Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 19:34:34 M: 16408576 DEBUG: ------ Window Init (VideoOSD.xml) ------
- 19:34:34 M: 16408576 DEBUG: CApplication::OnMessage : Translating Dialog.Close(142,true)
- 19:34:34 M: 16408576 DEBUG: CApplication::OnMessage : To Dialog.Close(142,true)
- 19:34:34 M: 16408576 DEBUG: CApplication::OnMessage : Translating Setfocus(603)
- 19:34:34 M: 16408576 DEBUG: CApplication::OnMessage : To Setfocus(603)
- 19:34:35 M: 16076800 DEBUG: CApplication::OnKey: 167 pressed, action is 4
- 19:34:36 M: 16076800 DEBUG: CApplication::OnKey: 11 pressed, action is 7
- 19:34:36 M: 16076800 DEBUG: CApplication::OnMessage : Translating RunScript(special://home/scripts/OpenSubtitles_OSD/default.py, [MOVIE]$INFO[VideoPlayer.Title][/MOVIE])
- 19:34:36 M: 16076800 DEBUG: CApplication::OnMessage : To RunScript(special://home/scripts/OpenSubtitles_OSD/default.py, [MOVIE]Even Cowgirls Get the Blues[/MOVIE])
- 19:34:36 M: 16076800 INFO: initializing python engine.
- 19:34:36 M: 16076800 DEBUG: LoadLibraryA('python24.dll')
- 19:34:36 M: 14954496 DEBUG: LoadLibrary('python24.dll') returning: 011BB510
- 19:34:36 M: 14958592 DEBUG: dllGetProcAddress(0083A8E8(kernel32.dll), 'InterlockedCompareExchange') => 000D5A34
- 19:34:36 M: 14692352 DEBUG: GetModuleFileNameA(00000000, 1E102490, 256) => 'xbmc.xbe'
- 19:34:36 M: 14692352 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
- 19:34:36 M: 14692352 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
- 19:34:36 M: 14635008 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 19:34:36 M: 14635008 DEBUG: LoadLibraryA('zlib.pyd')
- 19:34:36 M: 14565376 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 19:34:36 M: 14565376 DEBUG: LoadLibrary('zlib.pyd') returning: 01024A10
- 19:34:36 M: 14565376 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
- 19:34:37 M: 13709312 NOTICE: -->Python Initialized<--
- 19:34:37 M: 13709312 DEBUG: new python thread created. id=2
- 19:34:37 M: 13185024 DEBUG: Python thread: start processing
- 19:34:37 M: 13185024 DEBUG: XBPyThread::Process - The source file to load is special://home/scripts/OpenSubtitles_OSD/default.py
- 19:34:37 M: 13185024 DEBUG: XBPyThread::Process - Setting the Python path to Q:\scripts\OpenSubtitles_OSD;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
- 19:34:37 M: 13185024 DEBUG: XBPyThread::Process - Entering source directory Q:\scripts\OpenSubtitles_OSD
- 19:34:38 M: 11878400 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
- 19:34:38 M: 11874304 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 19:34:38 M: 11874304 DEBUG: LoadLibraryA('pyexpat.pyd')
- 19:34:38 M: 11735040 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 19:34:38 M: 11735040 DEBUG: LoadLibrary('pyexpat.pyd') returning: 0107EF10
- 19:34:38 M: 11735040 DEBUG: dllGetProcAddress(1D100000(pyexpat.pyd), 'initpyexpat') => 1D102350
- 19:34:38 M: 11722752 DEBUG: dllGetProcAddress(0083B170(advapi32.dll), 'CryptAcquireContextA') => 0024BC1E
- 19:34:38 M: 11722752 DEBUG: dllGetProcAddress(0083B170(advapi32.dll), 'CryptGenRandom') => 0024906B
- 19:34:38 M: 11722752 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
- 19:34:38 M: 11722752 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 19:34:38 M: 11722752 DEBUG: LoadLibraryA('_socket.pyd')
- 19:34:38 M: 11673600 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 19:34:38 M: 11673600 DEBUG: LoadLibrary('_socket.pyd') returning: 01089020
- 19:34:38 M: 11673600 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
- 19:34:38 M: 11649024 DEBUG: LoadLibraryExA called with flags:
- - LOAD_WITH_ALTERED_SEARCH_PATH
- 19:34:38 M: 11649024 DEBUG: LoadLibraryA('_ssl.pyd')
- 19:34:38 M: 11153408 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
- 19:34:38 M: 11153408 DEBUG: LoadLibrary('_ssl.pyd') returning: 00E6FDA0
- 19:34:38 M: 11153408 DEBUG: dllGetProcAddress(02850000(_ssl.pyd), 'init_ssl') => 02851820
- 19:34:39 M: 10551296 DEBUG: ------ Window Init (DialogSeekBar.xml) ------
- 19:34:39 M: 10543104 DEBUG: Alloc resources: 18.08ms (0.00 ms skin load, 0.00 ms preload)
- 19:34:40 M: 10104832 INFO: Loading skin includes from Q:\scripts\OpenSubtitles_OSD\resources\skins\MediaStream_Redux\includes.xml
- 19:34:40 M: 10104832 INFO: Error loading includes.xml file (Q:\scripts\OpenSubtitles_OSD\resources\skins\MediaStream_Redux\includes.xml): Failed to open file (row=0, col=0)
- 19:34:40 M: 10104832 NOTICE: Traceback (most recent call last):
- 19:34:40 M: 10104832 NOTICE: File "Q:\scripts\OpenSubtitles_OSD\default.py", line 86, in ?
- 19:34:40 M: 10104832 NOTICE: ui = gui.GUI( "script-OpenSubtitles_OSD-main.xml", os.getcwd(), (skin))
- 19:34:40 M: 10104832 NOTICE: TypeError
- 19:34:40 M: 10104832 NOTICE: :
- 19:34:40 M: 10104832 NOTICE: XML File for Window is missing
- 19:34:40 M: 10104832 ERROR: Scriptresult: Error
- 19:34:40 M: 10104832 INFO: Loading skin file: DialogOK.xml
- 19:34:40 M: 10104832 DEBUG: Load DialogOK.xml: 12.79ms
- 19:34:40 M: 10104832 DEBUG: ------ Window Init (DialogOK.xml) ------
- 19:34:40 M: 10104832 DEBUG: Alloc resources: 0.11ms (0.00 ms skin load, 0.00 ms preload)
- 19:34:43 M: 9838592 DEBUG: CApplication::OnKey: 11 pressed, action is 7
- 19:34:43 M: 9838592 DEBUG: ------ Window Deinit (DialogOK.xml) ------
- 19:34:44 M: 10104832 INFO: Python script stopped
- 19:34:44 M: 10629120 DEBUG: python thread 2 destructed
- 19:34:44 M: 10629120 INFO: Python, unloading python24.dll because no scripts are running anymore
- 19:34:44 M: 10940416 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 02850000): Detected memory leaks: 1647 leaks
- 19:34:44 M: 10940416 DEBUG: leak caller address 0285489B, size 20064, counter 1645
- 19:34:44 M: 10940416 DEBUG: leak caller address 028548B0, size 4224, counter 2
- 19:34:44 M: 10940416 DEBUG: _ssl.pyd: Total bytes leaked: 24288
- 19:34:44 M: 11440128 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 539 leaks
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E0211CB, size 24, counter 1
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E046F57, size 497856, counter 95
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E04FF6B, size 1000, counter 1
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E058C2C, size 233, counter 1
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E05CDDB, size 36556, counter 37
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E05E5EF, size 1976, counter 2
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E060EA5, size 608, counter 17
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E060F81, size 80, counter 4
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E072C5F, size 2883584, counter 11
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E072CAC, size 64, counter 1
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E072E88, size 59271, counter 105
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E072FC9, size 9113, counter 255
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E091E3F, size 640, counter 3
- 19:34:44 M: 14774272 DEBUG: leak caller address 1E093BEC, size 72, counter 6
- 19:34:44 M: 14774272 DEBUG: python24.dll: Total bytes leaked: 3491077
- 19:34:45 M: 15929344 DEBUG: CApplication::OnKey: 247 pressed, action is 51
- 19:34:46 M: 15929344 DEBUG: ------ Window Deinit (VideoOSD.xml) ------
- 19:34:49 M: 15929344 DEBUG: CApplication::OnKey: 224 pressed, action is 13
- 19:34:49 M: 15929344 NOTICE: CMPlayer::CloseFile()
- 19:34:49 M: 15929344 NOTICE: CMPlayer::CloseFile()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement