Advertisement
Guest User

LiveOnlineFooty.com_XBOX

a guest
May 30th, 2011
176
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 40.35 KB | None | 0 0
  1. 18:49:11 M:124416000 NOTICE: -----------------------------------------------------------------------
  2. 18:49:11 M:124395520 NOTICE: Starting XBMC4Xbox. Built on May 16 2011 (SVN:30850, compiler 1310)
  3. 18:49:11 M:124395520 NOTICE: special://xbmc/ is mapped to: Q:\
  4. 18:49:11 M:124395520 NOTICE: special://masterprofile/ is mapped to: q:\UserData
  5. 18:49:11 M:124395520 NOTICE: special://home/ is mapped to: Q:\
  6. 18:49:11 M:124395520 NOTICE: special://temp/ is mapped to: Z:\
  7. 18:49:11 M:124395520 NOTICE: The executable running is: E:\XBMC\default.xbe
  8. 18:49:11 M:124395520 NOTICE: Log File is located: Q:\xbmc.log
  9. 18:49:11 M:124395520 NOTICE: -----------------------------------------------------------------------
  10. 18:49:11 M:124395520 NOTICE: Unmapped drive T
  11. 18:49:11 M:124395520 NOTICE: Mapping drive T to Harddisk0\Partition1\XBMC\UserData
  12. 18:49:11 M:124395520 NOTICE: Setup DirectX
  13. 18:49:12 M:124370944 NOTICE: Mapping drive C to Harddisk0\Partition2
  14. 18:49:12 M:124370944 NOTICE: Mapping drive E to Harddisk0\Partition1
  15. 18:49:12 M:124370944 NOTICE: Unmapped drive D
  16. 18:49:12 M:124370944 NOTICE: Mapping drive D to Cdrom0
  17. 18:49:13 M:124370944 NOTICE: map extended drive F:
  18. 18:49:13 M:124370944 NOTICE: Mapping drive F to Harddisk0\Partition6
  19. 18:49:14 M:124366848 NOTICE: map extended drive G:
  20. 18:49:14 M:124366848 NOTICE: Mapping drive G to Harddisk0\Partition7
  21. 18:49:14 M:124366848 NOTICE: Mapping drive X to Harddisk0\Partition3
  22. 18:49:14 M:124366848 NOTICE: Mapping drive Y to Harddisk0\Partition4
  23. 18:49:14 M:124366848 NOTICE: Unmapped drive Z
  24. 18:49:14 M:124366848 NOTICE: Mapping drive Z to Harddisk0\Partition5
  25. 18:49:14 M:124366848 NOTICE: load settings...
  26. 18:49:14 M:124366848 NOTICE: Mapping drive P to Harddisk0\Partition1\XBMC\UserData
  27. 18:49:14 M:124366848 NOTICE: special://profile/ is mapped to: q:\UserData
  28. 18:49:14 M:124366848 NOTICE: loading special://masterprofile/guisettings.xml
  29. 18:49:14 M:124092416 NOTICE: Getting hardware information now...
  30. 18:49:14 M:124092416 NOTICE: Checking resolution 1
  31. 18:49:14 M:124092416 NOTICE: Loading player core factory settings from special://xbmc/system/playercorefactory.xml.
  32. 18:49:14 M:124071936 NOTICE: Loaded playercorefactory configuration
  33. 18:49:14 M:124071936 NOTICE: Loading player core factory settings from special://masterprofile/playercorefactory.xml.
  34. 18:49:14 M:124071936 NOTICE: special://masterprofile/playercorefactory.xml does not exist. Skipping.
  35. 18:49:14 M:124071936 NOTICE: No advancedsettings.xml to load (special://masterprofile/advancedsettings.xml)
  36. 18:49:14 M:124071936 NOTICE: Default Video Player: dvdplayer
  37. 18:49:14 M:124071936 NOTICE: Default Audio Player: paplayer
  38. 18:49:14 M:124071936 NOTICE: Per AV pack settings are off
  39. 18:49:14 M:124284928 NOTICE: q:\UserData\sources.xml
  40. 18:49:14 M:124284928 ERROR: Missing or invalid <name> and/or <path> in source
  41. 18:49:15 M:113713152 NOTICE: Network: Using dashboard IP settings
  42. 18:49:15 M:113381376 NOTICE: Checking the Date!
  43. 18:49:15 M:113381376 NOTICE: - The Date is Wrong: Setting New Date!
  44. 12:00:15 M:113381376 NOTICE: - New Date is now: 5-1-2004
  45. 12:00:15 M:113381376 NOTICE: start dvd mediatype detection
  46. 12:00:15 M:113315840 NOTICE: initializing playlistplayer
  47. 12:00:15 M:113315840 NOTICE: DONE initializing playlistplayer
  48. 12:00:15 M:113315840 NOTICE: start fancontroller
  49. 12:00:15 M:112783360 NOTICE: load default skin:[Confluence]
  50. 12:00:17 M:105656320 NOTICE: initialize done
  51. 12:00:17 M:105656320 NOTICE: Running the application...
  52. 12:00:18 M: 94851072 NOTICE: -->Python Initialized<--
  53. 12:00:18 M: 94306304 NOTICE: XBFileZilla: Starting...
  54. 12:00:18 M: 94240768 NOTICE: ES: Starting event server
  55. 12:00:18 M: 93175808 NOTICE: ES: Starting UDP Event server on 0.0.0.0:9777
  56. 12:00:18 M: 93102080 NOTICE: UDP: Listening on port 9777
  57. 12:00:19 M: 84074496 NOTICE: XBFileZilla: Started
  58. 12:00:21 M: 93122560 WARNING: XFILE::CFileCurl::CReadState::FillBuffer: curl failed with code 22
  59. 12:00:21 M: 93122560 ERROR: CFileCurl::CReadState::Open, didn't get any data from stream.
  60. 12:00:22 M: 93122560 WARNING: XFILE::CFileCurl::CReadState::FillBuffer: curl failed with code 22
  61. 12:00:22 M: 93122560 ERROR: CFileCurl::CReadState::Open, didn't get any data from stream.
  62. 12:00:22 M: 93122560 WARNING: XFILE::CFileCurl::CReadState::FillBuffer: curl failed with code 22
  63. 12:00:22 M: 93122560 ERROR: CFileCurl::CReadState::Open, didn't get any data from stream.
  64. 12:26:59 M: 96178176 NOTICE: Enabled debug logging due to GUI setting
  65. 12:26:59 M: 96190464 DEBUG: CApplication::OnKey: 275 pressed, action is 10
  66. 12:26:59 M: 96182272 DEBUG: CGUIWindowManager::PreviousWindow: Deactivate
  67. 12:26:59 M: 96182272 DEBUG: ------ Window Deinit (SettingsCategory.xml) ------
  68. 12:27:00 M:100421632 DEBUG: CGUIWindowManager::PreviousWindow: Activate new
  69. 12:27:00 M:100421632 DEBUG: ------ Window Init (Settings.xml) ------
  70. 12:27:00 M:100421632 INFO: Loading skin file: Settings.xml
  71. 12:27:00 M: 94650368 DEBUG: CApplication::OnKey: 275 pressed, action is 10
  72. 12:27:00 M: 94642176 DEBUG: CGUIWindowManager::PreviousWindow: Deactivate
  73. 12:27:00 M: 94642176 DEBUG: ------ Window Deinit (Settings.xml) ------
  74. 12:27:00 M: 97820672 DEBUG: CGUIWindowManager::PreviousWindow: Activate new
  75. 12:27:00 M: 97820672 DEBUG: ------ Window Init (Home.xml) ------
  76. 12:27:00 M: 97820672 INFO: Loading skin file: Home.xml
  77. 12:27:01 M: 93003776 DEBUG: CApplication::OnMessage : Translating XBMC.RunScript(special://skin/scripts/RecentlyAdded.py,limit=4)
  78. 12:27:01 M: 93003776 DEBUG: CApplication::OnMessage : To XBMC.RunScript(special://skin/scripts/RecentlyAdded.py,limit=4)
  79. 12:27:01 M: 93003776 INFO: initializing python engine.
  80. 12:27:01 M: 93003776 DEBUG: LoadLibraryA('python24.dll')
  81. 12:27:01 M: 91877376 DEBUG: LoadLibrary('python24.dll') returning: 00F30FB0
  82. 12:27:01 M: 91877376 DEBUG: dllGetProcAddress(007D3558(kernel32.dll), 'InterlockedCompareExchange') => 0027BCF4
  83. 12:27:01 M: 91602944 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  84. 12:27:01 M: 91602944 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  85. Previous line repeats 1 times.
  86. 12:27:01 M: 91541504 DEBUG: LoadLibraryExA called with flags:
  87. - LOAD_WITH_ALTERED_SEARCH_PATH
  88. 12:27:01 M: 91545600 DEBUG: LoadLibraryA('zlib.pyd')
  89. 12:27:01 M: 91475968 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  90. 12:27:01 M: 91475968 DEBUG: LoadLibrary('zlib.pyd') returning: 00F28D50
  91. 12:27:01 M: 91475968 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  92. 12:27:01 M: 90558464 NOTICE: -->Python Initialized<--
  93. 12:27:01 M: 90558464 DEBUG: new python thread created. id=2
  94. 12:27:01 M: 90034176 DEBUG: CApplication::OnMessage : Translating SetFocus(9000)
  95. 12:27:01 M: 90034176 DEBUG: Python thread: start processing
  96. 12:27:01 M: 90034176 DEBUG: CApplication::OnMessage : To SetFocus(9000)
  97. 12:27:01 M: 90042368 DEBUG: XBPyThread::Process - The source file to load is special://skin/scripts/RecentlyAdded.py
  98. 12:27:01 M: 90038272 DEBUG: XBPyThread::Process - Setting the Python path to Q:\skin\Confluence\scripts;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\CryptoPy\lib;Q:\scripts\.modules\Dialog Addon Scan\lib;Q:\scripts\.modules\Elementtree XML parser\lib;Q:\scripts\.modules\RSS Engine Addon\lib;Q:\scripts\.modules\simplejson\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  99. 12:27:01 M: 90042368 DEBUG: XBPyThread::Process - Entering source directory Q:\skin\Confluence\scripts
  100. 12:27:02 M: 88948736 DEBUG: LoadLibraryExA called with flags:
  101. - LOAD_WITH_ALTERED_SEARCH_PATH
  102. 12:27:02 M: 88948736 DEBUG: LoadLibraryA('_socket.pyd')
  103. 12:27:02 M: 88899584 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  104. 12:27:02 M: 88899584 DEBUG: LoadLibrary('_socket.pyd') returning: 014FC4E0
  105. 12:27:02 M: 88899584 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  106. 12:27:02 M: 88875008 DEBUG: LoadLibraryExA called with flags:
  107. - LOAD_WITH_ALTERED_SEARCH_PATH
  108. 12:27:02 M: 88875008 DEBUG: LoadLibraryA('_ssl.pyd')
  109. 12:27:02 M: 88375296 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  110. 12:27:02 M: 88375296 DEBUG: LoadLibrary('_ssl.pyd') returning: 01356800
  111. 12:27:02 M: 88375296 DEBUG: dllGetProcAddress(01BA0000(_ssl.pyd), 'init_ssl') => 01BA1820
  112. 12:27:02 M: 88367104 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  113. 12:27:02 M: 88338432 DEBUG: HttpApi Start command: SetResponseFormat paras: SetResponseFormat
  114. 12:27:02 M: 88338432 DEBUG: HttpApi Start command: SetResponseFormat paras: SetResponseFormat; OpenRecord;<record>
  115. 12:27:02 M: 88338432 DEBUG: HttpApi Start command: SetResponseFormat paras: SetResponseFormat; CloseRecord;</record>
  116. 12:27:02 M: 88330240 DEBUG: HttpApi Start command: QueryVideoDatabase paras: QueryVideoDatabase; select * from movieview order by idMovie desc limit 4
  117. 12:27:02 M: 88330240 DEBUG: HttpApi Start command: QueryVideoDatabase paras: QueryVideoDatabase; select * from episodeview order by idepisode desc limit 4
  118. 12:27:02 M: 88330240 INFO: Scriptresult: Success
  119. 12:27:02 M: 88330240 INFO: Python script stopped
  120. 12:27:02 M: 88854528 DEBUG: python thread 2 destructed
  121. 12:27:02 M: 88854528 INFO: Python, unloading python24.dll because no scripts are running anymore
  122. 12:27:02 M: 89067520 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01BA0000): Detected memory leaks: 1647 leaks
  123. 12:27:02 M: 89071616 DEBUG: leak caller address 01BA489B, size 20064, counter 1645
  124. 12:27:02 M: 89071616 DEBUG: leak caller address 01BA48B0, size 4224, counter 2
  125. 12:27:02 M: 89071616 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  126. 12:27:02 M: 89587712 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 203 leaks
  127. 12:27:02 M: 91865088 DEBUG: leak caller address 1E047413, size 168768, counter 48
  128. 12:27:02 M: 91865088 DEBUG: leak caller address 1E05928C, size 233, counter 1
  129. 12:27:02 M: 91865088 DEBUG: leak caller address 1E05D47B, size 33592, counter 34
  130. 12:27:02 M: 91865088 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  131. 12:27:02 M: 91865088 DEBUG: leak caller address 1E061589, size 328, counter 7
  132. 12:27:02 M: 91865088 DEBUG: leak caller address 1E06165A, size 80, counter 4
  133. 12:27:02 M: 91865088 DEBUG: leak caller address 1E07365F, size 2097152, counter 8
  134. 12:27:02 M: 91865088 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  135. 12:27:02 M: 91865088 DEBUG: leak caller address 1E073894, size 29856, counter 41
  136. 12:27:02 M: 91865088 DEBUG: leak caller address 1E0739DF, size 2053, counter 48
  137. 12:27:02 M: 91865088 DEBUG: leak caller address 1E092749, size 640, counter 3
  138. 12:27:02 M: 91865088 DEBUG: leak caller address 1E09457C, size 72, counter 6
  139. 12:27:02 M: 91865088 DEBUG: python24.dll: Total bytes leaked: 2334814
  140. 12:27:03 M: 93011968 DEBUG: CApplication::OnKey: 270 pressed, action is 3
  141. Previous line repeats 4 times.
  142. 12:27:05 M: 85946368 DEBUG: CApplication::OnKey: 273 pressed, action is 2
  143. 12:27:06 M: 88023040 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  144. Previous line repeats 1 times.
  145. 12:27:06 M: 88023040 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  146. 12:27:06 M: 88010752 DEBUG: CApplication::OnMessage : Translating ActivateWindow(VideoFiles,root)
  147. 12:27:06 M: 88010752 DEBUG: CApplication::OnMessage : To ActivateWindow(VideoFiles,root)
  148. 12:27:06 M: 88010752 DEBUG: Activating window ID: 10024
  149. 12:27:06 M: 88010752 DEBUG: Checking if window ID 10024 is locked.
  150. 12:27:06 M: 88010752 DEBUG: ------ Window Deinit (Home.xml) ------
  151. 12:27:07 M: 92872704 INFO: Attempting to quickpath to: root
  152. 12:27:07 M: 92872704 WARNING: CUtil::GetMatchingSource... no matching source found for [root]
  153. 12:27:07 M: 92872704 ERROR: Failed! Destination parameter (root) does not match a valid source!
  154. 12:27:07 M: 92860416 DEBUG: ------ Window Init (MyVideo.xml) ------
  155. 12:27:07 M: 92860416 INFO: Loading skin file: MyVideo.xml
  156. 12:27:07 M: 91914240 DEBUG: CGUIMediaWindow::GetDirectory ()
  157. 12:27:07 M: 91914240 DEBUG: ParentPath = []
  158. 12:27:07 M: 91914240 DEBUG: CFileItemList::Sort, sorting took 0 millis
  159. 12:27:08 M: 94064640 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  160. Previous line repeats 1 times.
  161. 12:27:09 M: 93798400 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  162. 12:27:09 M: 93876224 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/)
  163. 12:27:09 M: 93876224 DEBUG: ParentPath = []
  164. 12:27:09 M: 93876224 DEBUG: CFileItemList::Sort, sorting took 1 millis
  165. 12:27:09 M: 94818304 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  166. Previous line repeats 7 times.
  167. 12:27:11 M: 94162944 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  168. 12:27:11 M: 94240768 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/liveonlinefooty1.6/)
  169. 12:27:11 M: 94240768 DEBUG: ParentPath = [plugin://video/]
  170. 12:27:11 M: 94240768 DEBUG: DIRECTORY::CPluginDirectory::StartScript - URL for plugin settings: liveonlinefooty1.6/
  171. 12:27:11 M: 94240768 DEBUG: DIRECTORY::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/liveonlinefooty1.6/default.py('plugin://video/liveonlinefooty1.6/','0','')
  172. 12:27:11 M: 94240768 INFO: initializing python engine.
  173. 12:27:11 M: 94240768 DEBUG: LoadLibraryA('python24.dll')
  174. 12:27:11 M: 93114368 DEBUG: LoadLibrary('python24.dll') returning: 01399F50
  175. 12:27:11 M: 93114368 DEBUG: dllGetProcAddress(007D3558(kernel32.dll), 'InterlockedCompareExchange') => 0027BCF4
  176. 12:27:11 M: 92844032 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  177. 12:27:11 M: 92844032 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  178. Previous line repeats 1 times.
  179. 12:27:11 M: 92786688 DEBUG: LoadLibraryExA called with flags:
  180. - LOAD_WITH_ALTERED_SEARCH_PATH
  181. 12:27:11 M: 92786688 DEBUG: LoadLibraryA('zlib.pyd')
  182. 12:27:11 M: 92717056 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  183. 12:27:11 M: 92717056 DEBUG: LoadLibrary('zlib.pyd') returning: 01642E40
  184. 12:27:11 M: 92717056 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  185. 12:27:11 M: 91852800 NOTICE: -->Python Initialized<--
  186. 12:27:11 M: 91852800 DEBUG: new python thread created. id=3
  187. 12:27:11 M: 91328512 DEBUG: DIRECTORY::CPluginDirectory::WaitOnScriptResult - waiting on the liveonlinefooty1.6 plugin...
  188. 12:27:11 M: 91328512 DEBUG: Python thread: start processing
  189. 12:27:11 M: 91328512 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/liveonlinefooty1.6/default.py
  190. 12:27:11 M: 91328512 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\liveonlinefooty1.6;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\CryptoPy\lib;Q:\scripts\.modules\Dialog Addon Scan\lib;Q:\scripts\.modules\Elementtree XML parser\lib;Q:\scripts\.modules\RSS Engine Addon\lib;Q:\scripts\.modules\simplejson\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  191. 12:27:11 M: 91328512 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\liveonlinefooty1.6
  192. 12:27:12 M: 90251264 DEBUG: LoadLibraryExA called with flags:
  193. - LOAD_WITH_ALTERED_SEARCH_PATH
  194. 12:27:12 M: 90251264 DEBUG: LoadLibraryA('_socket.pyd')
  195. 12:27:12 M: 90202112 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  196. 12:27:12 M: 90202112 DEBUG: LoadLibrary('_socket.pyd') returning: 00F214E0
  197. 12:27:12 M: 90202112 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  198. 12:27:12 M: 90177536 DEBUG: LoadLibraryExA called with flags:
  199. - LOAD_WITH_ALTERED_SEARCH_PATH
  200. 12:27:12 M: 90177536 DEBUG: LoadLibraryA('_ssl.pyd')
  201. 12:27:12 M: 89677824 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  202. 12:27:12 M: 89677824 DEBUG: LoadLibrary('_ssl.pyd') returning: 0102E510
  203. 12:27:12 M: 89677824 DEBUG: dllGetProcAddress(01BA0000(_ssl.pyd), 'init_ssl') => 01BA1820
  204. 12:27:12 M: 89665536 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  205. 12:27:12 M: 89579520 DEBUG: dllGetProcAddress(007D3DE0(advapi32.dll), 'CryptAcquireContextA') => 00254F4B
  206. 12:27:12 M: 89579520 DEBUG: dllGetProcAddress(007D3DE0(advapi32.dll), 'CryptGenRandom') => 00254F5C
  207. 12:27:12 M: 89579520 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  208. 12:27:13 M: 88911872 INFO: Loading skin file: DialogProgress.xml
  209. 12:27:13 M: 85520384 DEBUG: ------ Window Init (DialogBusy.xml) ------
  210. 12:27:13 M: 85508096 INFO: Loading skin file: DialogBusy.xml
  211. 12:27:13 M: 85213184 DEBUG: ------ Window Init (DialogProgress.xml) ------
  212. 12:27:13 M: 89505792 DEBUG: ------ Window Deinit (DialogBusy.xml) ------
  213. 12:27:13 M: 88666112 DEBUG: LoadLibraryExA called with flags:
  214. - LOAD_WITH_ALTERED_SEARCH_PATH
  215. 12:27:13 M: 88670208 DEBUG: LoadLibraryA('pyexpat.pyd')
  216. 12:27:13 M: 88530944 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  217. 12:27:13 M: 88530944 DEBUG: LoadLibrary('pyexpat.pyd') returning: 00EE3840
  218. 12:27:13 M: 88530944 DEBUG: dllGetProcAddress(1D100000(pyexpat.pyd), 'initpyexpat') => 1D102350
  219. 12:27:13 M: 88518656 NOTICE: CWD: plugin://video/liveonlinefooty1.6
  220. 12:27:13 M: 88518656 NOTICE: CWD: plugin://video/liveonlinefooty1.6
  221. 12:27:13 M: 88498176 INFO: Scriptresult: Success
  222. 12:27:13 M: 88498176 DEBUG: DIRECTORY::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
  223. 12:27:13 M: 88498176 INFO: Python script stopped
  224. 12:27:13 M: 89042944 DEBUG: Saving fileitems [plugin://video/liveonlinefooty1.6/]
  225. 12:27:13 M: 89042944 DEBUG: -- items: 2, sort method: 0, ascending: false
  226. 12:27:14 M: 88670208 DEBUG: python thread 3 destructed
  227. 12:27:14 M: 88670208 INFO: Python, unloading python24.dll because no scripts are running anymore
  228. 12:27:14 M: 88907776 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01BA0000): Detected memory leaks: 1647 leaks
  229. 12:27:14 M: 88907776 DEBUG: leak caller address 01BA489B, size 20064, counter 1645
  230. 12:27:14 M: 88907776 DEBUG: leak caller address 01BA48B0, size 4224, counter 2
  231. 12:27:14 M: 88907776 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  232. 12:27:14 M: 89550848 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 538 leaks
  233. 12:27:14 M: 93130752 DEBUG: leak caller address 1E02169B, size 24, counter 1
  234. 12:27:14 M: 93130752 DEBUG: leak caller address 1E047413, size 497088, counter 94
  235. 12:27:14 M: 93130752 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  236. 12:27:14 M: 93130752 DEBUG: leak caller address 1E05928C, size 233, counter 1
  237. 12:27:14 M: 93130752 DEBUG: leak caller address 1E05D47B, size 41496, counter 42
  238. 12:27:14 M: 93130752 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  239. 12:27:14 M: 93130752 DEBUG: leak caller address 1E061589, size 592, counter 16
  240. 12:27:14 M: 93130752 DEBUG: leak caller address 1E06165A, size 80, counter 4
  241. 12:27:14 M: 93130752 DEBUG: leak caller address 1E07365F, size 3145728, counter 12
  242. 12:27:14 M: 93130752 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  243. 12:27:14 M: 93130752 DEBUG: leak caller address 1E073894, size 56225, counter 100
  244. 12:27:14 M: 93130752 DEBUG: leak caller address 1E0739DF, size 9139, counter 255
  245. 12:27:14 M: 93130752 DEBUG: leak caller address 1E092749, size 640, counter 3
  246. 12:27:14 M: 93130752 DEBUG: leak caller address 1E09457C, size 72, counter 6
  247. 12:27:14 M: 93130752 DEBUG: python24.dll: Total bytes leaked: 3754357
  248. 12:27:14 M: 94343168 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  249. 12:27:14 M: 94650368 DEBUG: CApplication::OnKey: 271 pressed, action is 4
  250. Previous line repeats 1 times.
  251. 12:27:16 M: 95182848 DEBUG: CApplication::OnKey: 256 pressed, action is 7
  252. 12:27:16 M: 95322112 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/liveonlinefooty1.6/?url=Settings&mode=3)
  253. 12:27:16 M: 95322112 DEBUG: ParentPath = [plugin://video/liveonlinefooty1.6/]
  254. 12:27:16 M: 95322112 DEBUG: DIRECTORY::CPluginDirectory::StartScript - URL for plugin settings: liveonlinefooty1.6/
  255. 12:27:16 M: 95322112 DEBUG: DIRECTORY::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/liveonlinefooty1.6/default.py('plugin://video/liveonlinefooty1.6/','0','?url=Settings&mode=3')
  256. 12:27:16 M: 95322112 INFO: initializing python engine.
  257. 12:27:16 M: 95322112 DEBUG: LoadLibraryA('python24.dll')
  258. 12:27:16 M: 94195712 DEBUG: LoadLibrary('python24.dll') returning: 00F26F40
  259. 12:27:16 M: 94195712 DEBUG: dllGetProcAddress(007D3558(kernel32.dll), 'InterlockedCompareExchange') => 0027BCF4
  260. 12:27:16 M: 93929472 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  261. 12:27:16 M: 93929472 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  262. Previous line repeats 1 times.
  263. 12:27:16 M: 93872128 DEBUG: LoadLibraryExA called with flags:
  264. - LOAD_WITH_ALTERED_SEARCH_PATH
  265. 12:27:16 M: 93872128 DEBUG: LoadLibraryA('zlib.pyd')
  266. 12:27:16 M: 93802496 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  267. 12:27:16 M: 93802496 DEBUG: LoadLibrary('zlib.pyd') returning: 01435A70
  268. 12:27:16 M: 93802496 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  269. 12:27:16 M: 92925952 NOTICE: -->Python Initialized<--
  270. 12:27:16 M: 92925952 DEBUG: new python thread created. id=4
  271. 12:27:16 M: 92401664 DEBUG: DIRECTORY::CPluginDirectory::WaitOnScriptResult - waiting on the liveonlinefooty1.6 plugin...
  272. 12:27:16 M: 92401664 DEBUG: Python thread: start processing
  273. 12:27:16 M: 92401664 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/liveonlinefooty1.6/default.py
  274. 12:27:16 M: 92401664 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\liveonlinefooty1.6;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\CryptoPy\lib;Q:\scripts\.modules\Dialog Addon Scan\lib;Q:\scripts\.modules\Elementtree XML parser\lib;Q:\scripts\.modules\RSS Engine Addon\lib;Q:\scripts\.modules\simplejson\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  275. 12:27:16 M: 92401664 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\liveonlinefooty1.6
  276. 12:27:16 M: 91324416 DEBUG: LoadLibraryExA called with flags:
  277. - LOAD_WITH_ALTERED_SEARCH_PATH
  278. 12:27:16 M: 91324416 DEBUG: LoadLibraryA('_socket.pyd')
  279. 12:27:16 M: 91275264 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  280. 12:27:16 M: 91275264 DEBUG: LoadLibrary('_socket.pyd') returning: 00F59430
  281. 12:27:16 M: 91275264 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  282. 12:27:16 M: 91258880 DEBUG: LoadLibraryExA called with flags:
  283. - LOAD_WITH_ALTERED_SEARCH_PATH
  284. 12:27:16 M: 91258880 DEBUG: LoadLibraryA('_ssl.pyd')
  285. 12:27:16 M: 90759168 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  286. 12:27:16 M: 90759168 DEBUG: LoadLibrary('_ssl.pyd') returning: 017055C0
  287. 12:27:16 M: 90759168 DEBUG: dllGetProcAddress(01BA0000(_ssl.pyd), 'init_ssl') => 01BA1820
  288. 12:27:16 M: 90742784 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  289. 12:27:17 M: 90689536 DEBUG: dllGetProcAddress(007D3DE0(advapi32.dll), 'CryptAcquireContextA') => 00254F4B
  290. 12:27:17 M: 90689536 DEBUG: dllGetProcAddress(007D3DE0(advapi32.dll), 'CryptGenRandom') => 00254F5C
  291. 12:27:17 M: 90689536 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
  292. 12:27:18 M: 90025984 INFO: Loading skin file: DialogProgress.xml
  293. 12:27:18 M: 86634496 DEBUG: ------ Window Init (DialogBusy.xml) ------
  294. 12:27:18 M: 86630400 INFO: Loading skin file: DialogBusy.xml
  295. 12:27:18 M: 86323200 DEBUG: ------ Window Init (DialogProgress.xml) ------
  296. 12:27:18 M: 89985024 DEBUG: ------ Window Deinit (DialogBusy.xml) ------
  297. 12:27:18 M: 89206784 DEBUG: LoadLibraryExA called with flags:
  298. - LOAD_WITH_ALTERED_SEARCH_PATH
  299. 12:27:18 M: 89206784 DEBUG: LoadLibraryA('pyexpat.pyd')
  300. 12:27:18 M: 89067520 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  301. 12:27:18 M: 89067520 DEBUG: LoadLibrary('pyexpat.pyd') returning: 00F695A0
  302. 12:27:18 M: 89067520 DEBUG: dllGetProcAddress(1D100000(pyexpat.pyd), 'initpyexpat') => 1D102350
  303. 12:27:18 M: 89055232 NOTICE: CWD: plugin://video/liveonlinefooty1.6
  304. 12:27:18 M: 89055232 NOTICE: CWD: plugin://video/liveonlinefooty1.6
  305. 12:27:18 M: 89051136 INFO: -->Python script returned the following error<--
  306. 12:27:18 M: 89051136 ERROR: Error Type: exceptions.TypeError
  307. 12:27:18 M: 89051136 ERROR: Error Contents: openSettings() got an unexpected keyword argument 'url'
  308. 12:27:18 M: 89051136 ERROR: Traceback (most recent call last):
  309. File "Q:\plugins\video\liveonlinefooty1.6\default.py", line 146, in ?
  310. lof_addon.openSettings(url=sys.argv[0])
  311. TypeError: openSettings() got an unexpected keyword argument 'url'
  312. 12:27:18 M: 89051136 INFO: -->End of Python script error report<--
  313. 12:27:18 M: 89051136 INFO: Python script stopped
  314. 12:27:18 M: 89575424 DEBUG: python thread 4 destructed
  315. 12:27:18 M: 89575424 INFO: Python, unloading python24.dll because no scripts are running anymore
  316. 12:27:18 M: 89800704 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01BA0000): Detected memory leaks: 1647 leaks
  317. 12:27:18 M: 89804800 DEBUG: leak caller address 01BA489B, size 20064, counter 1645
  318. 12:27:18 M: 89804800 DEBUG: leak caller address 01BA48B0, size 4224, counter 2
  319. 12:27:18 M: 89804800 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  320. 12:27:18 M: 90443776 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 540 leaks
  321. 12:27:18 M: 94052352 DEBUG: leak caller address 1E02169B, size 24, counter 1
  322. 12:27:18 M: 94052352 DEBUG: leak caller address 1E047413, size 497856, counter 96
  323. 12:27:18 M: 94052352 DEBUG: leak caller address 1E05046B, size 1000, counter 1
  324. 12:27:18 M: 94052352 DEBUG: leak caller address 1E05928C, size 233, counter 1
  325. 12:27:18 M: 94052352 DEBUG: leak caller address 1E05D47B, size 41496, counter 42
  326. 12:27:18 M: 94052352 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  327. 12:27:18 M: 94052352 DEBUG: leak caller address 1E061589, size 592, counter 16
  328. 12:27:18 M: 94052352 DEBUG: leak caller address 1E06165A, size 80, counter 4
  329. 12:27:18 M: 94052352 DEBUG: leak caller address 1E07365F, size 3145728, counter 12
  330. 12:27:18 M: 94052352 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  331. 12:27:18 M: 94052352 DEBUG: leak caller address 1E073894, size 56225, counter 100
  332. 12:27:18 M: 94052352 DEBUG: leak caller address 1E0739DF, size 9139, counter 255
  333. 12:27:18 M: 94052352 DEBUG: leak caller address 1E092749, size 640, counter 3
  334. 12:27:18 M: 94052352 DEBUG: leak caller address 1E09457C, size 72, counter 6
  335. 12:27:18 M: 94052352 DEBUG: python24.dll: Total bytes leaked: 3755125
  336. 12:27:18 M: 95223808 DEBUG: ------ Window Init (DialogKaiToast.xml) ------
  337. 12:27:18 M: 95117312 DEBUG: DIRECTORY::CPluginDirectory::WaitOnScriptResult - plugin exited prematurely - terminating
  338. 12:27:18 M: 95117312 ERROR: DIRECTORY::CDirectory::GetDirectory - Error getting plugin://video/liveonlinefooty1.6/?url=Settings&mode=3
  339. 12:27:18 M: 95117312 ERROR: CGUIMediaWindow::GetDirectory(plugin://video/liveonlinefooty1.6/?url=Settings&mode=3) failed
  340. 12:27:18 M: 95117312 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/liveonlinefooty1.6/)
  341. 12:27:18 M: 95117312 DEBUG: ParentPath = [plugin://video/]
  342. 12:27:18 M: 95117312 DEBUG: Loading fileitems [plugin://video/liveonlinefooty1.6/]
  343. 12:27:18 M: 95117312 DEBUG: -- items: 2, directory: plugin://video/liveonlinefooty1.6/ sort method: 0, ascending: false
  344. 12:27:19 M: 94765056 DEBUG: ------ Window Deinit (DialogProgress.xml) ------
  345. 12:27:20 M: 95125504 DEBUG: CApplication::OnKey: 257 pressed, action is 9
  346. 12:27:20 M: 95207424 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/)
  347. 12:27:20 M: 95207424 DEBUG: ParentPath = []
  348. 12:27:21 M: 95219712 DEBUG: CFileItemList::Sort, sorting took 0 millis
  349. 12:27:21 M: 95137792 DEBUG: CApplication::OnKey: 257 pressed, action is 9
  350. 12:27:21 M: 95219712 DEBUG: CGUIMediaWindow::GetDirectory ()
  351. 12:27:21 M: 95219712 DEBUG: ParentPath = []
  352. 12:27:21 M: 95219712 DEBUG: CFileItemList::Sort, sorting took 0 millis
  353. 12:27:21 M: 95129600 DEBUG: CApplication::OnKey: 257 pressed, action is 9
  354. 12:27:21 M: 95129600 DEBUG: CGUIWindowManager::PreviousWindow: Deactivate
  355. 12:27:21 M: 95141888 DEBUG: ------ Window Deinit (MyVideo.xml) ------
  356. 12:27:21 M: 99999744 DEBUG: CGUIWindowManager::PreviousWindow: Activate new
  357. 12:27:21 M: 99999744 DEBUG: ------ Window Init (Home.xml) ------
  358. 12:27:21 M: 99999744 INFO: Loading skin file: Home.xml
  359. 12:27:22 M: 95432704 DEBUG: CApplication::OnMessage : Translating XBMC.RunScript(special://skin/scripts/RecentlyAdded.py,limit=4)
  360. 12:27:22 M: 95432704 DEBUG: CApplication::OnMessage : To XBMC.RunScript(special://skin/scripts/RecentlyAdded.py,limit=4)
  361. 12:27:22 M: 95432704 INFO: initializing python engine.
  362. 12:27:22 M: 95432704 DEBUG: LoadLibraryA('python24.dll')
  363. 12:27:22 M: 94306304 DEBUG: LoadLibrary('python24.dll') returning: 00F6D8E0
  364. 12:27:22 M: 94306304 DEBUG: dllGetProcAddress(007D3558(kernel32.dll), 'InterlockedCompareExchange') => 0027BCF4
  365. 12:27:22 M: 94040064 DEBUG: GetModuleFileNameA(00000000, 1E103490, 256) => 'xbmc.xbe'
  366. 12:27:22 M: 94040064 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
  367. Previous line repeats 1 times.
  368. 12:27:22 M: 93982720 DEBUG: LoadLibraryExA called with flags:
  369. - LOAD_WITH_ALTERED_SEARCH_PATH
  370. 12:27:22 M: 93982720 DEBUG: LoadLibraryA('zlib.pyd')
  371. 12:27:22 M: 93913088 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  372. 12:27:22 M: 93913088 DEBUG: LoadLibrary('zlib.pyd') returning: 00ECA970
  373. 12:27:22 M: 93913088 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
  374. 12:27:22 M: 93016064 NOTICE: -->Python Initialized<--
  375. 12:27:22 M: 93016064 DEBUG: new python thread created. id=5
  376. 12:27:22 M: 92491776 DEBUG: CApplication::OnMessage : Translating SetFocus(9000)
  377. 12:27:22 M: 92491776 DEBUG: Python thread: start processing
  378. 12:27:22 M: 92491776 DEBUG: CApplication::OnMessage : To SetFocus(9000)
  379. 12:27:22 M: 92499968 DEBUG: XBPyThread::Process - The source file to load is special://skin/scripts/RecentlyAdded.py
  380. 12:27:22 M: 92499968 DEBUG: XBPyThread::Process - Setting the Python path to Q:\skin\Confluence\scripts;Q:\scripts\.modules\script.module.xbmcaddon\lib;Q:\scripts\.modules\script.module.beautifulsoup\lib;Q:\scripts\.modules\CryptoPy\lib;Q:\scripts\.modules\Dialog Addon Scan\lib;Q:\scripts\.modules\Elementtree XML parser\lib;Q:\scripts\.modules\RSS Engine Addon\lib;Q:\scripts\.modules\simplejson\lib;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
  381. 12:27:22 M: 92499968 DEBUG: XBPyThread::Process - Entering source directory Q:\skin\Confluence\scripts
  382. 12:27:23 M: 91410432 DEBUG: LoadLibraryExA called with flags:
  383. - LOAD_WITH_ALTERED_SEARCH_PATH
  384. 12:27:23 M: 91410432 DEBUG: LoadLibraryA('_socket.pyd')
  385. 12:27:23 M: 91361280 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  386. 12:27:23 M: 91361280 DEBUG: LoadLibrary('_socket.pyd') returning: 00EF1920
  387. 12:27:23 M: 91361280 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
  388. 12:27:23 M: 91336704 DEBUG: LoadLibraryExA called with flags:
  389. - LOAD_WITH_ALTERED_SEARCH_PATH
  390. 12:27:23 M: 91336704 DEBUG: LoadLibraryA('_ssl.pyd')
  391. 12:27:23 M: 90836992 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
  392. 12:27:23 M: 90836992 DEBUG: LoadLibrary('_ssl.pyd') returning: 0188D390
  393. 12:27:23 M: 90836992 DEBUG: dllGetProcAddress(02C20000(_ssl.pyd), 'init_ssl') => 02C21820
  394. 12:27:23 M: 90820608 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
  395. 12:27:23 M: 90787840 DEBUG: HttpApi Start command: SetResponseFormat paras: SetResponseFormat
  396. 12:27:23 M: 90787840 DEBUG: HttpApi Start command: SetResponseFormat paras: SetResponseFormat; OpenRecord;<record>
  397. 12:27:23 M: 90787840 DEBUG: HttpApi Start command: SetResponseFormat paras: SetResponseFormat; CloseRecord;</record>
  398. 12:27:23 M: 90779648 DEBUG: HttpApi Start command: QueryVideoDatabase paras: QueryVideoDatabase; select * from movieview order by idMovie desc limit 4
  399. 12:27:23 M: 89567232 DEBUG: HttpApi Start command: QueryVideoDatabase paras: QueryVideoDatabase; select * from episodeview order by idepisode desc limit 4
  400. 12:27:23 M: 89567232 INFO: Scriptresult: Success
  401. 12:27:24 M: 89567232 INFO: Python script stopped
  402. 12:27:24 M: 90091520 DEBUG: python thread 5 destructed
  403. 12:27:24 M: 90091520 INFO: Python, unloading python24.dll because no scripts are running anymore
  404. 12:27:24 M: 90304512 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 02C20000): Detected memory leaks: 1647 leaks
  405. 12:27:24 M: 90304512 DEBUG: leak caller address 02C2489B, size 20064, counter 1645
  406. 12:27:24 M: 90304512 DEBUG: leak caller address 02C248B0, size 4224, counter 2
  407. 12:27:24 M: 90304512 DEBUG: _ssl.pyd: Total bytes leaked: 24288
  408. 12:27:24 M: 90828800 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 203 leaks
  409. 12:27:24 M: 93093888 DEBUG: leak caller address 1E047413, size 168768, counter 48
  410. 12:27:24 M: 93093888 DEBUG: leak caller address 1E05928C, size 233, counter 1
  411. 12:27:24 M: 93093888 DEBUG: leak caller address 1E05D47B, size 33592, counter 34
  412. 12:27:24 M: 93093888 DEBUG: leak caller address 1E05EC8F, size 1976, counter 2
  413. 12:27:24 M: 93093888 DEBUG: leak caller address 1E061589, size 328, counter 7
  414. 12:27:24 M: 93093888 DEBUG: leak caller address 1E06165A, size 80, counter 4
  415. 12:27:24 M: 93093888 DEBUG: leak caller address 1E07365F, size 2097152, counter 8
  416. 12:27:24 M: 93093888 DEBUG: leak caller address 1E0736AC, size 64, counter 1
  417. 12:27:24 M: 93093888 DEBUG: leak caller address 1E073894, size 29856, counter 41
  418. 12:27:24 M: 93093888 DEBUG: leak caller address 1E0739DF, size 2053, counter 48
  419. 12:27:24 M: 93093888 DEBUG: leak caller address 1E092749, size 640, counter 3
  420. 12:27:24 M: 93093888 DEBUG: leak caller address 1E09457C, size 72, counter 6
  421. 12:27:24 M: 93093888 DEBUG: python24.dll: Total bytes leaked: 2334814
  422. 12:27:24 M: 94199808 DEBUG: ------ Window Deinit (DialogKaiToast.xml) ------
  423. 12:27:38 M: 94851072 DEBUG: SECTION:UnloadDelayed(DLL: Q:\system\ImageLib.dll)
  424. 12:30:20 M: 95408128 INFO: WEATHER: Downloading weather
  425. 12:30:20 M: 95408128 DEBUG: FileCurl::Open(D01659E0) http://xoap.weather.com/weather/local/UKXX0142?cc=*&unit=m&dayf=4&prod=xoap&link=xoap&par=1004124588&key=079f24145f208494
  426. 12:30:20 M: 95371264 INFO: XCURL::DllLibCurlGlobal::easy_aquire - Created session to http://xoap.weather.com
  427. 12:30:20 M: 95178752 DEBUG: FileCurl::Close(D01659E0) http://xoap.weather.com/weather/local/UKXX0142?cc=*&unit=m&dayf=4&prod=xoap&link=xoap&par=1004124588&key=079f24145f208494
  428. 12:30:20 M: 95178752 INFO: WEATHER: Weather download successful
  429. 12:30:31 M: 95813632 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://xoap.weather.com (easy=00FECA30, multi=00F98010)
  430. 12:31:00 M: 95932416 DEBUG: Updating RSS
  431. Previous line repeats 5 times.
  432. 12:31:00 M: 95866880 DEBUG: FileCurl::Open(D00F58DC) http://feeds.feedburner.com/XboxScene
  433. 12:31:00 M: 95830016 INFO: XCURL::DllLibCurlGlobal::easy_aquire - Created session to http://feeds.feedburner.com
  434. 12:31:00 M: 95498240 DEBUG: FileCurl::Close(D00F58DC) http://feeds.feedburner.com/XboxScene
  435. 12:31:00 M: 95506432 DEBUG: Got rss feed: http://feeds.feedburner.com/XboxScene
  436. 12:31:00 M: 95539200 DEBUG: RSS feed encoding: ISO-8859-1
  437. 12:31:00 M: 95539200 DEBUG: Parsed rss feed: http://feeds.feedburner.com/XboxScene
  438. 12:31:00 M: 95776768 DEBUG: FileCurl::Open(D00F58DC) http://news.bbc.co.uk/rss/newsonline_uk_edition/front_page/rss.xml
  439. 12:31:00 M: 95739904 INFO: XCURL::DllLibCurlGlobal::easy_aquire - Created session to http://news.bbc.co.uk
  440. 12:31:00 M: 95371264 DEBUG: FileCurl::Close(D00F58DC) http://feeds.bbci.co.uk/news/rss.xml?edition=uk
  441. 12:31:00 M: 95379456 DEBUG: Got rss feed: http://news.bbc.co.uk/rss/newsonline_uk_edition/front_page/rss.xml
  442. 12:31:00 M: 95383552 DEBUG: RSS feed encoding: UTF-8
  443. 12:31:00 M: 95383552 DEBUG: Parsed rss feed: http://news.bbc.co.uk/rss/newsonline_uk_edition/front_page/rss.xml
  444. 12:31:00 M: 95576064 DEBUG: FileCurl::Open(D00F58DC) http://www.telegraph.co.uk/news/newstopics/howaboutthat/rss
  445. 12:31:00 M: 95539200 INFO: XCURL::DllLibCurlGlobal::easy_aquire - Created session to http://www.telegraph.co.uk
  446. 12:31:01 M: 95297536 DEBUG: FileCurl::Close(D00F58DC) http://www.telegraph.co.uk/news/newstopics/howaboutthat/rss
  447. 12:31:01 M: 95305728 DEBUG: Got rss feed: http://www.telegraph.co.uk/news/newstopics/howaboutthat/rss
  448. 12:31:01 M: 95309824 DEBUG: RSS feed encoding: UTF-8
  449. 12:31:01 M: 95309824 DEBUG: Parsed rss feed: http://www.telegraph.co.uk/news/newstopics/howaboutthat/rss
  450. 12:31:01 M: 95457280 DEBUG: FileCurl::Open(D00F58DC) http://newsrss.bbc.co.uk/rss/sportonline_uk_edition/front_page/rss.xml
  451. 12:31:01 M: 95420416 INFO: XCURL::DllLibCurlGlobal::easy_aquire - Created session to http://newsrss.bbc.co.uk
  452. 12:31:01 M: 95219712 DEBUG: FileCurl::Close(D00F58DC) http://newsrss.bbc.co.uk/rss/sportonline_uk_edition/front_page/rss.xml
  453. 12:31:01 M: 95219712 DEBUG: Got rss feed: http://newsrss.bbc.co.uk/rss/sportonline_uk_edition/front_page/rss.xml
  454. 12:31:01 M: 95219712 DEBUG: RSS feed encoding: ISO-8859-1
  455. 12:31:01 M: 95219712 DEBUG: Parsed rss feed: http://newsrss.bbc.co.uk/rss/sportonline_uk_edition/front_page/rss.xml
  456. 12:31:01 M: 95338496 DEBUG: FileCurl::Open(D00F58DC) http://news.google.co.uk/news?pz=1&cf=all&ned=uk&hl=en&topic=t&output=rss
  457. 12:31:01 M: 95301632 INFO: XCURL::DllLibCurlGlobal::easy_aquire - Created session to http://news.google.co.uk
  458. 12:31:01 M: 95043584 DEBUG: FileCurl::Close(D00F58DC) http://news.google.co.uk/news?pz=1&cf=all&ned=uk&hl=en&topic=t&output=rss
  459. 12:31:01 M: 95043584 DEBUG: Got rss feed: http://news.google.co.uk/news?pz=1&cf=all&ned=uk&hl=en&topic=t&output=rss
  460. 12:31:01 M: 95043584 DEBUG: RSS feed encoding: UTF-8
  461. 12:31:01 M: 95043584 DEBUG: Parsed rss feed: http://news.google.co.uk/news?pz=1&cf=all&ned=uk&hl=en&topic=t&output=rss
  462. 12:31:01 M: 95211520 DEBUG: FileCurl::Open(D00F58DC) http://www.ps3-hacks.com/feed/
  463. 12:31:01 M: 95174656 INFO: XCURL::DllLibCurlGlobal::easy_aquire - Created session to http://www.ps3-hacks.com
  464. 12:31:10 M: 94990336 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://feeds.feedburner.com (easy=00FECA30, multi=0114ACE0)
  465. 12:31:10 M: 95109120 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://news.bbc.co.uk (easy=00FF6010, multi=013D2950)
  466. 12:31:11 M: 95309824 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://www.telegraph.co.uk (easy=01013010, multi=01472040)
  467. 12:31:11 M: 95432704 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://newsrss.bbc.co.uk (easy=0103A8A0, multi=00F1D630)
  468. 12:31:11 M: 95543296 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://news.google.co.uk (easy=01047010, multi=00F03910)
  469. 12:31:28 M: 95739904 WARNING: XFILE::CFileCurl::CReadState::FillBuffer: curl failed with code 28
  470. 12:31:28 M: 95739904 ERROR: CFileCurl::CReadState::Open, didn't get any data from stream.
  471. 12:31:28 M: 95739904 DEBUG: FileCurl::Close(D00F58DC) http://www.ps3-hacks.com/feed/
  472. 12:31:28 M: 95739904 ERROR: Timeout whilst retrieving http://www.ps3-hacks.com/feed/
  473. 12:31:38 M: 95907840 INFO: XCURL::DllLibCurlGlobal::CheckIdle - Closing session to http://www.ps3-hacks.com (easy=0104F770, multi=00F1F770)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement