hi. i've just tried the suggested fix on my xbox running t3ch_20090927. i still don't get anything listed. here is my debug log :
Code:
18:17:38 M: 36352000 DEBUG: Clearing cached fileitems [plugin://video/FreeMoovies/]
18:17:38 M: 40099840 DEBUG: CGUIMediaWindow::GetDirectory (plugin://video/FreeMoovies/)
18:17:38 M: 40099840 DEBUG: ParentPath = [plugin://video/]
18:17:38 M: 40099840 DEBUG: DIRECTORY::CPluginDirectory::StartScript - URL for plugin settings: FreeMoovies/
18:17:38 M: 40099840 DEBUG: DIRECTORY::CPluginDirectory::StartScript - calling plugin special://home/plugins/video/FreeMoovies/default.py('plugin://video/FreeMoovies/','0','')
18:17:38 M: 40099840 INFO: initializing python engine.
18:17:38 M: 40099840 DEBUG: LoadLibraryA('python24.dll')
18:17:38 M: 38977536 DEBUG: LoadLibrary('python24.dll') returning: 00D22560
18:17:38 M: 38977536 DEBUG: dllGetProcAddress(00854BF8(kernel32.dll), 'InterlockedCompareExchange') => 000D6AC4
18:17:38 M: 38711296 DEBUG: GetModuleFileNameA(00000000, 1E102490, 256) => 'xbmc.xbe'
18:17:38 M: 38711296 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
18:17:38 M: 38711296 DEBUG: advapi32.dll fake function RegQueryInfoKeyA called
18:17:38 M: 38653952 DEBUG: LoadLibraryExA called with flags:
- LOAD_WITH_ALTERED_SEARCH_PATH
18:17:38 M: 38653952 DEBUG: LoadLibraryA('zlib.pyd')
18:17:38 M: 38584320 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
18:17:38 M: 38584320 DEBUG: LoadLibrary('zlib.pyd') returning: 00D82A90
18:17:38 M: 38584320 DEBUG: dllGetProcAddress(1E1B0000(zlib.pyd), 'initzlib') => 1E1B2150
18:17:38 M: 37720064 NOTICE: -->Python Initialized<--
18:17:38 M: 37720064 DEBUG: new python thread created. id=44
18:17:38 M: 37195776 DEBUG: DIRECTORY::CPluginDirectory::WaitOnScriptResult - waiting on the FreeMoovies plugin...
18:17:38 M: 37195776 DEBUG: Python thread: start processing
18:17:38 M: 37195776 DEBUG: XBPyThread::Process - The source file to load is special://home/plugins/video/FreeMoovies/default.py
18:17:38 M: 37195776 DEBUG: XBPyThread::Process - Setting the Python path to Q:\plugins\video\FreeMoovies;Q:\system\python\python24.zlib;Q:\system\python\DLLs;Q:\system\python\Lib;Q:\system\python\spyce
18:17:38 M: 37195776 DEBUG: XBPyThread::Process - Entering source directory Q:\plugins\video\FreeMoovies
18:17:39 M: 36667392 DEBUG: LoadLibraryExA called with flags:
- LOAD_WITH_ALTERED_SEARCH_PATH
18:17:39 M: 36667392 DEBUG: LoadLibraryA('_socket.pyd')
18:17:39 M: 36618240 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
18:17:39 M: 36618240 DEBUG: LoadLibrary('_socket.pyd') returning: 00DB77D0
18:17:39 M: 36618240 DEBUG: dllGetProcAddress(1E1D0000(_socket.pyd), 'init_socket') => 1E1D4BF0
18:17:39 M: 36618240 DEBUG: LoadLibraryExA called with flags:
- LOAD_WITH_ALTERED_SEARCH_PATH
18:17:39 M: 36618240 DEBUG: LoadLibraryA('_ssl.pyd')
18:17:39 M: 36118528 DEBUG: kernel32.dll fake function DisableThreadLibraryCalls called
18:17:39 M: 36118528 DEBUG: LoadLibrary('_ssl.pyd') returning: 00DDD580
18:17:39 M: 36118528 DEBUG: dllGetProcAddress(01F00000(_ssl.pyd), 'init_ssl') => 01F01820
18:17:39 M: 36110336 DEBUG: kernel32.dll fake function SetConsoleCtrlHandler called
18:17:39 M: 36106240 DEBUG: dllGetProcAddress(00855480(advapi32.dll), 'CryptAcquireContextA') => 0025B897
18:17:39 M: 36106240 DEBUG: dllGetProcAddress(00855480(advapi32.dll), 'CryptGenRandom') => 00258CB6
18:17:39 M: 36106240 DEBUG: advapi32.dll fake function dllCryptAcquireContext() called
18:17:40 M: 34955264 DEBUG: ------ Window Init (DialogBusy.xml) ------
18:17:40 M: 34922496 INFO: Loading skin file: DialogBusy.xml
18:17:40 M: 34918400 DEBUG: Load DialogBusy.xml: 39.59ms
18:17:40 M: 34934784 DEBUG: Alloc resources: 42.52ms (42.51 ms skin load, 0.00 ms preload)
18:17:40 M: 34770944 INFO: Loading skin file: DialogProgress.xml
18:17:40 M: 34787328 DEBUG: Load DialogProgress.xml: 48.50ms
18:17:40 M: 34787328 DEBUG: ------ Window Init (DialogProgress.xml) ------
18:17:40 M: 34746368 DEBUG: Alloc resources: 17.96ms (0.00 ms skin load, 0.00 ms preload)
18:17:40 M: 34365440 NOTICE: Mode: None
18:17:40 M: 34373632 NOTICE: URL: None
18:17:40 M: 34381824 NOTICE: Name: None
18:17:40 M: 34381824 NOTICE: FreeMoovies --> common :: getHTML :: url = http://www.freemooviesonline.com
18:17:40 M: 34381824 DEBUG: ------ Window Deinit (DialogBusy.xml) ------
18:17:40 M: 34381824 DEBUG: LoadLibraryA('ws2_32')
18:17:40 M: 34381824 DEBUG: LoadLibrary('ws2_32.dll') returning: 00854BD0
18:17:40 M: 34381824 DEBUG: dllGetProcAddress(00854B90(ws2_32.dll), 'getaddrinfo') => 00258C91
18:17:40 M: 34381824 DEBUG: dllGetProcAddress(00854B90(ws2_32.dll), 'getaddrinfo') => 00258C91
18:17:40 M: 34381824 DEBUG: dllGetProcAddress(00854B90(ws2_32.dll), 'getnameinfo') => 0025838F
18:17:40 M: 34381824 DEBUG: dllGetProcAddress(00854B90(ws2_32.dll), 'freeaddrinfo') => 00257F03
18:17:45 M: 34516992 INFO: Scriptresult: Success
18:17:45 M: 34516992 INFO: Python script stopped
18:17:45 M: 35041280 DEBUG: DIRECTORY::CPluginDirectory::WaitOnScriptResult- plugin returned successfully
18:17:45 M: 34566144 DEBUG: python thread 44 destructed
18:17:45 M: 35090432 INFO: Python, unloading python24.dll because no scripts are running anymore
18:17:45 M: 35225600 DEBUG: Q:\system\python\DLLs\_socket.pyd: Detected 1 unloaded dll's
18:17:45 M: 35274752 DEBUG: Q:\system\python\DLLs\_ssl.pyd (base 01F00000): Detected memory leaks: 1647 leaks
18:17:45 M: 35274752 DEBUG: leak caller address 01F0489B, size 20064, counter 1645
18:17:45 M: 35274752 DEBUG: leak caller address 01F048B0, size 4224, counter 2
18:17:45 M: 35274752 DEBUG: _ssl.pyd: Total bytes leaked: 24288
18:17:45 M: 35778560 DEBUG: Q:\system\python\python24.dll (base 1E000000): Detected memory leaks: 458 leaks
18:17:45 M: 38584320 DEBUG: leak caller address 1E0211CB, size 24, counter 1
18:17:45 M: 38584320 DEBUG: leak caller address 1E046F57, size 487296, counter 81
18:17:45 M: 38584320 DEBUG: leak caller address 1E04FF6B, size 1000, counter 1
18:17:45 M: 38584320 DEBUG: leak caller address 1E058C2C, size 233, counter 1
18:17:45 M: 38584320 DEBUG: leak caller address 1E05CDDB, size 34580, counter 35
18:17:45 M: 38584320 DEBUG: leak caller address 1E05E5EF, size 1976, counter 2
18:17:45 M: 38584320 DEBUG: leak caller address 1E060EA5, size 824, counter 31
18:17:45 M: 38584320 DEBUG: leak caller address 1E060F81, size 84, counter 5
18:17:45 M: 38584320 DEBUG: leak caller address 1E072C5F, size 2359296, counter 9
18:17:45 M: 38584320 DEBUG: leak caller address 1E072CAC, size 64, counter 1
18:17:45 M: 38584320 DEBUG: leak caller address 1E072E88, size 52584, counter 94
18:17:45 M: 38584320 DEBUG: leak caller address 1E072FC9, size 7477, counter 188
18:17:45 M: 38584320 DEBUG: leak caller address 1E091E3F, size 640, counter 3
18:17:45 M: 38584320 DEBUG: leak caller address 1E093BEC, size 72, counter 6
18:17:45 M: 38584320 DEBUG: python24.dll: Total bytes leaked: 2946150
18:17:45 M: 39723008 DEBUG: ------ Window Deinit (DialogProgress.xml) ------