Advertisement
Guest User

Feanor

a guest
Jul 31st, 2009
257
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 27.13 KB | None | 0 0
  1. 20:50:20 M: 55427072 NOTICE: -----------------------------------------------------------------------
  2. 20:50:20 M: 55398400 NOTICE: Starting XBMC, Platform: Xbox. Built on Jun 26 2009 (SVN:21142, compiler 1310)
  3. 20:50:20 M: 55398400 NOTICE: special://xbmc/ is mapped to: Q:\
  4. 20:50:20 M: 55398400 NOTICE: special://masterprofile/ is mapped to: q:\UserData
  5. 20:50:20 M: 55398400 NOTICE: special://home/ is mapped to: Q:\
  6. 20:50:20 M: 55398400 NOTICE: special://temp/ is mapped to: Z:\
  7. 20:50:20 M: 55398400 NOTICE: The executable running is: E:\Apps\XBMC\default.xbe
  8. 20:50:20 M: 55398400 NOTICE: Log File is located: Q:\xbmc.log
  9. 20:50:20 M: 55398400 NOTICE: -----------------------------------------------------------------------
  10. 20:50:20 M: 55398400 NOTICE: Unmapped drive T
  11. 20:50:20 M: 55398400 NOTICE: Mapping drive T to Harddisk0\Partition1\Apps\XBMC\UserData
  12. 20:50:20 M: 55398400 NOTICE: Setup DirectX
  13. 20:50:20 M: 55373824 NOTICE: Mapping drive C to Harddisk0\Partition2
  14. 20:50:20 M: 55373824 NOTICE: Mapping drive E to Harddisk0\Partition1
  15. 20:50:20 M: 55373824 NOTICE: Unmapped drive D
  16. 20:50:20 M: 55373824 NOTICE: Mapping drive D to Cdrom0
  17. 20:50:20 M: 55373824 NOTICE: Mapping drive F to Harddisk0\Partition6
  18. 20:50:20 M: 55369728 NOTICE: Mapping drive X to Harddisk0\Partition3
  19. 20:50:20 M: 55369728 NOTICE: Mapping drive Y to Harddisk0\Partition4
  20. 20:50:20 M: 55369728 NOTICE: Unmapped drive Z
  21. 20:50:20 M: 55369728 NOTICE: Mapping drive Z to Harddisk0\Partition5
  22. 20:50:20 M: 55369728 NOTICE: load settings...
  23. 20:50:20 M: 55369728 NOTICE: Mapping drive P to Harddisk0\Partition1\Apps\XBMC\UserData
  24. 20:50:20 M: 55369728 NOTICE: special://profile/ is mapped to: q:\UserData
  25. 20:50:20 M: 55369728 NOTICE: loading special://masterprofile/guisettings.xml
  26. 20:50:20 M: 54882304 NOTICE: Getting hardware information now...
  27. 20:50:20 M: 54861824 NOTICE: Checking resolution 1
  28. 20:50:20 M: 54792192 NOTICE: No advancedsettings.xml to load (special://masterprofile/advancedsettings.xml)
  29. 20:50:20 M: 54771712 NOTICE: Default Video Player: mplayer
  30. 20:50:20 M: 54771712 NOTICE: Default Audio Player: paplayer
  31. 20:50:20 M: 54771712 NOTICE: Per AV pack settings are off
  32. 20:50:20 M: 55238656 NOTICE: q:\UserData\sources.xml
  33. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button browser_home
  34. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button browser_favorites
  35. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button browser_refresh
  36. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button browser_search
  37. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button launch_app1_pc_icon
  38. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button launch_media_select
  39. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button play_pause
  40. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button stop
  41. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button volume_up
  42. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button volume_mute
  43. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button volume_down
  44. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button next_track
  45. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button prev_track
  46. 20:50:21 M: 45592576 ERROR: Keyboard Translator: Can't find button launch_mail
  47. 20:50:21 M: 45867008 NOTICE: Network: Using static IP settings
  48. 20:50:21 M: 45539328 NOTICE: Checking the Date!
  49. 20:50:21 M: 45539328 NOTICE: start dvd mediatype detection
  50. 20:50:21 M: 45469696 NOTICE: initializing playlistplayer
  51. 20:50:21 M: 45469696 NOTICE: DONE initializing playlistplayer
  52. 20:50:21 M: 45461504 NOTICE: load default skin:[MediaStream_Redux]
  53. 20:50:23 M: 38793216 NOTICE: initialize done
  54. 20:50:23 M: 38793216 NOTICE: Running the application...
  55. 20:50:23 M: 38793216 NOTICE: start timeserver client
  56. 20:50:23 M: 38727680 NOTICE: XBFileZilla: Starting...
  57. 20:50:25 M: 32088064 NOTICE: XBFileZilla: Started
  58. 20:50:26 M: 22249472 NOTICE: -->Python Initialized<--
  59. 20:50:26 M: 22487040 NOTICE:
  60. 20:50:43 M: 26787840 NOTICE: Enabled debug logging due to GUI setting
  61. 20:50:44 M: 26767360 DEBUG: CApplication::OnKey: 275 pressed, action is 10
  62. 20:50:44 M: 26763264 DEBUG: CGUIWindowManager::PreviousWindow: Deactivate
  63. 20:50:44 M: 31948800 DEBUG: CGUIWindowManager::PreviousWindow: Activate new
  64. 20:50:44 M: 31948800 INFO: Loading skin file: Settings.xml
  65. 20:50:44 M: 31948800 DEBUG: Load Settings.xml: 20.60ms
  66. 20:50:44 M: 31948800 DEBUG: Alloc resources: 21.50ms (21.49 ms skin load, 0.00 ms preload)
  67. 20:50:45 M: 24104960 DEBUG: CApplication::OnKey: 275 pressed, action is 10
  68. 20:50:45 M: 24104960 DEBUG: CGUIWindowManager::PreviousWindow: Deactivate
  69. 20:50:45 M: 31424512 DEBUG: CGUIWindowManager::PreviousWindow: Activate new
  70. 20:50:45 M: 31424512 INFO: Loading skin file: Home.xml
  71. 20:50:46 M: 31043584 DEBUG: Load Home.xml: 175.98ms
  72. 20:50:46 M: 30969856 DEBUG: Alloc resources: 180.74ms (176.58 ms skin load, 0.00 ms preload)
  73. 20:50:46 M: 27602944 DEBUG: CApplication::OnMessage : Translating XBMC.RunScript(special://skin/scripts/RecentlyAdded.py,limit=4)
  74. 20:50:46 M: 27602944 DEBUG: CApplication::OnMessage : To XBMC.RunScript(special://skin/scripts/RecentlyAdded.py,limit=4)
  75. 20:50:46 M: 27602944 INFO: initializing python engine.
  76. 20:50:46 M: 27602944 DEBUG: LoadLibraryA('python24.dll')
  77. 20:50:46 M: 26480640 DEBUG: LoadLibrary('python24.dll') returning: 00EE03D0
  78. 20:50:46 M: 26480640 DEBUG: dllGetProcAddress(00819300(kernel32.dll), 'InterlockedCompareExchange') => 000D1C44
  79. 20:50:46 M: 26214400 DEBUG: GetModuleFileNameA(00000000, 1E102490, 256) => 'xbmc.xbe'
  80. 20:50:46 M: 26214400 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  81. 20:50:46 M: 26214400 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  82. 20:50:46 M: 26157056 DEBUG: LoadLibraryExA called with flags:
  83. - LOAD_WITH_ALTERED_SEARCH_PATH
  84. 20:50:46 M: 26157056 DEBUG: LoadLibraryA('zlib.pyd')
  85. 20:50:46 M: 26087424 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  86. 20:50:46 M: 26087424 DEBUG: LoadLibrary('zlib.pyd') returning: 00ECBAB0
  87. 20:50:46 M: 26087424 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  88. 20:50:46 M: 25202688 NOTICE: -->Python Initialized<--
  89. 20:50:46 M: 25202688 NOTICE:
  90. 20:50:46 M: 25202688 DEBUG: new python thread created. id=2
  91. 20:50:46 M: 24678400 DEBUG: CApplication::OnMessage : Translating SetFocus(9000)
  92. 20:50:46 M: 24678400 DEBUG: Python thread: start processing
  93. 20:50:46 M: 24678400 DEBUG: CApplication::OnMessage : To SetFocus(9000)
  94. 20:50:46 M: 24678400 DEBUG: XBPyThread::Process - The source file to load is special://skin/scripts/RecentlyAdded.py
  95. 20:50:46 M: 24678400 DEBUG: XBPyThread::Process - Setting the Python path to Q:\skin\MediaStream_Redux\scripts;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  96. 20:50:46 M: 24678400 DEBUG: XBPyThread::Process - Entering source directory Q:\skin\MediaStream_Redux\scripts
  97. 20:50:47 M: 23846912 DEBUG: LoadLibraryExA called with flags:
  98. - LOAD_WITH_ALTERED_SEARCH_PATH
  99. 20:50:47 M: 23846912 DEBUG: LoadLibraryA('_socket.pyd')
  100. 20:50:47 M: 23797760 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  101. 20:50:47 M: 23797760 DEBUG: LoadLibrary('_socket.pyd') returning: 00EFF2F0
  102. 20:50:47 M: 23797760 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  103. 20:50:47 M: 23773184 DEBUG: LoadLibraryExA called with flags:
  104. - LOAD_WITH_ALTERED_SEARCH_PATH
  105. 20:50:47 M: 23773184 DEBUG: LoadLibraryA('_ssl.pyd')
  106. 20:50:47 M: 23273472 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  107. 20:50:47 M: 23273472 DEBUG: LoadLibrary('_ssl.pyd') returning: 00F10540
  108. 20:50:47 M: 23273472 DEBUG: dllGetProcAddress(02180000(_ssl.pyd), 'init_ssl') => 02181820
  109. 20:50:47 M: 23257088 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  110. 20:50:47 M: 23248896 DEBUG: HttpApi Start command: SetResponseFormat paras: SetResponseFormat; OpenRecord;<record>
  111. 20:50:47 M: 23248896 DEBUG: HttpApi Start command: SetResponseFormat paras: SetResponseFormat; CloseRecord;</record>
  112. 20:50:47 M: 23248896 DEBUG: HttpApi Start command: QueryVideoDatabase paras: QueryVideoDatabase; select * from movieview order by idMovie desc limit 4
  113. 20:50:47 M: 23232512 DEBUG: HttpApi Start command: QueryVideoDatabase paras: QueryVideoDatabase; select * from episodeview order by idepisode desc limit 4
  114. 20:50:47 M: 23228416 INFO: Scriptresult: Succes
  115. 20:50:47 M: 23228416 INFO: Python script stopped
  116. 20:50:47 M: 23752704 DEBUG: python thread 2 destructed
  117. 20:50:47 M: 23752704 INFO: Python, unloading python24.dll because no scripts are running anymore
  118. 20:50:47 M: 23916544 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 02180000): Detected memory leaks: 1647 leaks
  119. 20:50:47 M: 23920640 DEBUG: leak caller address 0218489B, size 20064, counter 1645
  120. 20:50:47 M: 23920640 DEBUG: leak caller address 021848B0, size 4224, counter 2
  121. 20:50:47 M: 23920640 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  122. 20:50:47 M: 24428544 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 198 leaks
  123. 20:50:47 M: 26423296 DEBUG: leak caller address 1E046F57, size 167616, counter 48
  124. 20:50:47 M: 26423296 DEBUG: leak caller address 1E058C2C, size 233, counter 1
  125. 20:50:47 M: 26423296 DEBUG: leak caller address 1E05CDDB, size 29640, counter 30
  126. 20:50:47 M: 26423296 DEBUG: leak caller address 1E05E5EF, size 1976, counter 2
  127. 20:50:47 M: 26423296 DEBUG: leak caller address 1E060EA5, size 328, counter 7
  128. 20:50:47 M: 26423296 DEBUG: leak caller address 1E060F81, size 80, counter 4
  129. 20:50:47 M: 26423296 DEBUG: leak caller address 1E072C5F, size 1835008, counter 7
  130. 20:50:47 M: 26423296 DEBUG: leak caller address 1E072CAC, size 64, counter 1
  131. 20:50:47 M: 26423296 DEBUG: leak caller address 1E072E88, size 29917, counter 41
  132. 20:50:47 M: 26423296 DEBUG: leak caller address 1E072FC9, size 2053, counter 48
  133. 20:50:47 M: 26423296 DEBUG: leak caller address 1E091E3F, size 640, counter 3
  134. 20:50:47 M: 26423296 DEBUG: leak caller address 1E093BEC, size 72, counter 6
  135. 20:50:47 M: 26423296 DEBUG: python24.dll: Total bytes leaked: 2067627
  136. 20:50:48 M: 29925376 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  137. 20:50:49 M: 27586560 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  138. 20:50:51 M: 25231360 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  139. 20:50:52 M: 24903680 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  140. 20:50:55 M: 27258880 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  141. 20:50:56 M: 27054080 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  142. 20:50:56 M: 22564864 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  143. 20:50:57 M: 20848640 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  144. 20:50:57 M: 25886720 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  145. 20:50:58 M: 24158208 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  146. 20:50:59 M: 24616960 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  147. 20:50:59 M: 24616960 DEBUG: CApplication::OnMessage : Translating ActivateWindow(Scripts)
  148. 20:50:59 M: 24616960 DEBUG: CApplication::OnMessage : To ActivateWindow(Scripts)
  149. 20:50:59 M: 24616960 DEBUG: Activating window ID: 10020
  150. 20:50:59 M: 24616960 DEBUG: Checking if window ID 10020 is locked.
  151. 20:50:59 M: 31096832 INFO: Loading skin file: MyScripts.xml
  152. 20:50:59 M: 31080448 DEBUG: Load MyScripts.xml: 122.93ms
  153. 20:50:59 M: 30760960 DEBUG: Alloc resources: 197.52ms (123.42 ms skin load, 0.00 ms preload)
  154. 20:50:59 M: 30760960 DEBUG: CGUIMediaWindow::GetDirectory (Q:\scripts)
  155. 20:50:59 M: 30760960 DEBUG: ParentPath = []
  156. 20:51:00 M: 30760960 DEBUG: CFileItemList::Sort, sorting took 0 millis
  157. 20:51:00 M: 25550848 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://xoap.weather.com (easy=00DEB190, multi=00E24010)
  158. 20:51:01 M: 25587712 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  159. 20:51:01 M: 25063424 DEBUG: msg: Error loading jpeg - no SOI marker found in first 4096 bytes
  160. 20:51:01 M: 25063424 DEBUG: msg: Error loading jpeg - no SOI marker found in first 4096 bytes
  161. 20:51:01 M: 24907776 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  162. 20:51:01 M: 24817664 INFO: msg: Corrupt JPEG data: 77 extraneous bytes before marker 0x43
  163. 20:51:01 M: 24817664 INFO: msg: Corrupt JPEG data: 77 extraneous bytes before marker 0x43
  164. 20:51:01 M: 28131328 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  165. 20:51:02 M: 28131328 DEBUG: msg: Error loading jpeg - no SOI marker found in first 4096 bytes
  166. 20:51:02 M: 28131328 DEBUG: msg: Error loading jpeg - no SOI marker found in first 4096 bytes
  167. 20:51:02 M: 27975680 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  168. 20:51:02 M: 27975680 INFO: initializing python engine.
  169. 20:51:02 M: 27975680 DEBUG: LoadLibraryA('python24.dll')
  170. 20:51:02 M: 26853376 DEBUG: LoadLibrary('python24.dll') returning: 01C4AF30
  171. 20:51:02 M: 26853376 DEBUG: dllGetProcAddress(00819300(kernel32.dll), 'InterlockedCompareExchange') => 000D1C44
  172. 20:51:02 M: 26587136 DEBUG: GetModuleFileNameA(00000000, 1E102490, 256) => 'xbmc.xbe'
  173. 20:51:02 M: 26587136 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  174. 20:51:02 M: 26587136 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  175. 20:51:02 M: 26529792 DEBUG: LoadLibraryExA called with flags:
  176. - LOAD_WITH_ALTERED_SEARCH_PATH
  177. 20:51:02 M: 26529792 DEBUG: LoadLibraryA('zlib.pyd')
  178. 20:51:02 M: 26460160 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  179. 20:51:02 M: 26460160 DEBUG: LoadLibrary('zlib.pyd') returning: 00E98780
  180. 20:51:02 M: 26460160 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  181. 20:51:03 M: 25563136 NOTICE: -->Python Initialized<--
  182. 20:51:03 M: 25563136 NOTICE:
  183. 20:51:03 M: 25563136 DEBUG: new python thread created. id=3
  184. 20:51:03 M: 25219072 DEBUG: CGUIMediaWindow::GetDirectory (Q:\scripts)
  185. 20:51:03 M: 25219072 DEBUG: Python thread: start processing
  186. 20:51:03 M: 25219072 DEBUG: ParentPath = [Q:\scripts]
  187. 20:51:03 M: 25219072 DEBUG: XBPyThread::Process - The source file to load is Q:\scripts\Home Theater Experience\default.py
  188. 20:51:03 M: 25219072 DEBUG: XBPyThread::Process - Setting the Python path to Q:\scripts\Home Theater Experience;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  189. 20:51:03 M: 25219072 DEBUG: XBPyThread::Process - Entering source directory Q:\scripts\Home Theater Experience
  190. 20:51:03 M: 25182208 INFO: Loading skin file: DialogProgress.xml
  191. 20:51:03 M: 25190400 DEBUG: Load DialogProgress.xml: 28.37ms
  192. 20:51:03 M: 25239552 DEBUG: CFileItemList::Sort, sorting took 0 millis
  193. 20:51:03 M: 25051136 DEBUG: Alloc resources: 0.12ms (0.00 ms skin load, 0.00 ms preload)
  194. 20:51:04 M: 23863296 DEBUG: LoadLibraryExA called with flags:
  195. - LOAD_WITH_ALTERED_SEARCH_PATH
  196. 20:51:04 M: 23863296 DEBUG: LoadLibraryA('_socket.pyd')
  197. 20:51:04 M: 23814144 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  198. 20:51:04 M: 23814144 DEBUG: LoadLibrary('_socket.pyd') returning: 00F2CD60
  199. 20:51:04 M: 23814144 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  200. 20:51:04 M: 23797760 DEBUG: LoadLibraryExA called with flags:
  201. - LOAD_WITH_ALTERED_SEARCH_PATH
  202. 20:51:04 M: 23797760 DEBUG: LoadLibraryA('_ssl.pyd')
  203. 20:51:04 M: 23298048 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  204. 20:51:04 M: 23298048 DEBUG: LoadLibrary('_ssl.pyd') returning: 00E3FF10
  205. 20:51:04 M: 23298048 DEBUG: dllGetProcAddress(02180000(_ssl.pyd), 'init_ssl') => 02181820
  206. 20:51:04 M: 23166976 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  207. 20:51:04 M: 23093248 DEBUG: dllGetProcAddress(00819B88(advapi32.dll), 'CryptAcquireContextA') => 00241EAA
  208. 20:51:04 M: 23072768 DEBUG: dllGetProcAddress(00819B88(advapi32.dll), 'CryptGenRandom') => 0023F2F7
  209. 20:51:04 M: 23072768 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  210. 20:51:04 M: 23339008 NOTICE: Traceback (most recent call last):
  211. 20:51:04 M: 23339008 NOTICE: File "Q:\scripts\Home Theater Experience\default.py", line 11, in ?
  212. 20:51:04 M: 23339008 NOTICE:
  213. 20:51:04 M: 23339008 NOTICE: script.Main()
  214. 20:51:04 M: 23339008 NOTICE: File "Q:\scripts\Home Theater Experience\resources\lib\xbmcscript_player.py", line 45, in __init__
  215. 20:51:04 M: 23339008 NOTICE:
  216. 20:51:04 M: 23339008 NOTICE: playlist = self._create_playlist()
  217. 20:51:04 M: 23339008 NOTICE: File "Q:\scripts\Home Theater Experience\resources\lib\xbmcscript_player.py", line 141, in _create_playlist
  218. 20:51:04 M: 23339008 NOTICE:
  219. 20:51:04 M: 23339008 NOTICE: Scraper = scraper.Main( mpaa, genre, self.settings, movie )
  220. 20:51:04 M: 23339008 NOTICE: UnboundLocalError
  221. 20:51:04 M: 23339008 NOTICE: :
  222. 20:51:04 M: 23339008 NOTICE: local variable 'movie' referenced before assignment
  223. 20:51:04 M: 23339008 NOTICE:
  224. 20:51:04 M: 23339008 ERROR: Scriptresult: Error
  225. 20:51:04 M: 23339008 INFO: Loading skin file: DialogOK.xml
  226. 20:51:04 M: 23339008 DEBUG: Load DialogOK.xml: 29.17ms
  227. 20:51:04 M: 23339008 DEBUG: Alloc resources: 0.09ms (0.00 ms skin load, 0.00 ms preload)
  228. 20:51:07 M: 23863296 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  229. 20:51:07 M: 23863296 INFO: Python script stopped
  230. 20:51:07 M: 24387584 DEBUG: python thread 3 destructed
  231. 20:51:07 M: 24387584 INFO: Python, unloading python24.dll because no scripts are running anymore
  232. 20:51:07 M: 24621056 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 02180000): Detected memory leaks: 1647 leaks
  233. 20:51:07 M: 24621056 DEBUG: leak caller address 0218489B, size 20064, counter 1645
  234. 20:51:07 M: 24621056 DEBUG: leak caller address 021848B0, size 4224, counter 2
  235. 20:51:07 M: 24621056 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  236. 20:51:07 M: 25243648 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 263 leaks
  237. 20:51:07 M: 27238400 DEBUG: leak caller address 1E046F57, size 170688, counter 52
  238. 20:51:07 M: 27238400 DEBUG: leak caller address 1E04FF6B, size 1000, counter 1
  239. 20:51:07 M: 27238400 DEBUG: leak caller address 1E058C2C, size 233, counter 1
  240. 20:51:07 M: 27238400 DEBUG: leak caller address 1E05CDDB, size 32604, counter 33
  241. 20:51:07 M: 27238400 DEBUG: leak caller address 1E05E5EF, size 1976, counter 2
  242. 20:51:07 M: 27238400 DEBUG: leak caller address 1E060EA5, size 360, counter 9
  243. 20:51:07 M: 27238400 DEBUG: leak caller address 1E060F81, size 80, counter 4
  244. 20:51:07 M: 27238400 DEBUG: leak caller address 1E072C5F, size 1835008, counter 7
  245. 20:51:07 M: 27238400 DEBUG: leak caller address 1E072CAC, size 64, counter 1
  246. 20:51:07 M: 27238400 DEBUG: leak caller address 1E072E88, size 39560, counter 62
  247. 20:51:07 M: 27238400 DEBUG: leak caller address 1E072FC9, size 3443, counter 82
  248. 20:51:07 M: 27238400 DEBUG: leak caller address 1E091E3F, size 640, counter 3
  249. 20:51:07 M: 27238400 DEBUG: leak caller address 1E093BEC, size 72, counter 6
  250. 20:51:07 M: 27238400 DEBUG: python24.dll: Total bytes leaked: 2085728
  251. 20:51:07 M: 28667904 DEBUG: CGUIMediaWindow::GetDirectory (Q:\scripts)
  252. 20:51:07 M: 28667904 DEBUG: ParentPath = [Q:\scripts]
  253. 20:51:07 M: 28667904 DEBUG: CFileItemList::Sort, sorting took 0 millis
  254. 20:51:12 M: 28753920 DEBUG: CApplication::OnKey: 275 pressed, action is 10
  255. 20:51:12 M: 28753920 DEBUG: CGUIWindowManager::PreviousWindow: Deactivate
  256. 20:51:13 M: 34078720 DEBUG: CGUIWindowManager::PreviousWindow: Activate new
  257. 20:51:13 M: 34078720 INFO: Loading skin file: Home.xml
  258. 20:51:13 M: 33837056 DEBUG: Load Home.xml: 180.50ms
  259. 20:51:13 M: 33763328 DEBUG: Alloc resources: 191.37ms (181.00 ms skin load, 0.00 ms preload)
  260. 20:51:13 M: 30404608 DEBUG: CApplication::OnMessage : Translating XBMC.RunScript(special://skin/scripts/RecentlyAdded.py,limit=4)
  261. 20:51:13 M: 30404608 DEBUG: CApplication::OnMessage : To XBMC.RunScript(special://skin/scripts/RecentlyAdded.py,limit=4)
  262. 20:51:13 M: 30404608 INFO: initializing python engine.
  263. 20:51:13 M: 30404608 DEBUG: LoadLibraryA('python24.dll')
  264. 20:51:13 M: 29282304 DEBUG: LoadLibrary('python24.dll') returning: 00EBC1C0
  265. 20:51:13 M: 29282304 DEBUG: dllGetProcAddress(00819300(kernel32.dll), 'InterlockedCompareExchange') => 000D1C44
  266. 20:51:13 M: 29016064 DEBUG: GetModuleFileNameA(00000000, 1E102490, 256) => 'xbmc.xbe'
  267. 20:51:13 M: 29016064 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  268. 20:51:13 M: 29016064 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  269. 20:51:13 M: 28958720 DEBUG: LoadLibraryExA called with flags:
  270. - LOAD_WITH_ALTERED_SEARCH_PATH
  271. 20:51:13 M: 28958720 DEBUG: LoadLibraryA('zlib.pyd')
  272. 20:51:13 M: 28889088 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  273. 20:51:13 M: 28889088 DEBUG: LoadLibrary('zlib.pyd') returning: 00F6A440
  274. 20:51:13 M: 28889088 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  275. 20:51:13 M: 28016640 NOTICE: -->Python Initialized<--
  276. 20:51:13 M: 28016640 NOTICE:
  277. 20:51:13 M: 28016640 DEBUG: new python thread created. id=4
  278. 20:51:13 M: 27492352 DEBUG: CApplication::OnMessage : Translating SetFocus(9000)
  279. 20:51:13 M: 27492352 DEBUG: Python thread: start processing
  280. 20:51:13 M: 27492352 DEBUG: CApplication::OnMessage : To SetFocus(9000)
  281. 20:51:13 M: 27492352 DEBUG: XBPyThread::Process - The source file to load is special://skin/scripts/RecentlyAdded.py
  282. 20:51:13 M: 27492352 DEBUG: XBPyThread::Process - Setting the Python path to Q:\skin\MediaStream_Redux\scripts;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  283. 20:51:13 M: 27492352 DEBUG: XBPyThread::Process - Entering source directory Q:\skin\MediaStream_Redux\scripts
  284. 20:51:14 M: 26656768 DEBUG: LoadLibraryExA called with flags:
  285. - LOAD_WITH_ALTERED_SEARCH_PATH
  286. 20:51:14 M: 26656768 DEBUG: LoadLibraryA('_socket.pyd')
  287. 20:51:14 M: 26607616 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  288. 20:51:14 M: 26607616 DEBUG: LoadLibrary('_socket.pyd') returning: 00E96570
  289. 20:51:14 M: 26607616 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  290. 20:51:14 M: 26583040 DEBUG: LoadLibraryExA called with flags:
  291. - LOAD_WITH_ALTERED_SEARCH_PATH
  292. 20:51:14 M: 26583040 DEBUG: LoadLibraryA('_ssl.pyd')
  293. 20:51:14 M: 26083328 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  294. 20:51:14 M: 26083328 DEBUG: LoadLibrary('_ssl.pyd') returning: 00F60880
  295. 20:51:14 M: 26083328 DEBUG: dllGetProcAddress(02180000(_ssl.pyd), 'init_ssl') => 02181820
  296. 20:51:14 M: 26066944 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  297. 20:51:14 M: 26050560 DEBUG: HttpApi Start command: SetResponseFormat paras: SetResponseFormat; OpenRecord;<record>
  298. 20:51:14 M: 26050560 DEBUG: HttpApi Start command: SetResponseFormat paras: SetResponseFormat; CloseRecord;</record>
  299. 20:51:14 M: 26050560 DEBUG: HttpApi Start command: QueryVideoDatabase paras: QueryVideoDatabase; select * from movieview order by idMovie desc limit 4
  300. 20:51:14 M: 26050560 DEBUG: HttpApi Start command: QueryVideoDatabase paras: QueryVideoDatabase; select * from episodeview order by idepisode desc limit 4
  301. 20:51:15 M: 26013696 INFO: Scriptresult: Succes
  302. 20:51:15 M: 26013696 INFO: Python script stopped
  303. 20:51:15 M: 26537984 DEBUG: python thread 4 destructed
  304. 20:51:15 M: 26537984 INFO: Python, unloading python24.dll because no scripts are running anymore
  305. 20:51:15 M: 26718208 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 02180000): Detected memory leaks: 1647 leaks
  306. 20:51:15 M: 26722304 DEBUG: leak caller address 0218489B, size 20064, counter 1645
  307. 20:51:15 M: 26722304 DEBUG: leak caller address 021848B0, size 4224, counter 2
  308. 20:51:15 M: 26722304 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  309. 20:51:15 M: 27246592 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 198 leaks
  310. 20:51:15 M: 29220864 DEBUG: leak caller address 1E046F57, size 167616, counter 48
  311. 20:51:15 M: 29220864 DEBUG: leak caller address 1E058C2C, size 233, counter 1
  312. 20:51:15 M: 29220864 DEBUG: leak caller address 1E05CDDB, size 29640, counter 30
  313. 20:51:15 M: 29220864 DEBUG: leak caller address 1E05E5EF, size 1976, counter 2
  314. 20:51:15 M: 29220864 DEBUG: leak caller address 1E060EA5, size 328, counter 7
  315. 20:51:15 M: 29220864 DEBUG: leak caller address 1E060F81, size 80, counter 4
  316. 20:51:15 M: 29220864 DEBUG: leak caller address 1E072C5F, size 1835008, counter 7
  317. 20:51:15 M: 29220864 DEBUG: leak caller address 1E072CAC, size 64, counter 1
  318. 20:51:15 M: 29220864 DEBUG: leak caller address 1E072E88, size 29917, counter 41
  319. 20:51:15 M: 29220864 DEBUG: leak caller address 1E072FC9, size 2053, counter 48
  320. 20:51:15 M: 29220864 DEBUG: leak caller address 1E091E3F, size 640, counter 3
  321. 20:51:15 M: 29220864 DEBUG: leak caller address 1E093BEC, size 72, counter 6
  322. 20:51:15 M: 29220864 DEBUG: python24.dll: Total bytes leaked: 2067627
  323. 20:51:15 M: 30384128 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  324. 20:51:15 M: 27013120 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  325. 20:51:16 M: 27176960 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  326. 20:51:16 M: 25427968 DEBUG: CApplication::OnKey: 270 pressed, action is 3
  327. 20:51:16 M: 28176384 DEBUG: CApplication::OnKey: 270 pressed, action is 3
  328. 20:51:17 M: 23072768 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  329. 20:51:17 M: 23072768 DEBUG: CApplication::OnMessage : Translating ActivateWindow(Settings)
  330. 20:51:17 M: 23072768 DEBUG: CApplication::OnMessage : To ActivateWindow(Settings)
  331. 20:51:17 M: 23072768 DEBUG: Activating window ID: 10004
  332. 20:51:17 M: 23072768 DEBUG: Checking if window ID 10004 is locked.
  333. 20:51:17 M: 28954624 INFO: Loading skin file: Settings.xml
  334. 20:51:17 M: 28954624 DEBUG: Load Settings.xml: 20.38ms
  335. 20:51:17 M: 28954624 DEBUG: Alloc resources: 20.92ms (20.90 ms skin load, 0.00 ms preload)
  336. 20:51:18 M: 21532672 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  337. 20:51:18 M: 21532672 DEBUG: CApplication::OnMessage : Translating ActivateWindow(SystemSettings)
  338. 20:51:18 M: 21532672 DEBUG: CApplication::OnMessage : To ActivateWindow(SystemSettings)
  339. 20:51:18 M: 21532672 DEBUG: Activating window ID: 10016
  340. 20:51:18 M: 21532672 DEBUG: Checking if window ID 10016 is locked.
  341. 20:51:18 M: 26517504 INFO: Loading skin file: SettingsCategory.xml
  342. 20:51:18 M: 26517504 DEBUG: Load SettingsCategory.xml: 19.77ms
  343. 20:51:18 M: 26324992 DEBUG: Alloc resources: 50.16ms (20.23 ms skin load, 0.00 ms preload)
  344. 20:51:19 M: 26161152 DEBUG: CApplication::OnKey: 273 pressed, action is 2
  345. 20:51:20 M: 26161152 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  346. 20:51:20 M: 26161152 NOTICE: Disabled debug logging due to GUI setting
  347. 20:51:22 M: 25255936 NOTICE: -->Python Initialized<--
  348. 20:51:22 M: 25255936 NOTICE:
  349.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement