') returning: 017BF780
  617. 22:43:01 M: 41664512 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'InterlockedCompareExchange') => 0030CD24
  618. 22:43:01 M: 41398272 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  619. 22:43:01 M: 41398272 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  620. Previous line repeats 1 times.
  621. 22:43:01 M: 41340928 DEBUG: LoadLibraryExA called with flags:
  622. - LOAD_WITH_ALTERED_SEARCH_PATH
  623. 22:43:01 M: 41349120 DEBUG: LoadLibraryA('zlib.pyd')
  624. 22:43:01 M: 41279488 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  625. 22:43:01 M: 41279488 DEBUG: LoadLibrary('zlib.pyd') returning: 00D5D0C0
  626. 22:43:01 M: 41279488 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  627. 22:43:01 M: 40398848 NOTICE: -->Python Initialized<--
  628. 22:43:01 M: 40398848 DEBUG: new python thread created. id=4
  629. 22:43:01 M: 39874560 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - waiting on the Icefilms4Xbox-0.25.2 plugin...
  630. 22:43:01 M: 39874560 DEBUG: Python thread: start processing
  631. 22:43:01 M: 39874560 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/Icefilms4Xbox-0.25.2/default.py
  632. 22:43:01 M: 39878656 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\Icefilms4Xbox-0.25.2;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  633. 22:43:01 M: 39878656 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\Icefilms4Xbox-0.25.2
  634. 22:43:02 M: 37507072 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  635. 22:43:02 M: 37498880 DEBUG: LoadLibraryExA called with flags:
  636. - LOAD_WITH_ALTERED_SEARCH_PATH
  637. 22:43:02 M: 37498880 DEBUG: LoadLibraryA('_socket.pyd')
  638. 22:43:02 M: 37449728 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  639. 22:43:02 M: 37449728 DEBUG: LoadLibrary('_socket.pyd') returning: 015664E0
  640. 22:43:02 M: 37449728 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  641. 22:43:02 M: 37425152 DEBUG: LoadLibraryExA called with flags:
  642. - LOAD_WITH_ALTERED_SEARCH_PATH
  643. 22:43:02 M: 37425152 DEBUG: LoadLibraryA('_ssl.pyd')
  644. 22:43:02 M: 36921344 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  645. 22:43:02 M: 36921344 DEBUG: LoadLibrary('_ssl.pyd') returning: 012F1120
  646. 22:43:02 M: 36921344 DEBUG: dllGetProcAddress(01FB0000(_ssl.pyd), 'init_ssl') => 01FB1820
  647. 22:43:02 M: 36835328 DEBUG: dllGetProcAddress(00881C88(advapi32.dll), 'CryptAcquireContextA') => 00246587
  648. 22:43:02 M: 36835328 DEBUG: dllGetProcAddress(00881C88(advapi32.dll), 'CryptGenRandom') => 00246598
  649. 22:43:02 M: 36835328 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  650. 22:43:03 M: 36446208 INFO: Loading skin file: DialogProgress.xml
  651. 22:43:03 M: 36380672 DEBUG: ------ Window Init (DialogProgress.xml) ------
  652. 22:43:03 M: 35913728 DEBUG: LoadLibraryExA called with flags:
  653. - LOAD_WITH_ALTERED_SEARCH_PATH
  654. 22:43:03 M: 35913728 DEBUG: LoadLibraryA('unicodedata.pyd')
  655. 22:43:03 M: 35504128 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  656. 22:43:03 M: 35504128 DEBUG: LoadLibrary('unicodedata.pyd') returning: 00DCA2E0
  657. 22:43:03 M: 35504128 DEBUG: dllGetProcAddress(1D120000(unicodedata.pyd), 'initunicodedata') => 1D1224F0
  658. 22:43:04 M: 35315712 DEBUG: LoadLibraryExA called with flags:
  659. - LOAD_WITH_ALTERED_SEARCH_PATH
  660. 22:43:04 M: 35315712 DEBUG: LoadLibraryA('_sqlite.pyd')
  661. 22:43:04 M: 35033088 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  662. 22:43:04 M: 35033088 DEBUG: LoadLibrary('_sqlite.pyd') returning: 01285180
  663. 22:43:04 M: 35033088 DEBUG: dllGetProcAddress(02030000(_sqlite.pyd), 'init_sqlite') => 020312B0
  664. 22:43:04 M: 34983936 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  665. 22:43:04 M: 34959360 DEBUG: LoadLibraryExA called with flags:
  666. - LOAD_WITH_ALTERED_SEARCH_PATH
  667. 22:43:04 M: 34959360 DEBUG: LoadLibraryA('pyexpat.pyd')
  668. 22:43:04 M: 34824192 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  669. 22:43:04 M: 34824192 DEBUG: LoadLibrary('pyexpat.pyd') returning: 00E02D20
  670. 22:43:04 M: 34824192 DEBUG: dllGetProcAddress(02080000(pyexpat.pyd), 'initpyexpat') => 02082350
  671. 22:43:04 M: 34820096 DEBUG: xbmcaddon: trying plugin://video/icefilms
  672. 22:43:04 M: 34820096 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  673. 22:43:04 M: 34820096 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  674. 22:43:04 M: 34820096 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  675. 22:43:04 M: 34799616 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  676. 22:43:04 M: 34816000 DEBUG: xbmcaddon: trying plugin://video/icefilms
  677. 22:43:04 M: 34816000 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  678. 22:43:04 M: 34816000 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  679. 22:43:04 M: 34816000 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  680. 22:43:04 M: 34795520 NOTICE: ==========================PARAMS:
  681. URL: http://www.icefilms.info/ip.php?v=156653&
  682. NAME: True Blood 5x09 Everybody Wants to Rule the World (2012)
  683. MODE: 100
  684. IMDBNUM: None
  685. MYHANDLE: 0
  686. PARAMS: {'url': 'http%3A%2F%2Fwww.icefilms.info%2Fip.php%3Fv%3D156653%26', 'mode': '100', 'name': 'True+Blood+5x09+Everybody+Wants+to+Rule+the+World+%282012%29'}
  687. 22:43:04 M: 34795520 NOTICE: http://www.icefilms.info/ip.php?v=156653&
  688. 22:43:04 M: 34795520 DEBUG: LoadLibraryA('ws2_32')
  689. 22:43:04 M: 34795520 DEBUG: LoadLibrary('ws2_32.dll') returning: 008813D8
  690. 22:43:04 M: 34795520 DEBUG: dllGetProcAddress(00881398(ws2_32.dll), 'getaddrinfo') => 00247682
  691. Previous line repeats 1 times.
  692. 22:43:04 M: 34795520 DEBUG: dllGetProcAddress(00881398(ws2_32.dll), 'getnameinfo') => 0024769D
  693. 22:43:04 M: 34795520 DEBUG: dllGetProcAddress(00881398(ws2_32.dll), 'freeaddrinfo') => 002476C1
  694. 22:43:04 M: 34775040 NOTICE: posterurl does not exist
  695. 22:43:04 M: 34775040 NOTICE: USING FALLBACK SHOW NAME
  696. 22:43:05 M: 34775040 NOTICE: Set-Cookie: '3da7d6ecf7a0577769989e8f1e369b33=nu6u68snpk06u1i2v7l17brsc1; path=/'
  697. 22:43:05 M: 34754560 NOTICE: getting mirrors for: http://www.icefilms.info/membersonly/components/com_iceplayer/video.php?h=377&w=626&vid=156653&img=
  698. 22:43:05 M: 34754560 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  699. 22:43:05 M: 34754560 DEBUG: xbmcaddon: trying plugin://video/icefilms
  700. 22:43:05 M: 34754560 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  701. 22:43:05 M: 34754560 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  702. 22:43:05 M: 34754560 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  703. 22:43:05 M: 34734080 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  704. 22:43:05 M: 34734080 DEBUG: xbmcaddon: trying plugin://video/icefilms
  705. 22:43:05 M: 34738176 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  706. 22:43:05 M: 34717696 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  707. 22:43:05 M: 34717696 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  708. 22:43:05 M: 34717696 NOTICE: saved cookie: 3da7d6ecf7a0577769989e8f1e369b33=nu6u68snpk06u1i2v7l17brsc1
  709. 22:43:05 M: 34717696 NOTICE: response: /membersonly/components/com_iceplayer/GMorBMlet.php?url=http%3A%2F%2F180upload.com%2Fthc0ny5ko676
  710. 22:43:05 M: 34717696 NOTICE: url: http://180upload.com/thc0ny5ko676
  711. 22:43:05 M: 34697216 NOTICE: response: /membersonly/components/com_iceplayer/GMorBMlet.php?url=http%3A%2F%2Fsharebees.com%2F2ax7fobxxou3
  712. 22:43:05 M: 34697216 NOTICE: url: http://sharebees.com/2ax7fobxxou3
  713. 22:43:06 M: 34697216 NOTICE: response: /membersonly/components/com_iceplayer/GMorBMlet.php?url=http%3A%2F%2Fsharebees.com%2Fad6xrd52wjkx
  714. 22:43:06 M: 34697216 NOTICE: url: http://sharebees.com/ad6xrd52wjkx
  715. 22:43:06 M: 34697216 NOTICE: response: /membersonly/components/com_iceplayer/GMorBMlet.php?url=http%3A%2F%2F180upload.com%2F2e54qoejsto0
  716. 22:43:06 M: 34697216 NOTICE: url: http://180upload.com/2e54qoejsto0
  717. 22:43:06 M: 34689024 NOTICE: response: /membersonly/components/com_iceplayer/GMorBMlet.php?url=http%3A%2F%2Fbillionuploads.com%2Fjhbosvg5eh2r
  718. 22:43:06 M: 34668544 NOTICE: url: http://billionuploads.com/jhbosvg5eh2r
  719. 22:43:06 M: 34689024 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
  720. 22:43:06 M: 34713600 INFO: Scriptresult: Success
  721. 22:43:06 M: 34713600 DEBUG: Saving fileitems [plugin://video/Icefilms4Xbox-0.25.2/?url=http%3A%2F%2Fwww.icefilms.info%2Fip.php%3Fv%3D156653%26&mode=100&name=True+Blood+5x09+Everybody+Wants+to+Rule+the+World+%282012%29]
  722. 22:43:06 M: 34713600 INFO: Python script stopped
  723. 22:43:06 M: 35237888 DEBUG: -- items: 4, sort method: 0, ascending: false
  724. 22:43:07 M: 33120256 DEBUG: python thread 4 destructed
  725. 22:43:07 M: 33099776 INFO: Python, unloading python24.dll because no scripts are running anymore
  726. 22:43:07 M: 33300480 DEBUG: Q:\system\python\DLLs\_socket.pyd: Detected 1 unloaded dll's
  727. 22:43:07 M: 33370112 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01FB0000): Detected memory leaks: 1647 leaks
  728. 22:43:07 M: 33370112 DEBUG: leak caller address 01FB489B, size 20064, counter 1645
  729. 22:43:07 M: 33370112 DEBUG: leak caller address 01FB48B0, size 4224, counter 2
  730. 22:43:07 M: 33370112 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  731. 22:43:07 M: 34721792 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 920 leaks
  732. 22:43:07 M: 38592512 DEBUG: leak caller address 1E02169B, size 24, counter 1
  733. 22:43:07 M: 38592512 DEBUG: leak caller address 1E047413, size 536832, counter 150
  734. 22:43:07 M: 38592512 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  735. 22:43:07 M: 38592512 DEBUG: leak caller address 1E05928C, size 233, counter 1
  736. 22:43:07 M: 38592512 DEBUG: leak caller address 1E05D47B, size 45448, counter 46
  737. 22:43:07 M: 38592512 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  738. 22:43:07 M: 38592512 DEBUG: leak caller address 1E061589, size 1184, counter 46
  739. 22:43:07 M: 38592512 DEBUG: leak caller address 1E06165A, size 252, counter 28
  740. 22:43:07 M: 38592512 DEBUG: leak caller address 1E07365F, size 3407872, counter 13
  741. 22:43:07 M: 38592512 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  742. 22:43:07 M: 38592512 DEBUG: leak caller address 1E073894, size 115659, counter 204
  743. 22:43:07 M: 38592512 DEBUG: leak caller address 1E0739DF, size 15737, counter 402
  744. 22:43:07 M: 38592512 DEBUG: leak caller address 1E092749, size 640, counter 3
  745. 22:43:07 M: 38592512 DEBUG: leak caller address 1E09457C, size 84, counter 7
  746. 22:43:07 M: 38592512 DEBUG: leak caller address 1E0A2F8B, size 46, counter 3
  747. 22:43:07 M: 38592512 DEBUG: leak caller address 1E0A309A, size 4, counter 1
  748. 22:43:07 M: 38592512 DEBUG: leak caller address 1E0A30EB, size 158, counter 10
  749. 22:43:07 M: 38592512 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
  750. 22:43:07 M: 38592512 DEBUG: python24.dll: Total bytes leaked: 4127215
  751. 22:43:07 M: 40013824 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  752. 22:43:07 M: 40468480 DEBUG: CApplication::OnKey: 279 pressed, action is 112
  753. Previous line repeats 4 times.
  754. 22:43:08 M: 40468480 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  755. Previous line repeats 2 times.
  756. 22:43:09 M: 40468480 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  757. 22:43:09 M: 40456192 DEBUG: XFILE::CPluginDirectory::RunScriptWithParams - calling plugin special://home/plugins/video/Icefilms4Xbox-0.25.2/default.py('plugin://video/Icefilms4Xbox-0.25.2/','-1','?url=http%3A%2F%2F180upload.com%2F2e54qoejsto0&mode=200&name=Source+%234+%7C+180+%7C+Full')
  758. 22:43:09 M: 40456192 INFO: initializing python engine.
  759. 22:43:09 M: 40456192 DEBUG: LoadLibraryA('python24.dll')
  760. 22:43:09 M: 39329792 DEBUG: LoadLibrary('python24.dll') returning: 012ED410
  761. 22:43:09 M: 39329792 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'InterlockedCompareExchange') => 0030CD24
  762. 22:43:09 M: 39063552 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  763. 22:43:09 M: 39063552 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  764. Previous line repeats 1 times.
  765. 22:43:09 M: 39006208 DEBUG: LoadLibraryExA called with flags:
  766. - LOAD_WITH_ALTERED_SEARCH_PATH
  767. 22:43:09 M: 39010304 DEBUG: LoadLibraryA('zlib.pyd')
  768. 22:43:09 M: 38940672 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  769. 22:43:09 M: 38940672 DEBUG: LoadLibrary('zlib.pyd') returning: 00D09C40
  770. 22:43:09 M: 38940672 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  771. 22:43:09 M: 38064128 NOTICE: -->Python Initialized<--
  772. 22:43:09 M: 38064128 DEBUG: new python thread created. id=5
  773. 22:43:09 M: 37539840 DEBUG: Python thread: start processing
  774. 22:43:09 M: 37552128 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/Icefilms4Xbox-0.25.2/default.py
  775. 22:43:09 M: 37552128 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\Icefilms4Xbox-0.25.2;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  776. 22:43:09 M: 37552128 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\Icefilms4Xbox-0.25.2
  777. 22:43:10 M: 35176448 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  778. 22:43:10 M: 35168256 DEBUG: LoadLibraryExA called with flags:
  779. - LOAD_WITH_ALTERED_SEARCH_PATH
  780. 22:43:10 M: 35168256 DEBUG: LoadLibraryA('_socket.pyd')
  781. 22:43:10 M: 35119104 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  782. 22:43:10 M: 35119104 DEBUG: LoadLibrary('_socket.pyd') returning: 00C13540
  783. 22:43:10 M: 35119104 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  784. 22:43:10 M: 35102720 DEBUG: LoadLibraryExA called with flags:
  785. - LOAD_WITH_ALTERED_SEARCH_PATH
  786. 22:43:10 M: 35102720 DEBUG: LoadLibraryA('_ssl.pyd')
  787. 22:43:10 M: 34598912 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  788. 22:43:10 M: 34598912 DEBUG: LoadLibrary('_ssl.pyd') returning: 00D460A0
  789. 22:43:10 M: 34598912 DEBUG: dllGetProcAddress(01FB0000(_ssl.pyd), 'init_ssl') => 01FB1820
  790. 22:43:11 M: 34508800 DEBUG: dllGetProcAddress(00881C88(advapi32.dll), 'CryptAcquireContextA') => 00246587
  791. 22:43:11 M: 34508800 DEBUG: dllGetProcAddress(00881C88(advapi32.dll), 'CryptGenRandom') => 00246598
  792. 22:43:11 M: 34508800 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  793. 22:43:12 M: 34074624 DEBUG: LoadLibraryExA called with flags:
  794. - LOAD_WITH_ALTERED_SEARCH_PATH
  795. 22:43:12 M: 34074624 DEBUG: LoadLibraryA('unicodedata.pyd')
  796. 22:43:12 M: 33665024 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  797. 22:43:12 M: 33665024 DEBUG: LoadLibrary('unicodedata.pyd') returning: 00DCBC20
  798. 22:43:12 M: 33665024 DEBUG: dllGetProcAddress(1D120000(unicodedata.pyd), 'initunicodedata') => 1D1224F0
  799. 22:43:12 M: 33492992 DEBUG: LoadLibraryExA called with flags:
  800. - LOAD_WITH_ALTERED_SEARCH_PATH
  801. 22:43:12 M: 33492992 DEBUG: LoadLibraryA('_sqlite.pyd')
  802. 22:43:12 M: 33210368 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  803. 22:43:12 M: 33210368 DEBUG: LoadLibrary('_sqlite.pyd') returning: 00E07E80
  804. 22:43:12 M: 33210368 DEBUG: dllGetProcAddress(02030000(_sqlite.pyd), 'init_sqlite') => 020312B0
  805. 22:43:12 M: 33165312 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  806. 22:43:12 M: 33144832 DEBUG: LoadLibraryExA called with flags:
  807. - LOAD_WITH_ALTERED_SEARCH_PATH
  808. 22:43:12 M: 33148928 DEBUG: LoadLibraryA('pyexpat.pyd')
  809. 22:43:12 M: 33005568 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  810. 22:43:12 M: 33005568 DEBUG: LoadLibrary('pyexpat.pyd') returning: 0126C8F0
  811. 22:43:12 M: 33005568 DEBUG: dllGetProcAddress(02080000(pyexpat.pyd), 'initpyexpat') => 02082350
  812. 22:43:12 M: 32993280 DEBUG: xbmcaddon: trying plugin://video/icefilms
  813. 22:43:12 M: 32993280 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  814. 22:43:12 M: 32993280 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  815. 22:43:12 M: 32993280 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  816. 22:43:12 M: 32972800 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  817. 22:43:12 M: 32993280 DEBUG: xbmcaddon: trying plugin://video/icefilms
  818. 22:43:12 M: 32993280 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  819. 22:43:12 M: 32993280 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  820. 22:43:12 M: 32993280 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  821. 22:43:12 M: 32972800 NOTICE: ==========================PARAMS:
  822. URL: http://180upload.com/2e54qoejsto0
  823. NAME: Source #4 | 180 | Full
  824. MODE: 200
  825. IMDBNUM: None
  826. MYHANDLE: -1
  827. PARAMS: {'url': 'http%3A%2F%2F180upload.com%2F2e54qoejsto0', 'mode': '200', 'name': 'Source+%234+%7C+180+%7C+Full'}
  828. 22:43:12 M: 32972800 NOTICE: http://180upload.com/2e54qoejsto0
  829. 22:43:12 M: 32972800 INFO: Loading skin file: DialogProgress.xml
  830. 22:43:12 M: 32972800 DEBUG: ------ Window Init (DialogProgress.xml) ------
  831. 22:43:13 M: 32546816 NOTICE: 180Upload - Requesting GET URL: http://180upload.com/2e54qoejsto0
  832. 22:43:13 M: 32546816 DEBUG: LoadLibraryA('ws2_32')
  833. 22:43:13 M: 32526336 DEBUG: LoadLibrary('ws2_32.dll') returning: 008813D8
  834. 22:43:13 M: 32526336 DEBUG: dllGetProcAddress(00881398(ws2_32.dll), 'getaddrinfo') => 00247682
  835. Previous line repeats 1 times.
  836. 22:43:13 M: 32526336 DEBUG: dllGetProcAddress(00881398(ws2_32.dll), 'getnameinfo') => 0024769D
  837. 22:43:13 M: 32526336 DEBUG: dllGetProcAddress(00881398(ws2_32.dll), 'freeaddrinfo') => 002476C1
  838. 22:43:13 M: 32497664 NOTICE: **** 180Upload Error occured: 'NoneType' object has no attribute 'group'
  839. 22:43:13 M: 32497664 INFO: -->Python script returned the following error<--
  840. 22:43:13 M: 32518144 ERROR: Error Type: exceptions.AttributeError
  841. 22:43:13 M: 32518144 ERROR: Error Contents: 'NoneType' object has no attribute 'group'
  842. 22:43:13 M: 32518144 ERROR: Traceback (most recent call last):
  843. File "Q:\plugins\video\Icefilms4Xbox-0.25.2\default.py", line 2844, in ?
  844. Stream_Source(name,url)
  845. File "Q:\plugins\video\Icefilms4Xbox-0.25.2\default.py", line 2340, in Stream_Source
  846. link=Handle_Vidlink(url)
  847. File "Q:\plugins\video\Icefilms4Xbox-0.25.2\default.py", line 2292, in Handle_Vidlink
  848. return resolve_180upload(url)
  849. File "Q:\plugins\video\Icefilms4Xbox-0.25.2\default.py", line 388, in resolve_180upload
  850. data3 = re.search('<input type="hidden" name="rand" value="(.+?)">', html).group(1)
  851. AttributeError: 'NoneType' object has no attribute 'group'
  852. 22:43:13 M: 32497664 INFO: -->End of Python script error report<--
  853. 22:43:13 M: 32526336 INFO: Python script stopped
  854. 22:43:13 M: 33005568 DEBUG: ------ Window Init (DialogKaiToast.xml) ------
  855. 22:43:13 M: 32940032 DEBUG: python thread 5 destructed
  856. 22:43:13 M: 32940032 INFO: Python, unloading python24.dll because no scripts are running anymore
  857. 22:43:14 M: 33144832 DEBUG: Q:\system\python\DLLs\_socket.pyd: Detected 1 unloaded dll's
  858. 22:43:14 M: 33193984 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01FB0000): Detected memory leaks: 1647 leaks
  859. 22:43:14 M: 33193984 DEBUG: leak caller address 01FB489B, size 20064, counter 1645
  860. 22:43:14 M: 33193984 DEBUG: leak caller address 01FB48B0, size 4224, counter 2
  861. 22:43:14 M: 33193984 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  862. 22:43:14 M: 34533376 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 910 leaks
  863. 22:43:14 M: 38453248 DEBUG: leak caller address 1E02169B, size 24, counter 1
  864. 22:43:14 M: 38453248 DEBUG: leak caller address 1E047413, size 536064, counter 148
  865. 22:43:14 M: 38453248 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  866. 22:43:14 M: 38453248 DEBUG: leak caller address 1E05928C, size 233, counter 1
  867. 22:43:14 M: 38453248 DEBUG: leak caller address 1E05D47B, size 46436, counter 47
  868. 22:43:14 M: 38453248 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  869. 22:43:14 M: 38453248 DEBUG: leak caller address 1E061589, size 1184, counter 46
  870. 22:43:14 M: 38453248 DEBUG: leak caller address 1E06165A, size 252, counter 28
  871. 22:43:14 M: 38453248 DEBUG: leak caller address 1E07365F, size 3407872, counter 13
  872. 22:43:14 M: 38453248 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  873. 22:43:14 M: 38453248 DEBUG: leak caller address 1E073894, size 114628, counter 202
  874. 22:43:14 M: 38453248 DEBUG: leak caller address 1E0739DF, size 15479, counter 395
  875. 22:43:14 M: 38453248 DEBUG: leak caller address 1E092749, size 640, counter 3
  876. 22:43:14 M: 38453248 DEBUG: leak caller address 1E09457C, size 84, counter 7
  877. 22:43:14 M: 38453248 DEBUG: leak caller address 1E0A2F8B, size 46, counter 3
  878. 22:43:14 M: 38453248 DEBUG: leak caller address 1E0A309A, size 4, counter 1
  879. 22:43:14 M: 38453248 DEBUG: leak caller address 1E0A30EB, size 158, counter 10
  880. 22:43:14 M: 38453248 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
  881. 22:43:14 M: 38453248 DEBUG: python24.dll: Total bytes leaked: 4126146
  882. 22:43:14 M: 39833600 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  883. 22:43:14 M: 40366080 DEBUG: CApplication::OnKey: 270 pressed, action is 3
  884. 22:43:15 M: 40366080 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  885. 22:43:15 M: 40353792 DEBUG: XFILE::CPluginDirectory::RunScriptWithParams - calling plugin special://home/plugins/video/Icefilms4Xbox-0.25.2/default.py('plugin://video/Icefilms4Xbox-0.25.2/','-1','?url=http%3A%2F%2Fsharebees.com%2Fad6xrd52wjkx&mode=200&name=Source+%233+%7C+SB+%7C+Full')
  886. 22:43:15 M: 40353792 INFO: initializing python engine.
  887. 22:43:15 M: 40353792 DEBUG: LoadLibraryA('python24.dll')
  888. 22:43:15 M: 39227392 DEBUG: LoadLibrary('python24.dll') returning: 014DC480
  889. 22:43:15 M: 39227392 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'InterlockedCompareExchange') => 0030CD24
  890. 22:43:15 M: 38961152 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  891. 22:43:15 M: 38961152 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  892. Previous line repeats 1 times.
  893. 22:43:15 M: 38903808 DEBUG: LoadLibraryExA called with flags:
  894. - LOAD_WITH_ALTERED_SEARCH_PATH
  895. 22:43:15 M: 38907904 DEBUG: LoadLibraryA('zlib.pyd')
  896. 22:43:15 M: 38838272 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  897. 22:43:15 M: 38838272 DEBUG: LoadLibrary('zlib.pyd') returning: 012AFE20
  898. 22:43:15 M: 38838272 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  899. 22:43:15 M: 37957632 NOTICE: -->Python Initialized<--
  900. 22:43:15 M: 37957632 DEBUG: new python thread created. id=6
  901. 22:43:15 M: 37433344 DEBUG: Python thread: start processing
  902. 22:43:15 M: 37445632 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/Icefilms4Xbox-0.25.2/default.py
  903. 22:43:15 M: 37445632 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\Icefilms4Xbox-0.25.2;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  904. 22:43:15 M: 37445632 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\Icefilms4Xbox-0.25.2
  905. 22:43:15 M: 35078144 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  906. 22:43:16 M: 35057664 DEBUG: LoadLibraryExA called with flags:
  907. - LOAD_WITH_ALTERED_SEARCH_PATH
  908. 22:43:16 M: 35057664 DEBUG: LoadLibraryA('_socket.pyd')
  909. 22:43:16 M: 35008512 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  910. 22:43:16 M: 35008512 DEBUG: LoadLibrary('_socket.pyd') returning: 0190E7B0
  911. 22:43:16 M: 35008512 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  912. 22:43:16 M: 34983936 DEBUG: LoadLibraryExA called with flags:
  913. - LOAD_WITH_ALTERED_SEARCH_PATH
  914. 22:43:16 M: 34983936 DEBUG: LoadLibraryA('_ssl.pyd')
  915. 22:43:16 M: 34480128 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  916. 22:43:16 M: 34480128 DEBUG: LoadLibrary('_ssl.pyd') returning: 00CD7ED0
  917. 22:43:16 M: 34480128 DEBUG: dllGetProcAddress(01FB0000(_ssl.pyd), 'init_ssl') => 01FB1820
  918. 22:43:16 M: 34414592 DEBUG: dllGetProcAddress(00881C88(advapi32.dll), 'CryptAcquireContextA') => 00246587
  919. 22:43:16 M: 34414592 DEBUG: dllGetProcAddress(00881C88(advapi32.dll), 'CryptGenRandom') => 00246598
  920. 22:43:16 M: 34414592 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  921. 22:43:17 M: 34017280 DEBUG: LoadLibraryExA called with flags:
  922. - LOAD_WITH_ALTERED_SEARCH_PATH
  923. 22:43:17 M: 34017280 DEBUG: LoadLibraryA('unicodedata.pyd')
  924. 22:43:17 M: 33607680 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  925. 22:43:17 M: 33607680 DEBUG: LoadLibrary('unicodedata.pyd') returning: 00CF03E0
  926. 22:43:17 M: 33607680 DEBUG: dllGetProcAddress(1D120000(unicodedata.pyd), 'initunicodedata') => 1D1224F0
  927. 22:43:18 M: 33423360 DEBUG: LoadLibraryExA called with flags:
  928. - LOAD_WITH_ALTERED_SEARCH_PATH
  929. 22:43:18 M: 33423360 DEBUG: LoadLibraryA('_sqlite.pyd')
  930. 22:43:18 M: 33140736 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  931. 22:43:18 M: 33140736 DEBUG: LoadLibrary('_sqlite.pyd') returning: 00DE8F90
  932. 22:43:18 M: 33140736 DEBUG: dllGetProcAddress(02030000(_sqlite.pyd), 'init_sqlite') => 020312B0
  933. 22:43:18 M: 33095680 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  934. 22:43:18 M: 33071104 DEBUG: LoadLibraryExA called with flags:
  935. - LOAD_WITH_ALTERED_SEARCH_PATH
  936. 22:43:18 M: 33071104 DEBUG: LoadLibraryA('pyexpat.pyd')
  937. 22:43:18 M: 32935936 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  938. 22:43:18 M: 32935936 DEBUG: LoadLibrary('pyexpat.pyd') returning: 01575F50
  939. 22:43:18 M: 32935936 DEBUG: dllGetProcAddress(02080000(pyexpat.pyd), 'initpyexpat') => 02082350
  940. 22:43:18 M: 32931840 DEBUG: xbmcaddon: trying plugin://video/icefilms
  941. 22:43:18 M: 32931840 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  942. 22:43:18 M: 32931840 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  943. 22:43:18 M: 32931840 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  944. 22:43:18 M: 32911360 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  945. 22:43:18 M: 32927744 DEBUG: xbmcaddon: trying plugin://video/icefilms
  946. 22:43:18 M: 32927744 DEBUG: xbmcaddon: could not open Q:\plugins\video\icefilms\addon.xml
  947. 22:43:18 M: 32927744 DEBUG: xbmcaddon: trying plugin://video/Icefilms4Xbox-0.25.2
  948. 22:43:18 M: 32927744 DEBUG: xbmcaddon: using plugin://video/Icefilms4Xbox-0.25.2
  949. 22:43:18 M: 32907264 NOTICE: ==========================PARAMS:
  950. URL: http://sharebees.com/ad6xrd52wjkx
  951. NAME: Source #3 | SB | Full
  952. MODE: 200
  953. IMDBNUM: None
  954. MYHANDLE: -1
  955. PARAMS: {'url': 'http%3A%2F%2Fsharebees.com%2Fad6xrd52wjkx', 'mode': '200', 'name': 'Source+%233+%7C+SB+%7C+Full'}
  956. 22:43:18 M: 32907264 NOTICE: http://sharebees.com/ad6xrd52wjkx
  957. 22:43:18 M: 32907264 INFO: Loading skin file: DialogProgress.xml
  958. 22:43:18 M: 32907264 DEBUG: ------ Window Init (DialogProgress.xml) ------
  959. 22:43:18 M: 32481280 NOTICE: ShareBees - Requesting GET URL: http://sharebees.com/ad6xrd52wjkx
  960. 22:43:18 M: 32460800 DEBUG: LoadLibraryA('ws2_32')
  961. 22:43:18 M: 32460800 DEBUG: LoadLibrary('ws2_32.dll') returning: 008813D8
  962. 22:43:18 M: 32460800 DEBUG: dllGetProcAddress(00881398(ws2_32.dll), 'getaddrinfo') => 00247682
  963. Previous line repeats 1 times.
  964. 22:43:18 M: 32460800 DEBUG: dllGetProcAddress(00881398(ws2_32.dll), 'getnameinfo') => 0024769D
  965. 22:43:18 M: 32460800 DEBUG: dllGetProcAddress(00881398(ws2_32.dll), 'freeaddrinfo') => 002476C1
  966. 22:43:19 M: 32395264 NOTICE: ShareBees - Requesting POST URL: http://sharebees.com/ad6xrd52wjkx DATA: {'usr_login': u'', 'referer': 'http://sharebees.com/ad6xrd52wjkx', 'fname': u'True.Blood.S05E09.HDTV.x264-EVOLVE.mp4', 'method_free': u'Free Download', 'id': u'ad6xrd52wjkx', 'op': u'download1'}
  967. 22:43:19 M: 32354304 NOTICE: eval(function(jpg,video,162,controlbar,143,d){while(162--)if(controlbar[162])jpg=jpg.replace(new RegExp('234'+162.toString(video)+'234','flvplayer'),controlbar[162]);return jpg}('var 0=new SWFObject('http://www.sharebees.com/player/player.swf','player','600','400','9');0.addParam('allowfullscreen','true');0.addParam('allowscriptaccess','always');0.addParam('wmode','opaque');0.addVariable('duration','');0.addVariable('file','http://198.143.162.234:182/d/xjfsmqd34kfp7yqk6kzqkynphwprbayqnniglwp2agjmo7k22g6nn7hc/video.mp4');0.addVariable('image','http://198.143.162.234/i/00015/ad6xrd52wjkx.jpg');0.addVariable('provider','video');0.addVariable('skin','http://www.sharebees.com/mmm/grungetape/grungetape.xml');0.addVariable('controlbar','over');0.write('flvplayer')
  968. 22:43:19 M: 32436224 NOTICE: opening failed
  969. 22:43:19 M: 32440320 NOTICE: attempting to stream file
  970. 22:43:19 M: 32440320 ERROR: XFILE::CPluginDirectory::EndOfDirectory - called with an invalid handle.
  971. 22:43:19 M: 32440320 INFO: Scriptresult: Success
  972. 22:43:19 M: 32440320 INFO: Python script stopped
  973. 22:43:19 M: 32964608 DEBUG: python thread 6 destructed
  974. 22:43:19 M: 32964608 INFO: Python, unloading python24.dll because no scripts are running anymore
  975. 22:43:19 M: 33169408 DEBUG: Q:\system\python\DLLs\_socket.pyd: Detected 1 unloaded dll's
  976. 22:43:19 M: 33218560 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01FB0000): Detected memory leaks: 1647 leaks
  977. 22:43:19 M: 33218560 DEBUG: leak caller address 01FB489B, size 20064, counter 1645
  978. 22:43:19 M: 33218560 DEBUG: leak caller address 01FB48B0, size 4224, counter 2
  979. 22:43:19 M: 33218560 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  980. 22:43:19 M: 34562048 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 918 leaks
  981. 22:43:19 M: 38469632 DEBUG: leak caller address 1E02169B, size 24, counter 1
  982. 22:43:19 M: 38469632 DEBUG: leak caller address 1E047413, size 536064, counter 148
  983. 22:43:19 M: 38469632 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  984. 22:43:19 M: 38469632 DEBUG: leak caller address 1E05928C, size 233, counter 1
  985. 22:43:19 M: 38469632 DEBUG: leak caller address 1E05D47B, size 45448, counter 46
  986. 22:43:19 M: 38469632 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  987. 22:43:19 M: 38469632 DEBUG: leak caller address 1E061589, size 1184, counter 46
  988. 22:43:19 M: 38469632 DEBUG: leak caller address 1E06165A, size 252, counter 28
  989. 22:43:19 M: 38469632 DEBUG: leak caller address 1E07365F, size 3407872, counter 13
  990. 22:43:19 M: 38469632 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  991. 22:43:19 M: 38469632 DEBUG: leak caller address 1E073894, size 115659, counter 204
  992. 22:43:19 M: 38469632 DEBUG: leak caller address 1E0739DF, size 15737, counter 402
  993. 22:43:19 M: 38469632 DEBUG: leak caller address 1E092749, size 640, counter 3
  994. 22:43:19 M: 38469632 DEBUG: leak caller address 1E09457C, size 84, counter 7
  995. 22:43:19 M: 38469632 DEBUG: leak caller address 1E0A2F8B, size 46, counter 3
  996. 22:43:19 M: 38469632 DEBUG: leak caller address 1E0A309A, size 4, counter 1
  997. 22:43:19 M: 38469632 DEBUG: leak caller address 1E0A30EB, size 158, counter 10
  998. 22:43:19 M: 38469632 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
  999. 22:43:19 M: 38469632 DEBUG: python24.dll: Total bytes leaked: 4126447
  1000. 22:43:19 M: 39792640 INFO: XCURL::DllLibCurlGlobal::easy_aquire - Created session to http://198.143.162.234
  1001. 22:43:20 M: 39792640 DEBUG: CFileCurl::GetMimeType - http://198.143.162.234:182/d/xjfsmqd34kfp7yqk6kzqkynphwprbayqnniglwp2agjmo7k22g6nn7hc/True.Blood.S05E09.HDTV.x264-EVOLVE.mp4 -> application/octet-stream
  1002. 22:43:20 M: 39792640 NOTICE: DVDPlayer: Opening: http://198.143.162.234:182/d/xjfsmqd34kfp7yqk6kzqkynphwprbayqnniglwp2agjmo7k22g6nn7hc/True.Blood.S05E09.HDTV.x264-EVOLVE.mp4
  1003. 22:43:20 M: 39792640 WARNING: CDVDMessageQueue(player)::Put MSGQ_NOT_INITIALIZED
  1004. 22:43:20 M: 39268352 NOTICE: Creating InputStream
  1005. 22:43:20 M: 38469632 DEBUG: CFileCache::Open - opening <d/xjfsmqd34kfp7yqk6kzqkynphwprbayqnniglwp2agjmo7k22g6nn7hc/True.Blood.S05E09.HDTV.x264-EVOLVE.mp4> using cache
  1006. 22:43:20 M: 38469632 DEBUG: FileCurl::Open(00D5C810) http://198.143.162.234:182/d/xjfsmqd34kfp7yqk6kzqkynphwprbayqnniglwp2agjmo7k22g6nn7hc/True.Blood.S05E09.HDTV.x264-EVOLVE.mp4
  1007. 22:43:23 M: 37756928 INFO: CDVDFactorySubtitle::GetSubtitles, searching subtitles
  1008. 22:43:23 M: 37687296 DEBUG: CUtil::CacheSubtitles: START
  1009. 22:43:23 M: 37687296 INFO: CDVDFactorySubtitle::GetSubtitles, searching subtitles done
  1010. 22:43:23 M: 37687296 NOTICE: Creating Demuxer
  1011. 22:43:23 M: 37392384 DEBUG: GetModuleHandleA('libgcc_s_dw2-1.dll') failed
  1012. Previous line repeats 2 times.
  1013. 22:43:23 M: 31858688 DEBUG: CDVDDemuxFFmpeg::Open - probing detected format [mov,mp4,m4a,3gp,3g2,mj2]
  1014. 22:43:54 M: 27181056 DEBUG: CDVDDemuxFFmpeg::Open - avformat_find_stream_info starting
  1015. 22:43:54 M: 27168768 DEBUG: Unable to resolve: kernel32.dll InitializeConditionVariable
  1016. 22:43:54 M: 27168768 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'InitializeConditionVariable') => 00000000
  1017. 22:43:54 M: 27168768 DEBUG: Unable to resolve: kernel32.dll WakeAllConditionVariable
  1018. 22:43:54 M: 27168768 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'WakeAllConditionVariable') => 00000000
  1019. 22:43:54 M: 27168768 DEBUG: Unable to resolve: kernel32.dll WakeConditionVariable
  1020. 22:43:54 M: 27168768 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'WakeConditionVariable') => 00000000
  1021. 22:43:54 M: 27168768 DEBUG: Unable to resolve: kernel32.dll SleepConditionVariableCS
  1022. 22:43:54 M: 27168768 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'SleepConditionVariableCS') => 00000000
  1023. 22:43:54 M: 26017792 DEBUG: Unable to resolve: kernel32.dll InitializeConditionVariable
  1024. 22:43:54 M: 26017792 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'InitializeConditionVariable') => 00000000
  1025. 22:43:54 M: 26017792 DEBUG: Unable to resolve: kernel32.dll WakeAllConditionVariable
  1026. 22:43:54 M: 26017792 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'WakeAllConditionVariable') => 00000000
  1027. 22:43:54 M: 26017792 DEBUG: Unable to resolve: kernel32.dll WakeConditionVariable
  1028. 22:43:54 M: 26017792 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'WakeConditionVariable') => 00000000
  1029. 22:43:54 M: 26017792 DEBUG: Unable to resolve: kernel32.dll SleepConditionVariableCS
  1030. 22:43:54 M: 26017792 DEBUG: dllGetProcAddress(00881400(kernel32.dll), 'SleepConditionVariableCS') => 00000000
  1031. 22:43:54 M: 26873856 WARNING: could not find codec parameters for http://198.143.162.234:182/d/xjfsmqd34kfp7yqk6kzqkynphwprbayqnniglwp2agjmo7k22g6nn7hc/True.Blood.S05E09.HDTV.x264-EVOLVE.mp4
  1032. 22:43:54 M: 31870976 ERROR: CDVDPlayer::OpenDemuxStream - Error creating demuxer
  1033. 22:43:54 M: 31870976 NOTICE: CDVDPlayer::OnExit()
  1034. 22:43:54 M: 31870976 NOTICE: CDVDPlayer::OnExit() deleting input stream
  1035. 22:43:54 M: 33959936 DEBUG: CApplication::OnPlayBackStopped - Playback was stopped
  1036. 22:43:54 M: 33968128 DEBUG: ------ Window Deinit (DialogKaiToast.xml) ------
  1037. 22:43:54 M: 34041856 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  1038. 22:43:54 M: 34504704 NOTICE: CDVDPlayer::CloseFile()
  1039. 22:43:54 M: 34504704 WARNING: CDVDMessageQueue(player)::Put MSGQ_NOT_INITIALIZED
  1040. 22:43:54 M: 34504704 NOTICE: DVDPlayer: waiting for threads to exit
  1041. 22:43:54 M: 34504704 NOTICE: DVDPlayer: finished waiting
  1042. 22:43:55 M: 34504704 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  1043. 22:44:04 M: 33947648 DEBUG: SECTION:UnloadDelayed(DLL: Q:\system\players\dvdplayer\avutil-51.dll)
  1044. 22:44:04 M: 33947648 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://198.143.162.234 (easy=00D61990, multi=015177F0)
  1045. 22:44:04 M: 33992704 DEBUG: SECTION:UnloadDelayed(DLL: Q:\system\players\dvdplayer\avcodec-53.dll)
  1046. 22:44:05 M: 33992704 DEBUG: SECTION:UnloadDelayed(DLL: Q:\system\players\dvdplayer\avformat-53.dll)
  1047. 22:44:05 M: 33992704 DEBUG: GetModuleHandleA('libgcc_s_dw2-1.dll') failed
  1048. Previous line repeats 2 times.
  1049. 22:44:05 M: 34000896 DEBUG: Q:\system\players\dvdplayer\avutil-51.dll (base 68B80000): Detected memory leaks: 2 leaks
  1050. 22:44:05 M: 34029568 DEBUG: leak caller address 68B86768, size 112, counter 1
  1051. 22:44:05 M: 34029568 DEBUG: leak caller address 68B867C9, size 32784, counter 1
  1052. 22:44:05 M: 34029568 DEBUG: avutil-51.dll: Total bytes leaked: 32896
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement