Guest User

Kozz- Tou.Tv xbmc bug

a guest
Nov 16th, 2013
151
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 31.96 KB | None | 0 0
  1. 03:12:08 M:123408384 NOTICE: -----------------------------------------------------------------------
  2. 03:12:08 M:123387904 NOTICE: Starting XBMC4Xbox. Built on Oct 27 2013 (SVN:32589, compiler 1310)
  3. 03:12:08 M:123387904 NOTICE: special://xbmc/ is mapped to: Q:\
  4. 03:12:08 M:123387904 NOTICE: special://masterprofile/ is mapped to: Q:\UserData
  5. 03:12:08 M:123387904 NOTICE: special://home/ is mapped to: Q:\
  6. 03:12:08 M:123387904 NOTICE: special://temp/ is mapped to: Z:\
  7. 03:12:08 M:123387904 NOTICE: The executable running is: E:\Apps\XBMC\default.xbe
  8. 03:12:08 M:123387904 NOTICE: Log File is located: Q:\xbmc.log
  9. 03:12:08 M:123387904 NOTICE: -----------------------------------------------------------------------
  10. 03:12:08 M:123387904 NOTICE: Unmapped drive T
  11. 03:12:08 M:123387904 NOTICE: Mapping drive T to Harddisk0\Partition1\Apps\XBMC\UserData\
  12. 03:12:08 M:123387904 NOTICE: Setup DirectX
  13. 03:12:08 M:123363328 NOTICE: Mapping drive C to Harddisk0\Partition2
  14. 03:12:08 M:123363328 NOTICE: Mapping drive E to Harddisk0\Partition1
  15. 03:12:08 M:123363328 NOTICE: Unmapped drive D
  16. 03:12:08 M:123363328 NOTICE: Mapping drive D to Cdrom0
  17. 03:12:08 M:123363328 NOTICE: map extended drive F:
  18. 03:12:08 M:123363328 NOTICE: Mapping drive F to Harddisk0\Partition6
  19. 03:12:08 M:123363328 NOTICE: Mapping drive X to Harddisk0\Partition3
  20. 03:12:08 M:123363328 NOTICE: Mapping drive Y to Harddisk0\Partition4
  21. 03:12:08 M:123359232 NOTICE: Unmapped drive Z
  22. 03:12:08 M:123359232 NOTICE: Mapping drive Z to Harddisk0\Partition5
  23. 03:12:08 M:123359232 NOTICE: load settings...
  24. 03:12:08 M:123359232 NOTICE: Mapping drive P to Harddisk0\Partition1\Apps\XBMC\UserData\
  25. 03:12:08 M:123359232 NOTICE: special://profile/ is mapped to: special://masterprofile/
  26. 03:12:08 M:123359232 NOTICE: loading special://masterprofile/guisettings.xml
  27. 03:12:08 M:123191296 NOTICE: Getting hardware information now...
  28. 03:12:08 M:123191296 NOTICE: Checking resolution 10
  29. 03:12:08 M:123191296 NOTICE: Setting autoresolution mode 4
  30. 03:12:08 M:123191296 NOTICE: Loading player core factory settings from special://xbmc/system/playercorefactory.xml.
  31. 03:12:08 M:123191296 NOTICE: Loaded playercorefactory configuration
  32. 03:12:08 M:123170816 NOTICE: Loading player core factory settings from special://masterprofile/playercorefactory.xml.
  33. 03:12:08 M:123170816 NOTICE: special://masterprofile/playercorefactory.xml does not exist. Skipping.
  34. 03:12:08 M:123170816 NOTICE: No advancedsettings.xml to load (special://masterprofile/advancedsettings.xml)
  35. 03:12:08 M:123170816 NOTICE: Default Video Player: dvdplayer
  36. 03:12:08 M:123170816 NOTICE: Default Audio Player: paplayer
  37. 03:12:08 M:123170816 NOTICE: Per AV pack settings are off
  38. 03:12:08 M:123310080 NOTICE: special://masterprofile/sources.xml
  39. 03:12:09 M:116858880 NOTICE: Network: Using DHCP IP settings
  40. 03:12:09 M:116539392 NOTICE: Checking the Date!
  41. 03:12:09 M:116539392 NOTICE: start dvd mediatype detection
  42. 03:12:09 M:116473856 NOTICE: initializing playlistplayer
  43. 03:12:09 M:116473856 NOTICE: DONE initializing playlistplayer
  44. 03:12:09 M:116465664 NOTICE: load default skin:[Confluence Lite]
  45. 03:12:11 M:111693824 NOTICE: initialize done
  46. 03:12:11 M:111693824 NOTICE: Running the application...
  47. 03:12:11 M:108515328 WARNING: old getenv from python.lib called, library check needed
  48. Previous line repeats 3 times.
  49. 03:12:11 M:108630016 WARNING: Webserver: Starting...
  50. 03:12:11 M:108425216 NOTICE: Webserver: Started
  51. 03:12:11 M:108412928 NOTICE: XBFileZilla: Starting...
  52. 03:12:11 M:108347392 NOTICE: ES: Starting event server
  53. 03:12:11 M:107212800 NOTICE: ES: Starting UDP Event server on 0.0.0.0:9777
  54. 03:12:11 M:106762240 NOTICE: UDP: Listening on port 9777
  55. 03:12:12 M:101470208 NOTICE: XBFileZilla: Started
  56. 03:12:14 M:106196992 ERROR: CThread::staticThread : Access violation at 0x00254052: Reading location 0x00000018
  57. 03:12:22 M:107266048 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://feeds.feedburner.com (easy=00C2F220, multi=00D664C0)
  58. 03:12:24 M:107372544 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://xml.weather.com (easy=00C0F010, multi=00BFA840)
  59. 03:12:43 M:107827200 DEBUG: CApplication::OnKey: 167 pressed, action is Down
  60. 03:12:43 M:107827200 DEBUG: CApplication::OnKey: 168 pressed, action is Right
  61. 03:12:44 M:107827200 DEBUG: CApplication::OnKey: 11 pressed, action is Select
  62. 03:12:44 M:107814912 DEBUG: CApplication::ExecuteXBMCAction : Translating ActivateWindow(VideoFiles,Plugins,return)
  63. 03:12:44 M:107814912 DEBUG: CApplication::ExecuteXBMCAction : To ActivateWindow(VideoFiles,Plugins,return)
  64. 03:12:44 M:107814912 DEBUG: Activating window ID: 10024
  65. 03:12:44 M:107814912 DEBUG: Checking if window ID 10024 is locked.
  66. 03:12:44 M:107814912 DEBUG: ------ Window Deinit (Home.xml) ------
  67. 03:12:44 M:108322816 WARNING: CUtil::GetMatchingSource... no matching source found for [Plugins]
  68. 03:12:44 M:108322816 DEBUG: ------ Window Init (MyVideo.xml) ------
  69. 03:12:44 M:108322816 INFO: Loading skin file: MyVideo.xml
  70. 03:12:45 M:106741760 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/)
  71. 03:12:45 M:106799104 DEBUG: ParentPath = [plugin://video/]
  72. 03:12:45 M:106799104 DEBUG: CFileItemList::Sort, sorting took 0 millis
  73. 03:12:51 M:104726528 DEBUG: CApplication::OnKey: 167 pressed, action is Down
  74. 03:12:51 M:104173568 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 192 x 192
  75. 03:12:51 M:104173568 DEBUG: JpegIO::Read - Using scale_num of 8, 192 x 192
  76. 03:12:52 M:104321024 DEBUG: CApplication::OnKey: 167 pressed, action is Down
  77. 03:12:52 M:104280064 WARNING: JpegIO: Error 55: Not a JPEG file: starts with 0x%02x 0x%02x
  78. 03:12:52 M:103239680 DEBUG: Dll MSVCP71.dll was not found in path
  79. 03:12:52 M:103239680 DEBUG: Unable to load referenced dll MSVCP71.dll - Dll: Q:\system\ImageLib.dll
  80. 03:12:52 M:103092224 DEBUG: CApplication::OnKey: 11 pressed, action is Select
  81. 03:12:52 M:103079936 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/TouTv/)
  82. 03:12:52 M:103079936 DEBUG: ParentPath = [plugin://video/]
  83. 03:12:52 M:103079936 DEBUG: XFILE::CPluginDirectory::StartScript - URL for plugin settings: TouTv/
  84. 03:12:53 M:103079936 DEBUG: unable to load special://home/plugins/video/TouTv/resources/language/english/strings.xml: Failed to open file at line 0
  85. 03:12:53 M:103079936 DEBUG: XFILE::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/TouTv/default.py('plugin://video/TouTv/','0','')
  86. 03:12:53 M:103079936 INFO: initializing python engine.
  87. 03:12:53 M:103079936 DEBUG: LoadLibraryA('python24.dll')
  88. 03:12:53 M:101953536 DEBUG: LoadLibrary('python24.dll') returning: 00919280
  89. 03:12:53 M:101953536 DEBUG: dllGetProcAddress(00898B48(kernel32.dll), 'InterlockedCompareExchange') => 0031E3B4
  90. 03:12:53 M:101687296 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  91. 03:12:53 M:101687296 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  92. Previous line repeats 1 times.
  93. 03:12:53 M:101629952 DEBUG: LoadLibraryExA called with flags:
  94. - LOAD_WITH_ALTERED_SEARCH_PATH
  95. 03:12:53 M:101629952 DEBUG: LoadLibraryA('zlib.pyd')
  96. 03:12:53 M:101560320 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  97. 03:12:53 M:101560320 DEBUG: LoadLibrary('zlib.pyd') returning: 00D106C0
  98. 03:12:53 M:101560320 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  99. 03:12:53 M:100696064 NOTICE: -->Python Initialized<--
  100. 03:12:53 M:100696064 DEBUG: new python thread created. id=1
  101. 03:12:53 M:100171776 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - waiting on the TouTv plugin...
  102. 03:12:53 M:100171776 DEBUG: Python thread: start processing
  103. 03:12:53 M:100171776 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/TouTv/default.py
  104. 03:12:53 M:100171776 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\TouTv;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.xbmcvfs\lib;Q:\scripts\.modules\script.module.metahandler\lib;Q:\scripts\.modules\script.module.pysqlite2\lib;Q:\scripts\.modules\script.module.simplejson\lib;Q:\scripts\.modules\script.module.urlresolver\lib;Q:\scripts\.modules\script.module.t0mm0.common\lib;Q:\scripts\.modules\script.module.elementtree\lib;Q:\scripts\.modules\script.common.plugin.cache\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  105. 03:12:53 M:100171776 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\TouTv
  106. 03:12:54 M: 99618816 DEBUG: LoadLibraryExA called with flags:
  107. - LOAD_WITH_ALTERED_SEARCH_PATH
  108. 03:12:54 M: 99618816 DEBUG: LoadLibraryA('_socket.pyd')
  109. 03:12:54 M: 99569664 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  110. 03:12:54 M: 99569664 DEBUG: LoadLibrary('_socket.pyd') returning: 00D28DC0
  111. 03:12:54 M: 99569664 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  112. 03:12:54 M: 99545088 DEBUG: LoadLibraryExA called with flags:
  113. - LOAD_WITH_ALTERED_SEARCH_PATH
  114. 03:12:54 M: 99545088 DEBUG: LoadLibraryA('_ssl.pyd')
  115. 03:12:54 M: 99049472 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  116. 03:12:54 M: 99049472 DEBUG: LoadLibrary('_ssl.pyd') returning: 00D8BD70
  117. 03:12:54 M: 99049472 DEBUG: dllGetProcAddress(01210000(_ssl.pyd), 'init_ssl') => 01211820
  118. 03:12:54 M: 98758656 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  119. 03:12:54 M: 98758656 DEBUG: dllGetProcAddress(008993D0(advapi32.dll), 'CryptAcquireContextA') => 00256298
  120. 03:12:54 M: 98758656 DEBUG: dllGetProcAddress(008993D0(advapi32.dll), 'CryptGenRandom') => 002562A9
  121. 03:12:54 M: 98758656 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  122. 03:12:54 M: 96288768 DEBUG: ------ Window Init (DialogBusy.xml) ------
  123. 03:12:54 M: 96296960 INFO: Loading skin file: DialogBusy.xml
  124. 03:12:55 M: 96133120 INFO: Loading skin file: DialogProgress.xml
  125. 03:12:55 M: 96014336 DEBUG: ------ Window Init (DialogProgress.xml) ------
  126. 03:12:55 M: 97222656 DEBUG: ------ Window Deinit (DialogBusy.xml) ------
  127. 03:12:55 M: 97554432 INFO: Scriptresult: Success
  128. 03:12:55 M: 97533952 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
  129. 03:12:55 M: 97533952 INFO: Python script stopped
  130. 03:12:55 M: 98058240 DEBUG: Saving fileitems [plugin://video/TouTv/]
  131. 03:12:55 M: 98058240 DEBUG: -- items: 7, sort method: 0, ascending: false
  132. 03:12:55 M: 97808384 DEBUG: python thread 1 destructed
  133. 03:12:55 M: 97787904 INFO: Python, unloading python24.dll because no scripts are running anymore
  134. 03:12:55 M: 98033664 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01210000): Detected memory leaks: 1647 leaks
  135. 03:12:55 M: 98054144 DEBUG: leak caller address 0121489B, size 20064, counter 1645
  136. 03:12:55 M: 98054144 DEBUG: leak caller address 012148B0, size 4224, counter 2
  137. 03:12:55 M: 98054144 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  138. 03:12:55 M: 98566144 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 434 leaks
  139. 03:12:55 M:101363712 DEBUG: leak caller address 1E02169B, size 24, counter 1
  140. 03:12:55 M:101363712 DEBUG: leak caller address 1E047413, size 488064, counter 80
  141. 03:12:55 M:101363712 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  142. 03:12:55 M:101363712 DEBUG: leak caller address 1E05928C, size 233, counter 1
  143. 03:12:55 M:101363712 DEBUG: leak caller address 1E05D47B, size 42484, counter 43
  144. 03:12:55 M:101363712 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  145. 03:12:55 M:101363712 DEBUG: leak caller address 1E061589, size 488, counter 13
  146. 03:12:55 M:101363712 DEBUG: leak caller address 1E06165A, size 112, counter 7
  147. 03:12:55 M:101363712 DEBUG: leak caller address 1E07365F, size 2359296, counter 9
  148. 03:12:55 M:101363712 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  149. 03:12:55 M:101363712 DEBUG: leak caller address 1E073894, size 61567, counter 99
  150. 03:12:55 M:101363712 DEBUG: leak caller address 1E0739DF, size 6279, counter 159
  151. 03:12:55 M:101363712 DEBUG: leak caller address 1E092749, size 640, counter 3
  152. 03:12:55 M:101363712 DEBUG: leak caller address 1E09457C, size 72, counter 6
  153. 03:12:55 M:101363712 DEBUG: leak caller address 1E0A30EB, size 32, counter 8
  154. 03:12:55 M:101363712 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
  155. 03:12:55 M:101363712 DEBUG: python24.dll: Total bytes leaked: 2962333
  156. 03:12:56 M:102510592 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  157. 03:12:58 M:103542784 DEBUG: CApplication::OnKey: 167 pressed, action is Down
  158. Previous line repeats 5 times.
  159. 03:13:01 M:103542784 DEBUG: CApplication::OnKey: 166 pressed, action is Up
  160. 03:13:02 M:103542784 DEBUG: SECTION:UnloadDelayed(DLL: Q:\system\ImageLib.dll)
  161. 03:13:02 M:104620032 DEBUG: CApplication::OnKey: 11 pressed, action is Select
  162. 03:13:02 M:104607744 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/TouTv/?mode=0&name=VignettesTouTVADecouvrir)
  163. 03:13:02 M:104607744 DEBUG: ParentPath = [plugin://video/TouTv/]
  164. 03:13:02 M:104607744 DEBUG: XFILE::CPluginDirectory::StartScript - URL for plugin settings: TouTv/
  165. 03:13:02 M:104607744 DEBUG: unable to load special://home/plugins/video/TouTv/resources/language/english/strings.xml: Failed to open file at line 0
  166. 03:13:02 M:104607744 DEBUG: XFILE::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/TouTv/default.py('plugin://video/TouTv/','0','?mode=0&name=VignettesTouTVADecouvrir')
  167. 03:13:02 M:104607744 INFO: initializing python engine.
  168. 03:13:02 M:104607744 DEBUG: LoadLibraryA('python24.dll')
  169. 03:13:02 M:103481344 DEBUG: LoadLibrary('python24.dll') returning: 01371FB0
  170. 03:13:02 M:103481344 DEBUG: dllGetProcAddress(00898B48(kernel32.dll), 'InterlockedCompareExchange') => 0031E3B4
  171. 03:13:02 M:103215104 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  172. 03:13:02 M:103215104 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  173. Previous line repeats 1 times.
  174. 03:13:02 M:103157760 DEBUG: LoadLibraryExA called with flags:
  175. - LOAD_WITH_ALTERED_SEARCH_PATH
  176. 03:13:02 M:103157760 DEBUG: LoadLibraryA('zlib.pyd')
  177. 03:13:02 M:103088128 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  178. 03:13:02 M:103088128 DEBUG: LoadLibrary('zlib.pyd') returning: 00DAA3B0
  179. 03:13:02 M:103088128 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  180. 03:13:03 M:102227968 NOTICE: -->Python Initialized<--
  181. 03:13:03 M:102227968 DEBUG: new python thread created. id=2
  182. 03:13:03 M:101703680 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult - waiting on the TouTv plugin...
  183. 03:13:03 M:101703680 DEBUG: Python thread: start processing
  184. 03:13:03 M:101703680 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/TouTv/default.py
  185. 03:13:03 M:101703680 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\TouTv;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.xbmcvfs\lib;Q:\scripts\.modules\script.module.metahandler\lib;Q:\scripts\.modules\script.module.pysqlite2\lib;Q:\scripts\.modules\script.module.simplejson\lib;Q:\scripts\.modules\script.module.urlresolver\lib;Q:\scripts\.modules\script.module.t0mm0.common\lib;Q:\scripts\.modules\script.module.elementtree\lib;Q:\scripts\.modules\script.common.plugin.cache\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  186. 03:13:03 M:101703680 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\TouTv
  187. 03:13:03 M:101142528 DEBUG: LoadLibraryExA called with flags:
  188. - LOAD_WITH_ALTERED_SEARCH_PATH
  189. 03:13:03 M:101142528 DEBUG: LoadLibraryA('_socket.pyd')
  190. 03:13:03 M:101093376 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  191. 03:13:03 M:101093376 DEBUG: LoadLibrary('_socket.pyd') returning: 00BFCFD0
  192. 03:13:03 M:101093376 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  193. 03:13:04 M:101068800 DEBUG: LoadLibraryExA called with flags:
  194. - LOAD_WITH_ALTERED_SEARCH_PATH
  195. 03:13:04 M:101068800 DEBUG: LoadLibraryA('_ssl.pyd')
  196. 03:13:04 M:100569088 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  197. 03:13:04 M:100569088 DEBUG: LoadLibrary('_ssl.pyd') returning: 00DCED80
  198. 03:13:04 M:100569088 DEBUG: dllGetProcAddress(01A90000(_ssl.pyd), 'init_ssl') => 01A91820
  199. 03:13:04 M:100274176 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  200. 03:13:04 M:100265984 DEBUG: dllGetProcAddress(008993D0(advapi32.dll), 'CryptAcquireContextA') => 00256298
  201. 03:13:04 M:100265984 DEBUG: dllGetProcAddress(008993D0(advapi32.dll), 'CryptGenRandom') => 002562A9
  202. 03:13:04 M:100265984 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  203. 03:13:04 M: 98832384 DEBUG: ------ Window Init (DialogBusy.xml) ------
  204. 03:13:04 M: 98856960 INFO: Loading skin file: DialogBusy.xml
  205. 03:13:04 M: 98578432 INFO: Loading skin file: DialogProgress.xml
  206. 03:13:04 M: 98578432 DEBUG: ------ Window Init (DialogProgress.xml) ------
  207. 03:13:04 M: 99586048 DEBUG: ------ Window Deinit (DialogBusy.xml) ------
  208. 03:13:05 M: 98979840 DEBUG: LoadLibraryA('ws2_32')
  209. 03:13:05 M: 98979840 DEBUG: LoadLibrary('ws2_32.dll') returning: 00898B20
  210. 03:13:05 M: 98979840 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getaddrinfo') => 00257393
  211. Previous line repeats 1 times.
  212. 03:13:05 M: 98979840 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getnameinfo') => 002573AE
  213. 03:13:05 M: 98979840 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'freeaddrinfo') => 002573D2
  214. 03:13:06 M: 98586624 INFO: Scriptresult: Success
  215. 03:13:06 M: 98725888 DEBUG: XFILE::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
  216. 03:13:06 M: 98725888 INFO: Python script stopped
  217. 03:13:06 M: 99250176 DEBUG: Saving fileitems [plugin://video/TouTv/?mode=0&name=VignettesTouTVADecouvrir]
  218. 03:13:06 M: 99250176 DEBUG: -- items: 4, sort method: 0, ascending: false
  219. 03:13:06 M: 98988032 DEBUG: python thread 2 destructed
  220. 03:13:06 M: 98988032 INFO: Python, unloading python24.dll because no scripts are running anymore
  221. 03:13:06 M: 99209216 DEBUG: Q:\system\python\DLLs\_socket.pyd: Detected 1 unloaded dll's
  222. 03:13:06 M: 99262464 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01A90000): Detected memory leaks: 1647 leaks
  223. 03:13:06 M: 99270656 DEBUG: leak caller address 01A9489B, size 20064, counter 1645
  224. 03:13:06 M: 99270656 DEBUG: leak caller address 01A948B0, size 4224, counter 2
  225. 03:13:06 M: 99270656 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  226. 03:13:06 M: 99782656 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 500 leaks
  227. 03:13:06 M:102600704 DEBUG: leak caller address 1E02169B, size 24, counter 1
  228. 03:13:06 M:102600704 DEBUG: leak caller address 1E047413, size 492288, counter 88
  229. 03:13:06 M:102600704 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  230. 03:13:06 M:102600704 DEBUG: leak caller address 1E05928C, size 233, counter 1
  231. 03:13:06 M:102600704 DEBUG: leak caller address 1E05D47B, size 42484, counter 43
  232. 03:13:06 M:102600704 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  233. 03:13:06 M:102600704 DEBUG: leak caller address 1E061589, size 824, counter 31
  234. 03:13:06 M:102600704 DEBUG: leak caller address 1E06165A, size 116, counter 8
  235. 03:13:06 M:102600704 DEBUG: leak caller address 1E07365F, size 2359296, counter 9
  236. 03:13:06 M:102600704 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  237. 03:13:06 M:102600704 DEBUG: leak caller address 1E073894, size 65518, counter 109
  238. 03:13:06 M:102600704 DEBUG: leak caller address 1E0739DF, size 7503, counter 188
  239. 03:13:06 M:102600704 DEBUG: leak caller address 1E092749, size 640, counter 3
  240. 03:13:06 M:102600704 DEBUG: leak caller address 1E09457C, size 72, counter 6
  241. 03:13:06 M:102600704 DEBUG: leak caller address 1E0A30EB, size 32, counter 8
  242. 03:13:06 M:102600704 DEBUG: leak caller address 1E0A9CAD, size 2, counter 1
  243. 03:13:06 M:102600704 DEBUG: python24.dll: Total bytes leaked: 2972072
  244. 03:13:07 M:104062976 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  245. 03:13:07 M:104423424 DEBUG: CApplication::OnKey: 167 pressed, action is Down
  246. 03:13:07 M:103882752 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 256 x 143
  247. 03:13:07 M:103882752 DEBUG: JpegIO::Read - Using scale_num of 9, 234 x 132
  248. 03:13:08 M:104042496 DEBUG: CApplication::OnKey: 167 pressed, action is Down
  249. 03:13:08 M:104026112 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 256 x 143
  250. 03:13:08 M:104026112 DEBUG: JpegIO::Read - Using scale_num of 9, 234 x 132
  251. 03:13:08 M:103915520 DEBUG: CApplication::OnKey: 167 pressed, action is Down
  252. 03:13:08 M:103890944 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 256 x 143
  253. 03:13:08 M:103890944 DEBUG: JpegIO::Read - Using scale_num of 9, 234 x 132
  254. 03:13:09 M:103784448 DEBUG: CApplication::OnKey: 167 pressed, action is Down
  255. 03:13:09 M:103768064 DEBUG: JpegIO::Read - Requested minx x miny 192 x 192 - using minx x miny 256 x 143
  256. 03:13:09 M:103768064 DEBUG: JpegIO::Read - Using scale_num of 9, 234 x 132
  257. 03:13:14 M:104566784 DEBUG: CApplication::OnKey: 11 pressed, action is Select
  258. 03:13:14 M:104554496 DEBUG: unable to load special://home/plugins/video/TouTv/resources/language/english/strings.xml: Failed to open file at line 0
  259. 03:13:14 M:104554496 DEBUG: XFILE::CPluginDirectory::RunScriptWithParams - calling plugin special://home/plugins/video/TouTv/default.py('plugin://video/TouTv/','-1','?mode=4&name=VignettesTouTVADecouvrir&url=http%3A%2F%2Fwww.tou.tv%2Ffaster-pussy-cat-kill-kill&thumb=Q%3A%5CUserData%5CThumbnails%5CVideo%5Cc%5Cc1ebcbad.tbn&plot=Trois+pulpeuses+cr%C3%A9atures+partent+en+vir%C3%A9e+dans+leurs+bolides+de+course.+Varla%2C+experte+en+arts+martiaux+et+%C3%A9g%C3%A9rie+de+ce+groupe+d%27amazones%2C+d%C3%A9clenche+un+v%C3%A9ritable+carnage+pour+s%27approprier+le+magot+d%27un+vieillard+vicieux%2C+impuissant+et+voyeur.')
  260. 03:13:14 M:104554496 INFO: initializing python engine.
  261. 03:13:14 M:104554496 DEBUG: LoadLibraryA('python24.dll')
  262. 03:13:14 M:103428096 DEBUG: LoadLibrary('python24.dll') returning: 00D10FA0
  263. 03:13:15 M:103428096 DEBUG: dllGetProcAddress(00898B48(kernel32.dll), 'InterlockedCompareExchange') => 0031E3B4
  264. 03:13:15 M:103161856 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  265. 03:13:15 M:103161856 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  266. Previous line repeats 1 times.
  267. 03:13:15 M:103104512 DEBUG: LoadLibraryExA called with flags:
  268. - LOAD_WITH_ALTERED_SEARCH_PATH
  269. 03:13:15 M:103104512 DEBUG: LoadLibraryA('zlib.pyd')
  270. 03:13:15 M:103034880 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  271. 03:13:15 M:103034880 DEBUG: LoadLibrary('zlib.pyd') returning: 00C47250
  272. 03:13:15 M:103034880 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  273. 03:13:15 M:102170624 NOTICE: -->Python Initialized<--
  274. 03:13:15 M:102170624 DEBUG: new python thread created. id=3
  275. 03:13:15 M:101646336 DEBUG: Python thread: start processing
  276. 03:13:15 M:101658624 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/TouTv/default.py
  277. 03:13:15 M:101658624 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\TouTv;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.xbmcvfs\lib;Q:\scripts\.modules\script.module.metahandler\lib;Q:\scripts\.modules\script.module.pysqlite2\lib;Q:\scripts\.modules\script.module.simplejson\lib;Q:\scripts\.modules\script.module.urlresolver\lib;Q:\scripts\.modules\script.module.t0mm0.common\lib;Q:\scripts\.modules\script.module.elementtree\lib;Q:\scripts\.modules\script.common.plugin.cache\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  278. 03:13:15 M:101658624 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\TouTv
  279. 03:13:16 M:101101568 DEBUG: LoadLibraryExA called with flags:
  280. - LOAD_WITH_ALTERED_SEARCH_PATH
  281. 03:13:16 M:101101568 DEBUG: LoadLibraryA('_socket.pyd')
  282. 03:13:16 M:101052416 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  283. 03:13:16 M:101052416 DEBUG: LoadLibrary('_socket.pyd') returning: 00DB34B0
  284. 03:13:16 M:101052416 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  285. 03:13:16 M:101031936 DEBUG: LoadLibraryExA called with flags:
  286. - LOAD_WITH_ALTERED_SEARCH_PATH
  287. 03:13:16 M:101031936 DEBUG: LoadLibraryA('_ssl.pyd')
  288. 03:13:16 M:100532224 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  289. 03:13:16 M:100532224 DEBUG: LoadLibrary('_ssl.pyd') returning: 00C8E340
  290. 03:13:16 M:100532224 DEBUG: dllGetProcAddress(01A90000(_ssl.pyd), 'init_ssl') => 01A91820
  291. 03:13:16 M:100245504 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  292. 03:13:16 M:100237312 DEBUG: dllGetProcAddress(008993D0(advapi32.dll), 'CryptAcquireContextA') => 00256298
  293. 03:13:16 M:100237312 DEBUG: dllGetProcAddress(008993D0(advapi32.dll), 'CryptGenRandom') => 002562A9
  294. 03:13:16 M:100237312 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  295. 03:13:17 M: 99299328 DEBUG: LoadLibraryA('ws2_32')
  296. 03:13:17 M: 99299328 DEBUG: LoadLibrary('ws2_32.dll') returning: 00898B20
  297. 03:13:17 M: 99299328 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getaddrinfo') => 00257393
  298. Previous line repeats 1 times.
  299. 03:13:17 M: 99299328 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getnameinfo') => 002573AE
  300. 03:13:17 M: 99299328 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'freeaddrinfo') => 002573D2
  301. 03:13:18 M: 99258368 ERROR: XFILE::CPluginDirectory::SetProperty called with an invalid handle.
  302. 03:13:18 M: 99221504 ERROR: XFILE::CPluginDirectory::AddSortMethod - called with an invalid handle.
  303. 03:13:18 M: 99295232 ERROR: XFILE::CPluginDirectory::EndOfDirectory - called with an invalid handle.
  304. 03:13:18 M: 99282944 INFO: Scriptresult: Success
  305. 03:13:18 M: 99282944 INFO: Python script stopped
  306. 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers(rtsp://medias-rtsp.tou.tv/vodtoutv/_definst_/mp4:006/mp4/p/2013-11-14_10_00_00_pussycat_0001_800.mp4)
  307. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: un-named
  308. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: matches rule: un-named
  309. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: rtv
  310. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: hdhomerun/myth/rtmp/mms/udp
  311. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: lastfm/shout
  312. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: rtsp
  313. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: streams
  314. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: matches rule: streams
  315. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: flv/aacp/sdp/rtsp
  316. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: mp2
  317. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: dvd
  318. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: dvdfile
  319. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: dvdimage
  320. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: ogv/flv/mov
  321. 03:13:18 M: 99819520 DEBUG: CPlayerSelectionRule::GetPlayers: considering rule: nsv
  322. 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: matched 0 rules with players
  323. 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: adding videodefaultplayer (1)
  324. 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: for video=1, audio=0
  325. 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: for video=1, audio=1
  326. 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: adding player: DVDPlayer (1)
  327. 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: adding player: MPlayer (2)
  328. 03:13:18 M: 99819520 DEBUG: CPlayerCoreFactory::GetPlayers: added 2 players
  329. 03:13:18 M: 99819520 NOTICE: DVDPlayer: Opening: rtsp://medias-rtsp.tou.tv/vodtoutv/_definst_/mp4:006/mp4/p/2013-11-14_10_00_00_pussycat_0001_800.mp4
  330. 03:13:18 M: 99819520 WARNING: CDVDMessageQueue(player)::Put MSGQ_NOT_INITIALIZED
  331. 03:13:18 M: 99295232 NOTICE: Creating InputStream
  332. 03:13:18 M: 99295232 INFO: CDVDFactorySubtitle::GetSubtitles, searching subtitles
  333. 03:13:18 M: 99295232 DEBUG: CUtil::CacheSubtitles: START
  334. 03:13:18 M: 99295232 INFO: CDVDFactorySubtitle::GetSubtitles, searching subtitles done
  335. 03:13:18 M: 99295232 NOTICE: Creating Demuxer
  336. 03:13:18 M: 99102720 DEBUG: GetModuleHandleA('libgcc_s_dw2-1.dll') failed
  337. Previous line repeats 2 times.
  338. 03:13:18 M: 93790208 DEBUG: ffmpeg[1F4]: Using network protocols without global network initialization. Please use avformat_network_init(), this will become mandatory later.
  339. 03:13:18 M: 93790208 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getaddrinfo') => 00257393
  340. Previous line repeats 1 times.
  341. 03:13:18 M: 93790208 DEBUG: ffmpeg[1F4]: Using network protocols without global network initialization. Please use avformat_network_init(), this will become mandatory later.
  342. 03:13:18 M: 93790208 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getaddrinfo') => 00257393
  343. 03:13:18 M: 93790208 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'freeaddrinfo') => 002573D2
  344. 03:13:18 M: 93790208 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getnameinfo') => 002573AE
  345. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] SDP:
  346. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] v=0
  347. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] o=- 1254902844 1254902844 IN IP4 159.33.65.27
  348. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] s=006/mp4/p/2013-11-14_10_00_00_pussycat_0001_800.mp4
  349. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] c=IN IP4 159.33.65.27
  350. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] t=0 0
  351. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=sdplang:en
  352. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=range:npt=0- 5011.4
  353. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=control:*
  354. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] m=audio 0 RTP/AVP 96
  355. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=rtpmap:96 mpeg4-generic/44100/2
  356. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=fmtp:96 profile-level-id=1;mode=AAC-hbr;sizelength=13;indexlength=3;indexdeltalength=3;config=1210
  357. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=control:trackID=1
  358. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] m=video 0 RTP/AVP 97
  359. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=rtpmap:97 H264/90000
  360. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=fmtp:97 packetization-mode=1;profile-level-id=42C01E;sprop-parameter-sets=Z0LAHrZQKAv+XARAAAADAEAAAAy5KADDUAGGuajAPixcsA==,aMkjyA==
  361. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=cliprect:0,0,360,640
  362. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=framesize:97 640-360
  363. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=framerate:25.0
  364. 03:13:19 M: 93790208 DEBUG: ffmpeg[1F4]: [rtsp] a=control:trackID=2
  365. 03:13:19 M: 93790208 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'getaddrinfo') => 00257393
  366. 03:13:19 M: 93790208 DEBUG: dllGetProcAddress(00898AE0(ws2_32.dll), 'freeaddrinfo') => 002573D2
  367. 03:13:20 M: 92356608 DEBUG: ------ Window Init (DialogBusy.xml) ------
  368. 03:13:20 M: 92356608 INFO: Loading skin file: DialogBusy.xml
Advertisement
Add Comment
Please, Sign In to add comment