Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 03:12:08 M:123408384 NOTICE: -----------------------------------------------------------------------
- 03:12:08 M:123387904 NOTICE: Starting XBMC4Xbox. Built on Oct 27 2013 (SVN:32589, compiler 1310)
- 03:12:08 M:123387904 NOTICE: special://xbmc/ is mapped to: Q:\
- 03:12:08 M:123387904 NOTICE: special://masterprofile/ is mapped to: Q:\UserData
- 03:12:08 M:123387904 NOTICE: special://home/ is mapped to: Q:\
- 03:12:08 M:123387904 NOTICE: special://temp/ is mapped to: Z:\
- 03:12:08 M:123387904 NOTICE: The executable running is: E:\Apps\XBMC\default.xbe
- 03:12:08 M:123387904 NOTICE: Log File is located: Q:\xbmc.log
- 03:12:08 M:123387904 NOTICE: -----------------------------------------------------------------------
- 03:12:08 M:123387904 NOTICE: Unmapped drive T
- 03:12:08 M:123387904 NOTICE: Mapping drive T to Harddisk0\Partition1\Apps\XBMC\UserData\
- 03:12:08 M:123387904 NOTICE: Setup DirectX
- 03:12:08 M:123363328 NOTICE: Mapping drive C to Harddisk0\Partition2
- 03:12:08 M:123363328 NOTICE: Mapping drive E to Harddisk0\Partition1
- 03:12:08 M:123363328 NOTICE: Unmapped drive D
- 03:12:08 M:123363328 NOTICE: Mapping drive D to Cdrom0
- 03:12:08 M:123363328 NOTICE: map extended drive F:
- 03:12:08 M:123363328 NOTICE: Mapping drive F to Harddisk0\Partition6
- 03:12:08 M:123363328 NOTICE: Mapping drive X to Harddisk0\Partition3
- 03:12:08 M:123363328 NOTICE: Mapping drive Y to Harddisk0\Partition4
- 03:12:08 M:123359232 NOTICE: Unmapped drive Z
- 03:12:08 M:123359232 NOTICE: Mapping drive Z to Harddisk0\Partition5
- 03:12:08 M:123359232 NOTICE: load settings...
- 03:12:08 M:123359232 NOTICE: Mapping drive P to Harddisk0\Partition1\Apps\XBMC\UserData\
- 03:12:08 M:123359232 NOTICE: special://profile/ is mapped to: special://masterprofile/
- 03:12:08 M:123359232 NOTICE: loading special://masterprofile/guisettings.xml
- 03:12:08 M:123191296 NOTICE: Getting hardware information now...
- 03:12:08 M:123191296 NOTICE: Checking resolution 10
- 03:12:08 M:123191296 NOTICE: Setting autoresolution mode 4
- 03:12:08 M:123191296 NOTICE: Loading player core factory settings from special://xbmc/system/playercorefactory.xml.
- 03:12:08 M:123191296 NOTICE: Loaded playercorefactory configuration
- 03:12:08 M:123170816 NOTICE: Loading player core factory settings from special://masterprofile/playercorefactory.xml.
- 03:12:08 M:123170816 NOTICE: special://masterprofile/playercorefactory.xml does not exist. Skipping.
- 03:12:08 M:123170816 NOTICE: No advancedsettings.xml to load (special://masterprofile/advancedsettings.xml)
- 03:12:08 M:123170816 NOTICE: Default Video Player: dvdplayer
- 03:12:08 M:123170816 NOTICE: Default Audio Player: paplayer
- 03:12:08 M:123170816 NOTICE: Per AV pack settings are off
- 03:12:08 M:123310080 NOTICE: special://masterprofile/sources.xml
- 03:12:09 M:116858880 NOTICE: Network: Using DHCP IP settings
- 03:12:09 M:116539392 NOTICE: Checking the Date!
- 03:12:09 M:116539392 NOTICE: start dvd mediatype detection
- 03:12:09 M:116473856 NOTICE: initializing playlistplayer
- 03:12:09 M:116473856 NOTICE: DONE initializing playlistplayer
- 03:12:09 M:116465664 NOTICE: load default skin:[Confluence Lite]
- 03:12:11 M:111693824 NOTICE: initialize done
- 03:12:11 M:111693824 NOTICE: Running the application...
- 03:12:11 M:108515328 WARNING: old getenv from python.lib called, library check needed
- Previous line repeats 3 times.
- 03:12:11 M:108630016 WARNING: Webserver: Starting...
- 03:12:11 M:108425216 NOTICE: Webserver: Started
- 03:12:11 M:108412928 NOTICE: XBFileZilla: Starting...
- 03:12:11 M:108347392 NOTICE: ES: Starting event server
- 03:12:11 M:107212800 NOTICE: ES: Starting UDP Event server on 0.0.0.0:9777
- 03:12:11 M:106762240 NOTICE: UDP: Listening on port 9777
- 03:12:12 M:101470208 NOTICE: XBFileZilla: Started
- 03:12:14 M:106196992 ERROR: CThread::staticThread : Access violation at 0x00254052: Reading location 0x00000018
- 03:12:22 M:107266048 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://feeds.feedburner.com (easy=00C2F220, multi=00D664C0)
- 03:12:24 M:107372544 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://xml.weather.com (easy=00C0F010, multi=00BFA840)
- 03:12:43 M:107827200 DEBUG: CApplication::OnKey: 167 pressed, action is Down
- 03:12:43 M:107827200 DEBUG: CApplication::OnKey: 168 pressed, action is Right
- 03:12:44 M:107827200 DEBUG: CApplication::OnKey: 11 pressed, action is Select
- 03:12:44 M:107814912 DEBUG: CApplication::ExecuteXBMCAction : Translating ActivateWindow(VideoFiles,Plugins,return)
- 03:12:44 M:107814912 DEBUG: CApplication::ExecuteXBMCAction : To ActivateWindow(VideoFiles,Plugins,return)
- 03:12:44 M:107814912 DEBUG: Activating window ID: 10024
- 03:12:44 M:107814912 DEBUG: Checking if window ID 10024 is locked.
- 03:12:44 M:107814912 DEBUG: ------ Window Deinit (Home.xml) ------
- 03:12:44 M:108322816 WARNING: CUtil::GetMatchingSource... no matching source found for [Plugins]
- 03:12:44 M:108322816 DEBUG: ------ Window Init (MyVideo.xml) ------
- 03:12:44 M:108322816 INFO: Loading skin file: MyVideo.xml
- 03:12:45 M:106741760 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/)
- 03:12:45 M:106799104 DEBUG: ParentPath = [plugin://video/]
- 03:12:45 M:106799104 DEBUG: CFileItemList::Sort, sorting took 0 millis
- 03:12:51 M:104726528 DEBUG: CApplication::OnKey: 167 pressed, action is Down
- 03:12:51 M:104173568 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 192 x 192
- 03:12:51 M:104173568 DEBUG: JpegIO::Read - Using scale_num of 8, 192 x 192
- 03:12:52 M:104321024 DEBUG: CApplication::OnKey: 167 pressed, action is Down
- 03:12:52 M:104280064 WARNING: JpegIO: Error 55: Not a JPEG file: starts with 0x%02x 0x%02x
- 03:12:52 M:103239680 DEBUG: Dll MSVCP71.dll was not found in path
- 03:12:52 M:103239680 DEBUG: Unable to load referenced dll MSVCP71.dll - Dll: Q:\system\ImageLib.dll
- 03:12:52 M:103092224 DEBUG: CApplication::OnKey: 11 pressed, action is Select
- 03:12:52 M:103079936 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/TouTv/)
- 03:12:52 M:103079936 DEBUG: ParentPath = [plugin://video/]
- 03:12:52 M:103079936 DEBUG: XFILE::CPluginDirectory::StartScript - URL for plugin settings: TouTv/
- 03:12:53 M:103079936 DEBUG: unable to load special://home/plugins/video/TouTv/resources/language/english/strings.xml: Failed to open file at line 0
- 03:12:53 M:103079936 DEBUG: XFILE::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/TouTv/default.py('plugin://video/TouTv/','0','')
- 03:12:53 M:103079936 INFO: initializing python engine.
- 03:12:53 M:103079936 DEBUG: LoadLibraryA('python24.dll')
- 03:12:53 M:101953536 DEBUG: LoadLibrary('python24.dll') returning: 00919280
- 03:12:53 M:101953536 DEBUG: dllGetProcAddress(00898B48(kernel32.dll), 'InterlockedCompareExchange') => 0031E3B4
- 03:12:53 M:101687296 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
- 03:12:53 M:101687296 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
- Previous line repeats 1 times.
- 03:12:53 M:101629952 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 03:12:53 M:101629952 DEBUG: LoadLibraryA('zlib.pyd')
- 03:12:53 M:101560320 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 03:12:53 M:101560320 DEBUG: LoadLibrary('zlib.pyd') returning: 00D106C0
- 03:12:53 M:101560320 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
- 03:12:53 M:100696064 NOTICE: -->Python Initialized<--
- 03:12:53 M:100696064 DEBUG: new python thread created. id=1
- 03:12:53 M:100171776 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - waiting on the TouTv plugin...
- 03:12:53 M:100171776 DEBUG: Python thread: start processing
- 03:12:53 M:100171776 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/TouTv/default.py
- 03:12:53 M:100171776 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\TouTv;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.xbmcvfs\lib;Q:\scripts\.modules\script.module.metahandler\lib;Q:\scripts\.modules\script.module.pysqlite2\lib;Q:\scripts\.modules\script.module.simplejson\lib;Q:\scripts\.modules\script.module.urlresolver\lib;Q:\scripts\.modules\script.module.t0mm0.common\lib;Q:\scripts\.modules\script.module.elementtree\lib;Q:\scripts\.modules\script.common.plugin.cache\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
- 03:12:53 M:100171776 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\TouTv
- 03:12:54 M: 99618816 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 03:12:54 M: 99618816 DEBUG: LoadLibraryA('_socket.pyd')
- 03:12:54 M: 99569664 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 03:12:54 M: 99569664 DEBUG: LoadLibrary('_socket.pyd') returning: 00D28DC0
- 03:12:54 M: 99569664 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
- 03:12:54 M: 99545088 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 03:12:54 M: 99545088 DEBUG: LoadLibraryA('_ssl.pyd')
- 03:12:54 M: 99049472 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 03:12:54 M: 99049472 DEBUG: LoadLibrary('_ssl.pyd') returning: 00D8BD70
- 03:12:54 M: 99049472 DEBUG: dllGetProcAddress(01210000(_ssl.pyd), 'init_ssl') => 01211820
- 03:12:54 M: 98758656 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
- 03:12:54 M: 98758656 DEBUG: dllGetProcAddress(008993D0(advapi32.dll), 'CryptAcquireContextA') => 00256298
- 03:12:54 M: 98758656 DEBUG: dllGetProcAddress(008993D0(advapi32.dll), 'CryptGenRandom') => 002562A9
- 03:12:54 M: 98758656 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
- 03:12:54 M: 96288768 DEBUG: ------ Window Init (DialogBusy.xml) ------
- 03:12:54 M: 96296960 INFO: Loading skin file: DialogBusy.xml
- 03:12:55 M: 96133120 INFO: Loading skin file: DialogProgress.xml
- 03:12:55 M: 96014336 DEBUG: ------ Window Init (DialogProgress.xml) ------
- 03:12:55 M: 97222656 DEBUG: ------ Window Deinit (DialogBusy.xml) ------
- 03:12:55 M: 97554432 INFO: Scriptresult: Success
- 03:12:55 M: 97533952 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
- 03:12:55 M: 97533952 INFO: Python script stopped
- 03:12:55 M: 98058240 DEBUG: Saving fileitems [plugin://video/TouTv/]
- 03:12:55 M: 98058240 DEBUG: -- items: 7, sort method: 0, ascending: false
- 03:12:55 M: 97808384 DEBUG: python thread 1 destructed
- 03:12:55 M: 97787904 INFO: Python, unloading python24.dll because no scripts are running anymore
- 03:12:55 M: 98033664 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01210000): Detected memory leaks: 1647 leaks
- 03:12:55 M: 98054144 DEBUG: leak caller address 0121489B, size 20064, counter 1645
- 03:12:55 M: 98054144 DEBUG: leak caller address 012148B0, size 4224, counter 2
- 03:12:55 M: 98054144 DEBUG: _ssl.pyd: Total bytes leaked: 24288
- 03:12:55 M: 98566144 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 434 leaks
- 03:12:55 M:101363712 DEBUG: leak caller address 1E02169B, size 24, counter 1
- 03:12:55 M:101363712 DEBUG: leak caller address 1E047413, size 488064, counter 80
- 03:12:55 M:101363712 DEBUG: leak caller address 1E05046B, size 1000, counter 1
- 03:12:55 M:101363712 DEBUG: leak caller address 1E05928C, size 233, counter 1
- 03:12:55 M:101363712 DEBUG: leak caller address 1E05D47B, size 42484, counter 43
- 03:12:55 M:101363712 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
- 03:12:55 M:101363712 DEBUG: leak caller address 1E061589, size 488, counter 13
- 03:12:55 M:101363712 DEBUG: leak caller address 1E06165A, size 112, counter 7
- 03:12:55 M:101363712 DEBUG: leak caller address 1E07365F, size 2359296, counter 9
- 03:12:55 M:101363712 DEBUG: leak caller address 1E0736AC, size 64, counter 1
- 03:12:55 M:101363712 DEBUG: leak caller address 1E073894, size 61567, counter 99
- 03:12:55 M:101363712 DEBUG: leak caller address 1E0739DF, size 6279, counter 159
- 03:12:55 M:101363712 DEBUG: leak caller address 1E092749, size 640, counter 3
- 03:12:55 M:101363712 DEBUG: leak caller address 1E09457C, size 72, counter 6
- 03:12:55 M:101363712 DEBUG: leak caller address 1E0A30EB, size 32, counter 8
- 03:12:55 M:101363712 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
- 03:12:55 M:101363712 DEBUG: python24.dll: Total bytes leaked: 2962333
- 03:12:56 M:102510592 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
- 03:12:58 M:103542784 DEBUG: CApplication::OnKey: 167 pressed, action is Down
- Previous line repeats 5 times.
- 03:13:01 M:103542784 DEBUG: CApplication::OnKey: 166 pressed, action is Up
- 03:13:02 M:103542784 DEBUG: SECTION:UnloadDelayed(DLL: Q:\system\ImageLib.dll)
- 03:13:02 M:104620032 DEBUG: CApplication::OnKey: 11 pressed, action is Select
- 03:13:02 M:104607744 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/TouTv/?mode=0&name=VignettesTouTVADecouvrir)
- 03:13:02 M:104607744 DEBUG: ParentPath = [plugin://video/TouTv/]
- 03:13:02 M:104607744 DEBUG: XFILE::CPluginDirectory::StartScript - URL for plugin settings: TouTv/
- 03:13:02 M:104607744 DEBUG: unable to load special://home/plugins/video/TouTv/resources/language/english/strings.xml: Failed to open file at line 0
- 03:13:02 M:104607744 DEBUG: XFILE::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/TouTv/default.py('plugin://video/TouTv/','0','?mode=0&name=VignettesTouTVADecouvrir')
- 03:13:02 M:104607744 INFO: initializing python engine.
- 03:13:02 M:104607744 DEBUG: LoadLibraryA('python24.dll')
- 03:13:02 M:103481344 DEBUG: LoadLibrary('python24.dll') returning: 01371FB0
- 03:13:02 M:103481344 DEBUG: dllGetProcAddress(00898B48(kernel32.dll), 'InterlockedCompareExchange') => 0031E3B4
- 03:13:02 M:103215104 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
- 03:13:02 M:103215104 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
- Previous line repeats 1 times.
- 03:13:02 M:103157760 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 03:13:02 M:103157760 DEBUG: LoadLibraryA('zlib.pyd')
- 03:13:02 M:103088128 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 03:13:02 M:103088128 DEBUG: LoadLibrary('zlib.pyd') returning: 00DAA3B0
- 03:13:02 M:103088128 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
- 03:13:03 M:102227968 NOTICE: -->Python Initialized<--
- 03:13:03 M:102227968 DEBUG: new python thread created. id=2
- 03:13:03 M:101703680 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - waiting on the TouTv plugin...
- 03:13:03 M:101703680 DEBUG: Python thread: start processing
- 03:13:03 M:101703680 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/TouTv/default.py
- 03:13:03 M:101703680 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\TouTv;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.xbmcvfs\lib;Q:\scripts\.modules\script.module.metahandler\lib;Q:\scripts\.modules\script.module.pysqlite2\lib;Q:\scripts\.modules\script.module.simplejson\lib;Q:\scripts\.modules\script.module.urlresolver\lib;Q:\scripts\.modules\script.module.t0mm0.common\lib;Q:\scripts\.modules\script.module.elementtree\lib;Q:\scripts\.modules\script.common.plugin.cache\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
- 03:13:03 M:101703680 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\TouTv
- 03:13:03 M:101142528 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 03:13:03 M:101142528 DEBUG: LoadLibraryA('_socket.pyd')
- 03:13:03 M:101093376 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 03:13:03 M:101093376 DEBUG: LoadLibrary('_socket.pyd') returning: 00BFCFD0
- 03:13:03 M:101093376 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
- 03:13:04 M:101068800 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 03:13:04 M:101068800 DEBUG: LoadLibraryA('_ssl.pyd')
- 03:13:04 M:100569088 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 03:13:04 M:100569088 DEBUG: LoadLibrary('_ssl.pyd') returning: 00DCED80
- 03:13:04 M:100569088 DEBUG: dllGetProcAddress(01A90000(_ssl.pyd), 'init_ssl') => 01A91820
- 03:13:04 M:100274176 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
- 03:13:04 M:100265984 DEBUG: dllGetProcAddress(008993D0(advapi32.dll), 'CryptAcquireContextA') => 00256298
- 03:13:04 M:100265984 DEBUG: dllGetProcAddress(008993D0(advapi32.dll), 'CryptGenRandom') => 002562A9
- 03:13:04 M:100265984 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
- 03:13:04 M: 98832384 DEBUG: ------ Window Init (DialogBusy.xml) ------
- 03:13:04 M: 98856960 INFO: Loading skin file: DialogBusy.xml
- 03:13:04 M: 98578432 INFO: Loading skin file: DialogProgress.xml
- 03:13:04 M: 98578432 DEBUG: ------ Window Init (DialogProgress.xml) ------
- 03:13:04 M: 99586048 DEBUG: ------ Window Deinit (DialogBusy.xml) ------
- 03:13:05 M: 98979840 DEBUG: LoadLibraryA('ws2_32')
- 03:13:05 M: 98979840 DEBUG: LoadLibrary('ws2_32.dll') returning: 00898B20
- 03:13:05 M: 98979840 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getaddrinfo') => 00257393
- Previous line repeats 1 times.
- 03:13:05 M: 98979840 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getnameinfo') => 002573AE
- 03:13:05 M: 98979840 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'freeaddrinfo') => 002573D2
- 03:13:06 M: 98586624 INFO: Scriptresult: Success
- 03:13:06 M: 98725888 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
- 03:13:06 M: 98725888 INFO: Python script stopped
- 03:13:06 M: 99250176 DEBUG: Saving fileitems [plugin://video/TouTv/?mode=0&name=VignettesTouTVADecouvrir]
- 03:13:06 M: 99250176 DEBUG: -- items: 4, sort method: 0, ascending: false
- 03:13:06 M: 98988032 DEBUG: python thread 2 destructed
- 03:13:06 M: 98988032 INFO: Python, unloading python24.dll because no scripts are running anymore
- 03:13:06 M: 99209216 DEBUG: Q:\system\python\DLLs\_socket.pyd: Detected 1 unloaded dll's
- 03:13:06 M: 99262464 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01A90000): Detected memory leaks: 1647 leaks
- 03:13:06 M: 99270656 DEBUG: leak caller address 01A9489B, size 20064, counter 1645
- 03:13:06 M: 99270656 DEBUG: leak caller address 01A948B0, size 4224, counter 2
- 03:13:06 M: 99270656 DEBUG: _ssl.pyd: Total bytes leaked: 24288
- 03:13:06 M: 99782656 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 500 leaks
- 03:13:06 M:102600704 DEBUG: leak caller address 1E02169B, size 24, counter 1
- 03:13:06 M:102600704 DEBUG: leak caller address 1E047413, size 492288, counter 88
- 03:13:06 M:102600704 DEBUG: leak caller address 1E05046B, size 1000, counter 1
- 03:13:06 M:102600704 DEBUG: leak caller address 1E05928C, size 233, counter 1
- 03:13:06 M:102600704 DEBUG: leak caller address 1E05D47B, size 42484, counter 43
- 03:13:06 M:102600704 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
- 03:13:06 M:102600704 DEBUG: leak caller address 1E061589, size 824, counter 31
- 03:13:06 M:102600704 DEBUG: leak caller address 1E06165A, size 116, counter 8
- 03:13:06 M:102600704 DEBUG: leak caller address 1E07365F, size 2359296, counter 9
- 03:13:06 M:102600704 DEBUG: leak caller address 1E0736AC, size 64, counter 1
- 03:13:06 M:102600704 DEBUG: leak caller address 1E073894, size 65518, counter 109
- 03:13:06 M:102600704 DEBUG: leak caller address 1E0739DF, size 7503, counter 188
- 03:13:06 M:102600704 DEBUG: leak caller address 1E092749, size 640, counter 3
- 03:13:06 M:102600704 DEBUG: leak caller address 1E09457C, size 72, counter 6
- 03:13:06 M:102600704 DEBUG: leak caller address 1E0A30EB, size 32, counter 8
- 03:13:06 M:102600704 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
- 03:13:06 M:102600704 DEBUG: python24.dll: Total bytes leaked: 2972072
- 03:13:07 M:104062976 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
- 03:13:07 M:104423424 DEBUG: CApplication::OnKey: 167 pressed, action is Down
- 03:13:07 M:103882752 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 256 x 143
- 03:13:07 M:103882752 DEBUG: JpegIO::Read - Using scale_num of 9, 234 x 132
- 03:13:08 M:104042496 DEBUG: CApplication::OnKey: 167 pressed, action is Down
- 03:13:08 M:104026112 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 256 x 143
- 03:13:08 M:104026112 DEBUG: JpegIO::Read - Using scale_num of 9, 234 x 132
- 03:13:08 M:103915520 DEBUG: CApplication::OnKey: 167 pressed, action is Down
- 03:13:08 M:103890944 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 256 x 143
- 03:13:08 M:103890944 DEBUG: JpegIO::Read - Using scale_num of 9, 234 x 132
- 03:13:09 M:103784448 DEBUG: CApplication::OnKey: 167 pressed, action is Down
- 03:13:09 M:103768064 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 256 x 143
- 03:13:09 M:103768064 DEBUG: JpegIO::Read - Using scale_num of 9, 234 x 132
- 03:13:14 M:104566784 DEBUG: CApplication::OnKey: 11 pressed, action is Select
- 03:13:14 M:104554496 DEBUG: unable to load special://home/plugins/video/TouTv/resources/language/english/strings.xml: Failed to open file at line 0
- 03:13:14 M:104554496 DEBUG: XFILE::CPluginDirectory::RunScriptWithParams - calling plugin special://home/plugins/video/TouTv/default.py('plugin://video/TouTv/','-1','?mode=4&name=VignettesTouTVADecouvrir&url=http%3A%2F%2Fwww.tou.tv%2Ffaster-pussy-cat-kill-kill&thumb=Q%3A%5CUserData%5CThumbnails%5CVideo%5Cc%5Cc1ebcbad.tbn&plot=Trois+pulpeuses+cr%C3%A9atures+partent+en+vir%C3%A9e+dans+leurs+bolides+de+course.+Varla%2C+experte+en+arts+martiaux+et+%C3%A9g%C3%A9rie+de+ce+groupe+d%27amazones%2C+d%C3%A9clenche+un+v%C3%A9ritable+carnage+pour+s%27approprier+le+magot+d%27un+vieillard+vicieux%2C+impuissant+et+voyeur.')
- 03:13:14 M:104554496 INFO: initializing python engine.
- 03:13:14 M:104554496 DEBUG: LoadLibraryA('python24.dll')
- 03:13:14 M:103428096 DEBUG: LoadLibrary('python24.dll') returning: 00D10FA0
- 03:13:15 M:103428096 DEBUG: dllGetProcAddress(00898B48(kernel32.dll), 'InterlockedCompareExchange') => 0031E3B4
- 03:13:15 M:103161856 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
- 03:13:15 M:103161856 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
- Previous line repeats 1 times.
- 03:13:15 M:103104512 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 03:13:15 M:103104512 DEBUG: LoadLibraryA('zlib.pyd')
- 03:13:15 M:103034880 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 03:13:15 M:103034880 DEBUG: LoadLibrary('zlib.pyd') returning: 00C47250
- 03:13:15 M:103034880 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
- 03:13:15 M:102170624 NOTICE: -->Python Initialized<--
- 03:13:15 M:102170624 DEBUG: new python thread created. id=3
- 03:13:15 M:101646336 DEBUG: Python thread: start processing
- 03:13:15 M:101658624 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/TouTv/default.py
- 03:13:15 M:101658624 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\TouTv;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.xbmcvfs\lib;Q:\scripts\.modules\script.module.metahandler\lib;Q:\scripts\.modules\script.module.pysqlite2\lib;Q:\scripts\.modules\script.module.simplejson\lib;Q:\scripts\.modules\script.module.urlresolver\lib;Q:\scripts\.modules\script.module.t0mm0.common\lib;Q:\scripts\.modules\script.module.elementtree\lib;Q:\scripts\.modules\script.common.plugin.cache\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
- 03:13:15 M:101658624 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\TouTv
- 03:13:16 M:101101568 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 03:13:16 M:101101568 DEBUG: LoadLibraryA('_socket.pyd')
- 03:13:16 M:101052416 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 03:13:16 M:101052416 DEBUG: LoadLibrary('_socket.pyd') returning: 00DB34B0
- 03:13:16 M:101052416 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
- 03:13:16 M:101031936 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 03:13:16 M:101031936 DEBUG: LoadLibraryA('_ssl.pyd')
- 03:13:16 M:100532224 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 03:13:16 M:100532224 DEBUG: LoadLibrary('_ssl.pyd') returning: 00C8E340
- 03:13:16 M:100532224 DEBUG: dllGetProcAddress(01A90000(_ssl.pyd), 'init_ssl') => 01A91820
- 03:13:16 M:100245504 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
- 03:13:16 M:100237312 DEBUG: dllGetProcAddress(008993D0(advapi32.dll), 'CryptAcquireContextA') => 00256298
- 03:13:16 M:100237312 DEBUG: dllGetProcAddress(008993D0(advapi32.dll), 'CryptGenRandom') => 002562A9
- 03:13:16 M:100237312 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
- 03:13:17 M: 99299328 DEBUG: LoadLibraryA('ws2_32')
- 03:13:17 M: 99299328 DEBUG: LoadLibrary('ws2_32.dll') returning: 00898B20
- 03:13:17 M: 99299328 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getaddrinfo') => 00257393
- Previous line repeats 1 times.
- 03:13:17 M: 99299328 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getnameinfo') => 002573AE
- 03:13:17 M: 99299328 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'freeaddrinfo') => 002573D2
- 03:13:18 M: 99258368 ERROR: XFILE::CPluginDirectory::SetProperty called with an invalid handle.
- 03:13:18 M: 99221504 ERROR: XFILE::CPluginDirectory::AddSortMethod - called with an invalid handle.
- 03:13:18 M: 99295232 ERROR: XFILE::CPluginDirectory::EndOfDirectory - called with an invalid handle.
- 03:13:18 M: 99282944 INFO: Scriptresult: Success
- 03:13:18 M: 99282944 INFO: Python script stopped
- 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers(rtsp://medias-rtsp.tou.tv/vodtoutv/_definst_/mp4:006/mp4/p/2013-11-14_10_00_00_pussycat_0001_800.mp4)
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: un-named
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: matches rule: un-named
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: rtv
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: hdhomerun/myth/rtmp/mms/udp
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: lastfm/shout
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: rtsp
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: streams
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: matches rule: streams
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: flv/aacp/sdp/rtsp
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: mp2
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: dvd
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: dvdfile
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: dvdimage
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: ogv/flv/mov
- 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: nsv
- 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: matched 0 rules with players
- 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: adding videodefaultplayer (1)
- 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: for video=1, audio=0
- 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: for video=1, audio=1
- 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: adding player: DVDPlayer (1)
- 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: adding player: MPlayer (2)
- 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: added 2 players
- 03:13:18 M: 99819520 NOTICE: DVDPlayer: Opening: rtsp://medias-rtsp.tou.tv/vodtoutv/_definst_/mp4:006/mp4/p/2013-11-14_10_00_00_pussycat_0001_800.mp4
- 03:13:18 M: 99819520 WARNING: CDVDMessageQueue(player)::Put MSGQ_NOT_INITIALIZED
- 03:13:18 M: 99295232 NOTICE: Creating InputStream
- 03:13:18 M: 99295232 INFO: CDVDFactorySubtitle::GetSubtitles, searching subtitles
- 03:13:18 M: 99295232 DEBUG: CUtil::CacheSubtitles: START
- 03:13:18 M: 99295232 INFO: CDVDFactorySubtitle::GetSubtitles, searching subtitles done
- 03:13:18 M: 99295232 NOTICE: Creating Demuxer
- 03:13:18 M: 99102720 DEBUG: GetModuleHandleA('libgcc_s_dw2-1.dll') failed
- Previous line repeats 2 times.
- 03:13:18 M: 93790208 DEBUG: ffmpeg[1F4]: Using network protocols without global network initialization. Please use avformat_network_init(), this will become mandatory later.
- 03:13:18 M: 93790208 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getaddrinfo') => 00257393
- Previous line repeats 1 times.
- 03:13:18 M: 93790208 DEBUG: ffmpeg[1F4]: Using network protocols without global network initialization. Please use avformat_network_init(), this will become mandatory later.
- 03:13:18 M: 93790208 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getaddrinfo') => 00257393
- 03:13:18 M: 93790208 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'freeaddrinfo') => 002573D2
- 03:13:18 M: 93790208 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getnameinfo') => 002573AE
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] SDP:
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] v=0
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] o=- 1254902844 1254902844 IN IP4 159.33.65.27
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] s=006/mp4/p/2013-11-14_10_00_00_pussycat_0001_800.mp4
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] c=IN IP4 159.33.65.27
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] t=0 0
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=sdplang:en
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=range:npt=0- 5011.4
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=control:*
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] m=audio 0 RTP/AVP 96
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=rtpmap:96 mpeg4-generic/44100/2
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=fmtp:96 profile-level-id=1;mode=AAC-hbr;sizelength=13;indexlength=3;indexdeltalength=3;config=1210
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=control:trackID=1
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] m=video 0 RTP/AVP 97
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=rtpmap:97 H264/90000
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=fmtp:97 packetization-mode=1;profile-level-id=42C01E;sprop-parameter-sets=Z0LAHrZQKAv+XARAAAADAEAAAAy5KADDUAGGuajAPixcsA==,aMkjyA==
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=cliprect:0,0,360,640
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=framesize:97 640-360
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=framerate:25.0
- 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=control:trackID=2
- 03:13:19 M: 93790208 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getaddrinfo') => 00257393
- 03:13:19 M: 93790208 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'freeaddrinfo') => 002573D2
- 03:13:20 M: 92356608 DEBUG: ------ Window Init (DialogBusy.xml) ------
- 03:13:20 M: 92356608 INFO: Loading skin file: DialogBusy.xml
Advertisement
Add Comment
Please, Sign In to add comment