Advertisement
Guest User

Bram van Oploo

a guest
Aug 13th, 2009
132
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.82 KB | None | 0 0
  1. 19:34:34 M: 16408576 DEBUG: ------ Window Init (VideoOSD.xml) ------
  2. 19:34:34 M: 16408576 DEBUG: CApplication::OnMessage : Translating Dialog.Close(142,true)
  3. 19:34:34 M: 16408576 DEBUG: CApplication::OnMessage : To Dialog.Close(142,true)
  4. 19:34:34 M: 16408576 DEBUG: CApplication::OnMessage : Translating Setfocus(603)
  5. 19:34:34 M: 16408576 DEBUG: CApplication::OnMessage : To Setfocus(603)
  6. 19:34:35 M: 16076800 DEBUG: CApplication::OnKey: 167 pressed, action is 4
  7. 19:34:36 M: 16076800 DEBUG: CApplication::OnKey: 11 pressed, action is 7
  8. 19:34:36 M: 16076800 DEBUG: CApplication::OnMessage : Translating RunScript(special://home/scripts/OpenSubtitles_OSD/default.py, [MOVIE]$INFO[VideoPlayer.Title][/MOVIE])
  9. 19:34:36 M: 16076800 DEBUG: CApplication::OnMessage : To RunScript(special://home/scripts/OpenSubtitles_OSD/default.py, [MOVIE]Even Cowgirls Get the Blues[/MOVIE])
  10. 19:34:36 M: 16076800 INFO: initializing python engine.
  11. 19:34:36 M: 16076800 DEBUG: LoadLibraryA('python24.dll')
  12. 19:34:36 M: 14954496 DEBUG: LoadLibrary('python24.dll') returning: 011BB510
  13. 19:34:36 M: 14958592 DEBUG: dllGetProcAddress(0083A8E8(kernel32.dll), 'InterlockedCompareExchange') => 000D5A34
  14. 19:34:36 M: 14692352 DEBUG: GetModuleFileNameA(00000000, 1E102490, 256) => 'xbmc.xbe'
  15. 19:34:36 M: 14692352 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  16. 19:34:36 M: 14692352 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  17. 19:34:36 M: 14635008 DEBUG: LoadLibraryExA called with flags:
  18. - LOAD_WITH_ALTERED_SEARCH_PATH
  19. 19:34:36 M: 14635008 DEBUG: LoadLibraryA('zlib.pyd')
  20. 19:34:36 M: 14565376 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  21. 19:34:36 M: 14565376 DEBUG: LoadLibrary('zlib.pyd') returning: 01024A10
  22. 19:34:36 M: 14565376 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  23. 19:34:37 M: 13709312 NOTICE: -->Python Initialized<--
  24. 19:34:37 M: 13709312 DEBUG: new python thread created. id=2
  25. 19:34:37 M: 13185024 DEBUG: Python thread: start processing
  26. 19:34:37 M: 13185024 DEBUG: XBPyThread::Process - The source file to load is special://home/scripts/OpenSubtitles_OSD/default.py
  27. 19:34:37 M: 13185024 DEBUG: XBPyThread::Process - Setting the Python path to Q:\scripts\OpenSubtitles_OSD;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  28. 19:34:37 M: 13185024 DEBUG: XBPyThread::Process - Entering source directory Q:\scripts\OpenSubtitles_OSD
  29. 19:34:38 M: 11878400 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  30. 19:34:38 M: 11874304 DEBUG: LoadLibraryExA called with flags:
  31. - LOAD_WITH_ALTERED_SEARCH_PATH
  32. 19:34:38 M: 11874304 DEBUG: LoadLibraryA('pyexpat.pyd')
  33. 19:34:38 M: 11735040 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  34. 19:34:38 M: 11735040 DEBUG: LoadLibrary('pyexpat.pyd') returning: 0107EF10
  35. 19:34:38 M: 11735040 DEBUG: dllGetProcAddress(1D100000(pyexpat.pyd), 'initpyexpat') => 1D102350
  36. 19:34:38 M: 11722752 DEBUG: dllGetProcAddress(0083B170(advapi32.dll), 'CryptAcquireContextA') => 0024BC1E
  37. 19:34:38 M: 11722752 DEBUG: dllGetProcAddress(0083B170(advapi32.dll), 'CryptGenRandom') => 0024906B
  38. 19:34:38 M: 11722752 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  39. 19:34:38 M: 11722752 DEBUG: LoadLibraryExA called with flags:
  40. - LOAD_WITH_ALTERED_SEARCH_PATH
  41. 19:34:38 M: 11722752 DEBUG: LoadLibraryA('_socket.pyd')
  42. 19:34:38 M: 11673600 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  43. 19:34:38 M: 11673600 DEBUG: LoadLibrary('_socket.pyd') returning: 01089020
  44. 19:34:38 M: 11673600 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  45. 19:34:38 M: 11649024 DEBUG: LoadLibraryExA called with flags:
  46. - LOAD_WITH_ALTERED_SEARCH_PATH
  47. 19:34:38 M: 11649024 DEBUG: LoadLibraryA('_ssl.pyd')
  48. 19:34:38 M: 11153408 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  49. 19:34:38 M: 11153408 DEBUG: LoadLibrary('_ssl.pyd') returning: 00E6FDA0
  50. 19:34:38 M: 11153408 DEBUG: dllGetProcAddress(02850000(_ssl.pyd), 'init_ssl') => 02851820
  51. 19:34:39 M: 10551296 DEBUG: ------ Window Init (DialogSeekBar.xml) ------
  52. 19:34:39 M: 10543104 DEBUG: Alloc resources: 18.08ms (0.00 ms skin load, 0.00 ms preload)
  53. 19:34:40 M: 10104832 INFO: Loading skin includes from Q:\scripts\OpenSubtitles_OSD\resources\skins\MediaStream_Redux\includes.xml
  54. 19:34:40 M: 10104832 INFO: Error loading includes.xml file (Q:\scripts\OpenSubtitles_OSD\resources\skins\MediaStream_Redux\includes.xml): Failed to open file (row=0, col=0)
  55. 19:34:40 M: 10104832 NOTICE: Traceback (most recent call last):
  56. 19:34:40 M: 10104832 NOTICE: File "Q:\scripts\OpenSubtitles_OSD\default.py", line 86, in ?
  57. 19:34:40 M: 10104832 NOTICE: ui = gui.GUI( "script-OpenSubtitles_OSD-main.xml", os.getcwd(), (skin))
  58. 19:34:40 M: 10104832 NOTICE: TypeError
  59. 19:34:40 M: 10104832 NOTICE: :
  60. 19:34:40 M: 10104832 NOTICE: XML File for Window is missing
  61. 19:34:40 M: 10104832 ERROR: Scriptresult: Error
  62. 19:34:40 M: 10104832 INFO: Loading skin file: DialogOK.xml
  63. 19:34:40 M: 10104832 DEBUG: Load DialogOK.xml: 12.79ms
  64. 19:34:40 M: 10104832 DEBUG: ------ Window Init (DialogOK.xml) ------
  65. 19:34:40 M: 10104832 DEBUG: Alloc resources: 0.11ms (0.00 ms skin load, 0.00 ms preload)
  66. 19:34:43 M: 9838592 DEBUG: CApplication::OnKey: 11 pressed, action is 7
  67. 19:34:43 M: 9838592 DEBUG: ------ Window Deinit (DialogOK.xml) ------
  68. 19:34:44 M: 10104832 INFO: Python script stopped
  69. 19:34:44 M: 10629120 DEBUG: python thread 2 destructed
  70. 19:34:44 M: 10629120 INFO: Python, unloading python24.dll because no scripts are running anymore
  71. 19:34:44 M: 10940416 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 02850000): Detected memory leaks: 1647 leaks
  72. 19:34:44 M: 10940416 DEBUG: leak caller address 0285489B, size 20064, counter 1645
  73. 19:34:44 M: 10940416 DEBUG: leak caller address 028548B0, size 4224, counter 2
  74. 19:34:44 M: 10940416 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  75. 19:34:44 M: 11440128 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 539 leaks
  76. 19:34:44 M: 14774272 DEBUG: leak caller address 1E0211CB, size 24, counter 1
  77. 19:34:44 M: 14774272 DEBUG: leak caller address 1E046F57, size 497856, counter 95
  78. 19:34:44 M: 14774272 DEBUG: leak caller address 1E04FF6B, size 1000, counter 1
  79. 19:34:44 M: 14774272 DEBUG: leak caller address 1E058C2C, size 233, counter 1
  80. 19:34:44 M: 14774272 DEBUG: leak caller address 1E05CDDB, size 36556, counter 37
  81. 19:34:44 M: 14774272 DEBUG: leak caller address 1E05E5EF, size 1976, counter 2
  82. 19:34:44 M: 14774272 DEBUG: leak caller address 1E060EA5, size 608, counter 17
  83. 19:34:44 M: 14774272 DEBUG: leak caller address 1E060F81, size 80, counter 4
  84. 19:34:44 M: 14774272 DEBUG: leak caller address 1E072C5F, size 2883584, counter 11
  85. 19:34:44 M: 14774272 DEBUG: leak caller address 1E072CAC, size 64, counter 1
  86. 19:34:44 M: 14774272 DEBUG: leak caller address 1E072E88, size 59271, counter 105
  87. 19:34:44 M: 14774272 DEBUG: leak caller address 1E072FC9, size 9113, counter 255
  88. 19:34:44 M: 14774272 DEBUG: leak caller address 1E091E3F, size 640, counter 3
  89. 19:34:44 M: 14774272 DEBUG: leak caller address 1E093BEC, size 72, counter 6
  90. 19:34:44 M: 14774272 DEBUG: python24.dll: Total bytes leaked: 3491077
  91. 19:34:45 M: 15929344 DEBUG: CApplication::OnKey: 247 pressed, action is 51
  92. 19:34:46 M: 15929344 DEBUG: ------ Window Deinit (VideoOSD.xml) ------
  93. 19:34:49 M: 15929344 DEBUG: CApplication::OnKey: 224 pressed, action is 13
  94. 19:34:49 M: 15929344 NOTICE: CMPlayer::CloseFile()
  95. 19:34:49 M: 15929344 NOTICE: CMPlayer::CloseFile()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement