0% found this document useful (0 votes)
49 views

Newlog

Uploaded by

Prudhvi
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views

Newlog

Uploaded by

Prudhvi
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 226

-----------------------------------------------------------------------------------

-------------------------------------------------
| ICM Trace File (dev_icm)
-----------------------------------------------------------------------------------
-------------------------------------------------
---------------------------------------------------
trc file: "dev_icm", trc level: 3, release: "754"
---------------------------------------------------
[Thr 140532589094656] Wed Apr 10 12:36:00:380 2024
[Thr 140532589094656] HttpSetParam: (zdate/contloctime_trace = 1) ignored
[Thr 140532589094656] H2SetParam: (zdate/contloctime_trace = 1) ignored
[Thr 140532589094656] SmtpSetParam: (zdate/contloctime_trace = 1) ignored
sysno 02
sid Q20
systemid 390 (AMD/Intel x86_64 with Linux)
relno 7540
patchlevel 0
patchno 200
intno 20170305
make multithreaded, Unicode, 64 bit, optimized
profile /usr/sap/Q20/SYS/profile/Q20_D02_vq20app
pid 25112
[Thr 140532589094656] Wed Apr 10 12:36:00:380 2024
[Thr 140532589094656] Trace file initialized
[Thr 140532589094656] <<- SapSSLSetTraceFile(fp=7fd01c056c90)==SAP_O_K
[Thr 140532589094656] TRACE FILE TRUNCATED
[Thr 140532589094656] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532589094656] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589094656] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532589094656] HttpSAPR3Handler: Response from AppServer
[Thr 140532589094656] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589094656] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532589094656] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589094656] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532589094656] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd01c0781e0
[Thr 140532589094656] ISC: don't cache response: status code=403
[Thr 140532589094656] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532589094656] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589094656] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532589094656] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589094656] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532589094656] HttpModHandler: process 2, header_len 151
[Thr 140532589094656] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532589094656] HttpModHandler: perform the actions: (128)
[Thr 140532589094656] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532589094656] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589094656] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532589094656] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589094656] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532589094656] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532589094656] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532589094656] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589094656] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589094656] HttpModHandler: process 3, header_len 0
[Thr 140532589094656] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589094656] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd01c0781e0
[Thr 140532589094656] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589094656] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532589094656] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532589094656] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532589094656] IcmHandleReadFromPartner(id=1/336311): HandleServData
returned: 702
[Thr 140532589094656] BINDUMP of content denied
[Thr 140532589094656] IcmWriteToConn(id=1/336311): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532589094656] Wed Apr 10 12:36:00:380 2024
[Thr 140532589094656] ->> SapSSLWriteNB(sssl_hdl=7fd01c0454e0, buf=7fd050515420,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532589094656] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532589094656] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532589094656] <<- SapSSLWriteNB(sssl_hdl=7fd01c0454e0)==SAP_O_K
[Thr 140532589094656] in/out: ... = "buf= 7fd050515420, written= 1008 of 1008
(all) io=idle"
[Thr 140532589094656] IcmWriteToConn(id=1/336311): wrote data to partner (len =
1008)
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532589094656] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532589094656] MPI<7496e>bc#7 FreeInbuf#1 0 4563b0 0 -> MPI_OK
[Thr 140532589094656] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532589094656] ICT: IctHttpCloseMessage( 7fd01c066160 ) -> u=0 rc=0
[Thr 140532589094656] ICT: IctHttpCloseMessage( 7fd01c0796a0 ) -> u=0 rc=0
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532589094656] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f9671d0,flags=0x0000,timeout=10000,&IOstate=7fd0
4b0d57fc)
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532589094656] CCL[SSL]: Srv-0002A5CE: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532589094656] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532589094656] CCL[SSL]: Srv-0002A5CE: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 36 (rq_id 25344997)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 36
[Thr 140532589094656] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532589094656] in: sssl_hdl = 7fd01c0454e0
[Thr 140532589094656] in: ... ni_hdl = 177
[Thr 140532589094656] in: flags = 0
[Thr 140532589094656] in: timeout = 10000
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532589094656] MPI<7496d>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:58329
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=110), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532589094656] MPI<7496d>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532589094656] MPI<7496d>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532589094656] MPI<7496e>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532589094656] Wed Apr 10 12:36:00:380 2024
[Thr 140532589094656] MPI<7496e>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532589094656] MPI<7496e>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25344997 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25344997
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 01000000B7210500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
12
[Thr 140532577003264] -IN-- session invalid T30_U11715_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532589094656] NiIShutdownHandle: shutdown -w of hdl 177
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 25344997, slot 82)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25344997)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 1/336311
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
25344997, slot 82)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589094656] NiIPeek: peek successful for hdl 177 (r)
[Thr 140532589094656] NiIRead: hdl 177 SSLState 0
[Thr 140532589094656] NiIRead: hdl 177 received data (rcd=31,pac=1,RAW_IO)
[Thr 140532589094656] SiPeek: hang up occurred in sock 29
[Thr 140532589094656] NiIPeek: peek for hdl 177 failed (r; rc=1)
[Thr 140532589094656] NiIRead: hdl 177 SSLState 0
[Thr 140532589094656] NiIRead: SiRecv failed for hdl 177/sock 29
[Thr 140532589094656] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.221:12950;
L=10.200.50.133:8443)
[Thr 140532589094656] NiICloseHandle: shutdown and close hdl 177/sock 29
[Thr 140532589094656] IcmConnClose: Connection 1/336311 closed
[Thr 140532589094656] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.221 ->
rc=0
[Thr 140532589094656] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966718 -> 0
[Thr 140532589094656] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
-> 0
[Thr 140532589094656] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=-1 -> 0
[Thr 140532589094656] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532589094656] REQ TRACE END: 1/336311/1
[Thr 140532589094656] IcmWorkerThread: Thread 3: Waiting for event
[Thr 140532589094656] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Wed Apr 10 12:36:02:080 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 2 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 36 (rq_id 25345002)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 36
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:65125
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=111), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] Dump of queue <IcmanQueue> in slot 2 (1 requests, in use,
port=59573):
[Thr 140532577003264] -1 <- 103 (rq_id 25345003, NOWP,
REQ_HANDLER_PLUGIN_RESP) -> -1
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25345002 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25345002
[Thr 140532577003264] -IN-- ca_blk 1 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_ICMAN_OPCODE_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
16
[Thr 140532577003264] -IN-- session T20_U7788_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 1
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_ICMAN_OPCODE_RESP
request (rq_id 25345002, slot 83)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25345002)
[Thr 140532577003264] IcmHandleRequest: change parameter >rdisp/TRACE=>1<
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 334 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_SET_PARAM(11)
[Thr 140532577003264] IcmHandleAdmMsg: set param rdisp/TRACE -> 1
[Thr 140532577003264] HttpSetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] H2SetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] SmtpSetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] IcmSetTrcLevel: Switch trace level to: 1
[Thr 140532577003264] *
[Thr 140532577003264] * SWITCH TRC-LEVEL to 1
[Thr 140532577003264] *
[Thr 140532577003264] eppSetTraceLevel: changing trace level to 1
[Thr 140532585924352] Wed Apr 10 12:40:26:480 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000121d2} {root-id=730EFE
[Thr 140532585924352] INTERNAL T17_U11839_M0, 000, SAPSYS, ,
time=12:40:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 12:45:26:461 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000121f5} {root-id=730EFE
[Thr 140532588566272] INTERNAL T22_U12000_M0, 000, SAPSYS, ,
time=12:45:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 12:45:29:958 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000121f9} {root-id=730EFE
[Thr 140532590679808] INTERNAL T22_U12000_M0, 000, SAPSYS, ,
time=12:45:28, W16, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 12:48:19:113 2024
[Thr 140532587509504] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532587509504] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532587509504] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532587509504] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532587509504] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532587509504] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532587509504] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532587509504] (754_STACK patchno 200,linuxx86_64_gcc43) CommonCryptoLib
8.5.50 (/usr/sap/Q20/D02/exe/libsapcrypto.so)
[Thr 140532587509504] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532587509504] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532587509504] >> ===== SecuSSL ErrStack: =====
[Thr 140532587509504] Peer not trusted
[Thr 140532587509504] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532587509504] # --- Messages -----------
[Thr 140532587509504] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532587509504] # --- Summary -----------
[Thr 140532587509504] #01 Certificate (End Entity): VALID
[Thr 140532587509504] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532587509504] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532587509504] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532587509504] #02 Certificate (Issuer): VALID
[Thr 140532587509504] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532587509504] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532587509504] ----- END VERIFICATION RESULT -----
[Thr 140532587509504] << =============================
[Thr 140532587509504] Target Hostname="apps.support.sap.com"
[Thr 140532587509504] SSL NI-hdl 183: local=10.200.50.156:60700
peer=155.56.96.48:443
[Thr 140532587509504] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd038060d00)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532587509504] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532587509504] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532587509504]
[Thr 140532587509504] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532587509504] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532587509504] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532587509504] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532587509504] SSL NI-hdl 183: local=10.200.50.156:60700
peer=155.56.96.48:443
[Thr 140532587509504] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532587509504] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532587509504] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532587509504] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532587509504] Target Hostname="apps.support.sap.com"
[Thr 140532587509504] >> ---- SecuSSL ErrStack: ----
[Thr 140532587509504] Peer not trusted
[Thr 140532587509504] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532587509504] # --- Messages -----------
[Thr 140532587509504] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532587509504] # --- Summary -----------
[Thr 140532587509504] #01 Certificate (End Entity): VALID
[Thr 140532587509504] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532587509504] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532587509504] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532587509504] #02 Certificate (Issuer): VALID
[Thr 140532587509504] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532587509504] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532587509504] ----- END VERIFICATION RESULT -----
[Thr 140532587509504] << ---------------------------
[Thr 140532587509504]
[Thr 140532587509504] {00012211} {root-id=36354432464532303635443246453230}
[icxxconn.c 2536]
[Thr 140532587509504] SYNC_RFC T6_U12089_M0, 000, AVANTRA_RFC,
tq20app.sap.swisspor, time=12:48:09, W17, program=SAPMSS
[Thr 140532587509504] role: Client, protocol: HTTPS, local:
10.200.50.156:60700, peer: 155.56.96.48:443
[Thr 140532588566272] Wed Apr 10 12:48:19:559 2024
[Thr 140532588566272] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532588566272] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532588566272] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532588566272] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532588566272] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532588566272] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532588566272] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532588566272] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532588566272] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532588566272] >> ===== SecuSSL ErrStack: =====
[Thr 140532588566272] Peer not trusted
[Thr 140532588566272] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532588566272] # --- Messages -----------
[Thr 140532588566272] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532588566272] # --- Summary -----------
[Thr 140532588566272] #01 Certificate (End Entity): VALID
[Thr 140532588566272] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532588566272] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588566272] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532588566272] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532588566272] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532588566272] #02 Certificate (Issuer): VALID
[Thr 140532588566272] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588566272] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532588566272] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532588566272] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532588566272] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532588566272] ----- END VERIFICATION RESULT -----
[Thr 140532588566272] << =============================
[Thr 140532588566272] Target Hostname="apps.support.sap.com"
[Thr 140532588566272] SSL NI-hdl 176: local=10.200.50.156:60708
peer=155.56.96.48:443
[Thr 140532588566272] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd034057e10)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532588566272] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532588566272] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532588566272]
[Thr 140532588566272] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532588566272] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532588566272] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532588566272] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532588566272] SSL NI-hdl 176: local=10.200.50.156:60708
peer=155.56.96.48:443
[Thr 140532588566272] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532588566272] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532588566272] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532588566272] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532588566272] Target Hostname="apps.support.sap.com"
[Thr 140532588566272] >> ---- SecuSSL ErrStack: ----
[Thr 140532588566272] Peer not trusted
[Thr 140532588566272] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532588566272] # --- Messages -----------
[Thr 140532588566272] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532588566272] # --- Summary -----------
[Thr 140532588566272] #01 Certificate (End Entity): VALID
[Thr 140532588566272] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532588566272] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588566272] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532588566272] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532588566272] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532588566272] #02 Certificate (Issuer): VALID
[Thr 140532588566272] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588566272] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532588566272] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532588566272] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532588566272] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532588566272] ----- END VERIFICATION RESULT -----
[Thr 140532588566272] << ---------------------------
[Thr 140532588566272]
[Thr 140532588566272] {00012212} {root-id=36354432464532303635443246453230}
[icxxconn.c 2536]
[Thr 140532588566272] ASYNC_RFC T30_U12140_M0, 000, AVANTRA_RFC,
vq20app.sap.swisspor, time=12:48:19, W14, program=SAPM
[Thr 140532588566272] role: Client, protocol: HTTPS, local:
10.200.50.156:60708, peer: 155.56.96.48:443
[Thr 140532590151424] Wed Apr 10 12:50:26:452 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001221f} {root-id=730EFE
[Thr 140532590151424] INTERNAL T32_U12206_M0, 000, SAPSYS, ,
time=12:50:26, W10, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 12:55:26:612 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012242} {root-id=730EFE
[Thr 140532587509504] INTERNAL T19_U12386_M0, 000, SAPSYS, ,
time=12:55:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 12:55:29:055 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012246} {root-id=730EFE
[Thr 140532590151424] INTERNAL T19_U12386_M0, 000, SAPSYS, ,
time=12:55:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 13:00:26:451 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001226a} {root-id=730EFE
[Thr 140532588566272] INTERNAL T30_U12526_M0, 000, SAPSYS, ,
time=13:00:26, W11, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 13:05:26:458 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001228d} {root-id=730EFE
[Thr 140532586452736] INTERNAL T26_U12686_M0, 000, SAPSYS, ,
time=13:05:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 13:05:28:979 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012291} {root-id=730EFE
[Thr 140532588566272] INTERNAL T26_U12686_M0, 000, SAPSYS, ,
time=13:05:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 13:10:26:452 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000122b5} {root-id=730EFE
[Thr 140532586981120] INTERNAL T19_U12848_M0, 000, SAPSYS, ,
time=13:10:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 13:15:26:474 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000122d8} {root-id=730EFE
[Thr 140532590151424] INTERNAL T33_U13007_M0, 000, SAPSYS, ,
time=13:15:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 13:15:28:966 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000122dc} {root-id=730EFE
[Thr 140532586981120] INTERNAL T33_U13007_M0, 000, SAPSYS, ,
time=13:15:28, W15, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 13:20:26:459 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012304} {root-id=730EFE
[Thr 140532589094656] INTERNAL T30_U13182_M0, 000, SAPSYS, ,
time=13:20:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 13:25:26:411 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012327} {root-id=730EFE
[Thr 140532590679808] INTERNAL T33_U13374_M0, 000, SAPSYS, ,
time=13:25:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 13:25:28:933 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001232b} {root-id=730EFE
[Thr 140532589094656] INTERNAL T33_U13374_M0, 000, SAPSYS, ,
time=13:25:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 13:30:26:583 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001234f} {root-id=730EFE
[Thr 140532589623040] INTERNAL T25_U13575_M0, 000, SAPSYS, ,
time=13:30:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 13:35:26:445 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012372} {root-id=730EFE
[Thr 140532588037888] INTERNAL T11_U13744_M0, 000, SAPSYS, ,
time=13:35:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 13:35:28:905 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012376} {root-id=730EFE
[Thr 140532589623040] INTERNAL T11_U13744_M0, 000, SAPSYS, ,
time=13:35:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 13:40:26:460 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001239a} {root-id=730EFE
[Thr 140532585924352] INTERNAL T24_U13892_M0, 000, SAPSYS, ,
time=13:40:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 13:45:26:438 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000123bd} {root-id=730EFE
[Thr 140532589094656] INTERNAL T0_U14051_M0, 000, SAPSYS, ,
time=13:45:26, W17, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 13:45:28:878 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000123c1} {root-id=730EFE
[Thr 140532585924352] INTERNAL T0_U14051_M0, 000, SAPSYS, ,
time=13:45:28, W17, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 13:50:26:458 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000123e5} {root-id=730EFE
[Thr 140532587509504] INTERNAL T26_U14248_M0, 000, SAPSYS, ,
time=13:50:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 13:55:26:495 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012408} {root-id=730EFE
[Thr 140532589623040] INTERNAL T24_U14422_M0, 000, SAPSYS, ,
time=13:55:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 13:55:28:968 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001240c} {root-id=730EFE
[Thr 140532587509504] INTERNAL T24_U14422_M0, 000, SAPSYS, ,
time=13:55:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 14:00:26:456 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012430} {root-id=730EFE
[Thr 140532586452736] INTERNAL T6_U14565_M0, 000, SAPSYS, ,
time=14:00:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 14:05:26:608 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012453} {root-id=730EFE
[Thr 140532585924352] INTERNAL T24_U14727_M0, 000, SAPSYS, ,
time=14:05:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 14:05:29:097 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012457} {root-id=730EFE
[Thr 140532586452736] INTERNAL T24_U14727_M0, 000, SAPSYS, ,
time=14:05:28, W15, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 14:10:26:479 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001247b} {root-id=730EFE
[Thr 140532590151424] INTERNAL T6_U14874_M0, 000, SAPSYS, ,
time=14:10:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 14:15:26:613 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001249e} {root-id=730EFE
[Thr 140532587509504] INTERNAL T30_U15055_M0, 000, SAPSYS, ,
time=14:15:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 14:15:29:195 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000124a2} {root-id=730EFE
[Thr 140532590151424] INTERNAL T30_U15055_M0, 000, SAPSYS, ,
time=14:15:29, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 14:20:26:470 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000124ca} {root-id=730EFE
[Thr 140532590679808] INTERNAL T29_U15229_M0, 000, SAPSYS, ,
time=14:20:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 14:25:26:446 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000124ed} {root-id=730EFE
[Thr 140532588566272] INTERNAL T31_U15411_M0, 000, SAPSYS, ,
time=14:25:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 14:25:28:956 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000124f1} {root-id=730EFE
[Thr 140532590679808] INTERNAL T31_U15411_M0, 000, SAPSYS, ,
time=14:25:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 14:30:26:605 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012516} {root-id=730EFE
[Thr 140532585924352] INTERNAL T24_U15595_M0, 000, SAPSYS, ,
time=14:30:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 14:35:26:480 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012539} {root-id=730EFE
[Thr 140532589094656] INTERNAL T33_U15756_M0, 000, SAPSYS, ,
time=14:35:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 14:35:28:956 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001253d} {root-id=730EFE
[Thr 140532585924352] INTERNAL T33_U15756_M0, 000, SAPSYS, ,
time=14:35:28, W14, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 14:40:26:576 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012561} {root-id=730EFE
[Thr 140532587509504] INTERNAL T31_U15904_M0, 000, SAPSYS, ,
time=14:40:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 14:45:26:532 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012584} {root-id=730EFE
[Thr 140532589623040] INTERNAL T21_U16068_M0, 000, SAPSYS, ,
time=14:45:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 14:45:29:028 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012588} {root-id=730EFE
[Thr 140532587509504] INTERNAL T21_U16068_M0, 000, SAPSYS, ,
time=14:45:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 14:50:26:472 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000125ac} {root-id=730EFE
[Thr 140532586452736] INTERNAL T34_U16289_M0, 000, SAPSYS, ,
time=14:50:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 14:55:26:472 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000125cf} {root-id=730EFE
[Thr 140532585924352] INTERNAL T17_U16509_M0, 000, SAPSYS, ,
time=14:55:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 14:55:28:937 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000125d3} {root-id=730EFE
[Thr 140532586452736] INTERNAL T17_U16509_M0, 000, SAPSYS, ,
time=14:55:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 15:00:26:461 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000125f7} {root-id=730EFE
[Thr 140532590151424] INTERNAL T22_U16660_M0, 000, SAPSYS, ,
time=15:00:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 15:05:26:479 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001261a} {root-id=730EFE
[Thr 140532587509504] INTERNAL T0_U16832_M0, 000, SAPSYS, ,
time=15:05:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 15:05:29:002 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001261e} {root-id=730EFE
[Thr 140532590151424] INTERNAL T0_U16832_M0, 000, SAPSYS, ,
time=15:05:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 15:10:26:474 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012642} {root-id=730EFE
[Thr 140532588566272] INTERNAL T33_U16983_M0, 000, SAPSYS, ,
time=15:10:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 15:15:26:602 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012665} {root-id=730EFE
[Thr 140532586452736] INTERNAL T22_U17141_M0, 000, SAPSYS, ,
time=15:15:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 15:15:29:166 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012669} {root-id=730EFE
[Thr 140532588566272] INTERNAL T22_U17141_M0, 000, SAPSYS, ,
time=15:15:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 15:20:26:451 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012691} {root-id=730EFE
[Thr 140532588037888] INTERNAL T33_U17322_M0, 000, SAPSYS, ,
time=15:20:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 15:25:26:421 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000126b4} {root-id=730EFE
[Thr 140532586981120] INTERNAL T25_U17496_M0, 000, SAPSYS, ,
time=15:25:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 15:25:28:939 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000126b8} {root-id=730EFE
[Thr 140532588037888] INTERNAL T25_U17496_M0, 000, SAPSYS, ,
time=15:25:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 15:30:26:482 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000126fc} {root-id=730EFE
[Thr 140532588037888] INTERNAL T33_U17643_M0, 000, SAPSYS, ,
time=15:30:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 15:35:26:477 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001271f} {root-id=730EFE
[Thr 140532589094656] INTERNAL T30_U17806_M0, 000, SAPSYS, ,
time=15:35:26, W10, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 15:35:28:968 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012723} {root-id=730EFE
[Thr 140532588037888] INTERNAL T30_U17806_M0, 000, SAPSYS, ,
time=15:35:28, W10, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 15:40:26:500 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012747} {root-id=730EFE
[Thr 140532587509504] INTERNAL T6_U17958_M0, 000, SAPSYS, ,
time=15:40:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 15:45:26:472 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001276a} {root-id=730EFE
[Thr 140532589623040] INTERNAL T34_U18176_M0, 000, SAPSYS, ,
time=15:45:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 15:45:28:951 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001276e} {root-id=730EFE
[Thr 140532587509504] INTERNAL T34_U18176_M0, 000, SAPSYS, ,
time=15:45:28, W16, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 15:50:26:606 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012792} {root-id=730EFE
[Thr 140532586452736] INTERNAL T9_U18378_M0, 000, SAPSYS, ,
time=15:50:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 15:54:35:136 2024
[Thr 140532586452736] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532586452736] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532586452736] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532586452736] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532586452736] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532586452736] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532586452736] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532586452736] (754_STACK patchno 200,linuxx86_64_gcc43) CommonCryptoLib
8.5.50 (/usr/sap/Q20/D02/exe/libsapcrypto.so)
[Thr 140532586452736] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532586452736] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532586452736] >> ===== SecuSSL ErrStack: =====
[Thr 140532586452736] Peer not trusted
[Thr 140532586452736] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532586452736] # --- Messages -----------
[Thr 140532586452736] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532586452736] # --- Summary -----------
[Thr 140532586452736] #01 Certificate (End Entity): VALID
[Thr 140532586452736] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532586452736] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586452736] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532586452736] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532586452736] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532586452736] #02 Certificate (Issuer): VALID
[Thr 140532586452736] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586452736] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532586452736] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532586452736] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532586452736] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532586452736] ----- END VERIFICATION RESULT -----
[Thr 140532586452736] << =============================
[Thr 140532586452736] Target Hostname="apps.support.sap.com"
[Thr 140532586452736] SSL NI-hdl 176: local=10.200.50.156:19400
peer=155.56.96.48:443
[Thr 140532586452736] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd02c042a30)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532586452736] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532586452736] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532586452736]
[Thr 140532586452736] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532586452736] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532586452736] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532586452736] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532586452736] SSL NI-hdl 176: local=10.200.50.156:19400
peer=155.56.96.48:443
[Thr 140532586452736] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532586452736] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532586452736] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532586452736] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532586452736] Target Hostname="apps.support.sap.com"
[Thr 140532586452736] >> ---- SecuSSL ErrStack: ----
[Thr 140532586452736] Peer not trusted
[Thr 140532586452736] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532586452736] # --- Messages -----------
[Thr 140532586452736] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532586452736] # --- Summary -----------
[Thr 140532586452736] #01 Certificate (End Entity): VALID
[Thr 140532586452736] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532586452736] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586452736] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532586452736] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532586452736] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532586452736] #02 Certificate (Issuer): VALID
[Thr 140532586452736] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586452736] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532586452736] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532586452736] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532586452736] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532586452736] ----- END VERIFICATION RESULT -----
[Thr 140532586452736] << ---------------------------
[Thr 140532586452736]
[Thr 140532586452736] {000127af} {root-id=730EFE781C731EEEBDE82B0FA40C2B3A}
[icxxconn.c 2536]
[Thr 140532586452736] GUI T30_U18420_M0, 000, DDIC, EC2AMAZ-6OB0VGC,
time=15:54:35, W19, program=RSHTTPPIN, high priori
[Thr 140532586452736] role: Client, protocol: HTTPS, local:
10.200.50.156:19400, peer: 155.56.96.48:443
[Thr 140532590151424] Wed Apr 10 15:55:26:475 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000127b6} {root-id=730EFE
[Thr 140532590151424] INTERNAL T22_U18564_M0, 000, SAPSYS, ,
time=15:55:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 15:55:28:970 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000127ba} {root-id=730EFE
[Thr 140532586981120] INTERNAL T22_U18564_M0, 000, SAPSYS, ,
time=15:55:28, W14, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 16:00:26:476 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000127de} {root-id=730EFE
[Thr 140532586452736] INTERNAL T33_U18718_M0, 000, SAPSYS, ,
time=16:00:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 16:06:31:594 2024
[Thr 140532586981120] *** ERROR => IcmReadFromPartner(id=2/337926): No data from
server received, role: Server, (rc=MPI_EBROKEN: pip
[Thr 140532589094656] Wed Apr 10 16:06:36:477 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00022807} {root-id=730EFE
[Thr 140532589094656] INTERNAL T0_U18878_M0, 000, SAPSYS, ,
time=16:05:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 16:06:38:346 2024
[Thr 140532587509504] *** ERROR => IcmReadFromPartner(id=6/337923): No data from
server received, role: Server, (rc=MPI_EBROKEN: pip
[Thr 140532587509504] *** ERROR => IcmCreateDpRequest: Session does not exist
[icxxthr.c 4773]
[Thr 140532588566272] *** ERROR => IcmReadFromPartner(id=7/337924): No data from
server received, role: Server, (rc=MPI_EBROKEN: pip
[Thr 140532588037888] Wed Apr 10 16:06:38:573 2024
[Thr 140532588037888] *** ERROR => IcmReadFromPartner(id=1/337921): No data from
server received, role: Server, (rc=MPI_EBROKEN: pip
[Thr 140532586981120] Wed Apr 10 16:06:42:271 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001280d} {root-id=730EFE
[Thr 140532586981120] INTERNAL T0_U18878_M0, 000, SAPSYS, ,
time=16:06:39, W18, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 16:10:26:549 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012829} {root-id=730EFE
[Thr 140532586452736] INTERNAL T33_U19060_M0, 000, SAPSYS, ,
time=16:10:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 16:15:26:518 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052852} {root-id=730EFE
[Thr 140532589623040] INTERNAL T0_U19270_M0, 000, SAPSYS, ,
time=16:15:26, W14, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 16:20:27:562 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092879} {root-id=730EFE
[Thr 140532587509504] INTERNAL T0_U19491_M0, 000, SAPSYS, ,
time=16:20:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 16:20:27:950 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009287b} {root-id=730EFE
[Thr 140532590151424] INTERNAL T0_U19491_M0, 000, SAPSYS, ,
time=16:20:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 16:25:28:534 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000028a7} {root-id=730EFE
[Thr 140532585924352] INTERNAL T14_U19757_M0, 000, SAPSYS, ,
time=16:25:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 16:30:27:551 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000928ca} {root-id=730EFE
[Thr 140532586981120] INTERNAL T38_U19972_M0, 000, SAPSYS, ,
time=16:30:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 16:30:33:920 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000928ce} {root-id=730EFE
[Thr 140532587509504] INTERNAL T38_U19972_M0, 000, SAPSYS, ,
time=16:30:33, W17, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 16:35:27:364 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000928f2} {root-id=730EFE
[Thr 140532589094656] INTERNAL T39_U20230_M0, 000, SAPSYS, ,
time=16:35:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 16:40:27:445 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092915} {root-id=730EFE
[Thr 140532588566272] INTERNAL T12_U20490_M0, 000, SAPSYS, ,
time=16:40:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 16:40:32:580 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092919} {root-id=730EFE
[Thr 140532589094656] INTERNAL T12_U20490_M0, 000, SAPSYS, ,
time=16:40:32, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 16:45:27:872 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0002293e} {root-id=730EFE
[Thr 140532586452736] INTERNAL T22_U20820_M0, 000, SAPSYS, ,
time=16:45:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 16:50:27:471 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092961} {root-id=730EFE
[Thr 140532590151424] INTERNAL T15_U21189_M0, 000, SAPSYS, ,
time=16:50:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 16:50:33:753 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092965} {root-id=730EFE
[Thr 140532585924352] INTERNAL T15_U21189_M0, 000, SAPSYS, ,
time=16:50:33, W16, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 16:55:27:655 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092989} {root-id=730EFE
[Thr 140532589623040] INTERNAL T9_U21584_M0, 000, SAPSYS, ,
time=16:55:26, W15, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 17:00:29:843 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000929ac} {root-id=730EFE
[Thr 140532590679808] INTERNAL T36_U21770_M0, 000, SAPSYS, ,
time=17:00:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 17:00:36:493 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000929b0} {root-id=730EFE
[Thr 140532589623040] INTERNAL T36_U21770_M0, 000, SAPSYS, ,
time=17:00:36, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 17:05:27:819 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000929d4} {root-id=730EFE
[Thr 140532589094656] INTERNAL T10_U21990_M0, 000, SAPSYS, ,
time=17:05:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 17:10:27:661 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000929f7} {root-id=730EFE
[Thr 140532585924352] INTERNAL T28_U22256_M0, 000, SAPSYS, ,
time=17:10:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 17:10:33:583 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000929fb} {root-id=730EFE
[Thr 140532589094656] INTERNAL T28_U22256_M0, 000, SAPSYS, ,
time=17:10:33, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 17:15:27:708 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092a1f} {root-id=730EFE
[Thr 140532588566272] INTERNAL T27_U22528_M0, 000, SAPSYS, ,
time=17:15:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 17:20:27:630 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092a45} {root-id=730EFE
[Thr 140532588566272] INTERNAL T12_U22771_M0, 000, SAPSYS, ,
time=17:20:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 17:20:33:619 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092a4a} {root-id=730EFE
[Thr 140532590151424] INTERNAL T12_U22771_M0, 000, SAPSYS, ,
time=17:20:33, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 17:25:27:502 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052a70} {root-id=730EFE
[Thr 140532585924352] INTERNAL T21_U23011_M0, 000, SAPSYS, ,
time=17:25:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 17:30:27:775 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00062a9c} {root-id=730EFE
[Thr 140532590151424] INTERNAL T36_U23200_M0, 000, SAPSYS, ,
time=17:30:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 17:30:34:088 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00062aa1} {root-id=730EFE
[Thr 140532586981120] INTERNAL T36_U23200_M0, 000, SAPSYS, ,
time=17:30:33, W12, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 17:35:29:064 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092ac5} {root-id=730EFE
[Thr 140532589623040] INTERNAL T37_U23410_M0, 000, SAPSYS, ,
time=17:35:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 17:40:27:661 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092ae7} {root-id=730EFE
[Thr 140532585924352] INTERNAL T18_U23645_M0, 000, SAPSYS, ,
time=17:40:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 17:40:33:044 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092aec} {root-id=730EFE
[Thr 140532589623040] INTERNAL T18_U23645_M0, 000, SAPSYS, ,
time=17:40:32, W16, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 17:45:27:821 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052b11} {root-id=730EFE
[Thr 140532589623040] INTERNAL T35_U23912_M0, 000, SAPSYS, ,
time=17:45:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 17:46:00:897 2024
[Thr 140532589094656] SSL_get_state()==0x1180 "TLS read client certificate A"
[Thr 140532589094656] *** ERROR in secussl_read: SSL_read() lasterr 0x20001046
[Thr 140532589094656] => "received a fatal TLS certificate unknown alert message
from the peer"
[Thr 140532589094656] srv SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLS.pse"
(load=Fri Apr 5 11:51:37 2024, rcnt=10)
[Thr 140532589094656] Subject : CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532589094656] Issuer : CN=SubordinateCA-Production, DC=corp, DC=ads,
DC=swissport, DC=aero
[Thr 140532589094656] SerialNo:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532589094656] Validity - NotBefore: Tue Mar 26 11:09:13 2024
(240326100913Z)
[Thr 140532589094656] NotAfter: Thu Mar 26 11:09:13 2026
(260326100913Z)
[Thr 140532589094656] SSL_CTX ciphersuites=135:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532589094656] Server SSL_CTX 7fd00c089d00 pvflags=897
(TLSv1.2,TLSv1.1,TLSv1.0,BC)
[Thr 140532589094656] TLSextSNI server_name="vq20app.sap.swissport.aero"
[Thr 140532589094656] (754_STACK patchno 200,linuxx86_64_gcc43) CommonCryptoLib
8.5.50 (/usr/sap/Q20/D02/exe/libsapcrypto.so)
[Thr 140532589094656] secussl_read: SSL_read() failed (536875078/0x20001046)
[Thr 140532589094656] => "received a fatal TLS certificate unknown alert message
from the peer"
[Thr 140532589094656] SSL NI-hdl 148: local=10.200.50.133:8443
peer=10.75.16.232:59175
[Thr 140532589094656] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd01c0454e0)==SSSLERR_ALERT_CERTIFICATE_UNKNOWN
[Thr 140532589094656] *** ERROR => IcmConnInitServerSSL: SapSSLSessionStartNB
returned (-127): SSSLERR_ALERT_CERTIFICATE_UNKNOWN [ic
[Thr 140532590151424] Wed Apr 10 17:50:27:690 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092b37} {root-id=730EFE
[Thr 140532590151424] INTERNAL T11_U24215_M0, 000, SAPSYS, ,
time=17:50:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 17:50:33:588 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092b3c} {root-id=730EFE
[Thr 140532588037888] INTERNAL T11_U24215_M0, 000, SAPSYS, ,
time=17:50:32, W16, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 17:53:37:655 2024
[Thr 140532589623040] *** ERROR => NULL bytes in HTTP request {00022b55}
[http_plg.c 6916]
[Thr 140532589623040] role: Server, protocol: HTTP, local:
10.200.50.133:8002, peer: 10.9.168.118:61993
[Thr 140532589623040] *** WARNING => HttpParseRequestHeader: Hint: NULL bytes in
HTTP request are often caused by HTTPS traffic arri
[Thr 140532589623040] *** ERROR => HttpPlugInHandleNetData: HttpParseRequestHeader
failed (rc=701) [http_plg.c 2525]
[Thr 140532585924352] *** ERROR => NULL bytes in HTTP request {00022b57}
[http_plg.c 6916]
[Thr 140532585924352] role: Server, protocol: HTTP, local:
10.200.50.133:8002, peer: 10.9.168.118:61996
[Thr 140532585924352] *** WARNING => HttpParseRequestHeader: Hint: NULL bytes in
HTTP request are often caused by HTTPS traffic arri
[Thr 140532585924352] *** ERROR => HttpPlugInHandleNetData: HttpParseRequestHeader
failed (rc=701) [http_plg.c 2525]
[Thr 140532589094656] Wed Apr 10 17:53:45:176 2024
[Thr 140532589094656] *** ERROR => NULL bytes in HTTP request {00022b5a}
[http_plg.c 6916]
[Thr 140532589094656] role: Server, protocol: HTTP, local:
10.200.50.133:8002, peer: 10.9.168.118:62005
[Thr 140532589094656] *** WARNING => HttpParseRequestHeader: Hint: NULL bytes in
HTTP request are often caused by HTTPS traffic arri
[Thr 140532589094656] *** ERROR => HttpPlugInHandleNetData: HttpParseRequestHeader
failed (rc=701) [http_plg.c 2525]
[Thr 140532588566272] *** ERROR => NULL bytes in HTTP request {00022b5b}
[http_plg.c 6916]
[Thr 140532588566272] role: Server, protocol: HTTP, local:
10.200.50.133:8002, peer: 10.9.168.118:62006
[Thr 140532588566272] *** WARNING => HttpParseRequestHeader: Hint: NULL bytes in
HTTP request are often caused by HTTPS traffic arri
[Thr 140532588566272] *** ERROR => HttpPlugInHandleNetData: HttpParseRequestHeader
failed (rc=701) [http_plg.c 2525]
[Thr 140532588037888] Wed Apr 10 17:55:27:453 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00062b67} {root-id=730EFE
[Thr 140532588037888] INTERNAL T16_U24505_M0, 000, SAPSYS, ,
time=17:55:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 18:00:27:273 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052b8a} {root-id=730EFE
[Thr 140532588037888] INTERNAL T35_U24753_M0, 000, SAPSYS, ,
time=18:00:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 18:00:31:492 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052b8f} {root-id=730EFE
[Thr 140532589094656] INTERNAL T35_U24753_M0, 000, SAPSYS, ,
time=18:00:31, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 18:05:27:679 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092bb2} {root-id=730EFE
[Thr 140532586981120] INTERNAL T38_U25047_M0, 000, SAPSYS, ,
time=18:05:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 18:10:29:393 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092bd5} {root-id=730EFE
[Thr 140532585924352] INTERNAL T31_U25264_M0, 000, SAPSYS, ,
time=18:10:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 18:10:35:347 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092bda} {root-id=730EFE
[Thr 140532586452736] INTERNAL T31_U25264_M0, 000, SAPSYS, ,
time=18:10:34, W18, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 18:15:27:745 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052bff} {root-id=730EFE
[Thr 140532586981120] INTERNAL T2_U25507_M0, 000, SAPSYS, ,
time=18:15:26, W6, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 18:20:27:685 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012c29} {root-id=730EFE
[Thr 140532590151424] INTERNAL T10_U25766_M0, 000, SAPSYS, ,
time=18:20:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 18:20:33:506 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012c2e} {root-id=730EFE
[Thr 140532586981120] INTERNAL T10_U25766_M0, 000, SAPSYS, ,
time=18:20:33, W14, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 18:25:27:896 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052c53} {root-id=730EFE
[Thr 140532589094656] INTERNAL T19_U26023_M0, 000, SAPSYS, ,
time=18:25:26, W9, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 18:30:27:531 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052c7c} {root-id=730EFE
[Thr 140532589094656] INTERNAL T33_U26274_M0, 000, SAPSYS, ,
time=18:30:26, W9, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 18:30:32:982 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052c81} {root-id=730EFE
[Thr 140532586981120] INTERNAL T33_U26274_M0, 000, SAPSYS, ,
time=18:30:32, W9, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 18:35:27:925 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092ca4} {root-id=730EFE
[Thr 140532590679808] INTERNAL T38_U26558_M0, 000, SAPSYS, ,
time=18:35:26, W9, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 18:40:28:052 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092cc8} {root-id=730EFE
[Thr 140532585924352] INTERNAL T11_U26802_M0, 000, SAPSYS, ,
time=18:40:26, W5, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 18:40:35:162 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092ccd} {root-id=730EFE
[Thr 140532590151424] INTERNAL T11_U26802_M0, 000, SAPSYS, ,
time=18:40:34, W5, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532577003264] Wed Apr 10 18:44:22:837 2024
[Thr 140532577003264] IcmHandleAdmMsg: set param rdisp/TRACE -> 3
[Thr 140532577003264] IcmSetTrcLevel: Switch trace level to: 3
[Thr 140532577003264] *
[Thr 140532577003264] * SWITCH TRC-LEVEL to 3
[Thr 140532577003264] *
[Thr 140532577003264] eppSetTraceLevel: changing trace level to 3
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_ICMAN_OPCODE_RESP request
(rq_id 25530648, slot 422)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530648
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530649)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=66), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530649 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530649
[Thr 140532577003264] -IN-- ca_blk 16 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 16
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530649, slot 423)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530649)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c0d7a20
[Thr 140532577003264] IcmCreateRequest: Append request 354089
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c0d7a20
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530649, slot 423)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 16 with request rq_id
25530649
[Thr 140532577003264] DpCaRelBlk: released ca_blk 16
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532588566272] IcmWorkerHandleRequest: worker 4 got the semaphore
[Thr 140532588566272] Wed Apr 10 18:44:22:841 2024
[Thr 140532588566272] REQUEST:
Type: ADMMSG Index = 354089
[Thr 140532588566272] MPI<75abc>bb#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532588566272] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532588566272] MPI<75abb>bc#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532588566272] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532588566272] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532588566272] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532588566272] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532588566272] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532588566272] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532588566272] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532588566272] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532588566272] MPI<75abc>bb#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532588566272] MPI<75abb>bc#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532588566272] IcmWorkerThread: Thread 4: Waiting for event
[Thr 140532588566272] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530650)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=67), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530650 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530650
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530650, slot 424)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530650)
[Thr 140532577003264] Wed Apr 10 18:44:22:844 2024
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c0e8cf0
[Thr 140532577003264] IcmCreateRequest: Append request 354090
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c0e8cf0
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530650, slot 424)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530650
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585924352] IcmWorkerHandleRequest: worker 9 got the semaphore
[Thr 140532585924352] REQUEST:
Type: ADMMSG Index = 354090
[Thr 140532585924352] MPI<75abe>bb#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532585924352] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532585924352] MPI<75abd>bc#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532585924352] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532585924352] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532585924352] MPI<75abe>bb#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532585924352] MPI<75abd>bc#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532585924352] IcmWorkerThread: Thread 9: Waiting for event
[Thr 140532585924352] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530654)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] Wed Apr 10 18:44:22:846 2024
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=68), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530654 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530654
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530654, slot 425)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530654)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c075e10
[Thr 140532577003264] IcmCreateRequest: Append request 354091
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c075e10
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530654, slot 425)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530654
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589623040] IcmWorkerHandleRequest: worker 2 got the semaphore
[Thr 140532589623040] REQUEST:
Type: ADMMSG Index = 354091
[Thr 140532589623040] MPI<75ac0>bb#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532589623040] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532589623040] MPI<75abf>bc#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532589623040] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532589623040] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532589623040] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532589623040] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532589623040] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532589623040] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532589623040] Wed Apr 10 18:44:22:846 2024
[Thr 140532589623040] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532589623040] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532589623040] MPI<75ac0>bb#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532589623040] MPI<75abf>bc#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532589623040] IcmWorkerThread: Thread 2: Waiting for event
[Thr 140532589623040] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530655)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=69), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530655 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530655
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530655, slot 426)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530655)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c077a20
[Thr 140532577003264] IcmCreateRequest: Append request 354092
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c077a20
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530655, slot 426)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530655
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] Wed Apr 10 18:44:22:847 2024
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532590679808] IcmWorkerHandleRequest: worker 0 got the semaphore
[Thr 140532590679808] REQUEST:
Type: ADMMSG Index = 354092
[Thr 140532590679808] MPI<75ac2>bb#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532590679808] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532590679808] MPI<75ac1>bc#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532590679808] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532590679808] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532590679808] MPI<75ac2>bb#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532590679808] MPI<75ac1>bc#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532590679808] IcmWorkerThread: Thread 0: Waiting for event
[Thr 140532590679808] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Wed Apr 10 18:44:24:427 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530661)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=70), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530661 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530661
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530661, slot 427)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530661)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c075240
[Thr 140532577003264] IcmCreateRequest: Append request 354093
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c075240
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530661, slot 427)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530661
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] Wed Apr 10 18:44:24:439 2024
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532588037888] IcmWorkerHandleRequest: worker 5 got the semaphore
[Thr 140532588037888] REQUEST:
Type: ADMMSG Index = 354093
[Thr 140532588037888] MPI<75ac4>bb#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532588037888] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532588037888] MPI<75ac3>bc#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532588037888] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532588037888] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532588037888] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532588037888] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532588037888] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532588037888] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532588037888] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532588037888] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532588037888] MPI<75ac4>bb#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532588037888] MPI<75ac3>bc#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532588037888] IcmWorkerThread: Thread 5: Waiting for event
[Thr 140532588037888] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530662)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=71), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530662 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530662
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] Wed Apr 10 18:44:24:439 2024
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530662, slot 428)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530662)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c06b130
[Thr 140532577003264] IcmCreateRequest: Append request 354094
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c06b130
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530662, slot 428)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530662
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532586981120] IcmWorkerHandleRequest: worker 7 got the semaphore
[Thr 140532586981120] REQUEST:
Type: ADMMSG Index = 354094
[Thr 140532586981120] MPI<75ac6>bb#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532586981120] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532586981120] MPI<75ac5>bc#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532586981120] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532586981120] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586981120] MPI<75ac6>bb#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532586981120] MPI<75ac5>bc#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532586981120] IcmWorkerThread: Thread 7: Waiting for event
[Thr 140532586981120] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Wed Apr 10 18:44:25:578 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530665)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=72), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530665 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530665
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530665, slot 429)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530665)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c0fdce0
[Thr 140532577003264] IcmCreateRequest: Append request 354095
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c0fdce0
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530665, slot 429)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530665
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532586452736] IcmWorkerHandleRequest: worker 8 got the semaphore
[Thr 140532586452736] REQUEST:
Wed Apr 10 18:44:25:578 2024
Type: ADMMSG Index = 354095
[Thr 140532586452736] MPI<75ac8>bb#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532586452736] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532586452736] MPI<75ac7>bc#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532586452736] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532586452736] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532586452736] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532586452736] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532586452736] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532586452736] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532586452736] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532586452736] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532586452736] MPI<75ac8>bb#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532586452736] MPI<75ac7>bc#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532586452736] IcmWorkerThread: Thread 8: Waiting for event
[Thr 140532586452736] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530666)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=73), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530666 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530666
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530666, slot 430)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530666)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] Wed Apr 10 18:44:25:579 2024
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c0fdce0
[Thr 140532577003264] IcmCreateRequest: Append request 354096
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c0fdce0
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530666, slot 430)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530666
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532590151424] IcmWorkerHandleRequest: worker 1 got the semaphore
[Thr 140532590151424] REQUEST:
Type: ADMMSG Index = 354096
[Thr 140532590151424] MPI<75aca>bb#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532590151424] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532590151424] MPI<75ac9>bc#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532590151424] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532590151424] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532590151424] MPI<75aca>bb#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532590151424] MPI<75ac9>bc#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532590151424] IcmWorkerThread: Thread 1: Waiting for event
[Thr 140532590151424] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Wed Apr 10 18:44:26:668 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530674)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=74), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530674 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530674
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530674, slot 431)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530674)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c06b130
[Thr 140532577003264] IcmCreateRequest: Append request 354097
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c06b130
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530674, slot 431)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530674
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2295710 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] Wed Apr 10 18:44:26:668 2024
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532587509504] IcmWorkerHandleRequest: worker 6 got the semaphore
[Thr 140532587509504] REQUEST:
Type: ADMMSG Index = 354097
[Thr 140532587509504] MPI<75acc>bb#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532587509504] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532587509504] MPI<75acb>bc#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532587509504] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532587509504] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532587509504] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532587509504] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532587509504] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532587509504] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532587509504] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532587509504] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532587509504] MPI<75acc>bb#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532587509504] MPI<75acb>bc#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532587509504] IcmWorkerThread: Thread 6: Waiting for event
[Thr 140532587509504] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532585395968] MPI<2>0#2295711 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2295712 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2295713: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2295713 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] Wed Apr 10 18:44:26:669 2024
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530675)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=75), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530675 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530675
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530675, slot 432)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530675)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c075240
[Thr 140532577003264] IcmCreateRequest: Append request 354098
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c075240
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530675, slot 432)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530675
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589094656] IcmWorkerHandleRequest: worker 3 got the semaphore
[Thr 140532589094656] REQUEST:
Type: ADMMSG Index = 354098
[Thr 140532589094656] MPI<75ace>bb#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532589094656] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532589094656] MPI<75acd>bc#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532589094656] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532589094656] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532589094656] MPI<75ace>bb#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532589094656] MPI<75acd>bc#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532589094656] Wed Apr 10 18:44:26:669 2024
[Thr 140532589094656] IcmWorkerThread: Thread 3: Waiting for event
[Thr 140532589094656] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Wed Apr 10 18:44:27:417 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530678)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=76), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530678 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530678
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530678, slot 433)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530678)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c077a20
[Thr 140532577003264] IcmCreateRequest: Append request 354099
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c077a20
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530678, slot 433)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530678
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532588566272] IcmWorkerHandleRequest: worker 4 got the semaphore
[Thr 140532588566272] REQUEST:
Wed Apr 10 18:44:27:417 2024
Type: ADMMSG Index = 354099
[Thr 140532588566272] MPI<75ad0>bb#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532588566272] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532588566272] MPI<75acf>bc#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532588566272] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532588566272] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532588566272] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532588566272] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532588566272] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532588566272] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532588566272] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532588566272] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532588566272] MPI<75ad0>bb#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532588566272] MPI<75acf>bc#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532588566272] IcmWorkerThread: Thread 4: Waiting for event
[Thr 140532588566272] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530679)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=77), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530679 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530679
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530679, slot 434)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530679)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] Wed Apr 10 18:44:27:418 2024
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c075e10
[Thr 140532577003264] IcmCreateRequest: Append request 354100
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c075e10
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530679, slot 434)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530679
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585924352] IcmWorkerHandleRequest: worker 9 got the semaphore
[Thr 140532585924352] REQUEST:
Type: ADMMSG Index = 354100
[Thr 140532585924352] MPI<75ad2>bb#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532585924352] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532585924352] MPI<75ad1>bc#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532585924352] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532585924352] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532585924352] MPI<75ad2>bb#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532585924352] MPI<75ad1>bc#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532585924352] IcmWorkerThread: Thread 9: Waiting for event
[Thr 140532585924352] DpRqFreePendingRequests: freed 0 pending request
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 181 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 181/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] Wed Apr 10 18:44:27:437 2024
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 181 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 181 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 181 from 10.200.51.221:24340
[Thr 140533415016064] NiIAccept: hdl 181 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 1/339178/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.221 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 354101
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532589623040] IcmWorkerHandleRequest: worker 2 got the semaphore
[Thr 140532589623040] REQ TRACE BEGIN: 1/339178/1
[Thr 140532589623040] REQUEST:
Type: ACCEPT_CONNECTION Index = 354101
[Thr 140532589623040] CONNECTION (id=1/339178):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 181, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.221:24340 ()
status: NOP
connect time: 10.04.2024 18:44:27
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532589623040] MPI 188: event flag already open:7641 key=16641
[Thr 140532589623040] MPI 188: event flag already open:7640 key=16640
[Thr 140532589623040] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532589623040] MPI<75ad3>bc#1 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532589623040] MPI<75ad3>bc#2 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532589623040] MPI 187: event flag already open:7643 key=16643
[Thr 140532589623040] MPI 187: event flag already open:7642 key=16642
[Thr 140532589623040] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532589623040] MPI<75ad4>bb#1 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532589623040] MPI<75ad4>bb#2 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532589623040] ->> SapSSLSessionInit(&sssl_hdl=7fd04f9671d0, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532589623040] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532589623040] Wed Apr 10 18:44:27:439 2024
[Thr 140532589623040] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532589623040] out: sssl_hdl = 7fd040061e40
[Thr 140532589623040] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd040061e40,
cred_hdl=7fd00c064270)
[Thr 140532589623040] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532589623040] ->> SapSSLSetNiHdl(sssl_hdl=7fd040061e40, ni_hdl=181)
[Thr 140532589623040] SSL NI-hdl 181: local=10.200.50.133:8443
peer=10.200.51.221:24340
[Thr 140532589623040] <<- SapSSLSetNiHdl(sssl_hdl=7fd040061e40,
ni_hdl=181)==SAP_O_K
[Thr 140532589623040] ->> SapSSLSessionStartNB(sssl_hdl=7fd040061e40, flags=0x0000,
timeout=500, &IOstat=7fd04f9671dc)
[Thr 140532589623040] NiIBlockMode: leave blockmode for hdl 181 FALSE
[Thr 140532589623040] NiIHdlGetStatus: hdl 181/sock 29 ok, data pending (len=1)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532589623040] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532589623040] ClientHello session_id="5D2DEED1 4377CF2E 850BA87A
AB78C8BD B5DEFBC5 7A0E51C5 5DCF9963 3968B799"
[Thr 140532589623040] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532589623040] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532589623040] TLS_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_AES_256_GCM_SHA384
[Thr 140532589623040] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532589623040] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532589623040] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532589623040] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532589623040] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532589623040] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532589623040] [ssl_bytes_to_cipher_suites]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Received TLS Extensions:
[Thr 140532589623040] Id: 43 - supported_versions [RFC8446]
[Thr 140532589623040] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532589623040] Id: 51 - key_share [RFC8446]
[Thr 140532589623040] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532589623040] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532589623040] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532589623040] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532589623040] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532589623040] [ssl_parse_clienthello_tlsext]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Own TLS certificate:
[Thr 140532589623040] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532589623040] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532589623040] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532589623040] [ssl3_output_cert_chain]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: CA certificate:
[Thr 140532589623040] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532589623040] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532589623040] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532589623040] [ssl3_output_cert_chain]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Offering 2 certificate type(s) for
client authentication:
[Thr 140532589623040] rsa_sign(1)
[Thr 140532589623040] ecdsa_sign(64)
[Thr 140532589623040] [ssl3_get_req_cert_type]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532589623040] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532589623040] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532589623040] [ssl_get_encoded_trusted_ca_list]
[Thr 140532589623040] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532589623040] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532589623040] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532589623040] <-- SSL:SiPoll(sock=29, evt=R, slept = 4 ms) Ready
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] Wed Apr 10 18:44:27:451 2024
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Received message of type
"Certificate" containing no certificates.
[Thr 140532589623040] Renouncing client authentication: verification mode: 1
[Thr 140532589623040] [ssl3_decode_client_certificate]
[Thr 140532589623040] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532589623040] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532589623040] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532589623040] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532589623040] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532589623040] No Client Certificate
[Thr 140532589623040] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532589623040] (failed resume) new TLS session_id="CD3033C5 93E35F48
F54C96C2 14CA4B99 540C485A 1C21DE94 E2570C88 1AA81BBA
[Thr 140532589623040] SapSSLISessionStartFin(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532589623040] <<- SapSSLSessionStartNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532589623040] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd040061e40, &plen=(nil),
&more=(nil), &ios=7fd04b156c38)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] IcmReadFromConn(id=1/339178): request new MPI (0/0)
[Thr 140532589623040] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532589623040] MPI<75ad3>bc#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532589623040] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532589623040] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd040061e40,
&plen=7fd04b156b18, &more=7fd04b156b17, &ios=7fd04b156b1c)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] NiIPeek: peek successful for hdl 181 (r)
[Thr 140532589623040] ->> SapSSLReadNB(sssl_hdl=7fd040061e40, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=6920, max=6928)
[Thr 140532589623040] SSL:SSL_read(reclen= 6936) data, out= 6907
[Thr 140532589623040] <<- SapSSLReadNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "fl=0x00, max=65455, got=6907, more=N,
io=idle"
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd040061e40,
&plen=7fd04b156b18, &more=7fd04b156b17, &ios=7fd04b156b1c)
[Thr 140532589623040] Wed Apr 10 18:44:27:454 2024
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] NiIPeek: peek for hdl 181 timed out (r; 0ms)
[Thr 140532589623040] IcmReadFromConn(id=1/339178): no SSL data available
[Thr 140532589623040] IcmReadFromConn(id=1/339178): read 6907 bytes, 1 readops
(timeout 0)
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] HttpPlugInHandleNetData(rqid=1/339178/1): role: Server(1),
status: 1
[Thr 140532589623040] content-length: 0/0, buf_len: 6907, buf_offset: 0,
buf_status: 0
[Thr 140532589623040] ICT: IctIHttpOpenMessage: 7fd04005dda0 typ=1
[Thr 140532589623040] IctCheckIfValidHostname: Check [api-staging.swissport-
services.com] len 34
[Thr 140532589623040] HttpParseRequestHeader: content length: 6329
[Thr 140532589623040] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532589623040] HttpParseRequestHeader: Version: 1001
[Thr 140532589623040] HttpParseRequestHeader: no server port set
[Thr 140532589623040] HttpParseRequestHeader: Keep-Alive: 1
[Thr 140532589623040] ->> SapSSLGetPeerInfo(sssl_hdl=7fd040061e40,
&cert=7fd04b1566f0, &cert_len=7fd04b1566ec,
[Thr 140532589623040] &subject_dn=7fd04b1566f8, &issuer_dn=7fd04b156700,
&csuite_name=7fd04b156708)
[Thr 140532589623040] <<- SapSSLGetPeerInfo(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] out: cert_len = <no cert>
[Thr 140532589623040] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532589623040] HTTP request (raw) [1/339178/1]:
[Thr 140532589623040] POST
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_inv_ws/800/
zmm_i_inv_ws/inv_aws HTT
[Thr 140532589623040] x-forwarded-for: 52.63.148.205
[Thr 140532589623040] x-forwarded-proto: https
[Thr 140532589623040] x-forwarded-port: 443
[Thr 140532589623040] host: api-staging.swissport-services.com
[Thr 140532589623040] x-amzn-trace-id: Root=1-6616c1eb-53805ce0026e5f182bf65dc4
[Thr 140532589623040] content-length: 6329
[Thr 140532589623040] soapaction: urn:sap-
com:document:sap:rfc:functions:ZMM_I_INVOICE_WS:ZMM_I_INVOICE_WSRequest
[Thr 140532589623040] authorization: XXX
[Thr 140532589623040] content-type: text/xml; charset=UTF-8
[Thr 140532589623040] cookie: sap-usercontext=sap-client=800;
[Thr 140532589623040] accept: */*
[Thr 140532589623040] user-agent: AHC/2.1
[Thr 140532589623040] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532589623040] ->> SapSSLGetPeerInfo(sssl_hdl=7fd040061e40,
&cert=7fd04b155638, &cert_len=7fd04b155634,
[Thr 140532589623040] &subject_dn=7fd04b155640, &issuer_dn=7fd04b155648,
&csuite_name=7fd04b1556c8)
[Thr 140532589623040] <<- SapSSLGetPeerInfo(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] out: cert_len = <no cert>
[Thr 140532589623040] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532589623040] HttpCheckUserAgent: Function call IcmRegExec(expr=AHC/2.1)
failed with rc=1
[Thr 140532589623040] sap-cancel-on-close not found
[Thr 140532589623040] DpPlgGetVirtHost: search virt host for 2/api-
staging.swissport-services.com/8443
[Thr 140532589623040] Wed Apr 10 18:44:27:455 2024
[Thr 140532589623040] DpPlgGetVirtHost: no server defined, use default
[Thr 140532589623040] HttpGetVirtHost: use virt_host_idx 0 for api-
staging.swissport-services.com:8443
[Thr 140532589623040] HttpSrvHdlRequest: method: 2; path:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_inv_ws
[Thr 140532589623040] Handler 0: HttpAuthHandler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_in
[Thr 140532589623040] Handler 1: HttpModHandler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_inv
[Thr 140532589623040] Handler 2: HttpCacheHandler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_i
[Thr 140532589623040] Handler 6: HttpSAPR3Handler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_i
[Thr 140532589623040] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532589623040] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532589623040] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532589623040] >> start >>
CsiExecute(7fd02401e940,7fd04b150a20,99,1,7fd04b150a10,7fd04b1509f4,0)
[Thr 140532589623040] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532589623040] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532589623040] << end << CsiExecute(CSI_RC==OK)
[Thr 140532589623040] >> start >> CsiFreeInstance((nil))
[Thr 140532589623040] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532589623040] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532589623040] HttpModHandler: process 1, header_len 578
[Thr 140532589623040] ->> SapSSLGetPeerInfo(sssl_hdl=7fd040061e40,
&cert=7fd04b1518a0, &cert_len=7fd04b151580,
[Thr 140532589623040] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532589623040] <<- SapSSLGetPeerInfo(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] out: cert_len = <no cert>
[Thr 140532589623040] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532589623040] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532589623040] HttpModHandler: perform the actions: (128)
[Thr 140532589623040] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532589623040] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532589623040] HttpCacheHandler: TASK_REQUEST 578 7fd024001ae0 (nil)
[Thr 140532589623040] ISC: uncacheable request method 2
[Thr 140532589623040] HttpCacheHandler: cache miss.
[Thr 140532589623040] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532589623040] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532589623040] ICT: IctLookupPathTable() -> 0
[Thr 140532589623040] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532589623040] DTRACE(1/339178/1): {root-
id=730EFE781C731EEEBDEB3309ED4C5805}_{conn-id=730EFE781C731EEEBDEB3309ED4C7805}_1
[Thr 140532589623040] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532589623040] IcmPlFlushBuf: Flushing 6907 Bytes, buf_status: 6
[Thr 140532589623040] Wed Apr 10 18:44:27:456 2024
[Thr 140532589623040] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532589623040] flush buffer with mpi buffer id 7
[Thr 140532589623040] MPI<75ad3>bc#4 FlushOutbuf 7 1 0 255cb0 6987 6 ->
7fd050314cb0 MPI_OK
[Thr 140532589623040] IcmPlFlushBuf: roll in workprocess
[Thr 140532589623040] IcmConnRollInWP: roll in work process
[Thr 140532589623040] IcmCreateDpRequest: Send request to AppServer
[Thr 140532589623040] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532589623040] DpResourcesOk: ca blocks: act/max/usage = 15/6000/0.250000 %
[Thr 140532589623040] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532589623040] DpResourcesOk: logons: act/max/usage = 23/1200/1.916667 %
[Thr 140532589623040] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532589623040] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532589623040] DpResourcesOk: ES: act/max/usage = 2760 MB/10992 MB/25.109171
%
[Thr 140532589623040] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532589623040] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532589623040] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532589623040] DpListRemove: remove elem 22 from tmadm_free_list
[Thr 140532589623040] DpListRemove: 1176 elems in tmadm_free_list
[Thr 140532589623040] DpListInsert: insert elem 22 into tmadm_inuse_list (at begin)
[Thr 140532589623040] DpListInsert: 24 elems in tmadm_inuse_list
[Thr 140532589623040] DpGetFreeUid: new UID: 26998
[Thr 140532589623040] DpSesLockSessionEntry: lock T22_U26998_M0
[Thr 140532589623040] DpSesUnlockSessionEntry: unlocked invalid T22_M0
[Thr 140532589623040] DpInitInternalSession: initialized T22_M0_I0
[Thr 140532589623040] RqQQueueDestroy: Destroy queue <T22_U26997_M0> in slot 71
(51207)
[Thr 140532589623040] RqQQueueDestroy: locked session queue mutex for high priority
[Thr 140532589623040] RqQQueueSlotClear: clear slot 71
[Thr 140532589623040] RqQUnlockSessionQueue: unlocked session queue mutex for high
priority
[Thr 140532589623040] DpITmSlotClear: cleared T22_U26998
[Thr 140532589623040] DpTmSlotAllocate: allocated T22_U26998
[Thr 140532589623040] RqQQueueCreate: Created queue <T22_U26998_M0> in slot 71
(51209) with normal priority
[Thr 140532589623040] DpLogonInit: new logon T22_U26998, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532589623040] IcmSendRq: created T22_U26998_M0
[Thr 140532589623040] DpSesGetWorkerType: return workerType DIA for T22_U26998
[Thr 140532589623040] DpRqSlotAllocate: 1 pending requests
[Thr 140532589623040] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
25530682, slot 435)
[Thr 140532589623040] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 25530682) from
ICMAN to local WORKER
[Thr 140532589623040] rq_id 25530682
[Thr 140532589623040] -OUT- ca_blk -1 len 0
[Thr 140532589623040] -OUT- userTrace 3
[Thr 140532589623040] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532589623040] -OUT- mpi rq <75ad3> mpi resp <75ad4> prot
2
[Thr 140532589623040] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532589623040] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532589623040] -OUT- dtrace {root-
id=730EFE781C731EEEBDEB3309ED4C5805}_{conn-id=730EFE781C731EEEBDEB3309ED4C7805}_1
[Thr 140532589623040] -OUT- sender address:
[Thr 140532589623040] -OUT- type LOCAL
[Thr 140532589623040] -OUT- agentType ICMAN
[Thr 140532589623040] -OUT- receiver address:
[Thr 140532589623040] -OUT- type LOCAL
[Thr 140532589623040] -OUT- agentType WORKER workerTyp DIA
[Thr 140532589623040] -OUT- session T22_U26998_M0
[Thr 140532589623040] RqQAddRequest: Add request rq_id 25530682 (DIA) to queue
<T22_U26998_M0> in slot 71 at the end
[Thr 140532589623040] Dump of queue <T22_U26998_M0> in slot 71 (1 requests,
port=0):
[Thr 140532589623040] Wed Apr 10 18:44:27:456 2024
[Thr 140532589623040] -1 <- 88 (rq_id 25530682, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532589623040] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532589623040] RqQQueueAddToSessionQueue: Added queue <T22_U26998_M0> in
slot 71 to normal priority session queue at the end
[Thr 140532589623040] Session queue dump (normal priority, 1 elements, peak 2):
[Thr 140532589623040] -1 <- 71 < T22_U26998_M0> -> -1
[Thr 140532589623040] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532589623040] RqQNotifySessionQueue: notify normal priority session queue
of queue <T22_U26998_M0> (DIA) (id=79)
[Thr 140532589623040] Info of W15 (inside function RqQNotifyWorker (end))
[Thr 140532589623040] noOfPendingQueues=>W15-0<
[Thr 140532589623040] noOfWaitForQueues=>W15-2<
[Thr 140532589623040] wait for queue 81 (T29_U26820_M0)
[Thr 140532589623040] wait for queue 20 (W15)
[Thr 140532589623040] lowestPriority: normal priority
[Thr 140532589623040] modCounter=>W15-4043107<
[Thr 140532589623040] RqQNotifyWorker: notify W15 about dispatch queues
(modCounter=>W15-4043107<)
[Thr 140532589623040] RqQSetWorkerState: W15 has state RUNNING (modCounter=>W15-
4043107<)
[Thr 140532589623040] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532589623040] RqQQueueGetNumberOfRequests: Queue <T22_U26998_M0> in slot 71
contains 0 requests of type DIA
[Thr 140532589623040] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 25530682), queue has 0 requests
[Thr 140532589623040] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 25530682,
slot 435)
[Thr 140532589623040] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532589623040] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532589623040] IcmHandleNetRead(id=1/339178): read_len: 6907, HandleNetData
returned: 4
[Thr 140532589623040] IcmHandleNetRead(id=1/339178): status 1 -> 4
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd040061e40,
&plen=7fd04b156c58, &more=7fd04b156c33, &ios=7fd04b156c38)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] IcmReadFromPartner(id=1/339178): read with maximum timeout
500
[Thr 140532589623040] IcmMpiWatchInsert: MPI watch entry <75ad4>, number 11
inserted.
[Thr 140532589623040] MPI<75ad4>bb#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532577003264] Wed Apr 10 18:44:28:246 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530690)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=78), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530690 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530690
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530690, slot 436)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530690)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c0e8cf0
[Thr 140532577003264] IcmCreateRequest: Append request 354102
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c0e8cf0
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530690, slot 436)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530690
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532590679808] IcmWorkerHandleRequest: worker 0 got the semaphore
[Thr 140532590679808] REQUEST:
Wed Apr 10 18:44:28:246 2024
Type: ADMMSG Index = 354102
[Thr 140532590679808] MPI<75ad6>b8#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532590679808] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532590679808] MPI<75ad5>b0#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532590679808] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532590679808] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532590679808] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532590679808] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532590679808] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532590679808] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532590679808] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532590679808] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532590679808] MPI<75ad6>b8#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532590679808] MPI<75ad5>b0#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532590679808] IcmWorkerThread: Thread 0: Waiting for event
[Thr 140532590679808] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530691)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=79), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530691 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530691
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530691, slot 437)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530691)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] Wed Apr 10 18:44:28:247 2024
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c0d7a20
[Thr 140532577003264] IcmCreateRequest: Append request 354103
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c0d7a20
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530691, slot 437)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530691
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532588037888] IcmWorkerHandleRequest: worker 5 got the semaphore
[Thr 140532588037888] REQUEST:
Type: ADMMSG Index = 354103
[Thr 140532588037888] MPI<75ad8>b8#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532588037888] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532588037888] MPI<75ad7>b0#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532588037888] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532588037888] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532588037888] MPI<75ad8>b8#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532588037888] MPI<75ad7>b0#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532588037888] IcmWorkerThread: Thread 5: Waiting for event
[Thr 140532588037888] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532589623040] Wed Apr 10 18:44:29:192 2024
[Thr 140532589623040] MPI<75ad4>bb#6 GetInbuf -1 255cb0 755 (1) -> MPI_EOS: End Of
Stream
[Thr 140532589623040] IcmMpiWatchRemove: MPI watch entry <75ad4>, number 11 removed
(wakeup was not sent).
[Thr 140532589623040] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] PlugInHandleServData(rqid=1/339178/1): role: Server(1),
status: 3
[Thr 140532589623040] content-length: 0/-1, buf_len: 675, buf_offset: 0,
buf_status: 6
[Thr 140532589623040] ICT: IctIHttpOpenMessage: 7fd04007e8d0 typ=2
[Thr 140532589623040] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532589623040] HttpParseResponseHeader: Version: 1001
[Thr 140532589623040] HttpParseResponseHeader: Keep-Alive: 0
[Thr 140532589623040] HTTP response (raw) [1/339178/1]:
[Thr 140532589623040] HTTP/1.1 500 Invalid WSDL access, no SOAP request expected
[Thr 140532589623040] content-type: text/xml
[Thr 140532589623040] content-length: 482
[Thr 140532589623040] sap-icm-log-uname: SWPS_ZYC
[Thr 140532589623040] sap-icm-log-mandt: 800
[Thr 140532589623040] sap-perf-fesrec: 1693644.000000
[Thr 140532589623040] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532589623040] DTRACE(1/339178/1): {root-
id=730EFE781C731EEEBDEB3309ED4C5805}_{conn-id=730EFE781C731EEEBDEB3309ED4C7805}_1
[Thr 140532589623040] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532589623040] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532589623040] HttpSAPR3Handler: Response from AppServer
[Thr 140532589623040] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589623040] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532589623040] HttpCacheHandler: TASK_RESPONSE 193 7fd024001ae0 7fd04007d410
[Thr 140532589623040] ISC: don't cache response (no valid cache key).
[Thr 140532589623040] ICC: don't cache response. scc=0 status=0 len=0 meth=2
[Thr 140532589623040] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589623040] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532589623040] HttpModHandler: process 2, header_len 193
[Thr 140532589623040] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532589623040] HttpModHandler: perform the actions: (128)
[Thr 140532589623040] HttpModSerializeHeaderAndCertificate: serialize new http
header
[Thr 140532589623040] ICT: IctHttpCloseMessage( 7fd04007e8d0 ) -> u=0 rc=0
[Thr 140532589623040] ICT: IctIHttpOpenMessage: 7fd04007e8d0 typ=2
[Thr 140532589623040] Wed Apr 10 18:44:29:192 2024
[Thr 140532589623040] HttpModSerializeHeaderAndCertificate: buffer: 7fd050314d20,
base: 7fd050314cd0, buf_size: 65456, buf_used: 641
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] HTTP response (rewritten) [1/339178/1]:
[Thr 140532589623040] HTTP/1.1 500 Invalid WSDL access, no SOAP request expected
[Thr 140532589623040] content-type: text/xml
[Thr 140532589623040] content-length: 482
[Thr 140532589623040] sap-perf-fesrec: 1693644.000000
[Thr 140532589623040] connection: close
[Thr 140532589623040] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589623040] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532589623040] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532589623040] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpModHandler: process 3, header_len 0
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd04007d410
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532589623040] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532589623040] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532589623040] IcmHandleReadFromPartner(id=1/339178): HandleServData
returned: 702
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] IcmWriteToConn(id=1/339178): prepared to write data to
partner (len = 641, timeout = 2000)
[Thr 140532589623040] ->> SapSSLWriteNB(sssl_hdl=7fd040061e40, buf=7fd050314d20,
len=641, flags=0x0000, timeout=2000, &IOstate=7fd04
[Thr 140532589623040] SSL:SSL_write(len=641) net=670 (out=641 of 641, prev=0)
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=670 of 670)
[Thr 140532589623040] <<- SapSSLWriteNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "buf= 7fd050314d20, written= 641 of 641 (all)
io=idle"
[Thr 140532589623040] IcmWriteToConn(id=1/339178): wrote data to partner (len =
641)
[Thr 140532589623040] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532589623040] MPI<75ad4>bb#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532589623040] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532589623040] ICT: IctHttpCloseMessage( 7fd04005dda0 ) -> u=0 rc=0
[Thr 140532589623040] ICT: IctHttpCloseMessage( 7fd04007e8d0 ) -> u=0 rc=0
[Thr 140532589623040] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f9671d0,flags=0x0000,timeout=10000,&IOstate=7fd0
4b1567fc)
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532589623040] Wed Apr 10 18:44:29:192 2024
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532589623040] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532589623040] in: sssl_hdl = 7fd040061e40
[Thr 140532589623040] in: ... ni_hdl = 181
[Thr 140532589623040] in: flags = 0
[Thr 140532589623040] in: timeout = 10000
[Thr 140532589623040] MPI<75ad3>bc#7 Close( bc ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532589623040] MPI<75ad3>bc#9 Delete( bc ) -> MPI_OK
[Thr 140532589623040] MPI<75ad3>bc#8 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532589623040] MPI<75ad4>bb#8 Close( bb ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532589623040] MPI<75ad4>bb#10 Delete( bb ) -> MPI_OK
[Thr 140532589623040] MPI<75ad4>bb#9 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532589623040] NiIShutdownHandle: shutdown -w of hdl 181
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530711)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:47230
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=80), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530711 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530711
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 01000000EA2C0500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
15
[Thr 140532577003264] -IN-- session T22_U26998_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 25530711, slot 438)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530711)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 1/339178
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
25530711, slot 438)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] Wed Apr 10 18:44:29:192 2024
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589623040] SiPeek: hang up occurred in sock 29
[Thr 140532589623040] NiIPeek: peek for hdl 181 failed (r; rc=1)
[Thr 140532589623040] NiIRead: hdl 181 SSLState 0
[Thr 140532589623040] NiIRead: SiRecv failed for hdl 181/sock 29
[Thr 140532589623040] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.221:24340;
L=10.200.50.133:8443)
[Thr 140532589623040] NiICloseHandle: shutdown and close hdl 181/sock 29
[Thr 140532589623040] IcmConnClose: Connection 1/339178 closed
[Thr 140532589623040] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.221 ->
rc=0
[Thr 140532589623040] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532589623040] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
-> 0
[Thr 140532589623040] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=-1 -> 0
[Thr 140532589623040] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532589623040] REQ TRACE END: 1/339178/1
[Thr 140532589623040] IcmWorkerThread: Thread 2: Waiting for event
[Thr 140532589623040] DpRqFreePendingRequests: freed 0 pending request
[Thr 140533415016064] Wed Apr 10 18:44:31:360 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 182 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 182/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 182 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 182 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 182 from 10.200.51.199:24222
[Thr 140533415016064] NiIAccept: hdl 182 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 6
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 1/339179/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.199 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 354104
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532586981120] IcmWorkerHandleRequest: worker 7 got the semaphore
[Thr 140532586981120] REQ TRACE BEGIN: 1/339179/1
[Thr 140532586981120] REQUEST:
Type: ACCEPT_CONNECTION Index = 354104
[Thr 140532586981120] CONNECTION (id=1/339179):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 182, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.199:24222 ()
status: NOP
connect time: 10.04.2024 18:44:31
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532586981120] MPI 187: event flag already open:7643 key=16643
[Thr 140532586981120] Wed Apr 10 18:44:31:360 2024
[Thr 140532586981120] MPI 187: event flag already open:7642 key=16642
[Thr 140532586981120] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532586981120] MPI<75ad9>bb#1 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532586981120] MPI<75ad9>bb#2 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532586981120] MPI 188: event flag already open:7641 key=16641
[Thr 140532586981120] MPI 188: event flag already open:7640 key=16640
[Thr 140532586981120] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532586981120] MPI<75ada>bc#1 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532586981120] MPI<75ada>bc#2 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532586981120] ->> SapSSLSessionInit(&sssl_hdl=7fd04f9671d0, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532586981120] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532586981120] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532586981120] out: sssl_hdl = 7fd014011190
[Thr 140532586981120] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd014011190,
cred_hdl=7fd00c064270)
[Thr 140532586981120] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532586981120] ->> SapSSLSetNiHdl(sssl_hdl=7fd014011190, ni_hdl=182)
[Thr 140532586981120] SSL NI-hdl 182: local=10.200.50.133:8443
peer=10.200.51.199:24222
[Thr 140532586981120] <<- SapSSLSetNiHdl(sssl_hdl=7fd014011190,
ni_hdl=182)==SAP_O_K
[Thr 140532586981120] ->> SapSSLSessionStartNB(sssl_hdl=7fd014011190, flags=0x0000,
timeout=500, &IOstat=7fd04f9671dc)
[Thr 140532586981120] NiIBlockMode: leave blockmode for hdl 182 FALSE
[Thr 140532586981120] NiIHdlGetStatus: hdl 182/sock 29 ok, data pending (len=1)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532586981120] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532586981120] ClientHello session_id="2A5B5881 852452D1 9C193719
3CFA1F9C 8734C8D3 27FC9A00 B743BF76 7413DE90"
[Thr 140532586981120] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532586981120] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532586981120] TLS_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_AES_256_GCM_SHA384
[Thr 140532586981120] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532586981120] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532586981120] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532586981120] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532586981120] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532586981120] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532586981120] [ssl_bytes_to_cipher_suites]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Received TLS Extensions:
[Thr 140532586981120] Id: 43 - supported_versions [RFC8446]
[Thr 140532586981120] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532586981120] Id: 51 - key_share [RFC8446]
[Thr 140532586981120] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532586981120] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532586981120] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532586981120] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532586981120] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532586981120] [ssl_parse_clienthello_tlsext]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Own TLS certificate:
[Thr 140532586981120] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532586981120] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532586981120] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532586981120] [ssl3_output_cert_chain]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: CA certificate:
[Thr 140532586981120] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532586981120] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532586981120] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532586981120] [ssl3_output_cert_chain]
[Thr 140532586981120] Wed Apr 10 18:44:31:361 2024
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Offering 2 certificate type(s) for
client authentication:
[Thr 140532586981120] rsa_sign(1)
[Thr 140532586981120] ecdsa_sign(64)
[Thr 140532586981120] [ssl3_get_req_cert_type]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532586981120] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532586981120] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532586981120] [ssl_get_encoded_trusted_ca_list]
[Thr 140532586981120] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532586981120] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532586981120] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532586981120] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Received message of type
"Certificate" containing no certificates.
[Thr 140532586981120] Renouncing client authentication: verification mode: 1
[Thr 140532586981120] [ssl3_decode_client_certificate]
[Thr 140532586981120] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532586981120] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532586981120] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532586981120] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532586981120] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532586981120] No Client Certificate
[Thr 140532586981120] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532586981120] (failed resume) new TLS session_id="E42CF9A1 98C458FB
280A8F33 69C149AA 276C1ABE 1EA11E57 1895EF47 295A31D9
[Thr 140532586981120] SapSSLISessionStartFin(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532586981120] <<- SapSSLSessionStartNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532586981120] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014011190, &plen=(nil),
&more=(nil), &ios=7fd04aed1c38)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] IcmReadFromConn(id=1/339179): request new MPI (0/0)
[Thr 140532586981120] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532586981120] MPI<75ad9>bb#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532586981120] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532586981120] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586981120] Wed Apr 10 18:44:31:365 2024
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014011190,
&plen=7fd04aed1b18, &more=7fd04aed1b17, &ios=7fd04aed1b1c)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] NiIPeek: peek successful for hdl 182 (r)
[Thr 140532586981120] ->> SapSSLReadNB(sssl_hdl=7fd014011190, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532586981120] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532586981120] <<- SapSSLReadNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014011190,
&plen=7fd04aed1b18, &more=7fd04aed1b17, &ios=7fd04aed1b1c)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] NiIPeek: peek for hdl 182 timed out (r; 0ms)
[Thr 140532586981120] IcmReadFromConn(id=1/339179): no SSL data available
[Thr 140532586981120] IcmReadFromConn(id=1/339179): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] HttpPlugInHandleNetData(rqid=1/339179/1): role: Server(1),
status: 1
[Thr 140532586981120] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532586981120] ICT: IctIHttpOpenMessage: 7fd014063b80 typ=1
[Thr 140532586981120] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532586981120] HttpParseRequestHeader: no content length set
[Thr 140532586981120] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532586981120] HttpParseRequestHeader: Version: 1001
[Thr 140532586981120] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532586981120] ->> SapSSLGetPeerInfo(sssl_hdl=7fd014011190,
&cert=7fd04aed16f0, &cert_len=7fd04aed16ec,
[Thr 140532586981120] &subject_dn=7fd04aed16f8, &issuer_dn=7fd04aed1700,
&csuite_name=7fd04aed1708)
[Thr 140532586981120] <<- SapSSLGetPeerInfo(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] out: cert_len = <no cert>
[Thr 140532586981120] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586981120] HTTP request (raw) [1/339179/1]:
[Thr 140532586981120] GET /sap/bc/ping HTTP/1.1
[Thr 140532586981120] host: 10.200.50.133:8443
[Thr 140532586981120] connection: close
[Thr 140532586981120] user-agent: ELB-HealthChecker/2.0
[Thr 140532586981120] accept-encoding: gzip, compressed
[Thr 140532586981120] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532586981120] ->> SapSSLGetPeerInfo(sssl_hdl=7fd014011190,
&cert=7fd04aed0638, &cert_len=7fd04aed0634,
[Thr 140532586981120] &subject_dn=7fd04aed0640, &issuer_dn=7fd04aed0648,
&csuite_name=7fd04aed06c8)
[Thr 140532586981120] <<- SapSSLGetPeerInfo(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] out: cert_len = <no cert>
[Thr 140532586981120] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586981120] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532586981120] Wed Apr 10 18:44:31:367 2024
[Thr 140532586981120] sap-cancel-on-close not found
[Thr 140532586981120] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532586981120] DpPlgGetVirtHost: no server defined, use default
[Thr 140532586981120] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532586981120] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532586981120] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532586981120] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532586981120] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532586981120] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532586981120] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532586981120] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532586981120] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532586981120] >> start >>
CsiExecute(7fd02401e940,7fd04aecba20,12,1,7fd04aecba10,7fd04aecb9f4,0)
[Thr 140532586981120] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532586981120] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532586981120] << end << CsiExecute(CSI_RC==OK)
[Thr 140532586981120] >> start >> CsiFreeInstance((nil))
[Thr 140532586981120] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532586981120] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532586981120] HttpModHandler: process 1, header_len 144
[Thr 140532586981120] ->> SapSSLGetPeerInfo(sssl_hdl=7fd014011190,
&cert=7fd04aecc8a0, &cert_len=7fd04aecc580,
[Thr 140532586981120] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532586981120] <<- SapSSLGetPeerInfo(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] out: cert_len = <no cert>
[Thr 140532586981120] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586981120] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586981120] HttpModHandler: perform the actions: (128)
[Thr 140532586981120] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532586981120] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586981120] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532586981120] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532586981120] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532586981120] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532586981120] MTX_LOCK 1760 7fd024005020
[Thr 140532586981120] MTX_UNLOCK 1891 7fd024005020
[Thr 140532586981120] IctCmOpen#350390 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586981120] MTX_LOCK 1760 7fd024004a70
[Thr 140532586981120] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532586981120] Wed Apr 10 18:44:31:367 2024
[Thr 140532586981120] IctCmOpen#450785 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586981120] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532586981120] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532586981120] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532586981120] MTX_LOCK 1760 7fd024005020
[Thr 140532586981120] MTX_UNLOCK 1891 7fd024005020
[Thr 140532586981120] IctCmOpen#350391 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586981120] MTX_LOCK 1760 7fd024004a70
[Thr 140532586981120] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532586981120] IctCmOpen#450786 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586981120] HttpCacheHandler: cache miss.
[Thr 140532586981120] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586981120] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532586981120] ICT: IctLookupPathTable() -> 0
[Thr 140532586981120] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532586981120] DTRACE(1/339179/1): {root-
id=730EFE781C731EEEBDEB33548A20D806}_{conn-id=730EFE781C731EEEBDEB33548A20F806}_1
[Thr 140532586981120] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532586981120] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532586981120] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586981120] flush buffer with mpi buffer id 7
[Thr 140532586981120] MPI<75ad9>bb#4 FlushOutbuf 7 1 0 255cb0 224 6 -> 7fd050314cb0
MPI_OK
[Thr 140532586981120] IcmPlFlushBuf: roll in workprocess
[Thr 140532586981120] IcmConnRollInWP: roll in work process
[Thr 140532586981120] IcmCreateDpRequest: Send request to AppServer
[Thr 140532586981120] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532586981120] DpResourcesOk: ca blocks: act/max/usage = 13/6000/0.216667 %
[Thr 140532586981120] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532586981120] DpResourcesOk: logons: act/max/usage = 21/1200/1.750000 %
[Thr 140532586981120] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532586981120] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532586981120] DpResourcesOk: ES: act/max/usage = 2784 MB/10992 MB/25.327511
%
[Thr 140532586981120] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532586981120] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532586981120] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532586981120] DpListRemove: remove elem 31 from tmadm_free_list
[Thr 140532586981120] DpListRemove: 1178 elems in tmadm_free_list
[Thr 140532586981120] DpListInsert: insert elem 31 into tmadm_inuse_list (at begin)
[Thr 140532586981120] DpListInsert: 22 elems in tmadm_inuse_list
[Thr 140532586981120] DpGetFreeUid: new UID: 27003
[Thr 140532586981120] Wed Apr 10 18:44:31:368 2024
[Thr 140532586981120] DpSesLockSessionEntry: lock T31_U27003_M0
[Thr 140532586981120] DpSesUnlockSessionEntry: unlocked invalid T31_M0
[Thr 140532586981120] DpInitInternalSession: initialized T31_M0_I0
[Thr 140532586981120] RqQQueueDestroy: Destroy queue <T31_U27002_M0> in slot 56
(51222)
[Thr 140532586981120] RqQQueueDestroy: locked session queue mutex for high priority
[Thr 140532586981120] RqQQueueSlotClear: clear slot 56
[Thr 140532586981120] RqQUnlockSessionQueue: unlocked session queue mutex for high
priority
[Thr 140532586981120] DpITmSlotClear: cleared T31_U27003
[Thr 140532586981120] DpTmSlotAllocate: allocated T31_U27003
[Thr 140532586981120] RqQQueueCreate: Created queue <T31_U27003_M0> in slot 56
(51223) with normal priority
[Thr 140532586981120] DpLogonInit: new logon T31_U27003, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532586981120] IcmSendRq: created T31_U27003_M0
[Thr 140532586981120] DpSesGetWorkerType: return workerType DIA for T31_U27003
[Thr 140532586981120] DpRqSlotAllocate: 1 pending requests
[Thr 140532586981120] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
25530731, slot 439)
[Thr 140532586981120] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 25530731) from
ICMAN to local WORKER
[Thr 140532586981120] rq_id 25530731
[Thr 140532586981120] -OUT- ca_blk -1 len 0
[Thr 140532586981120] -OUT- userTrace 3
[Thr 140532586981120] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532586981120] -OUT- mpi rq <75ad9> mpi resp <75ada> prot
2
[Thr 140532586981120] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532586981120] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532586981120] -OUT- dtrace {root-
id=730EFE781C731EEEBDEB33548A20D806}_{conn-id=730EFE781C731EEEBDEB33548A20F806}_1
[Thr 140532586981120] -OUT- sender address:
[Thr 140532586981120] -OUT- type LOCAL
[Thr 140532586981120] -OUT- agentType ICMAN
[Thr 140532586981120] -OUT- receiver address:
[Thr 140532586981120] -OUT- type LOCAL
[Thr 140532586981120] -OUT- agentType WORKER workerTyp DIA
[Thr 140532586981120] -OUT- session T31_U27003_M0
[Thr 140532586981120] RqQAddRequest: Add request rq_id 25530731 (DIA) to queue
<T31_U27003_M0> in slot 56 at the end
[Thr 140532586981120] Dump of queue <T31_U27003_M0> in slot 56 (1 requests,
port=0):
[Thr 140532586981120] -1 <- 70 (rq_id 25530731, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532586981120] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532586981120] RqQQueueAddToSessionQueue: Added queue <T31_U27003_M0> in
slot 56 to normal priority session queue at the end
[Thr 140532586981120] Session queue dump (normal priority, 1 elements, peak 2):
[Thr 140532586981120] -1 <- 56 < T31_U27003_M0> -> -1
[Thr 140532586981120] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532586981120] RqQNotifySessionQueue: notify normal priority session queue
of queue <T31_U27003_M0> (DIA) (id=80)
[Thr 140532586981120] Info of W15 (inside function RqQNotifyWorker (end))
[Thr 140532586981120] noOfPendingQueues=>W15-0<
[Thr 140532586981120] noOfWaitForQueues=>W15-2<
[Thr 140532586981120] wait for queue 81 (T29_U26820_M0)
[Thr 140532586981120] wait for queue 20 (W15)
[Thr 140532586981120] lowestPriority: normal priority
[Thr 140532586981120] modCounter=>W15-4043123<
[Thr 140532586981120] RqQNotifyWorker: notify W15 about dispatch queues
(modCounter=>W15-4043123<)
[Thr 140532586981120] RqQSetWorkerState: W15 has state RUNNING (modCounter=>W15-
4043123<)
[Thr 140532586981120] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532586981120] RqQQueueGetNumberOfRequests: Queue <T31_U27003_M0> in slot 56
contains 0 requests of type DIA
[Thr 140532586981120] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 25530731), queue has 0 requests
[Thr 140532586981120] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 25530731,
slot 439)
[Thr 140532586981120] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532586981120] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532586981120] IcmHandleNetRead(id=1/339179): read_len: 144, HandleNetData
returned: 4
[Thr 140532586981120] IcmHandleNetRead(id=1/339179): status 1 -> 4
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014011190,
&plen=7fd04aed1c58, &more=7fd04aed1c33, &ios=7fd04aed1c38)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] Wed Apr 10 18:44:31:369 2024
[Thr 140532586981120] IcmReadFromPartner(id=1/339179): read with maximum timeout
500
[Thr 140532586981120] IcmMpiWatchInsert: MPI watch entry <75ada>, number 11
inserted.
[Thr 140532586981120] MPI<75ada>bc#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532586981120] Wed Apr 10 18:44:31:541 2024
[Thr 140532586981120] MPI<75ada>bc#6 GetInbuf -1 255cb0 1089 (1) -> MPI_EOS: End Of
Stream
[Thr 140532586981120] IcmMpiWatchRemove: MPI watch entry <75ada>, number 11 removed
(wakeup was not sent).
[Thr 140532586981120] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] PlugInHandleServData(rqid=1/339179/1): role: Server(1),
status: 3
[Thr 140532586981120] content-length: 0/-1, buf_len: 1009, buf_offset: 0,
buf_status: 6
[Thr 140532586981120] ICT: IctIHttpOpenMessage: 7fd014079220 typ=2
[Thr 140532586981120] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532586981120] HttpParseResponseHeader: Version: 1001
[Thr 140532586981120] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532586981120] HTTP response (raw) [1/339179/1]:
[Thr 140532586981120] HTTP/1.1 403 Forbidden
[Thr 140532586981120] content-type: text/html; charset=utf-8
[Thr 140532586981120] content-length: 857
[Thr 140532586981120] sap-perf-fesrec: 165951.000000
[Thr 140532586981120] content-encoding: gzip
[Thr 140532586981120] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532586981120] DTRACE(1/339179/1): {root-
id=730EFE781C731EEEBDEB33548A20D806}_{conn-id=730EFE781C731EEEBDEB33548A20F806}_1
[Thr 140532586981120] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532586981120] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586981120] HttpSAPR3Handler: Response from AppServer
[Thr 140532586981120] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586981120] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586981120] HttpCacheHandler: TASK_RESPONSE 152 7fd024001ae0 7fd01401e8a0
[Thr 140532586981120] ISC: don't cache response: status code=403
[Thr 140532586981120] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532586981120] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586981120] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532586981120] HttpModHandler: process 2, header_len 152
[Thr 140532586981120] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586981120] HttpModHandler: perform the actions: (128)
[Thr 140532586981120] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532586981120] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586981120] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] Wed Apr 10 18:44:31:541 2024
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532586981120] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532586981120] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpModHandler: process 3, header_len 0
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd01401e8a0
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532586981120] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532586981120] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532586981120] IcmHandleReadFromPartner(id=1/339179): HandleServData
returned: 702
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] IcmWriteToConn(id=1/339179): prepared to write data to
partner (len = 1009, timeout = 2000)
[Thr 140532586981120] ->> SapSSLWriteNB(sssl_hdl=7fd014011190, buf=7fd050314d20,
len=1009, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532586981120] SSL:SSL_write(len=1009) net=1038 (out=1009 of 1009,
prev=0)
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1038 of 1038)
[Thr 140532586981120] <<- SapSSLWriteNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "buf= 7fd050314d20, written= 1009 of 1009
(all) io=idle"
[Thr 140532586981120] IcmWriteToConn(id=1/339179): wrote data to partner (len =
1009)
[Thr 140532586981120] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532586981120] MPI<75ada>bc#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532586981120] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532586981120] ICT: IctHttpCloseMessage( 7fd014063b80 ) -> u=0 rc=0
[Thr 140532586981120] ICT: IctHttpCloseMessage( 7fd014079220 ) -> u=0 rc=0
[Thr 140532586981120] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f9671d0,flags=0x0000,timeout=10000,&IOstate=7fd0
4aed17fc)
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532586981120] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532586981120] in: sssl_hdl = 7fd014011190
[Thr 140532586981120] in: ... ni_hdl = 182
[Thr 140532586981120] in: flags = 0
[Thr 140532586981120] in: timeout = 10000
[Thr 140532586981120] MPI<75ad9>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532586981120] MPI<75ad9>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532586981120] MPI<75ad9>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586981120] MPI<75ada>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532586981120] MPI<75ada>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532586981120] Wed Apr 10 18:44:31:541 2024
[Thr 140532586981120] MPI<75ada>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586981120] NiIShutdownHandle: shutdown -w of hdl 182
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 70 (rq_id 25530732)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 70
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:47230
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=81), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530732 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530732
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 01000000EB2C0500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
15
[Thr 140532577003264] -IN-- session T31_U27003_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 25530732, slot 440)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530732)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 1/339179
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
25530732, slot 440)
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2295714 WriteOOB 77
[Thr 140532585395968] MPI<2>0#2295715 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2295716 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2295717: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2295717 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] Wed Apr 10 18:44:31:542 2024
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532586981120] SiPeek: hang up occurred in sock 29
[Thr 140532586981120] NiIPeek: peek for hdl 182 failed (r; rc=1)
[Thr 140532586981120] NiIRead: hdl 182 SSLState 0
[Thr 140532586981120] NiIRead: SiRecv failed for hdl 182/sock 29
[Thr 140532586981120] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.199:24222;
L=10.200.50.133:8443)
[Thr 140532586981120] NiICloseHandle: shutdown and close hdl 182/sock 29
[Thr 140532586981120] IcmConnClose: Connection 1/339179 closed
[Thr 140532586981120] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.199 ->
rc=0
[Thr 140532586981120] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532586981120] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
-> 0
[Thr 140532586981120] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=-1 -> 0
[Thr 140532586981120] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532586981120] REQ TRACE END: 1/339179/1
[Thr 140532586981120] IcmWorkerThread: Thread 7: Waiting for event
[Thr 140532586981120] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Wed Apr 10 18:44:34:436 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Wed Apr 10 18:44:36:547 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2295718 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=4000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 4000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=4000)
[Thr 140532585395968] MPI<2>0#2295719 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2295720 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2295721: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2295721 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] Wed Apr 10 18:44:40:551 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: call schedules, last t: 1712767450, next
t: 1712767480, cur t: 1712767480
[Thr 140532577003264] IcmCreateRequest: Append request 354105
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532586452736] IcmWorkerHandleRequest: worker 8 got the semaphore
[Thr 140532586452736] REQUEST:
Type: SCHEDULER Index = 354105
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532586452736] IcmGetSchedule: found slot 0
[Thr 140532586452736] IcmAlReportPerfData: Reporting data to CCMS Alerting
Infrastructure
[Thr 140532586452736] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140532586452736] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140532586452736] IcmConnInitContext: context initialized
[Thr 140532586452736] IcmGetServicePtr: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 1
[Thr 140532586452736] PlugInHandleAdmMessage: request received:
[Thr 140532586452736] PlugInHandleAdmMessage: opcode: ICM_COM_OP_CACHE_STAT (136),
len: 528, dest_type: 2, subhdlkey: 262145(4/0)
[Thr 140532586452736] HttpISubHandlerItCreate: add reference to table 7fd024010780,
now 2 references, 1 tables used
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_ADM_MSG(4), header_l
[Thr 140532586452736] HttpCacheHandler: TASK_ADM_MSG 0 7fd024001ae0 (nil)
[Thr 140532586452736] SCACHE: adm request received:
[Thr 140532586452736] SCACHE: opcode: 136, len: 528, dest_type: 2, dest:
[Thr 140532586452736] MTX_LOCK 3247 7fd024004a70
[Thr 140532586452736] MTX_UNLOCK 3260 7fd024004a70
[Thr 140532586452736] IctCmGetCacheInfo#450787 -> 0
[Thr 140532586452736] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532586452736] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532586452736] HttpSubHandlerItDelete: remove reference to table
7fd024010780, now 1 references, 1 tables used
[Thr 140532586452736] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532586452736] IcmServDecrRefCount: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 0
[Thr 140532586452736] IcmGetSchedule: next schedule in 30 secs
[Thr 140532586452736] IcmWorkerThread: Thread 8: Waiting for event
[Thr 140532586452736] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Wed Apr 10 18:44:41:476 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 2 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 70 (rq_id 25530790)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 70
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=82), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] Dump of queue <IcmanQueue> in slot 2 (1 requests, in use,
port=59573):
[Thr 140532577003264] -1 <- 32 (rq_id 25530791, NOWP,
REQ_HANDLER_PLUGIN_RESP) -> -1
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530790 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530790
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_ICMAN_OPCODE_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_ICMAN_OPCODE_RESP
request (rq_id 25530790, slot 441)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530790)
[Thr 140532577003264] IcmHandleRequest: change parameter >rdisp/TRACE=>1<
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 334 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_SET_PARAM(11)
[Thr 140532577003264] IcmHandleAdmMsg: set param rdisp/TRACE -> 1
[Thr 140532577003264] HttpSetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] H2SetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] SmtpSetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] IcmSetTrcLevel: Switch trace level to: 1
[Thr 140532577003264] *
[Thr 140532577003264] * SWITCH TRC-LEVEL to 1
[Thr 140532577003264] *
[Thr 140532577003264] eppSetTraceLevel: changing trace level to 1
[Thr 140532590151424] Wed Apr 10 18:45:29:678 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012cf1} {root-id=730EFE
[Thr 140532590151424] INTERNAL T29_U27030_M0, 000, SAPSYS, ,
time=18:45:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 18:50:27:761 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012d14} {root-id=730EFE
[Thr 140532589623040] INTERNAL T32_U27319_M0, 000, SAPSYS, ,
time=18:50:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 18:50:33:744 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012d19} {root-id=730EFE
[Thr 140532589094656] INTERNAL T32_U27319_M0, 000, SAPSYS, ,
time=18:50:33, W15, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 18:55:27:854 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012d3c} {root-id=730EFE
[Thr 140532586981120] INTERNAL T40_U27577_M0, 000, SAPSYS, ,
time=18:55:26, W8, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 19:00:27:602 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012d5f} {root-id=730EFE
[Thr 140532585924352] INTERNAL T35_U27806_M0, 000, SAPSYS, ,
time=19:00:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 19:00:33:986 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012d64} {root-id=730EFE
[Thr 140532586452736] INTERNAL T35_U27806_M0, 000, SAPSYS, ,
time=19:00:33, W15, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 19:05:27:787 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012d87} {root-id=730EFE
[Thr 140532590679808] INTERNAL T27_U28024_M0, 000, SAPSYS, ,
time=19:05:26, W9, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 19:10:27:905 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012daa} {root-id=730EFE
[Thr 140532587509504] INTERNAL T26_U28229_M0, 000, SAPSYS, ,
time=19:10:26, W8, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 19:10:33:899 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012daf} {root-id=730EFE
[Thr 140532588037888] INTERNAL T26_U28229_M0, 000, SAPSYS, ,
time=19:10:33, W8, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 19:15:28:071 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012dd2} {root-id=730EFE
[Thr 140532589094656] INTERNAL T12_U28458_M0, 000, SAPSYS, ,
time=19:15:26, W8, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532577003264] Wed Apr 10 19:20:34:620 2024
[Thr 140532577003264] IcmHandleAdmMsg: set param icm/OP_PSE_CHANGED -> SAPSSLA.pse
[Thr 140532577003264] IcmSSLPseChanged: SSL Certificate SAPSSLA.pse was changed -
refresh
[Thr 140532577003264] = AnonClient SSL_CTX 7fd00c07ea70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532577003264] = AnonClient ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532577003264] Reload OK for SSL cred "/usr/sap/Q20/D02/sec/SAPSSLA.pse"
[Thr 140532585924352] Wed Apr 10 19:20:35:261 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012dfa} {root-id=730EFE
[Thr 140532585924352] INTERNAL T26_U28693_M0, 000, SAPSYS, ,
time=19:20:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 19:20:41:745 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e03} {root-id=730EFE
[Thr 140532588566272] INTERNAL T26_U28693_M0, 000, SAPSYS, ,
time=19:20:41, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 19:25:28:083 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e25} {root-id=730EFE
[Thr 140532586981120] INTERNAL T30_U28930_M0, 000, SAPSYS, ,
time=19:25:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 19:30:28:308 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e49} {root-id=730EFE
[Thr 140532589623040] INTERNAL T33_U29157_M0, 000, SAPSYS, ,
time=19:30:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 19:30:35:421 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e4e} {root-id=730EFE
[Thr 140532590151424] INTERNAL T33_U29157_M0, 000, SAPSYS, ,
time=19:30:34, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 19:35:28:044 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e71} {root-id=730EFE
[Thr 140532590679808] INTERNAL T18_U29380_M0, 000, SAPSYS, ,
time=19:35:26, W13, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 19:40:27:964 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e94} {root-id=730EFE
[Thr 140532589094656] INTERNAL T41_U29588_M0, 000, SAPSYS, ,
time=19:40:26, W13, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 19:40:34:335 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e99} {root-id=730EFE
[Thr 140532588037888] INTERNAL T41_U29588_M0, 000, SAPSYS, ,
time=19:40:33, W13, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 19:45:27:942 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092ebc} {root-id=730EFE
[Thr 140532588566272] INTERNAL T9_U29790_M0, 000, SAPSYS, ,
time=19:45:26, W5, program=SAPMSSY8, high priority, memor
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 19:50:27:971 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092edf} {root-id=730EFE
[Thr 140532586452736] INTERNAL T18_U30023_M0, 000, SAPSYS, ,
time=19:50:26, W3, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 19:50:34:287 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092ee4} {root-id=730EFE
[Thr 140532585924352] INTERNAL T18_U30023_M0, 000, SAPSYS, ,
time=19:50:33, W3, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 19:55:54:038 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f0a} {root-id=730EFE
[Thr 140532588566272] INTERNAL T11_U30249_M0, 000, SAPSYS, ,
time=19:55:51, W15, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 20:00:27:724 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f2a} {root-id=730EFE
[Thr 140532590679808] INTERNAL T12_U30450_M0, 000, SAPSYS, ,
time=20:00:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 20:00:31:088 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f2c} {root-id=730EFE
[Thr 140532586981120] INTERNAL T12_U30450_M0, 000, SAPSYS, ,
time=20:00:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 20:05:27:978 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f4e} {root-id=730EFE
[Thr 140532588566272] INTERNAL T12_U30719_M0, 000, SAPSYS, ,
time=20:05:26, W9, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 20:10:26:474 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f71} {root-id=730EFE
[Thr 140532586452736] INTERNAL T33_U30937_M0, 000, SAPSYS, ,
time=20:10:26, W9, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 20:10:29:339 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f75} {root-id=730EFE
[Thr 140532588566272] INTERNAL T33_U30937_M0, 000, SAPSYS, ,
time=20:10:29, W9, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 20:15:27:400 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f99} {root-id=730EFE
[Thr 140532590151424] INTERNAL T38_U31179_M0, 000, SAPSYS, ,
time=20:15:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 20:20:27:545 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092fc1} {root-id=730EFE
[Thr 140532589094656] INTERNAL T26_U31443_M0, 000, SAPSYS, ,
time=20:20:26, W5, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 20:20:33:434 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092fc5} {root-id=730EFE
[Thr 140532590679808] INTERNAL T26_U31443_M0, 000, SAPSYS, ,
time=20:20:33, W5, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 20:25:27:639 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092fe9} {root-id=730EFE
[Thr 140532588566272] INTERNAL T30_U31696_M0, 000, SAPSYS, ,
time=20:25:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 20:30:29:752 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009300c} {root-id=730EFE
[Thr 140532586452736] INTERNAL T8_U31935_M0, 000, SAPSYS, ,
time=20:30:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 20:30:36:374 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093011} {root-id=730EFE
[Thr 140532585924352] INTERNAL T8_U31935_M0, 000, SAPSYS, ,
time=20:30:35, W19, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 20:35:27:690 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093034} {root-id=730EFE
[Thr 140532590151424] INTERNAL T12_U233_M0, 000, SAPSYS, ,
time=20:35:26, W19, program=SAPMSSY8, high priority, memor
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 20:40:27:777 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093057} {root-id=730EFE
[Thr 140532590679808] INTERNAL T38_U481_M0, 000, SAPSYS, ,
time=20:40:26, W19, program=SAPMSSY8, high priority, memor
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 20:40:32:747 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009305b} {root-id=730EFE
[Thr 140532590151424] INTERNAL T38_U481_M0, 000, SAPSYS, ,
time=20:40:32, W19, program=SAPMSSY8, high priority, memor
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 20:45:28:300 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009307f} {root-id=730EFE
[Thr 140532588037888] INTERNAL T32_U679_M0, 000, SAPSYS, ,
time=20:45:26, W9, program=SAPMSSY8, high priority, memory
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 20:50:27:991 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000930a2} {root-id=730EFE
[Thr 140532588566272] INTERNAL T12_U917_M0, 000, SAPSYS, ,
time=20:50:26, W2, program=SAPMSSY8, high priority, memory
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 20:50:34:796 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000930a6} {root-id=730EFE
[Thr 140532588037888] INTERNAL T12_U917_M0, 000, SAPSYS, ,
time=20:50:34, W2, program=SAPMSSY8, high priority, memory
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 20:55:27:937 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000930ca} {root-id=730EFE
[Thr 140532585924352] INTERNAL T32_U1118_M0, 000, SAPSYS, ,
time=20:55:26, W2, program=SAPMSSY8, high priority, memor
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 21:00:28:381 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000930ed} {root-id=730EFE
[Thr 140532590151424] INTERNAL T3_U1291_M0, 000, SAPSYS, ,
time=21:00:26, W5, program=SAPMSSY8, high priority, memory
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 21:00:35:382 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000930f1} {root-id=730EFE
[Thr 140532585924352] INTERNAL T3_U1291_M0, 000, SAPSYS, ,
time=21:00:34, W5, program=SAPMSSY8, high priority, memory
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 21:05:30:617 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093115} {root-id=730EFE
[Thr 140532587509504] INTERNAL T3_U1485_M0, 000, SAPSYS, ,
time=21:05:26, W14, program=SAPMSSY8, high priority, memor
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 21:10:28:111 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093138} {root-id=730EFE
[Thr 140532588037888] INTERNAL T38_U1664_M0, 000, SAPSYS, ,
time=21:10:26, W11, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 21:10:34:398 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009313c} {root-id=730EFE
[Thr 140532587509504] INTERNAL T38_U1664_M0, 000, SAPSYS, ,
time=21:10:33, W11, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 21:15:27:992 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093160} {root-id=730EFE
[Thr 140532586981120] INTERNAL T31_U1859_M0, 000, SAPSYS, ,
time=21:15:26, W5, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 21:20:27:612 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093188} {root-id=730EFE
[Thr 140532590151424] INTERNAL T3_U2075_M0, 000, SAPSYS, ,
time=21:20:26, W18, program=SAPMSSY8, high priority, memor
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 21:20:33:362 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009318c} {root-id=730EFE
[Thr 140532585924352] INTERNAL T3_U2075_M0, 000, SAPSYS, ,
time=21:20:32, W18, program=SAPMSSY8, high priority, memor
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 21:25:27:880 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000931b0} {root-id=730EFE
[Thr 140532587509504] INTERNAL T41_U2277_M0, 000, SAPSYS, ,
time=21:25:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 21:30:27:001 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000931d3} {root-id=730EFE
[Thr 140532588037888] INTERNAL T12_U2477_M0, 000, SAPSYS, ,
time=21:30:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 21:30:30:902 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000931d7} {root-id=730EFE
[Thr 140532587509504] INTERNAL T12_U2477_M0, 000, SAPSYS, ,
time=21:30:30, W18, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 21:35:26:799 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000931fb} {root-id=730EFE
[Thr 140532586981120] INTERNAL T10_U2772_M0, 000, SAPSYS, ,
time=21:35:26, W5, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 21:40:29:435 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009321e} {root-id=730EFE
[Thr 140532585924352] INTERNAL T41_U2970_M0, 000, SAPSYS, ,
time=21:40:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 21:40:35:087 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093222} {root-id=730EFE
[Thr 140532586981120] INTERNAL T41_U2970_M0, 000, SAPSYS, ,
time=21:40:34, W18, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 21:45:29:850 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093246} {root-id=730EFE
[Thr 140532589623040] INTERNAL T12_U3147_M0, 000, SAPSYS, ,
time=21:45:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 21:50:26:754 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093269} {root-id=730EFE
[Thr 140532587509504] INTERNAL T35_U3527_M0, 000, SAPSYS, ,
time=21:50:26, W12, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 21:50:30:168 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009326d} {root-id=730EFE
[Thr 140532589623040] INTERNAL T35_U3527_M0, 000, SAPSYS, ,
time=21:50:29, W12, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 21:55:27:044 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093291} {root-id=730EFE
[Thr 140532589094656] INTERNAL T17_U3933_M0, 000, SAPSYS, ,
time=21:55:26, W7, program=SAPMSSY8, high priority, memor
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 22:00:27:526 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000932b4} {root-id=730EFE
[Thr 140532586981120] INTERNAL T27_U4227_M0, 000, SAPSYS, ,
time=22:00:26, W7, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 22:00:33:977 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000932b8} {root-id=730EFE
[Thr 140532585924352] INTERNAL T27_U4227_M0, 000, SAPSYS, ,
time=22:00:33, W7, program=SAPMSSY8, high priority, memor
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 22:00:55:623 2024
[Thr 140532587509504] *** ERROR => IcmCreateDpRequest: Session does not exist
[icxxthr.c 4773]
[Thr 140532590151424] Wed Apr 10 22:05:28:939 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000932dc} {root-id=730EFE
[Thr 140532590151424] INTERNAL T20_U4415_M0, 000, SAPSYS, ,
time=22:05:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 22:10:28:503 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000932ff} {root-id=730EFE
[Thr 140532588037888] INTERNAL T18_U4598_M0, 000, SAPSYS, ,
time=22:10:26, W5, program=SAPMSSY8, high priority, memor
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 22:10:35:446 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093303} {root-id=730EFE
[Thr 140532587509504] INTERNAL T18_U4598_M0, 000, SAPSYS, ,
time=22:10:34, W5, program=SAPMSSY8, high priority, memor
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 22:15:38:667 2024
[Thr 140532588037888] *** ERROR => IcmReadFromPartner(id=9/340774): No data from
server received, role: Server, (rc=MPI_EBROKEN: pip
[Thr 140532590679808] Wed Apr 10 22:15:41:645 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093329} {root-id=730EFE
[Thr 140532590679808] INTERNAL T40_U4804_M0, 000, SAPSYS, ,
time=22:15:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 22:20:27:628 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009334a} {root-id=730EFE
[Thr 140532585924352] INTERNAL T20_U5009_M0, 000, SAPSYS, ,
time=22:20:26, W5, program=SAPMSSY8, high priority, memor
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 22:20:31:418 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009334c} {root-id=730EFE
[Thr 140532586452736] INTERNAL T20_U5009_M0, 000, SAPSYS, ,
time=22:20:26, W5, program=SAPMSSY8, high priority, memor
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 22:25:27:589 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009336e} {root-id=730EFE
[Thr 140532590151424] INTERNAL T13_U5211_M0, 000, SAPSYS, ,
time=22:25:26, W12, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 22:30:27:910 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093391} {root-id=730EFE
[Thr 140532588037888] INTERNAL T40_U5392_M0, 000, SAPSYS, ,
time=22:30:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 22:30:34:736 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093395} {root-id=730EFE
[Thr 140532590151424] INTERNAL T40_U5392_M0, 000, SAPSYS, ,
time=22:30:34, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 22:35:28:070 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000933b9} {root-id=730EFE
[Thr 140532586981120] INTERNAL T20_U5573_M0, 000, SAPSYS, ,
time=22:35:26, W8, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 22:40:27:796 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000933dc} {root-id=730EFE
[Thr 140532585924352] INTERNAL T40_U5745_M0, 000, SAPSYS, ,
time=22:40:26, W6, program=SAPMSSY8, high priority, memor
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 22:40:33:489 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000933e0} {root-id=730EFE
[Thr 140532586981120] INTERNAL T40_U5745_M0, 000, SAPSYS, ,
time=22:40:33, W6, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 22:45:27:952 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093404} {root-id=730EFE
[Thr 140532588566272] INTERNAL T30_U5925_M0, 000, SAPSYS, ,
time=22:45:26, W12, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 22:50:29:398 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093427} {root-id=730EFE
[Thr 140532590151424] INTERNAL T26_U6130_M0, 000, SAPSYS, ,
time=22:50:26, W7, program=SAPMSSY8, high priority, memor
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 22:50:35:314 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009342b} {root-id=730EFE
[Thr 140532588566272] INTERNAL T26_U6130_M0, 000, SAPSYS, ,
time=22:50:34, W7, program=SAPMSSY8, high priority, memor
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 22:55:28:163 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009344f} {root-id=730EFE
[Thr 140532589623040] INTERNAL T41_U6329_M0, 000, SAPSYS, ,
time=22:55:26, W9, program=SAPMSSY8, high priority, memor
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 23:00:29:884 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093472} {root-id=730EFE
[Thr 140532586981120] INTERNAL T33_U6502_M0, 000, SAPSYS, ,
time=23:00:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 23:00:36:620 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093476} {root-id=730EFE
[Thr 140532589623040] INTERNAL T33_U6502_M0, 000, SAPSYS, ,
time=23:00:36, W16, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 23:05:28:047 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093499} {root-id=730EFE
[Thr 140532586981120] INTERNAL T33_U6686_M0, 000, SAPSYS, ,
time=23:05:26, W8, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 23:10:27:305 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000934bc} {root-id=730EFE
[Thr 140532585924352] INTERNAL T35_U6909_M0, 000, SAPSYS, ,
time=23:10:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 23:10:32:000 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000934c1} {root-id=730EFE
[Thr 140532587509504] INTERNAL T35_U6909_M0, 000, SAPSYS, ,
time=23:10:31, W16, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 23:15:28:041 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000934e4} {root-id=730EFE
[Thr 140532588566272] INTERNAL T10_U7192_M0, 000, SAPSYS, ,
time=23:15:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 23:20:26:750 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009350b} {root-id=730EFE
[Thr 140532588037888] INTERNAL T22_U7382_M0, 000, SAPSYS, ,
time=23:20:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 23:20:29:577 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093510} {root-id=730EFE
[Thr 140532589623040] INTERNAL T22_U7382_M0, 000, SAPSYS, ,
time=23:20:29, W16, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 23:25:26:855 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093534} {root-id=730EFE
[Thr 140532587509504] INTERNAL T36_U7590_M0, 000, SAPSYS, ,
time=23:25:26, W15, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 23:30:26:555 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093557} {root-id=730EFE
[Thr 140532588566272] INTERNAL T11_U7741_M0, 000, SAPSYS, ,
time=23:30:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 23:30:29:039 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009355b} {root-id=730EFE
[Thr 140532587509504] INTERNAL T11_U7741_M0, 000, SAPSYS, ,
time=23:30:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 23:35:26:544 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009357f} {root-id=730EFE
[Thr 140532586452736] INTERNAL T27_U7902_M0, 000, SAPSYS, ,
time=23:35:26, W15, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 23:40:26:529 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000935a2} {root-id=730EFE
[Thr 140532589623040] INTERNAL T1_U8048_M0, 000, SAPSYS, ,
time=23:40:26, W17, program=SAPMSSY8, high priority, memor
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 23:40:28:978 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000935a6} {root-id=730EFE
[Thr 140532586452736] INTERNAL T1_U8048_M0, 000, SAPSYS, ,
time=23:40:28, W17, program=SAPMSSY8, high priority, memor
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 23:45:26:541 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000935ca} {root-id=730EFE
[Thr 140532589094656] INTERNAL T6_U8207_M0, 000, SAPSYS, ,
time=23:45:26, W19, program=SAPMSSY8, high priority, memor
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 23:50:26:543 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000935ed} {root-id=730EFE
[Thr 140532587509504] INTERNAL T36_U8403_M0, 000, SAPSYS, ,
time=23:50:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 23:50:29:034 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000935f1} {root-id=730EFE
[Thr 140532589094656] INTERNAL T36_U8403_M0, 000, SAPSYS, ,
time=23:50:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 23:55:26:543 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093615} {root-id=730EFE
[Thr 140532590151424] INTERNAL T24_U8579_M0, 000, SAPSYS, ,
time=23:55:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 00:00:26:747 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093638} {root-id=730EFE
[Thr 140532586452736] INTERNAL T6_U8723_M0, 000, SAPSYS, ,
time=00:00:26, W14, program=SAPMSSY8, high priority, memor
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 00:00:29:421 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009363c} {root-id=730EFE
[Thr 140532590151424] INTERNAL T6_U8723_M0, 000, SAPSYS, ,
time=00:00:29, W14, program=SAPMSSY8, high priority, memor
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 00:05:26:556 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093660} {root-id=730EFE
[Thr 140532588037888] INTERNAL T9_U8887_M0, 000, SAPSYS, ,
time=00:05:26, W16, program=SAPMSSY8, high priority, memor
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 00:10:26:537 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093683} {root-id=730EFE
[Thr 140532589094656] INTERNAL T5_U9040_M0, 000, SAPSYS, ,
time=00:10:26, W14, program=SAPMSSY8, high priority, memor
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 00:10:29:023 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093687} {root-id=730EFE
[Thr 140532588037888] INTERNAL T5_U9040_M0, 000, SAPSYS, ,
time=00:10:28, W14, program=SAPMSSY8, high priority, memor
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 00:15:26:566 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000936ab} {root-id=730EFE
[Thr 140532585924352] INTERNAL T36_U9202_M0, 000, SAPSYS, ,
time=00:15:26, W15, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 00:20:26:550 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000936ce} {root-id=730EFE
[Thr 140532590151424] INTERNAL T35_U9371_M0, 000, SAPSYS, ,
time=00:20:26, W17, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 00:20:28:984 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000936d2} {root-id=730EFE
[Thr 140532585924352] INTERNAL T35_U9371_M0, 000, SAPSYS, ,
time=00:20:28, W17, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 00:25:26:497 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000936f6} {root-id=730EFE
[Thr 140532590679808] INTERNAL T24_U9556_M0, 000, SAPSYS, ,
time=00:25:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 00:30:26:547 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093719} {root-id=730EFE
[Thr 140532588037888] INTERNAL T6_U9701_M0, 000, SAPSYS, ,
time=00:30:26, W19, program=SAPMSSY8, high priority, memor
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 00:30:29:001 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009371d} {root-id=730EFE
[Thr 140532590679808] INTERNAL T6_U9701_M0, 000, SAPSYS, ,
time=00:30:28, W19, program=SAPMSSY8, high priority, memor
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 00:35:26:689 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093741} {root-id=730EFE
[Thr 140532586981120] INTERNAL T11_U9899_M0, 000, SAPSYS, ,
time=00:35:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 00:40:26:541 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093764} {root-id=730EFE
[Thr 140532585924352] INTERNAL T35_U10042_M0, 000, SAPSYS, ,
time=00:40:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 00:40:29:024 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093768} {root-id=730EFE
[Thr 140532586981120] INTERNAL T35_U10042_M0, 000, SAPSYS, ,
time=00:40:28, W12, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 00:45:26:549 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009378c} {root-id=730EFE
[Thr 140532588566272] INTERNAL T24_U10200_M0, 000, SAPSYS, ,
time=00:45:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 00:50:26:551 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000937af} {root-id=730EFE
[Thr 140532590679808] INTERNAL T6_U10397_M0, 000, SAPSYS, ,
time=00:50:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 00:50:29:028 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000937b3} {root-id=730EFE
[Thr 140532588566272] INTERNAL T6_U10397_M0, 000, SAPSYS, ,
time=00:50:28, W18, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 00:55:26:534 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000937d7} {root-id=730EFE
[Thr 140532589623040] INTERNAL T35_U10567_M0, 000, SAPSYS, ,
time=00:55:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 01:00:26:549 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000937fa} {root-id=730EFE
[Thr 140532586981120] INTERNAL T24_U10710_M0, 000, SAPSYS, ,
time=01:00:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 01:00:29:025 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000937fe} {root-id=730EFE
[Thr 140532589623040] INTERNAL T24_U10710_M0, 000, SAPSYS, ,
time=01:00:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 01:05:26:549 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093822} {root-id=730EFE
[Thr 140532587509504] INTERNAL T6_U10877_M0, 000, SAPSYS, ,
time=01:05:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 01:10:26:718 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093845} {root-id=730EFE
[Thr 140532588566272] INTERNAL T33_U11030_M0, 000, SAPSYS, ,
time=01:10:26, W11, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 01:10:29:259 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093849} {root-id=730EFE
[Thr 140532587509504] INTERNAL T33_U11030_M0, 000, SAPSYS, ,
time=01:10:29, W11, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 01:15:26:551 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009386d} {root-id=730EFE
[Thr 140532586452736] INTERNAL T9_U11190_M0, 000, SAPSYS, ,
time=01:15:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 01:20:26:556 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093894} {root-id=730EFE
[Thr 140532586452736] INTERNAL T9_U11368_M0, 000, SAPSYS, ,
time=01:20:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 01:20:29:025 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093898} {root-id=730EFE
[Thr 140532590151424] INTERNAL T9_U11368_M0, 000, SAPSYS, ,
time=01:20:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 01:25:26:489 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000938bc} {root-id=730EFE
[Thr 140532588037888] INTERNAL T27_U11548_M0, 000, SAPSYS, ,
time=01:25:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 01:30:26:555 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000938df} {root-id=730EFE
[Thr 140532589094656] INTERNAL T27_U11694_M0, 000, SAPSYS, ,
time=01:30:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 01:30:29:032 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000938e3} {root-id=730EFE
[Thr 140532588037888] INTERNAL T27_U11694_M0, 000, SAPSYS, ,
time=01:30:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 01:35:26:561 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093907} {root-id=730EFE
[Thr 140532585924352] INTERNAL T5_U11854_M0, 000, SAPSYS, ,
time=01:35:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 01:40:26:557 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009392a} {root-id=730EFE
[Thr 140532590151424] INTERNAL T16_U12000_M0, 000, SAPSYS, ,
time=01:40:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 01:40:29:019 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009392e} {root-id=730EFE
[Thr 140532585924352] INTERNAL T16_U12000_M0, 000, SAPSYS, ,
time=01:40:28, W15, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 01:45:26:682 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093952} {root-id=730EFE
[Thr 140532590679808] INTERNAL T24_U12161_M0, 000, SAPSYS, ,
time=01:45:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 01:50:26:564 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093975} {root-id=730EFE
[Thr 140532588037888] INTERNAL T36_U12359_M0, 000, SAPSYS, ,
time=01:50:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 01:50:29:052 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093979} {root-id=730EFE
[Thr 140532590679808] INTERNAL T36_U12359_M0, 000, SAPSYS, ,
time=01:50:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 01:55:26:582 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009399d} {root-id=730EFE
[Thr 140532586981120] INTERNAL T38_U12535_M0, 000, SAPSYS, ,
time=01:55:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 02:00:26:538 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000939c0} {root-id=730EFE
[Thr 140532585924352] INTERNAL T16_U12670_M0, 000, SAPSYS, ,
time=02:00:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 02:00:28:985 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000939c4} {root-id=730EFE
[Thr 140532586981120] INTERNAL T16_U12670_M0, 000, SAPSYS, ,
time=02:00:28, W12, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 02:05:26:558 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000939e8} {root-id=730EFE
[Thr 140532588566272] INTERNAL T33_U12814_M0, 000, SAPSYS, ,
time=02:05:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 02:10:26:540 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093a0b} {root-id=730EFE
[Thr 140532590679808] INTERNAL T6_U12954_M0, 000, SAPSYS, ,
time=02:10:26, W12, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 02:10:28:990 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093a0f} {root-id=730EFE
[Thr 140532588566272] INTERNAL T6_U12954_M0, 000, SAPSYS, ,
time=02:10:28, W12, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 02:15:26:564 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093a33} {root-id=730EFE
[Thr 140532589623040] INTERNAL T11_U13113_M0, 000, SAPSYS, ,
time=02:15:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 02:20:26:685 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093a5a} {root-id=730EFE
[Thr 140532589623040] INTERNAL T29_U13288_M0, 000, SAPSYS, ,
time=02:20:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 02:20:29:133 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093a5e} {root-id=730EFE
[Thr 140532586452736] INTERNAL T29_U13288_M0, 000, SAPSYS, ,
time=02:20:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 02:25:26:506 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093a82} {root-id=730EFE
[Thr 140532589094656] INTERNAL T31_U13485_M0, 000, SAPSYS, ,
time=02:25:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 02:30:26:571 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093aa5} {root-id=730EFE
[Thr 140532587509504] INTERNAL T30_U13630_M0, 000, SAPSYS, ,
time=02:30:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 02:30:29:026 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093aa9} {root-id=730EFE
[Thr 140532589094656] INTERNAL T30_U13630_M0, 000, SAPSYS, ,
time=02:30:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 02:35:26:627 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093acd} {root-id=730EFE
[Thr 140532590151424] INTERNAL T33_U13794_M0, 000, SAPSYS, ,
time=02:35:26, W13, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 02:40:26:553 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093af0} {root-id=730EFE
[Thr 140532586452736] INTERNAL T27_U13939_M0, 000, SAPSYS, ,
time=02:40:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 02:40:29:014 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093af4} {root-id=730EFE
[Thr 140532590151424] INTERNAL T27_U13939_M0, 000, SAPSYS, ,
time=02:40:28, W14, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 02:45:26:559 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093b18} {root-id=730EFE
[Thr 140532588037888] INTERNAL T29_U14096_M0, 000, SAPSYS, ,
time=02:45:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 02:50:26:555 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093b3b} {root-id=730EFE
[Thr 140532589094656] INTERNAL T35_U14293_M0, 000, SAPSYS, ,
time=02:50:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 02:50:29:009 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093b3f} {root-id=730EFE
[Thr 140532588037888] INTERNAL T35_U14293_M0, 000, SAPSYS, ,
time=02:50:28, W12, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 02:55:26:694 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093b63} {root-id=730EFE
[Thr 140532585924352] INTERNAL T33_U14472_M0, 000, SAPSYS, ,
time=02:55:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 03:00:26:562 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093b86} {root-id=730EFE
[Thr 140532590151424] INTERNAL T24_U14616_M0, 000, SAPSYS, ,
time=03:00:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 03:00:29:025 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093b8a} {root-id=730EFE
[Thr 140532585924352] INTERNAL T24_U14616_M0, 000, SAPSYS, ,
time=03:00:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 03:05:26:558 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093bae} {root-id=730EFE
[Thr 140532590679808] INTERNAL T36_U14775_M0, 000, SAPSYS, ,
time=03:05:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 03:10:26:576 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093bd1} {root-id=730EFE
[Thr 140532588037888] INTERNAL T16_U14925_M0, 000, SAPSYS, ,
time=03:10:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 03:10:29:048 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093bd5} {root-id=730EFE
[Thr 140532590679808] INTERNAL T16_U14925_M0, 000, SAPSYS, ,
time=03:10:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 03:15:26:562 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093bf9} {root-id=730EFE
[Thr 140532586981120] INTERNAL T38_U15083_M0, 000, SAPSYS, ,
time=03:15:26, W13, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 03:20:26:564 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093c1c} {root-id=730EFE
[Thr 140532585924352] INTERNAL T1_U15251_M0, 000, SAPSYS, ,
time=03:20:26, W15, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 03:20:29:100 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093c20} {root-id=730EFE
[Thr 140532586981120] INTERNAL T1_U15251_M0, 000, SAPSYS, ,
time=03:20:28, W15, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 03:25:26:515 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093c44} {root-id=730EFE
[Thr 140532588566272] INTERNAL T9_U15435_M0, 000, SAPSYS, ,
time=03:25:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 03:30:26:691 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093c67} {root-id=730EFE
[Thr 140532590679808] INTERNAL T29_U15582_M0, 000, SAPSYS, ,
time=03:30:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 03:30:29:148 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093c6b} {root-id=730EFE
[Thr 140532588566272] INTERNAL T29_U15582_M0, 000, SAPSYS, ,
time=03:30:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 03:35:26:553 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093c8f} {root-id=730EFE
[Thr 140532589623040] INTERNAL T31_U15740_M0, 000, SAPSYS, ,
time=03:35:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 03:40:26:590 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093cb2} {root-id=730EFE
[Thr 140532586981120] INTERNAL T11_U15884_M0, 000, SAPSYS, ,
time=03:40:26, W13, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 03:40:29:323 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093cb6} {root-id=730EFE
[Thr 140532589623040] INTERNAL T11_U15884_M0, 000, SAPSYS, ,
time=03:40:29, W13, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 03:45:26:568 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093cda} {root-id=730EFE
[Thr 140532587509504] INTERNAL T35_U16045_M0, 000, SAPSYS, ,
time=03:45:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 03:50:26:571 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093cfd} {root-id=730EFE
[Thr 140532588566272] INTERNAL T27_U16243_M0, 000, SAPSYS, ,
time=03:50:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 03:50:29:082 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d01} {root-id=730EFE
[Thr 140532587509504] INTERNAL T27_U16243_M0, 000, SAPSYS, ,
time=03:50:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 03:55:26:569 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d25} {root-id=730EFE
[Thr 140532586452736] INTERNAL T38_U16411_M0, 000, SAPSYS, ,
time=03:55:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 04:00:26:564 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d47} {root-id=730EFE
[Thr 140532589623040] INTERNAL T1_U16557_M0, 000, SAPSYS, ,
time=04:00:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 04:00:29:051 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d4c} {root-id=730EFE
[Thr 140532586981120] INTERNAL T1_U16557_M0, 000, SAPSYS, ,
time=04:00:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 04:05:26:744 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d6f} {root-id=730EFE
[Thr 140532590151424] INTERNAL T36_U16718_M0, 000, SAPSYS, ,
time=04:05:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 04:10:26:554 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d92} {root-id=730EFE
[Thr 140532586452736] INTERNAL T23_U16870_M0, 000, SAPSYS, ,
time=04:10:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 04:10:28:994 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d97} {root-id=730EFE
[Thr 140532585924352] INTERNAL T23_U16870_M0, 000, SAPSYS, ,
time=04:10:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 04:15:26:696 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093dba} {root-id=730EFE
[Thr 140532590679808] INTERNAL T30_U17021_M0, 000, SAPSYS, ,
time=04:15:26, W10, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 04:20:26:560 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093de1} {root-id=730EFE
[Thr 140532590679808] INTERNAL T38_U17198_M0, 000, SAPSYS, ,
time=04:20:26, W11, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 04:20:29:055 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093de6} {root-id=730EFE
[Thr 140532586981120] INTERNAL T38_U17198_M0, 000, SAPSYS, ,
time=04:20:28, W11, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 04:25:26:523 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e09} {root-id=730EFE
[Thr 140532589623040] INTERNAL T31_U17377_M0, 000, SAPSYS, ,
time=04:25:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 04:30:26:573 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e2c} {root-id=730EFE
[Thr 140532589094656] INTERNAL T6_U17521_M0, 000, SAPSYS, ,
time=04:30:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 04:30:29:029 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e31} {root-id=730EFE
[Thr 140532590151424] INTERNAL T6_U17521_M0, 000, SAPSYS, ,
time=04:30:28, W16, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 04:35:26:550 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e54} {root-id=730EFE
[Thr 140532588037888] INTERNAL T1_U17682_M0, 000, SAPSYS, ,
time=04:35:26, W17, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 04:40:26:682 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e77} {root-id=730EFE
[Thr 140532585924352] INTERNAL T36_U17824_M0, 000, SAPSYS, ,
time=04:40:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 04:40:29:118 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e7c} {root-id=730EFE
[Thr 140532586452736] INTERNAL T36_U17824_M0, 000, SAPSYS, ,
time=04:40:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 04:45:26:631 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e9f} {root-id=730EFE
[Thr 140532586981120] INTERNAL T29_U17981_M0, 000, SAPSYS, ,
time=04:45:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 04:50:26:573 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093ec2} {root-id=730EFE
[Thr 140532589623040] INTERNAL T24_U18178_M0, 000, SAPSYS, ,
time=04:50:26, W13, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 04:50:29:027 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093ec7} {root-id=730EFE
[Thr 140532588566272] INTERNAL T24_U18178_M0, 000, SAPSYS, ,
time=04:50:28, W13, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 04:55:26:572 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093eea} {root-id=730EFE
[Thr 140532590151424] INTERNAL T6_U18353_M0, 000, SAPSYS, ,
time=04:55:26, W11, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 05:00:26:577 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093f0d} {root-id=730EFE
[Thr 140532588037888] INTERNAL T29_U18496_M0, 000, SAPSYS, ,
time=05:00:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 05:00:29:051 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093f11} {root-id=730EFE
[Thr 140532590151424] INTERNAL T29_U18496_M0, 000, SAPSYS, ,
time=05:00:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 05:05:26:556 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093f35} {root-id=730EFE
[Thr 140532586452736] INTERNAL T31_U18657_M0, 000, SAPSYS, ,
time=05:05:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 05:10:26:572 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093f58} {root-id=730EFE
[Thr 140532586981120] INTERNAL T24_U18807_M0, 000, SAPSYS, ,
time=05:10:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 05:10:29:012 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093f5c} {root-id=730EFE
[Thr 140532586452736] INTERNAL T24_U18807_M0, 000, SAPSYS, ,
time=05:10:28, W12, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 05:15:26:698 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093f80} {root-id=730EFE
[Thr 140532588566272] INTERNAL T27_U18965_M0, 000, SAPSYS, ,
time=05:15:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 05:20:26:570 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093fa3} {root-id=730EFE
[Thr 140532590151424] INTERNAL T35_U19131_M0, 000, SAPSYS, ,
time=05:20:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 05:20:29:031 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093fa7} {root-id=730EFE
[Thr 140532588566272] INTERNAL T35_U19131_M0, 000, SAPSYS, ,
time=05:20:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 05:25:26:518 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093fcb} {root-id=730EFE
[Thr 140532585924352] INTERNAL T30_U19315_M0, 000, SAPSYS, ,
time=05:25:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 05:30:26:576 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093fee} {root-id=730EFE
[Thr 140532586452736] INTERNAL T23_U19460_M0, 000, SAPSYS, ,
time=05:30:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 05:30:29:079 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093ff2} {root-id=730EFE
[Thr 140532585924352] INTERNAL T23_U19460_M0, 000, SAPSYS, ,
time=05:30:28, W16, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 05:35:26:579 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094016} {root-id=730EFE
[Thr 140532590679808] INTERNAL T36_U19621_M0, 000, SAPSYS, ,
time=05:35:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 05:40:26:577 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094039} {root-id=730EFE
[Thr 140532588566272] INTERNAL T30_U19767_M0, 000, SAPSYS, ,
time=05:40:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 05:40:29:055 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009403d} {root-id=730EFE
[Thr 140532590679808] INTERNAL T30_U19767_M0, 000, SAPSYS, ,
time=05:40:28, W16, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 05:45:26:608 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094061} {root-id=730EFE
[Thr 140532589094656] INTERNAL T16_U19925_M0, 000, SAPSYS, ,
time=05:45:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 05:50:26:933 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094084} {root-id=730EFE
[Thr 140532585924352] INTERNAL T29_U20123_M0, 000, SAPSYS, ,
time=05:50:26, W11, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 05:50:29:547 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094088} {root-id=730EFE
[Thr 140532589094656] INTERNAL T29_U20123_M0, 000, SAPSYS, ,
time=05:50:29, W11, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 05:55:26:577 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000940ac} {root-id=730EFE
[Thr 140532587509504] INTERNAL T5_U20294_M0, 000, SAPSYS, ,
time=05:55:26, W14, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 06:00:26:559 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000940cf} {root-id=730EFE
[Thr 140532590679808] INTERNAL T36_U20439_M0, 000, SAPSYS, ,
time=06:00:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 06:00:29:029 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000940d3} {root-id=730EFE
[Thr 140532587509504] INTERNAL T36_U20439_M0, 000, SAPSYS, ,
time=06:00:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 06:05:26:564 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000940f7} {root-id=730EFE
[Thr 140532589623040] INTERNAL T38_U20600_M0, 000, SAPSYS, ,
time=06:05:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 06:10:26:568 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009411a} {root-id=730EFE
[Thr 140532589094656] INTERNAL T29_U20750_M0, 000, SAPSYS, ,
time=06:10:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 06:10:29:022 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009411e} {root-id=730EFE
[Thr 140532589623040] INTERNAL T29_U20750_M0, 000, SAPSYS, ,
time=06:10:28, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 06:15:26:591 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094142} {root-id=730EFE
[Thr 140532588037888] INTERNAL T5_U20908_M0, 000, SAPSYS, ,
time=06:15:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 06:20:26:577 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094165} {root-id=730EFE
[Thr 140532587509504] INTERNAL T33_U21076_M0, 000, SAPSYS, ,
time=06:20:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 06:20:29:028 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094169} {root-id=730EFE
[Thr 140532588037888] INTERNAL T33_U21076_M0, 000, SAPSYS, ,
time=06:20:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 06:25:26:666 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009418d} {root-id=730EFE
[Thr 140532586981120] INTERNAL T11_U21261_M0, 000, SAPSYS, ,
time=06:25:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 06:30:26:598 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000941b0} {root-id=730EFE
[Thr 140532589623040] INTERNAL T27_U21405_M0, 000, SAPSYS, ,
time=06:30:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 06:30:29:054 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000941b4} {root-id=730EFE
[Thr 140532586981120] INTERNAL T27_U21405_M0, 000, SAPSYS, ,
time=06:30:28, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 06:35:26:584 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000941d8} {root-id=730EFE
[Thr 140532590151424] INTERNAL T1_U21566_M0, 000, SAPSYS, ,
time=06:35:26, W15, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 06:40:26:573 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000941fb} {root-id=730EFE
[Thr 140532588037888] INTERNAL T38_U21709_M0, 000, SAPSYS, ,
time=06:40:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 06:40:29:014 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000941ff} {root-id=730EFE
[Thr 140532590151424] INTERNAL T38_U21709_M0, 000, SAPSYS, ,
time=06:40:28, W14, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 06:45:26:577 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094223} {root-id=730EFE
[Thr 140532586452736] INTERNAL T9_U21867_M0, 000, SAPSYS, ,
time=06:45:26, W13, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 06:50:26:565 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094246} {root-id=730EFE
[Thr 140532586981120] INTERNAL T31_U22065_M0, 000, SAPSYS, ,
time=06:50:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 06:50:29:014 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009424a} {root-id=730EFE
[Thr 140532586452736] INTERNAL T31_U22065_M0, 000, SAPSYS, ,
time=06:50:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 06:55:26:646 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009426e} {root-id=730EFE
[Thr 140532588566272] INTERNAL T16_U22238_M0, 000, SAPSYS, ,
time=06:55:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 07:00:26:713 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094291} {root-id=730EFE
[Thr 140532590151424] INTERNAL T27_U22382_M0, 000, SAPSYS, ,
time=07:00:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 07:00:29:170 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094295} {root-id=730EFE
[Thr 140532588566272] INTERNAL T27_U22382_M0, 000, SAPSYS, ,
time=07:00:29, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 07:05:26:589 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000942b9} {root-id=730EFE
[Thr 140532585924352] INTERNAL T29_U22547_M0, 000, SAPSYS, ,
time=07:05:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 07:10:26:586 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000942dc} {root-id=730EFE
[Thr 140532586452736] INTERNAL T31_U22698_M0, 000, SAPSYS, ,
time=07:10:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 07:10:29:029 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000942e0} {root-id=730EFE
[Thr 140532585924352] INTERNAL T31_U22698_M0, 000, SAPSYS, ,
time=07:10:28, W14, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 07:15:26:578 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094304} {root-id=730EFE
[Thr 140532590679808] INTERNAL T6_U22853_M0, 000, SAPSYS, ,
time=07:15:26, W17, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 07:20:13:159 2024
[Thr 140532588037888] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532588037888] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532588037888] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532588037888] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532588037888] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532588037888] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532588037888] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532588037888] (754_STACK patchno 200,linuxx86_64_gcc43) CommonCryptoLib
8.5.50 (/usr/sap/Q20/D02/exe/libsapcrypto.so)
[Thr 140532588037888] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532588037888] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532588037888] >> ===== SecuSSL ErrStack: =====
[Thr 140532588037888] Peer not trusted
[Thr 140532588037888] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532588037888] # --- Messages -----------
[Thr 140532588037888] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532588037888] # --- Summary -----------
[Thr 140532588037888] #01 Certificate (End Entity): VALID
[Thr 140532588037888] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532588037888] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588037888] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532588037888] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532588037888] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532588037888] #02 Certificate (Issuer): VALID
[Thr 140532588037888] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588037888] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532588037888] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532588037888] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532588037888] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532588037888] ----- END VERIFICATION RESULT -----
[Thr 140532588037888] << =============================
[Thr 140532588037888] Target Hostname="apps.support.sap.com"
[Thr 140532588037888] SSL NI-hdl 154: local=10.200.50.156:25788
peer=155.56.96.48:443
[Thr 140532588037888] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd02001b090)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532588037888] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532588037888] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532588037888]
[Thr 140532588037888] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532588037888] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532588037888] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532588037888] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532588037888] SSL NI-hdl 154: local=10.200.50.156:25788
peer=155.56.96.48:443
[Thr 140532588037888] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532588037888] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532588037888] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532588037888] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532588037888] Target Hostname="apps.support.sap.com"
[Thr 140532588037888] >> ---- SecuSSL ErrStack: ----
[Thr 140532588037888] Peer not trusted
[Thr 140532588037888] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532588037888] # --- Messages -----------
[Thr 140532588037888] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532588037888] # --- Summary -----------
[Thr 140532588037888] #01 Certificate (End Entity): VALID
[Thr 140532588037888] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532588037888] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588037888] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532588037888] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532588037888] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532588037888] #02 Certificate (Issuer): VALID
[Thr 140532588037888] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588037888] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532588037888] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532588037888] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532588037888] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532588037888] ----- END VERIFICATION RESULT -----
[Thr 140532588037888] << ---------------------------
[Thr 140532588037888]
[Thr 140532588037888] {00094329} {root-id=730EFE781C731EEEBDF863EF03F6EC88}
[icxxconn.c 2536]
[Thr 140532588037888] SYNC_RFC T30_U23008_M0, 000, SAP_BATCH,
vq20app.sap.swisspor, time=07:19:53, W13, program=SAPMSSY
[Thr 140532588037888] role: Client, protocol: HTTPS, local:
10.200.50.156:25788, peer: 155.56.96.48:443
[Thr 140532590151424] Thu Apr 11 07:20:26:573 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009432c} {root-id=730EFE
[Thr 140532590151424] INTERNAL T27_U23028_M0, 000, SAPSYS, ,
time=07:20:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 07:20:29:010 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094330} {root-id=730EFE
[Thr 140532588566272] INTERNAL T27_U23028_M0, 000, SAPSYS, ,
time=07:20:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 07:20:33:179 2024
[Thr 140532590151424] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532590151424] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532590151424] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590151424] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532590151424] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532590151424] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532590151424] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532590151424] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532590151424] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590151424] >> ===== SecuSSL ErrStack: =====
[Thr 140532590151424] Peer not trusted
[Thr 140532590151424] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532590151424] # --- Messages -----------
[Thr 140532590151424] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532590151424] # --- Summary -----------
[Thr 140532590151424] #01 Certificate (End Entity): VALID
[Thr 140532590151424] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532590151424] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532590151424] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532590151424] #02 Certificate (Issuer): VALID
[Thr 140532590151424] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532590151424] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532590151424] ----- END VERIFICATION RESULT -----
[Thr 140532590151424] << =============================
[Thr 140532590151424] Target Hostname="apps.support.sap.com"
[Thr 140532590151424] SSL NI-hdl 156: local=10.200.50.156:51512
peer=155.56.96.48:443
[Thr 140532590151424] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd028013a10)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532590151424] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532590151424] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532590151424]
[Thr 140532590151424] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532590151424] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532590151424] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590151424] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532590151424] SSL NI-hdl 156: local=10.200.50.156:51512
peer=155.56.96.48:443
[Thr 140532590151424] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532590151424] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532590151424] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532590151424] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532590151424] Target Hostname="apps.support.sap.com"
[Thr 140532590151424] >> ---- SecuSSL ErrStack: ----
[Thr 140532590151424] Peer not trusted
[Thr 140532590151424] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532590151424] # --- Messages -----------
[Thr 140532590151424] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532590151424] # --- Summary -----------
[Thr 140532590151424] #01 Certificate (End Entity): VALID
[Thr 140532590151424] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532590151424] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532590151424] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532590151424] #02 Certificate (Issuer): VALID
[Thr 140532590151424] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532590151424] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532590151424] ----- END VERIFICATION RESULT -----
[Thr 140532590151424] << ---------------------------
[Thr 140532590151424]
[Thr 140532590151424] {00094336} {root-id=730EFE781C731EEEBDF863EF03F6EC88}
[icxxconn.c 2536]
[Thr 140532590151424] SYNC_RFC T30_U23008_M0, 000, SAP_BATCH,
vq20app.sap.swisspor, time=07:19:53, W13, program=SAPMSSY
[Thr 140532590151424] role: Client, protocol: HTTPS, local:
10.200.50.156:51512, peer: 155.56.96.48:443
[Thr 140532585924352] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532585924352] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532585924352] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532585924352] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532585924352] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532585924352] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532585924352] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532585924352] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532585924352] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532585924352] >> ===== SecuSSL ErrStack: =====
[Thr 140532585924352] Peer not trusted
[Thr 140532585924352] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532585924352] # --- Messages -----------
[Thr 140532585924352] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532585924352] # --- Summary -----------
[Thr 140532585924352] #01 Certificate (End Entity): VALID
[Thr 140532585924352] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532585924352] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532585924352] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532585924352] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532585924352] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532585924352] #02 Certificate (Issuer): VALID
[Thr 140532585924352] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532585924352] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532585924352] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532585924352] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532585924352] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532585924352] ----- END VERIFICATION RESULT -----
[Thr 140532585924352] << =============================
[Thr 140532585924352] Target Hostname="apps.support.sap.com"
[Thr 140532585924352] SSL NI-hdl 157: local=10.200.50.156:51522
peer=155.56.96.48:443
[Thr 140532585924352] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd018010930)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532585924352] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532585924352] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532585924352]
[Thr 140532585924352] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532585924352] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532585924352] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532585924352] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532585924352] SSL NI-hdl 157: local=10.200.50.156:51522
peer=155.56.96.48:443
[Thr 140532585924352] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532585924352] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532585924352] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532585924352] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532585924352] Target Hostname="apps.support.sap.com"
[Thr 140532585924352] >> ---- SecuSSL ErrStack: ----
[Thr 140532585924352] Peer not trusted
[Thr 140532585924352] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532585924352] # --- Messages -----------
[Thr 140532585924352] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532585924352] # --- Summary -----------
[Thr 140532585924352] #01 Certificate (End Entity): VALID
[Thr 140532585924352] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532585924352] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532585924352] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532585924352] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532585924352] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532585924352] #02 Certificate (Issuer): VALID
[Thr 140532585924352] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532585924352] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532585924352] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532585924352] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532585924352] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532585924352] ----- END VERIFICATION RESULT -----
[Thr 140532585924352] << ---------------------------
[Thr 140532585924352]
[Thr 140532585924352] {00094337} {root-id=730EFE781C731EEEBDF863EF03F6EC88}
[icxxconn.c 2536]
[Thr 140532585924352] SYNC_RFC T35_U23007_M0, 000, SAP_BATCH, ,
time=07:20:33, W10, program=SAPMSSY1, low priority, mem
[Thr 140532585924352] role: Client, protocol: HTTPS, local:
10.200.50.156:51522, peer: 155.56.96.48:443
[Thr 140532586981120] Thu Apr 11 07:25:26:549 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094356} {root-id=730EFE
[Thr 140532586981120] INTERNAL T1_U23205_M0, 000, SAPSYS, ,
time=07:25:26, W13, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 07:30:26:600 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094379} {root-id=730EFE
[Thr 140532589623040] INTERNAL T38_U23353_M0, 000, SAPSYS, ,
time=07:30:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 07:30:29:055 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009437d} {root-id=730EFE
[Thr 140532586981120] INTERNAL T38_U23353_M0, 000, SAPSYS, ,
time=07:30:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 07:35:26:706 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000943a1} {root-id=730EFE
[Thr 140532590151424] INTERNAL T29_U23513_M0, 000, SAPSYS, ,
time=07:35:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 07:40:26:588 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000943c4} {root-id=730EFE
[Thr 140532590679808] INTERNAL T24_U23658_M0, 000, SAPSYS, ,
time=07:40:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 07:40:29:023 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000943c8} {root-id=730EFE
[Thr 140532590151424] INTERNAL T24_U23658_M0, 000, SAPSYS, ,
time=07:40:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 07:45:26:599 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000943ec} {root-id=730EFE
[Thr 140532586452736] INTERNAL T33_U23817_M0, 000, SAPSYS, ,
time=07:45:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 07:48:12:473 2024
[Thr 140532589623040] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532589623040] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532589623040] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532589623040] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532589623040] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532589623040] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532589623040] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532589623040] (754_STACK patchno 200,linuxx86_64_gcc43) CommonCryptoLib
8.5.50 (/usr/sap/Q20/D02/exe/libsapcrypto.so)
[Thr 140532589623040] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532589623040] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532589623040] >> ===== SecuSSL ErrStack: =====
[Thr 140532589623040] Peer not trusted
[Thr 140532589623040] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532589623040] # --- Messages -----------
[Thr 140532589623040] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532589623040] # --- Summary -----------
[Thr 140532589623040] #01 Certificate (End Entity): VALID
[Thr 140532589623040] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532589623040] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532589623040] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532589623040] #02 Certificate (Issuer): VALID
[Thr 140532589623040] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532589623040] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532589623040] ----- END VERIFICATION RESULT -----
[Thr 140532589623040] << =============================
[Thr 140532589623040] Target Hostname="apps.support.sap.com"
[Thr 140532589623040] SSL NI-hdl 153: local=10.200.50.156:40404
peer=155.56.96.48:443
[Thr 140532589623040] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd040061e40)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532589623040] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532589623040] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532589623040]
[Thr 140532589623040] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532589623040] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532589623040] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532589623040] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532589623040] SSL NI-hdl 153: local=10.200.50.156:40404
peer=155.56.96.48:443
[Thr 140532589623040] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532589623040] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532589623040] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532589623040] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532589623040] Target Hostname="apps.support.sap.com"
[Thr 140532589623040] >> ---- SecuSSL ErrStack: ----
[Thr 140532589623040] Peer not trusted
[Thr 140532589623040] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532589623040] # --- Messages -----------
[Thr 140532589623040] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532589623040] # --- Summary -----------
[Thr 140532589623040] #01 Certificate (End Entity): VALID
[Thr 140532589623040] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532589623040] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532589623040] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532589623040] #02 Certificate (Issuer): VALID
[Thr 140532589623040] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532589623040] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532589623040] ----- END VERIFICATION RESULT -----
[Thr 140532589623040] << ---------------------------
[Thr 140532589623040]
[Thr 140532589623040] {00094401} {root-id=0050569232781EDE88C88C3E1D25C7B2}
[icxxconn.c 2536]
[Thr 140532589623040] SYNC_RFC T29_U23947_M0, 000, DDIC,
vq20app.sap.swisspor, time=07:47:52, W11, program=SAPMSSY1, lo
[Thr 140532589623040] role: Client, protocol: HTTPS, local:
10.200.50.156:40404, peer: 155.56.96.48:443
[Thr 140532587509504] Thu Apr 11 07:48:32:489 2024
[Thr 140532587509504] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532587509504] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532587509504] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532587509504] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532587509504] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532587509504] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532587509504] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532587509504] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532587509504] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532587509504] >> ===== SecuSSL ErrStack: =====
[Thr 140532587509504] Peer not trusted
[Thr 140532587509504] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532587509504] # --- Messages -----------
[Thr 140532587509504] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532587509504] # --- Summary -----------
[Thr 140532587509504] #01 Certificate (End Entity): VALID
[Thr 140532587509504] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532587509504] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532587509504] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532587509504] #02 Certificate (Issuer): VALID
[Thr 140532587509504] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532587509504] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532587509504] ----- END VERIFICATION RESULT -----
[Thr 140532587509504] << =============================
[Thr 140532587509504] Target Hostname="apps.support.sap.com"
[Thr 140532587509504] SSL NI-hdl 155: local=10.200.50.156:40404
peer=155.56.96.48:443
[Thr 140532587509504] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd0380512c0)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532587509504] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532587509504] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532587509504]
[Thr 140532587509504] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532587509504] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532587509504] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532587509504] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532587509504] SSL NI-hdl 155: local=10.200.50.156:40404
peer=155.56.96.48:443
[Thr 140532587509504] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532587509504] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532587509504] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532587509504] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532587509504] Target Hostname="apps.support.sap.com"
[Thr 140532587509504] >> ---- SecuSSL ErrStack: ----
[Thr 140532587509504] Peer not trusted
[Thr 140532587509504] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532587509504] # --- Messages -----------
[Thr 140532587509504] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532587509504] # --- Summary -----------
[Thr 140532587509504] #01 Certificate (End Entity): VALID
[Thr 140532587509504] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532587509504] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532587509504] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532587509504] #02 Certificate (Issuer): VALID
[Thr 140532587509504] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532587509504] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532587509504] ----- END VERIFICATION RESULT -----
[Thr 140532587509504] << ---------------------------
[Thr 140532587509504]
[Thr 140532587509504] {00094404} {root-id=0050569232781EDE88C88C3E1D25C7B2}
[icxxconn.c 2536]
[Thr 140532587509504] SYNC_RFC T29_U23947_M0, 000, DDIC,
vq20app.sap.swisspor, time=07:47:52, W11, program=SAPMSSY1, lo
[Thr 140532587509504] role: Client, protocol: HTTPS, local:
10.200.50.156:40404, peer: 155.56.96.48:443
[Thr 140532586981120] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532586981120] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532586981120] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532586981120] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532586981120] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532586981120] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532586981120] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532586981120] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532586981120] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532586981120] >> ===== SecuSSL ErrStack: =====
[Thr 140532586981120] Peer not trusted
[Thr 140532586981120] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532586981120] # --- Messages -----------
[Thr 140532586981120] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532586981120] # --- Summary -----------
[Thr 140532586981120] #01 Certificate (End Entity): VALID
[Thr 140532586981120] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532586981120] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586981120] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532586981120] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532586981120] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532586981120] #02 Certificate (Issuer): VALID
[Thr 140532586981120] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586981120] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532586981120] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532586981120] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532586981120] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532586981120] ----- END VERIFICATION RESULT -----
[Thr 140532586981120] << =============================
[Thr 140532586981120] Target Hostname="apps.support.sap.com"
[Thr 140532586981120] SSL NI-hdl 156: local=10.200.50.156:40406
peer=155.56.96.48:443
[Thr 140532586981120] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd014006a10)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532586981120] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532586981120] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532586981120]
[Thr 140532586981120] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532586981120] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532586981120] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532586981120] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532586981120] SSL NI-hdl 156: local=10.200.50.156:40406
peer=155.56.96.48:443
[Thr 140532586981120] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532586981120] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532586981120] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532586981120] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532586981120] Target Hostname="apps.support.sap.com"
[Thr 140532586981120] >> ---- SecuSSL ErrStack: ----
[Thr 140532586981120] Peer not trusted
[Thr 140532586981120] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532586981120] # --- Messages -----------
[Thr 140532586981120] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532586981120] # --- Summary -----------
[Thr 140532586981120] #01 Certificate (End Entity): VALID
[Thr 140532586981120] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532586981120] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586981120] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532586981120] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532586981120] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532586981120] #02 Certificate (Issuer): VALID
[Thr 140532586981120] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586981120] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532586981120] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532586981120] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532586981120] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532586981120] ----- END VERIFICATION RESULT -----
[Thr 140532586981120] << ---------------------------
[Thr 140532586981120]
[Thr 140532586981120] {00094405} {root-id=0050569232781EDE88C88C3E1D25C7B2}
[icxxconn.c 2536]
[Thr 140532586981120] SYNC_RFC T27_U23946_M0, 000, DDIC, ,
time=07:48:32, W12, program=SAPMSSY1, low priority, memory=0
[Thr 140532586981120] role: Client, protocol: HTTPS, local:
10.200.50.156:40406, peer: 155.56.96.48:443
[Thr 140532590679808] Thu Apr 11 07:50:26:598 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094412} {root-id=730EFE
[Thr 140532590679808] INTERNAL T9_U24018_M0, 000, SAPSYS, ,
time=07:50:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 07:50:29:068 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094416} {root-id=730EFE
[Thr 140532590151424] INTERNAL T9_U24018_M0, 000, SAPSYS, ,
time=07:50:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 07:55:26:577 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009443a} {root-id=730EFE
[Thr 140532586452736] INTERNAL T29_U24193_M0, 000, SAPSYS, ,
time=07:55:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 08:00:26:671 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009445d} {root-id=730EFE
[Thr 140532586981120] INTERNAL T24_U24337_M0, 000, SAPSYS, ,
time=08:00:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 08:00:29:343 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094461} {root-id=730EFE
[Thr 140532586452736] INTERNAL T24_U24337_M0, 000, SAPSYS, ,
time=08:00:29, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 08:05:26:601 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094486} {root-id=730EFE
[Thr 140532589094656] INTERNAL T30_U24511_M0, 000, SAPSYS, ,
time=08:05:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 08:10:26:728 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000944a9} {root-id=730EFE
[Thr 140532585924352] INTERNAL T11_U24660_M0, 000, SAPSYS, ,
time=08:10:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 08:10:29:192 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000944ad} {root-id=730EFE
[Thr 140532589094656] INTERNAL T11_U24660_M0, 000, SAPSYS, ,
time=08:10:29, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 08:15:26:589 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000944d1} {root-id=730EFE
[Thr 140532587509504] INTERNAL T31_U24816_M0, 000, SAPSYS, ,
time=08:15:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 08:20:12:749 2024
[Thr 140532590679808] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532590679808] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532590679808] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590679808] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532590679808] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532590679808] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532590679808] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532590679808] (754_STACK patchno 200,linuxx86_64_gcc43) CommonCryptoLib
8.5.50 (/usr/sap/Q20/D02/exe/libsapcrypto.so)
[Thr 140532590679808] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532590679808] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590679808] >> ===== SecuSSL ErrStack: =====
[Thr 140532590679808] Peer not trusted
[Thr 140532590679808] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532590679808] # --- Messages -----------
[Thr 140532590679808] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532590679808] # --- Summary -----------
[Thr 140532590679808] #01 Certificate (End Entity): VALID
[Thr 140532590679808] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532590679808] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590679808] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532590679808] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532590679808] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532590679808] #02 Certificate (Issuer): VALID
[Thr 140532590679808] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590679808] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532590679808] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532590679808] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532590679808] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532590679808] ----- END VERIFICATION RESULT -----
[Thr 140532590679808] << =============================
[Thr 140532590679808] Target Hostname="apps.support.sap.com"
[Thr 140532590679808] SSL NI-hdl 153: local=10.200.50.156:40992
peer=155.56.96.48:443
[Thr 140532590679808] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd03c009ee0)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532590679808] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532590679808] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532590679808]
[Thr 140532590679808] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532590679808] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532590679808] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590679808] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532590679808] SSL NI-hdl 153: local=10.200.50.156:40992
peer=155.56.96.48:443
[Thr 140532590679808] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532590679808] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532590679808] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532590679808] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532590679808] Target Hostname="apps.support.sap.com"
[Thr 140532590679808] >> ---- SecuSSL ErrStack: ----
[Thr 140532590679808] Peer not trusted
[Thr 140532590679808] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532590679808] # --- Messages -----------
[Thr 140532590679808] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532590679808] # --- Summary -----------
[Thr 140532590679808] #01 Certificate (End Entity): VALID
[Thr 140532590679808] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532590679808] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590679808] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532590679808] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532590679808] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532590679808] #02 Certificate (Issuer): VALID
[Thr 140532590679808] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590679808] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532590679808] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532590679808] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532590679808] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532590679808] ----- END VERIFICATION RESULT -----
[Thr 140532590679808] << ---------------------------
[Thr 140532590679808]
[Thr 140532590679808] {000944f2} {root-id=730EFE781C731EEEBDF97028640270DE}
[icxxconn.c 2536]
[Thr 140532590679808] SYNC_RFC T30_U24975_M0, 000, SAP_BATCH,
vq20app.sap.swisspor, time=08:19:52, W12, program=SAPMSSY
[Thr 140532590679808] role: Client, protocol: HTTPS, local:
10.200.50.156:40992, peer: 155.56.96.48:443
[Thr 140532589623040] Thu Apr 11 08:20:26:593 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000944f5} {root-id=730EFE
[Thr 140532589623040] INTERNAL T1_U24983_M0, 000, SAPSYS, ,
time=08:20:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 08:20:29:067 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000944f9} {root-id=730EFE
[Thr 140532586981120] INTERNAL T1_U24983_M0, 000, SAPSYS, ,
time=08:20:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 08:20:32:772 2024
[Thr 140532589623040] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532589623040] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532589623040] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532589623040] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532589623040] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532589623040] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532589623040] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532589623040] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532589623040] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532589623040] >> ===== SecuSSL ErrStack: =====
[Thr 140532589623040] Peer not trusted
[Thr 140532589623040] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532589623040] # --- Messages -----------
[Thr 140532589623040] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532589623040] # --- Summary -----------
[Thr 140532589623040] #01 Certificate (End Entity): VALID
[Thr 140532589623040] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532589623040] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532589623040] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532589623040] #02 Certificate (Issuer): VALID
[Thr 140532589623040] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532589623040] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532589623040] ----- END VERIFICATION RESULT -----
[Thr 140532589623040] << =============================
[Thr 140532589623040] Target Hostname="apps.support.sap.com"
[Thr 140532589623040] SSL NI-hdl 155: local=10.200.50.156:21414
peer=155.56.96.48:443
[Thr 140532589623040] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd040011440)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532589623040] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532589623040] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532589623040]
[Thr 140532589623040] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532589623040] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532589623040] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532589623040] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532589623040] SSL NI-hdl 155: local=10.200.50.156:21414
peer=155.56.96.48:443
[Thr 140532589623040] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532589623040] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532589623040] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532589623040] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532589623040] Target Hostname="apps.support.sap.com"
[Thr 140532589623040] >> ---- SecuSSL ErrStack: ----
[Thr 140532589623040] Peer not trusted
[Thr 140532589623040] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532589623040] # --- Messages -----------
[Thr 140532589623040] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532589623040] # --- Summary -----------
[Thr 140532589623040] #01 Certificate (End Entity): VALID
[Thr 140532589623040] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532589623040] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532589623040] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532589623040] #02 Certificate (Issuer): VALID
[Thr 140532589623040] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532589623040] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532589623040] ----- END VERIFICATION RESULT -----
[Thr 140532589623040] << ---------------------------
[Thr 140532589623040]
[Thr 140532589623040] {000944ff} {root-id=730EFE781C731EEEBDF97028640270DE}
[icxxconn.c 2536]
[Thr 140532589623040] SYNC_RFC T30_U24975_M0, 000, SAP_BATCH,
vq20app.sap.swisspor, time=08:19:52, W12, program=SAPMSSY
[Thr 140532589623040] role: Client, protocol: HTTPS, local:
10.200.50.156:21414, peer: 155.56.96.48:443
[Thr 140532590151424] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532590151424] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532590151424] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590151424] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532590151424] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532590151424] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532590151424] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532590151424] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532590151424] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590151424] >> ===== SecuSSL ErrStack: =====
[Thr 140532590151424] Peer not trusted
[Thr 140532590151424] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532590151424] # --- Messages -----------
[Thr 140532590151424] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532590151424] # --- Summary -----------
[Thr 140532590151424] #01 Certificate (End Entity): VALID
[Thr 140532590151424] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532590151424] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532590151424] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532590151424] #02 Certificate (Issuer): VALID
[Thr 140532590151424] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532590151424] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532590151424] ----- END VERIFICATION RESULT -----
[Thr 140532590151424] << =============================
[Thr 140532590151424] Target Hostname="apps.support.sap.com"
[Thr 140532590151424] SSL NI-hdl 156: local=10.200.50.156:21424
peer=155.56.96.48:443
[Thr 140532590151424] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd028013a10)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532590151424] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532590151424] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532590151424]
[Thr 140532590151424] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532590151424] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532590151424] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590151424] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532590151424] SSL NI-hdl 156: local=10.200.50.156:21424
peer=155.56.96.48:443
[Thr 140532590151424] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532590151424] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532590151424] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532590151424] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532590151424] Target Hostname="apps.support.sap.com"
[Thr 140532590151424] >> ---- SecuSSL ErrStack: ----
[Thr 140532590151424] Peer not trusted
[Thr 140532590151424] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532590151424] # --- Messages -----------
[Thr 140532590151424] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532590151424] # --- Summary -----------
[Thr 140532590151424] #01 Certificate (End Entity): VALID
[Thr 140532590151424] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532590151424] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532590151424] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532590151424] #02 Certificate (Issuer): VALID
[Thr 140532590151424] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532590151424] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532590151424] ----- END VERIFICATION RESULT -----
[Thr 140532590151424] << ---------------------------
[Thr 140532590151424]
[Thr 140532590151424] {00094500} {root-id=730EFE781C731EEEBDF97028640270DE}
[icxxconn.c 2536]
[Thr 140532590151424] SYNC_RFC T31_U24974_M0, 000, SAP_BATCH, ,
time=08:20:32, W10, program=SAPMSSY1, low priority, mem
[Thr 140532590151424] role: Client, protocol: HTTPS, local:
10.200.50.156:21424, peer: 155.56.96.48:443
[Thr 140532587509504] Thu Apr 11 08:25:26:552 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009451f} {root-id=730EFE
[Thr 140532587509504] INTERNAL T24_U25173_M0, 000, SAPSYS, ,
time=08:25:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 08:30:26:607 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094542} {root-id=730EFE
[Thr 140532588037888] INTERNAL T29_U25317_M0, 000, SAPSYS, ,
time=08:30:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 08:30:29:084 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094546} {root-id=730EFE
[Thr 140532587509504] INTERNAL T29_U25317_M0, 000, SAPSYS, ,
time=08:30:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 08:35:26:595 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009456a} {root-id=730EFE
[Thr 140532589623040] INTERNAL T31_U25487_M0, 000, SAPSYS, ,
time=08:35:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 08:40:26:600 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009458d} {root-id=730EFE
[Thr 140532589094656] INTERNAL T6_U25641_M0, 000, SAPSYS, ,
time=08:40:26, W11, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 08:40:29:075 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094591} {root-id=730EFE
[Thr 140532589623040] INTERNAL T6_U25641_M0, 000, SAPSYS, ,
time=08:40:28, W11, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 08:45:26:757 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000945b7} {root-id=730EFE
[Thr 140532587509504] INTERNAL T36_U25810_M0, 000, SAPSYS, ,
time=08:45:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 08:50:26:600 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000945da} {root-id=730EFE
[Thr 140532588037888] INTERNAL T35_U26011_M0, 000, SAPSYS, ,
time=08:50:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 08:50:29:064 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000945de} {root-id=730EFE
[Thr 140532587509504] INTERNAL T35_U26011_M0, 000, SAPSYS, ,
time=08:50:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 08:55:26:620 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094602} {root-id=730EFE
[Thr 140532589623040] INTERNAL T24_U26202_M0, 000, SAPSYS, ,
time=08:55:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 09:00:26:637 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094626} {root-id=730EFE
[Thr 140532589623040] INTERNAL T11_U26347_M0, 000, SAPSYS, ,
time=09:00:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 09:00:29:090 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009462a} {root-id=730EFE
[Thr 140532586981120] INTERNAL T11_U26347_M0, 000, SAPSYS, ,
time=09:00:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532577003264] Thu Apr 11 09:01:30:766 2024
[Thr 140532577003264] IcmSetTrcLevel: Switch trace level to: 2
[Thr 140532577003264] *
[Thr 140532577003264] * SWITCH TRC-LEVEL to 2
[Thr 140532577003264] *
[Thr 140532577003264] eppSetTraceLevel: changing trace level to 2
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_ICMAN_OPCODE_RESP request
(rq_id 26077862, slot 934)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 1 with request rq_id
26077862
[Thr 140532577003264] DpCaRelBlk: released ca_blk 1
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] Thu Apr 11 09:01:35:772 2024
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532585395968] MPI<2>0#2331576 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331577 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331578: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331578 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] MPI<2>0#2331575 WriteOOB 77
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532599072512] Thu Apr 11 09:01:37:284 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140533415016064] Thu Apr 11 09:01:40:164 2024
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiICreateHandle: hdl 155 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 155/sock 29 (I4;
ST)
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 155 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 155 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 155 from 10.200.51.199:48258
[Thr 140533415016064] NiIAccept: hdl 155 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345654/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.199 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360773
[Thr 140532586452736] IcmWorkerHandleRequest: worker 8 got the semaphore
[Thr 140532586452736] REQ TRACE BEGIN: 9/345654/1
[Thr 140532586452736] REQUEST:
Type: ACCEPT_CONNECTION Index = 360773
[Thr 140532586452736] CONNECTION (id=9/345654):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 155, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.199:48258 ()
status: NOP
connect time: 11.04.2024 09:01:40
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140533415016064] IcmQueueAppend: queuelen: 0
[Thr 140533415016064] MAIN TRACE END
[Thr 140532586452736] MPI 187: event flag already open:7643 key=16643
[Thr 140532586452736] MPI 187: event flag already open:7642 key=16642
[Thr 140532586452736] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532586452736] MPI<78179>bb#1 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532586452736] MPI<78179>bb#2 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532586452736] MPI 188: event flag already open:7641 key=16641
[Thr 140532586452736] MPI 188: event flag already open:7640 key=16640
[Thr 140532586452736] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532586452736] MPI<7817a>bc#1 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532586452736] MPI<7817a>bc#2 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532586452736] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532586452736] Thu Apr 11 09:01:40:167 2024
[Thr 140532586452736] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532586452736] out: sssl_hdl = 7fd02c042a30
[Thr 140532586452736] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532586452736] SSL NI-hdl 155: local=10.200.50.133:8443
peer=10.200.51.199:48258
[Thr 140532586452736] <<- SapSSLSetNiHdl(sssl_hdl=7fd02c042a30,
ni_hdl=155)==SAP_O_K
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532586452736] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532586452736] ClientHello session_id="57767189 0BFECFE9 30C0CB29
A02C4AAB EACB9432 28160AE1 75AB3720 E7683655"
[Thr 140532586452736] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532586452736] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532586452736] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532586452736] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532586452736] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532586452736] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532586452736] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532586452736] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532586452736] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532586452736] (failed resume) new TLS session_id="1A3E2817 8DED6F04
1C52B262 CE4E0FDB C08BAFD1 780A9165 47636F31 F8B8A73B
[Thr 140532586452736] SapSSLISessionStartFin(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532586452736] <<- SapSSLSessionStartNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532586452736] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] IcmReadFromConn(id=9/345654): request new MPI (0/0)
[Thr 140532586452736] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532586452736] MPI<78179>bb#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532586452736] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532586452736] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586452736] Thu Apr 11 09:01:40:173 2024
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532586452736] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532586452736] <<- SapSSLReadNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] IcmReadFromConn(id=9/345654): no SSL data available
[Thr 140532586452736] IcmReadFromConn(id=9/345654): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532586452736] BINDUMP of content denied
[Thr 140532586452736] HttpPlugInHandleNetData(rqid=9/345654/1): role: Server(1),
status: 1
[Thr 140532586452736] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532586452736] ICT: IctIHttpOpenMessage: 7fd02c064b40 typ=1
[Thr 140532586452736] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532586452736] HttpParseRequestHeader: no content length set
[Thr 140532586452736] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532586452736] HttpParseRequestHeader: Version: 1001
[Thr 140532586452736] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532586452736] <<- SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] out: cert_len = <no cert>
[Thr 140532586452736] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586452736] HTTP request (raw) [9/345654/1]:
[Thr 140532586452736] GET /sap/bc/ping HTTP/1.1
[Thr 140532586452736] host: 10.200.50.133:8443
[Thr 140532586452736] connection: close
[Thr 140532586452736] user-agent: ELB-HealthChecker/2.0
[Thr 140532586452736] accept-encoding: gzip, compressed
[Thr 140532586452736] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532586452736] <<- SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] out: cert_len = <no cert>
[Thr 140532586452736] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586452736] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532586452736] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532586452736] DpPlgGetVirtHost: no server defined, use default
[Thr 140532586452736] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532586452736] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532586452736] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532586452736] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532586452736] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532586452736] Thu Apr 11 09:01:40:174 2024
[Thr 140532586452736] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532586452736] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532586452736] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532586452736] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532586452736] >> start >>
CsiExecute(7fd02401e940,7fd04ae4aa20,12,1,7fd04ae4aa10,7fd04ae4a9f4,0)
[Thr 140532586452736] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532586452736] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532586452736] << end << CsiExecute(CSI_RC==OK)
[Thr 140532586452736] >> start >> CsiFreeInstance((nil))
[Thr 140532586452736] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532586452736] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532586452736] HttpModHandler: process 1, header_len 144
[Thr 140532586452736] <<- SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] out: cert_len = <no cert>
[Thr 140532586452736] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586452736] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586452736] HttpModHandler: perform the actions: (128)
[Thr 140532586452736] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532586452736] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586452736] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532586452736] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532586452736] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532586452736] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532586452736] IctCmOpen#357242 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] IctCmOpen#459351 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532586452736] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532586452736] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532586452736] IctCmOpen#357243 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] IctCmOpen#459352 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] HttpCacheHandler: cache miss.
[Thr 140532586452736] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586452736] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532586452736] ICT: IctLookupPathTable() -> 0
[Thr 140532586452736] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532586452736] DTRACE(9/345654/1): {root-
id=730EFE781C731EEEBDFA2B13316013E9}_{conn-id=730EFE781C731EEEBDFA2B13316033E9}_1
[Thr 140532586452736] Thu Apr 11 09:01:40:175 2024
[Thr 140532586452736] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532586452736] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532586452736] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586452736] flush buffer with mpi buffer id 7
[Thr 140532586452736] MPI<78179>bb#4 FlushOutbuf 7 1 0 255cb0 224 6 -> 7fd050314cb0
MPI_OK
[Thr 140532586452736] IcmPlFlushBuf: roll in workprocess
[Thr 140532586452736] IcmConnRollInWP: roll in work process
[Thr 140532586452736] IcmCreateDpRequest: Send request to AppServer
[Thr 140532586452736] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532586452736] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532586452736] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532586452736] DpListRemove: remove elem 6 from tmadm_free_list
[Thr 140532586452736] DpListRemove: 1193 elems in tmadm_free_list
[Thr 140532586452736] DpListInsert: insert elem 6 into tmadm_inuse_list (at begin)
[Thr 140532586452736] DpListInsert: 7 elems in tmadm_inuse_list
[Thr 140532586452736] DpInitInternalSession: initialized T6_M0_I0
[Thr 140532586452736] DpITmSlotClear: cleared T6_U26389
[Thr 140532586452736] DpTmSlotAllocate: allocated T6_U26389
[Thr 140532586452736] RqQQueueCreate: Created queue <T6_U26389_M0> in slot 53
(48954) with normal priority
[Thr 140532586452736] DpLogonInit: new logon T6_U26389, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal priori
[Thr 140532586452736] IcmSendRq: created T6_U26389_M0
[Thr 140532586452736] DpSesGetWorkerType: return workerType DIA for T6_U26389
[Thr 140532586452736] DpRqSlotAllocate: 1 pending requests
[Thr 140532586452736] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26077880, slot 935)
[Thr 140532586452736] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26077880) from
ICMAN to local WORKER
[Thr 140532586452736] rq_id 26077880
[Thr 140532586452736] -OUT- ca_blk -1 len 0
[Thr 140532586452736] -OUT- userTrace 2
[Thr 140532586452736] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532586452736] -OUT- mpi rq <78179> mpi resp <7817a> prot
2
[Thr 140532586452736] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532586452736] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532586452736] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA2B13316013E9}_{conn-id=730EFE781C731EEEBDFA2B13316033E9}_1
[Thr 140532586452736] -OUT- sender address:
[Thr 140532586452736] -OUT- type LOCAL
[Thr 140532586452736] -OUT- agentType ICMAN
[Thr 140532586452736] -OUT- receiver address:
[Thr 140532586452736] -OUT- type LOCAL
[Thr 140532586452736] -OUT- agentType WORKER workerTyp DIA
[Thr 140532586452736] -OUT- session T6_U26389_M0
[Thr 140532586452736] RqQAddRequest: Add request rq_id 26077880 (DIA) to queue
<T6_U26389_M0> in slot 53 at the end
[Thr 140532586452736] Dump of queue <T6_U26389_M0> in slot 53 (1 requests, port=0):
[Thr 140532586452736] -1 <- 29 (rq_id 26077880, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532586452736] RqQQueueAddToSessionQueue: Added queue <T6_U26389_M0> in slot
53 to normal priority session queue at the end (
[Thr 140532586452736] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532586452736] -1 <- 53 < T6_U26389_M0> -> -1
[Thr 140532586452736] RqQNotifySessionQueue: notify normal priority session queue
of queue <T6_U26389_M0> (DIA) (id=181)
[Thr 140532586452736] Info of W13 (inside function RqQNotifyWorker (end))
[Thr 140532586452736] noOfPendingQueues=>W13-0<
[Thr 140532586452736] noOfWaitForQueues=>W13-2<
[Thr 140532586452736] wait for queue 69 (T38_U26359_M0)
[Thr 140532586452736] wait for queue 18 (W13)
[Thr 140532586452736] lowestPriority: normal priority
[Thr 140532586452736] modCounter=>W13-3399494<
[Thr 140532586452736] RqQNotifyWorker: notify W13 about dispatch queues
(modCounter=>W13-3399494<)
[Thr 140532586452736] RqQSetWorkerState: W13 has state RUNNING (modCounter=>W13-
3399494<)
[Thr 140532586452736] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532586452736] RqQQueueGetNumberOfRequests: Queue <T6_U26389_M0> in slot 53
contains 1 requests of type DIA
[Thr 140532586452736] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26077880), queue has 1 requests
[Thr 140532586452736] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26077880,
slot 935)
[Thr 140532586452736] Thu Apr 11 09:01:40:175 2024
[Thr 140532586452736] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532586452736] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532586452736] IcmHandleNetRead(id=9/345654): read_len: 144, HandleNetData
returned: 4
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] IcmReadFromPartner(id=9/345654): read with maximum timeout
500
[Thr 140532586452736] IcmMpiWatchInsert: MPI watch entry <7817a>, number 11
inserted.
[Thr 140532586452736] MPI<7817a>bc#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532586452736] MPI<7817a>bc#6 GetInbuf -1 255cb0 1087 (1) -> MPI_EOS: End Of
Stream
[Thr 140532586452736] IcmMpiWatchRemove: MPI watch entry <7817a>, number 11 removed
(wakeup was not sent).
[Thr 140532586452736] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532586452736] BINDUMP of content denied
[Thr 140532586452736] PlugInHandleServData(rqid=9/345654/1): role: Server(1),
status: 3
[Thr 140532586452736] content-length: 0/-1, buf_len: 1007, buf_offset: 0,
buf_status: 6
[Thr 140532586452736] ICT: IctIHttpOpenMessage: 7fd02c077470 typ=2
[Thr 140532586452736] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532586452736] HttpParseResponseHeader: Version: 1001
[Thr 140532586452736] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532586452736] HTTP response (raw) [9/345654/1]:
[Thr 140532586452736] HTTP/1.1 403 Forbidden
[Thr 140532586452736] content-type: text/html; charset=utf-8
[Thr 140532586452736] content-length: 857
[Thr 140532586452736] sap-perf-fesrec: 3698.000000
[Thr 140532586452736] content-encoding: gzip
[Thr 140532586452736] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532586452736] DTRACE(9/345654/1): {root-
id=730EFE781C731EEEBDFA2B13316013E9}_{conn-id=730EFE781C731EEEBDFA2B13316033E9}_1
[Thr 140532586452736] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532586452736] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 29 (rq_id 26077881)
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:60019
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=165), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26077881 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] Thu Apr 11 09:01:40:189 2024
[Thr 140532577003264] rq_id 26077881
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 2
[Thr 140532577003264] -IN-- sDataLen 8 sData 0900000036460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
13
[Thr 140532577003264] -IN-- session T6_U26389_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26077881, slot 936)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26077881)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345654
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26077881, slot 936)
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331579 WriteOOB 77
[Thr 140532585395968] MPI<2>0#2331580 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331581 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331582: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331582 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532586452736] HttpSAPR3Handler: Response from AppServer
[Thr 140532586452736] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586452736] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586452736] HttpCacheHandler: TASK_RESPONSE 150 7fd024001ae0 7fd02c075fb0
[Thr 140532586452736] ISC: don't cache response: status code=403
[Thr 140532586452736] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532586452736] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586452736] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532586452736] HttpModHandler: process 2, header_len 150
[Thr 140532586452736] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586452736] HttpModHandler: perform the actions: (128)
[Thr 140532586452736] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532586452736] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586452736] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532586452736] Thu Apr 11 09:01:40:189 2024
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532586452736] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532586452736] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpModHandler: process 3, header_len 0
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd02c075fb0
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532586452736] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532586452736] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532586452736] IcmHandleReadFromPartner(id=9/345654): HandleServData
returned: 702
[Thr 140532586452736] BINDUMP of content denied
[Thr 140532586452736] IcmWriteToConn(id=9/345654): prepared to write data to
partner (len = 1007, timeout = 2000)
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1036 of 1036)
[Thr 140532586452736] <<- SapSSLWriteNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "buf= 7fd050314d20, written= 1007 of 1007
(all) io=idle"
[Thr 140532586452736] IcmWriteToConn(id=9/345654): wrote data to partner (len =
1007)
[Thr 140532586452736] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532586452736] MPI<7817a>bc#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532586452736] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532586452736] ICT: IctHttpCloseMessage( 7fd02c064b40 ) -> u=0 rc=0
[Thr 140532586452736] ICT: IctHttpCloseMessage( 7fd02c077470 ) -> u=0 rc=0
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532586452736] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532586452736] in: sssl_hdl = 7fd02c042a30
[Thr 140532586452736] in: ... ni_hdl = 155
[Thr 140532586452736] in: flags = 0
[Thr 140532586452736] in: timeout = 10000
[Thr 140532586452736] MPI<78179>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532586452736] MPI<78179>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532586452736] MPI<78179>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586452736] MPI<7817a>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532586452736] MPI<7817a>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532586452736] MPI<7817a>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586452736] NiIShutdownHandle: shutdown -w of hdl 155
[Thr 140532586452736] SiPeek: hang up occurred in sock 29
[Thr 140532586452736] NiIPeek: peek for hdl 155 failed (r; rc=1)
[Thr 140532586452736] Thu Apr 11 09:01:40:190 2024
[Thr 140532586452736] NiIRead: SiRecv failed for hdl 155/sock 29
[Thr 140532586452736] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.199:48258;
L=10.200.50.133:8443)
[Thr 140532586452736] NiICloseHandle: shutdown and close hdl 155/sock 29
[Thr 140532586452736] IcmConnClose: Connection 9/345654 closed
[Thr 140532586452736] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.199 ->
rc=0
[Thr 140532586452736] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532586452736] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
-> 0
[Thr 140532586452736] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=-1 -> 0
[Thr 140532586452736] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532586452736] REQ TRACE END: 9/345654/1
[Thr 140532586452736] IcmWorkerThread: Thread 8: Waiting for event
[Thr 140532586452736] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Thu Apr 11 09:01:42:954 2024
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 29 (rq_id 26077894)
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:47230
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=166), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26077894 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26077894
[Thr 140532577003264] -IN-- ca_blk 1 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_ICMAN_OPCODE_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
15
[Thr 140532577003264] -IN-- session T31_U25632_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 1
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_ICMAN_OPCODE_RESP
request (rq_id 26077894, slot 937)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26077894)
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_TRACE_UP(5)
[Thr 140532577003264] IcmHandleAdmMsg: increase trace level
[Thr 140532577003264] IcmSetTrcLevel: Switch trace level to: 3
[Thr 140532577003264] *
[Thr 140532577003264] * SWITCH TRC-LEVEL to 3
[Thr 140532577003264] *
[Thr 140532577003264] eppSetTraceLevel: changing trace level to 3
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_ICMAN_OPCODE_RESP request
(rq_id 26077894, slot 937)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 1 with request rq_id
26077894
[Thr 140532577003264] DpCaRelBlk: released ca_blk 1
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=1000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 1000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=1000)
[Thr 140532577003264] Thu Apr 11 09:01:43:955 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: call schedules, last t: 1712818873, next
t: 1712818903, cur t: 1712818903
[Thr 140532577003264] IcmCreateRequest: Append request 360774
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532588037888] IcmWorkerHandleRequest: worker 5 got the semaphore
[Thr 140532588037888] REQUEST:
Type: SCHEDULER Index = 360774
[Thr 140532588037888] IcmGetSchedule: found slot 0
[Thr 140532588037888] IcmAlReportPerfData: Reporting data to CCMS Alerting
Infrastructure
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532588037888] IcmConnCheckStoredClientConn: next client timeout check in 7
sec
[Thr 140532588037888] IcmConnInitContext: context initialized
[Thr 140532588037888] IcmGetServicePtr: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 1
[Thr 140532588037888] PlugInHandleAdmMessage: request received:
[Thr 140532588037888] PlugInHandleAdmMessage: opcode: ICM_COM_OP_CACHE_STAT (136),
len: 528, dest_type: 2, subhdlkey: 262145(4/0)
[Thr 140532588037888] HttpISubHandlerItCreate: add reference to table 7fd024010780,
now 2 references, 1 tables used
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_ADM_MSG(4), header_l
[Thr 140532588037888] HttpCacheHandler: TASK_ADM_MSG 0 7fd024001ae0 (nil)
[Thr 140532588037888] SCACHE: adm request received:
[Thr 140532588037888] SCACHE: opcode: 136, len: 528, dest_type: 2, dest:
[Thr 140532588037888] MTX_LOCK 3247 7fd024004a70
[Thr 140532588037888] MTX_UNLOCK 3260 7fd024004a70
[Thr 140532588037888] IctCmGetCacheInfo#459353 -> 0
[Thr 140532588037888] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532588037888] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532588037888] HttpSubHandlerItDelete: remove reference to table
7fd024010780, now 1 references, 1 tables used
[Thr 140532588037888] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532588037888] IcmServDecrRefCount: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 0
[Thr 140532588037888] IcmGetSchedule: next schedule in 30 secs
[Thr 140532588037888] IcmWorkerThread: Thread 5: Waiting for event
[Thr 140532588037888] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:01:47:294 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:01:48:960 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331583 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331584 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331585 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331586: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331586 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532577003264] Thu Apr 11 09:01:53:963 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331587 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331588 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331589 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331590: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331590 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140533415016064] Thu Apr 11 09:01:54:773 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 156 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 156/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 156 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 156 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 156 from 10.200.51.221:15868
[Thr 140533415016064] NiIAccept: hdl 156 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345656/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.221 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360775
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532589623040] IcmWorkerHandleRequest: worker 2 got the semaphore
[Thr 140532589623040] REQ TRACE BEGIN: 9/345656/1
[Thr 140532589623040] REQUEST:
Type: ACCEPT_CONNECTION Index = 360775
[Thr 140532589623040] CONNECTION (id=9/345656):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 156, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.221:15868 ()
status: NOP
connect time: 11.04.2024 09:01:54
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532589623040] Thu Apr 11 09:01:54:773 2024
[Thr 140532589623040] MPI 188: event flag already open:7641 key=16641
[Thr 140532589623040] MPI 188: event flag already open:7640 key=16640
[Thr 140532589623040] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532589623040] MPI<7817b>bc#1 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532589623040] MPI<7817b>bc#2 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532589623040] MPI 187: event flag already open:7643 key=16643
[Thr 140532589623040] MPI 187: event flag already open:7642 key=16642
[Thr 140532589623040] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532589623040] MPI<7817c>bb#1 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532589623040] MPI<7817c>bb#2 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532589623040] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532589623040] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532589623040] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532589623040] out: sssl_hdl = 7fd04004ab80
[Thr 140532589623040] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd04004ab80,
cred_hdl=7fd00c064270)
[Thr 140532589623040] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532589623040] ->> SapSSLSetNiHdl(sssl_hdl=7fd04004ab80, ni_hdl=156)
[Thr 140532589623040] SSL NI-hdl 156: local=10.200.50.133:8443
peer=10.200.51.221:15868
[Thr 140532589623040] <<- SapSSLSetNiHdl(sssl_hdl=7fd04004ab80,
ni_hdl=156)==SAP_O_K
[Thr 140532589623040] ->> SapSSLSessionStartNB(sssl_hdl=7fd04004ab80, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532589623040] NiIBlockMode: leave blockmode for hdl 156 FALSE
[Thr 140532589623040] NiIHdlGetStatus: hdl 156/sock 29 ok, data pending (len=1)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532589623040] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532589623040] ClientHello session_id="12F586E5 50E563FD 150643EF
48691F8A A073731C CE1D58F7 88113A8B 75131115"
[Thr 140532589623040] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532589623040] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532589623040] TLS_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_AES_256_GCM_SHA384
[Thr 140532589623040] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532589623040] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532589623040] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532589623040] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532589623040] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532589623040] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532589623040] [ssl_bytes_to_cipher_suites]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Received TLS Extensions:
[Thr 140532589623040] Id: 43 - supported_versions [RFC8446]
[Thr 140532589623040] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532589623040] Id: 51 - key_share [RFC8446]
[Thr 140532589623040] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532589623040] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532589623040] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532589623040] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532589623040] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532589623040] [ssl_parse_clienthello_tlsext]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Own TLS certificate:
[Thr 140532589623040] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532589623040] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532589623040] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532589623040] [ssl3_output_cert_chain]
[Thr 140532589623040] Thu Apr 11 09:01:54:773 2024
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: CA certificate:
[Thr 140532589623040] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532589623040] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532589623040] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532589623040] [ssl3_output_cert_chain]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Offering 2 certificate type(s) for
client authentication:
[Thr 140532589623040] rsa_sign(1)
[Thr 140532589623040] ecdsa_sign(64)
[Thr 140532589623040] [ssl3_get_req_cert_type]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532589623040] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532589623040] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532589623040] [ssl_get_encoded_trusted_ca_list]
[Thr 140532589623040] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532589623040] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532589623040] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532589623040] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Received message of type
"Certificate" containing no certificates.
[Thr 140532589623040] Renouncing client authentication: verification mode: 1
[Thr 140532589623040] [ssl3_decode_client_certificate]
[Thr 140532589623040] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532589623040] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532589623040] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532589623040] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532589623040] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532589623040] No Client Certificate
[Thr 140532589623040] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532589623040] (failed resume) new TLS session_id="1C849BC6 ED3BC7E7
E987D049 315C8CC1 C78131C7 469A36BD 20D81C9A 9BF98202
[Thr 140532589623040] SapSSLISessionStartFin(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532589623040] <<- SapSSLSessionStartNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532589623040] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd04004ab80, &plen=(nil),
&more=(nil), &ios=7fd04b156c38)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] IcmReadFromConn(id=9/345656): request new MPI (0/0)
[Thr 140532589623040] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532589623040] MPI<7817b>bc#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532589623040] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532589623040] Thu Apr 11 09:01:54:776 2024
[Thr 140532589623040] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd04004ab80,
&plen=7fd04b156b18, &more=7fd04b156b17, &ios=7fd04b156b1c)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] NiIPeek: peek successful for hdl 156 (r)
[Thr 140532589623040] ->> SapSSLReadNB(sssl_hdl=7fd04004ab80, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532589623040] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532589623040] <<- SapSSLReadNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd04004ab80,
&plen=7fd04b156b18, &more=7fd04b156b17, &ios=7fd04b156b1c)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] NiIPeek: peek for hdl 156 timed out (r; 0ms)
[Thr 140532589623040] IcmReadFromConn(id=9/345656): no SSL data available
[Thr 140532589623040] IcmReadFromConn(id=9/345656): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] HttpPlugInHandleNetData(rqid=9/345656/1): role: Server(1),
status: 1
[Thr 140532589623040] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532589623040] ICT: IctIHttpOpenMessage: 7fd04005dda0 typ=1
[Thr 140532589623040] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532589623040] HttpParseRequestHeader: no content length set
[Thr 140532589623040] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532589623040] HttpParseRequestHeader: Version: 1001
[Thr 140532589623040] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532589623040] ->> SapSSLGetPeerInfo(sssl_hdl=7fd04004ab80,
&cert=7fd04b1566f0, &cert_len=7fd04b1566ec,
[Thr 140532589623040] &subject_dn=7fd04b1566f8, &issuer_dn=7fd04b156700,
&csuite_name=7fd04b156708)
[Thr 140532589623040] <<- SapSSLGetPeerInfo(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] out: cert_len = <no cert>
[Thr 140532589623040] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532589623040] HTTP request (raw) [9/345656/1]:
[Thr 140532589623040] GET /sap/bc/ping HTTP/1.1
[Thr 140532589623040] host: 10.200.50.133:8443
[Thr 140532589623040] connection: close
[Thr 140532589623040] user-agent: ELB-HealthChecker/2.0
[Thr 140532589623040] accept-encoding: gzip, compressed
[Thr 140532589623040] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532589623040] ->> SapSSLGetPeerInfo(sssl_hdl=7fd04004ab80,
&cert=7fd04b155638, &cert_len=7fd04b155634,
[Thr 140532589623040] &subject_dn=7fd04b155640, &issuer_dn=7fd04b155648,
&csuite_name=7fd04b1556c8)
[Thr 140532589623040] <<- SapSSLGetPeerInfo(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] out: cert_len = <no cert>
[Thr 140532589623040] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532589623040] Thu Apr 11 09:01:54:777 2024
[Thr 140532589623040] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532589623040] sap-cancel-on-close not found
[Thr 140532589623040] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532589623040] DpPlgGetVirtHost: no server defined, use default
[Thr 140532589623040] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532589623040] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532589623040] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532589623040] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532589623040] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532589623040] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532589623040] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532589623040] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532589623040] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532589623040] >> start >>
CsiExecute(7fd02401e940,7fd04b150a20,12,1,7fd04b150a10,7fd04b1509f4,0)
[Thr 140532589623040] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532589623040] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532589623040] << end << CsiExecute(CSI_RC==OK)
[Thr 140532589623040] >> start >> CsiFreeInstance((nil))
[Thr 140532589623040] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532589623040] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532589623040] HttpModHandler: process 1, header_len 144
[Thr 140532589623040] ->> SapSSLGetPeerInfo(sssl_hdl=7fd04004ab80,
&cert=7fd04b1518a0, &cert_len=7fd04b151580,
[Thr 140532589623040] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532589623040] <<- SapSSLGetPeerInfo(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] out: cert_len = <no cert>
[Thr 140532589623040] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532589623040] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532589623040] HttpModHandler: perform the actions: (128)
[Thr 140532589623040] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532589623040] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532589623040] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532589623040] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532589623040] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532589623040] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532589623040] MTX_LOCK 1760 7fd024005020
[Thr 140532589623040] MTX_UNLOCK 1891 7fd024005020
[Thr 140532589623040] IctCmOpen#357244 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532589623040] MTX_LOCK 1760 7fd024004a70
[Thr 140532589623040] Thu Apr 11 09:01:54:777 2024
[Thr 140532589623040] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532589623040] IctCmOpen#459354 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532589623040] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532589623040] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532589623040] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532589623040] MTX_LOCK 1760 7fd024005020
[Thr 140532589623040] MTX_UNLOCK 1891 7fd024005020
[Thr 140532589623040] IctCmOpen#357245 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532589623040] MTX_LOCK 1760 7fd024004a70
[Thr 140532589623040] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532589623040] IctCmOpen#459355 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532589623040] HttpCacheHandler: cache miss.
[Thr 140532589623040] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532589623040] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532589623040] ICT: IctLookupPathTable() -> 0
[Thr 140532589623040] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532589623040] DTRACE(9/345656/1): {root-
id=730EFE781C731EEEBDFA2C29B87B140E}_{conn-id=730EFE781C731EEEBDFA2C29B87B340E}_1
[Thr 140532589623040] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532589623040] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532589623040] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532589623040] flush buffer with mpi buffer id 7
[Thr 140532589623040] MPI<7817b>bc#4 FlushOutbuf 7 1 0 255cb0 224 6 -> 7fd050314cb0
MPI_OK
[Thr 140532589623040] IcmPlFlushBuf: roll in workprocess
[Thr 140532589623040] IcmConnRollInWP: roll in work process
[Thr 140532589623040] IcmCreateDpRequest: Send request to AppServer
[Thr 140532589623040] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532589623040] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532589623040] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532589623040] DpResourcesOk: logons: act/max/usage = 6/1200/0.500000 %
[Thr 140532589623040] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532589623040] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532589623040] DpResourcesOk: ES: act/max/usage = 2184 MB/10992 MB/19.868996
%
[Thr 140532589623040] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532589623040] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532589623040] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532589623040] DpListRemove: remove elem 36 from tmadm_free_list
[Thr 140532589623040] DpListRemove: 1193 elems in tmadm_free_list
[Thr 140532589623040] DpListInsert: insert elem 36 into tmadm_inuse_list (at begin)
[Thr 140532589623040] DpListInsert: 7 elems in tmadm_inuse_list
[Thr 140532589623040] Thu Apr 11 09:01:54:778 2024
[Thr 140532589623040] DpGetFreeUid: new UID: 26438
[Thr 140532589623040] DpSesLockSessionEntry: lock invalid T36_M0
[Thr 140532589623040] DpSesUnlockSessionEntry: unlocked invalid T36_M0
[Thr 140532589623040] DpInitInternalSession: initialized T36_M0_I0
[Thr 140532589623040] DpITmSlotClear: cleared T36_U26438
[Thr 140532589623040] DpTmSlotAllocate: allocated T36_U26438
[Thr 140532589623040] RqQQueueCreate: Created queue <T36_U26438_M0> in slot 68
(49059) with normal priority
[Thr 140532589623040] DpLogonInit: new logon T36_U26438, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532589623040] IcmSendRq: created T36_U26438_M0
[Thr 140532589623040] DpSesGetWorkerType: return workerType DIA for T36_U26438
[Thr 140532589623040] DpRqSlotAllocate: 1 pending requests
[Thr 140532589623040] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078206, slot 938)
[Thr 140532589623040] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078206) from
ICMAN to local WORKER
[Thr 140532589623040] rq_id 26078206
[Thr 140532589623040] -OUT- ca_blk -1 len 0
[Thr 140532589623040] -OUT- userTrace 3
[Thr 140532589623040] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532589623040] -OUT- mpi rq <7817b> mpi resp <7817c> prot
2
[Thr 140532589623040] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532589623040] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532589623040] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA2C29B87B140E}_{conn-id=730EFE781C731EEEBDFA2C29B87B340E}_1
[Thr 140532589623040] -OUT- sender address:
[Thr 140532589623040] -OUT- type LOCAL
[Thr 140532589623040] -OUT- agentType ICMAN
[Thr 140532589623040] -OUT- receiver address:
[Thr 140532589623040] -OUT- type LOCAL
[Thr 140532589623040] -OUT- agentType WORKER workerTyp DIA
[Thr 140532589623040] -OUT- session T36_U26438_M0
[Thr 140532589623040] RqQAddRequest: Add request rq_id 26078206 (DIA) to queue
<T36_U26438_M0> in slot 68 at the end
[Thr 140532589623040] Dump of queue <T36_U26438_M0> in slot 68 (1 requests,
port=0):
[Thr 140532589623040] -1 <- 83 (rq_id 26078206, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532589623040] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532589623040] RqQQueueAddToSessionQueue: Added queue <T36_U26438_M0> in
slot 68 to normal priority session queue at the end
[Thr 140532589623040] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532589623040] -1 <- 68 < T36_U26438_M0> -> -1
[Thr 140532589623040] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532589623040] RqQNotifySessionQueue: notify normal priority session queue
of queue <T36_U26438_M0> (DIA) (id=182)
[Thr 140532589623040] Info of W18 (inside function RqQNotifyWorker (end))
[Thr 140532589623040] noOfPendingQueues=>W18-0<
[Thr 140532589623040] noOfWaitForQueues=>W18-2<
[Thr 140532589623040] wait for queue 69 (T38_U26359_M0)
[Thr 140532589623040] wait for queue 23 (W18)
[Thr 140532589623040] lowestPriority: normal priority
[Thr 140532589623040] modCounter=>W18-2733039<
[Thr 140532589623040] RqQNotifyWorker: notify W18 about dispatch queues
(modCounter=>W18-2733039<)
[Thr 140532589623040] RqQSetWorkerState: W18 has state RUNNING (modCounter=>W18-
2733039<)
[Thr 140532589623040] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532589623040] RqQQueueGetNumberOfRequests: Queue <T36_U26438_M0> in slot 68
contains 1 requests of type DIA
[Thr 140532589623040] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078206), queue has 1 requests
[Thr 140532589623040] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078206,
slot 938)
[Thr 140532589623040] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532589623040] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532589623040] IcmHandleNetRead(id=9/345656): read_len: 144, HandleNetData
returned: 4
[Thr 140532589623040] IcmHandleNetRead(id=9/345656): status 1 -> 4
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd04004ab80,
&plen=7fd04b156c58, &more=7fd04b156c33, &ios=7fd04b156c38)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] IcmReadFromPartner(id=9/345656): read with maximum timeout
500
[Thr 140532589623040] IcmMpiWatchInsert: MPI watch entry <7817c>, number 11
inserted.
[Thr 140532589623040] MPI<7817c>bb#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532589623040] Thu Apr 11 09:01:54:795 2024
[Thr 140532589623040] MPI<7817c>bb#6 GetInbuf -1 255cb0 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532589623040] IcmMpiWatchRemove: MPI watch entry <7817c>, number 11 removed
(wakeup was not sent).
[Thr 140532589623040] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] PlugInHandleServData(rqid=9/345656/1): role: Server(1),
status: 3
[Thr 140532589623040] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532589623040] ICT: IctIHttpOpenMessage: 7fd0400796c0 typ=2
[Thr 140532589623040] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532589623040] HttpParseResponseHeader: Version: 1001
[Thr 140532589623040] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532589623040] HTTP response (raw) [9/345656/1]:
[Thr 140532589623040] HTTP/1.1 403 Forbidden
[Thr 140532589623040] content-type: text/html; charset=utf-8
[Thr 140532589623040] content-length: 857
[Thr 140532589623040] sap-perf-fesrec: 11678.000000
[Thr 140532589623040] content-encoding: gzip
[Thr 140532589623040] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532589623040] DTRACE(9/345656/1): {root-
id=730EFE781C731EEEBDFA2C29B87B140E}_{conn-id=730EFE781C731EEEBDFA2C29B87B340E}_1
[Thr 140532589623040] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532589623040] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532589623040] HttpSAPR3Handler: Response from AppServer
[Thr 140532589623040] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589623040] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532589623040] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd040078200
[Thr 140532589623040] ISC: don't cache response: status code=403
[Thr 140532589623040] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532589623040] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589623040] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532589623040] HttpModHandler: process 2, header_len 151
[Thr 140532589623040] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532589623040] HttpModHandler: perform the actions: (128)
[Thr 140532589623040] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532589623040] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589623040] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] Thu Apr 11 09:01:54:795 2024
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532589623040] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532589623040] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpModHandler: process 3, header_len 0
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd040078200
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532589623040] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532589623040] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532589623040] IcmHandleReadFromPartner(id=9/345656): HandleServData
returned: 702
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] IcmWriteToConn(id=9/345656): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532589623040] ->> SapSSLWriteNB(sssl_hdl=7fd04004ab80, buf=7fd050314d20,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532589623040] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532589623040] <<- SapSSLWriteNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "buf= 7fd050314d20, written= 1008 of 1008
(all) io=idle"
[Thr 140532589623040] IcmWriteToConn(id=9/345656): wrote data to partner (len =
1008)
[Thr 140532589623040] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532589623040] MPI<7817c>bb#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532589623040] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532589623040] ICT: IctHttpCloseMessage( 7fd04005dda0 ) -> u=0 rc=0
[Thr 140532589623040] ICT: IctHttpCloseMessage( 7fd0400796c0 ) -> u=0 rc=0
[Thr 140532589623040] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4b1567fc)
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532589623040] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532589623040] in: sssl_hdl = 7fd04004ab80
[Thr 140532589623040] in: ... ni_hdl = 156
[Thr 140532589623040] in: flags = 0
[Thr 140532589623040] in: timeout = 10000
[Thr 140532589623040] MPI<7817b>bc#7 Close( bc ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532589623040] MPI<7817b>bc#9 Delete( bc ) -> MPI_OK
[Thr 140532589623040] MPI<7817b>bc#8 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532589623040] MPI<7817c>bb#8 Close( bb ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532589623040] MPI<7817c>bb#10 Delete( bb ) -> MPI_OK
[Thr 140532589623040] Thu Apr 11 09:01:54:795 2024
[Thr 140532589623040] MPI<7817c>bb#9 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532589623040] NiIShutdownHandle: shutdown -w of hdl 156
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 83 (rq_id 26078207)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 83
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=167), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078207 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078207
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 0900000038460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T36_U26438_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078207, slot 939)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078207)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345656
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078207, slot 939)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589623040] SiPeek: hang up occurred in sock 29
[Thr 140532589623040] NiIPeek: peek for hdl 156 failed (r; rc=1)
[Thr 140532589623040] NiIRead: hdl 156 SSLState 0
[Thr 140532589623040] NiIRead: SiRecv failed for hdl 156/sock 29
[Thr 140532589623040] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.221:15868;
L=10.200.50.133:8443)
[Thr 140532589623040] NiICloseHandle: shutdown and close hdl 156/sock 29
[Thr 140532589623040] IcmConnClose: Connection 9/345656 closed
[Thr 140532589623040] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.221 ->
rc=0
[Thr 140532589623040] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532589623040] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
-> 0
[Thr 140532589623040] Thu Apr 11 09:01:54:796 2024
[Thr 140532589623040] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=-1 -> 0
[Thr 140532589623040] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532589623040] REQ TRACE END: 9/345656/1
[Thr 140532589623040] IcmWorkerThread: Thread 2: Waiting for event
[Thr 140532589623040] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:01:57:303 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:01:59:799 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331591 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331592 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331593 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331594: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331594 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532577003264] Thu Apr 11 09:02:04:803 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331595 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331596 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331597 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331598: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331598 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532599072512] Thu Apr 11 09:02:07:311 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:02:09:807 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331599 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=4000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 4000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=4000)
[Thr 140532585395968] MPI<2>0#2331600 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331601 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331602: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331602 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140533415016064] Thu Apr 11 09:02:10:165 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 157 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 157/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 157 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 157 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 157 from 10.200.51.199:3380
[Thr 140533415016064] NiIAccept: hdl 157 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345657/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.199 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360776
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532590151424] IcmWorkerHandleRequest: worker 1 got the semaphore
[Thr 140532590151424] REQ TRACE BEGIN: 9/345657/1
[Thr 140532590151424] REQUEST:
Type: ACCEPT_CONNECTION Index = 360776
[Thr 140532590151424] CONNECTION (id=9/345657):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 157, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.199:3380 ()
status: NOP
connect time: 11.04.2024 09:02:10
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532590151424] Thu Apr 11 09:02:10:166 2024
[Thr 140532590151424] MPI 187: event flag already open:7643 key=16643
[Thr 140532590151424] MPI 187: event flag already open:7642 key=16642
[Thr 140532590151424] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532590151424] MPI<7817d>bb#1 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532590151424] MPI<7817d>bb#2 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532590151424] MPI 188: event flag already open:7641 key=16641
[Thr 140532590151424] MPI 188: event flag already open:7640 key=16640
[Thr 140532590151424] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532590151424] MPI<7817e>bc#1 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532590151424] MPI<7817e>bc#2 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532590151424] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532590151424] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532590151424] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532590151424] out: sssl_hdl = 7fd0280624d0
[Thr 140532590151424] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd0280624d0,
cred_hdl=7fd00c064270)
[Thr 140532590151424] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532590151424] ->> SapSSLSetNiHdl(sssl_hdl=7fd0280624d0, ni_hdl=157)
[Thr 140532590151424] SSL NI-hdl 157: local=10.200.50.133:8443
peer=10.200.51.199:3380
[Thr 140532590151424] <<- SapSSLSetNiHdl(sssl_hdl=7fd0280624d0,
ni_hdl=157)==SAP_O_K
[Thr 140532590151424] ->> SapSSLSessionStartNB(sssl_hdl=7fd0280624d0, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532590151424] NiIBlockMode: leave blockmode for hdl 157 FALSE
[Thr 140532590151424] NiIHdlGetStatus: hdl 157/sock 29 ok, data pending (len=1)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532590151424] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532590151424] ClientHello session_id="E1AC946F 80AE9C7F E757F254
D442A63B 1647811F 306D479C 16F84484 7F703040"
[Thr 140532590151424] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532590151424] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532590151424] TLS_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_AES_256_GCM_SHA384
[Thr 140532590151424] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532590151424] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532590151424] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532590151424] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532590151424] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532590151424] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532590151424] [ssl_bytes_to_cipher_suites]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Received TLS Extensions:
[Thr 140532590151424] Id: 43 - supported_versions [RFC8446]
[Thr 140532590151424] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532590151424] Id: 51 - key_share [RFC8446]
[Thr 140532590151424] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532590151424] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532590151424] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532590151424] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532590151424] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532590151424] [ssl_parse_clienthello_tlsext]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Own TLS certificate:
[Thr 140532590151424] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532590151424] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532590151424] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532590151424] [ssl3_output_cert_chain]
[Thr 140532590151424] Thu Apr 11 09:02:10:166 2024
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: CA certificate:
[Thr 140532590151424] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532590151424] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532590151424] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532590151424] [ssl3_output_cert_chain]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Offering 2 certificate type(s) for
client authentication:
[Thr 140532590151424] rsa_sign(1)
[Thr 140532590151424] ecdsa_sign(64)
[Thr 140532590151424] [ssl3_get_req_cert_type]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532590151424] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532590151424] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532590151424] [ssl_get_encoded_trusted_ca_list]
[Thr 140532590151424] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532590151424] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532590151424] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532590151424] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Received message of type
"Certificate" containing no certificates.
[Thr 140532590151424] Renouncing client authentication: verification mode: 1
[Thr 140532590151424] [ssl3_decode_client_certificate]
[Thr 140532590151424] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532590151424] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532590151424] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532590151424] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532590151424] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532590151424] No Client Certificate
[Thr 140532590151424] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532590151424] (failed resume) new TLS session_id="76A7A62F A3213FBF
F8B0B2E0 8ED6B42C B589FE70 C26FE600 6AFC9F8D C42EC64A
[Thr 140532590151424] SapSSLISessionStartFin(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532590151424] <<- SapSSLSessionStartNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532590151424] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd0280624d0, &plen=(nil),
&more=(nil), &ios=7fd04b1d7c38)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] IcmReadFromConn(id=9/345657): request new MPI (0/0)
[Thr 140532590151424] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532590151424] MPI<7817d>bb#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532590151424] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532590151424] Thu Apr 11 09:02:10:169 2024
[Thr 140532590151424] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd0280624d0,
&plen=7fd04b1d7b18, &more=7fd04b1d7b17, &ios=7fd04b1d7b1c)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] NiIPeek: peek successful for hdl 157 (r)
[Thr 140532590151424] ->> SapSSLReadNB(sssl_hdl=7fd0280624d0, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532590151424] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532590151424] <<- SapSSLReadNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd0280624d0,
&plen=7fd04b1d7b18, &more=7fd04b1d7b17, &ios=7fd04b1d7b1c)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] NiIPeek: peek for hdl 157 timed out (r; 0ms)
[Thr 140532590151424] IcmReadFromConn(id=9/345657): no SSL data available
[Thr 140532590151424] IcmReadFromConn(id=9/345657): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532590151424] BINDUMP of content denied
[Thr 140532590151424] HttpPlugInHandleNetData(rqid=9/345657/1): role: Server(1),
status: 1
[Thr 140532590151424] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532590151424] ICT: IctIHttpOpenMessage: 7fd02803ad80 typ=1
[Thr 140532590151424] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532590151424] HttpParseRequestHeader: no content length set
[Thr 140532590151424] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532590151424] HttpParseRequestHeader: Version: 1001
[Thr 140532590151424] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532590151424] ->> SapSSLGetPeerInfo(sssl_hdl=7fd0280624d0,
&cert=7fd04b1d76f0, &cert_len=7fd04b1d76ec,
[Thr 140532590151424] &subject_dn=7fd04b1d76f8, &issuer_dn=7fd04b1d7700,
&csuite_name=7fd04b1d7708)
[Thr 140532590151424] <<- SapSSLGetPeerInfo(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] out: cert_len = <no cert>
[Thr 140532590151424] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532590151424] HTTP request (raw) [9/345657/1]:
[Thr 140532590151424] GET /sap/bc/ping HTTP/1.1
[Thr 140532590151424] host: 10.200.50.133:8443
[Thr 140532590151424] connection: close
[Thr 140532590151424] user-agent: ELB-HealthChecker/2.0
[Thr 140532590151424] accept-encoding: gzip, compressed
[Thr 140532590151424] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532590151424] ->> SapSSLGetPeerInfo(sssl_hdl=7fd0280624d0,
&cert=7fd04b1d6638, &cert_len=7fd04b1d6634,
[Thr 140532590151424] &subject_dn=7fd04b1d6640, &issuer_dn=7fd04b1d6648,
&csuite_name=7fd04b1d66c8)
[Thr 140532590151424] <<- SapSSLGetPeerInfo(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] out: cert_len = <no cert>
[Thr 140532590151424] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532590151424] Thu Apr 11 09:02:10:170 2024
[Thr 140532590151424] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532590151424] sap-cancel-on-close not found
[Thr 140532590151424] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532590151424] DpPlgGetVirtHost: no server defined, use default
[Thr 140532590151424] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532590151424] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532590151424] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532590151424] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532590151424] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532590151424] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532590151424] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532590151424] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532590151424] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532590151424] >> start >>
CsiExecute(7fd02401e940,7fd04b1d1a20,12,1,7fd04b1d1a10,7fd04b1d19f4,0)
[Thr 140532590151424] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532590151424] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532590151424] << end << CsiExecute(CSI_RC==OK)
[Thr 140532590151424] >> start >> CsiFreeInstance((nil))
[Thr 140532590151424] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532590151424] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532590151424] HttpModHandler: process 1, header_len 144
[Thr 140532590151424] ->> SapSSLGetPeerInfo(sssl_hdl=7fd0280624d0,
&cert=7fd04b1d28a0, &cert_len=7fd04b1d2580,
[Thr 140532590151424] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532590151424] <<- SapSSLGetPeerInfo(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] out: cert_len = <no cert>
[Thr 140532590151424] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532590151424] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532590151424] HttpModHandler: perform the actions: (128)
[Thr 140532590151424] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532590151424] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532590151424] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532590151424] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532590151424] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532590151424] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532590151424] MTX_LOCK 1760 7fd024005020
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024005020
[Thr 140532590151424] IctCmOpen#357246 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] MTX_LOCK 1760 7fd024004a70
[Thr 140532590151424] Thu Apr 11 09:02:10:170 2024
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532590151424] IctCmOpen#459356 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532590151424] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532590151424] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532590151424] MTX_LOCK 1760 7fd024005020
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024005020
[Thr 140532590151424] IctCmOpen#357247 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] MTX_LOCK 1760 7fd024004a70
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532590151424] IctCmOpen#459357 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] HttpCacheHandler: cache miss.
[Thr 140532590151424] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532590151424] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532590151424] ICT: IctLookupPathTable() -> 0
[Thr 140532590151424] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532590151424] DTRACE(9/345657/1): {root-
id=730EFE781C731EEEBDFA2D4F51A0D40F}_{conn-id=730EFE781C731EEEBDFA2D4F51A0F40F}_1
[Thr 140532590151424] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532590151424] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532590151424] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532590151424] flush buffer with mpi buffer id 7
[Thr 140532590151424] MPI<7817d>bb#4 FlushOutbuf 7 1 0 255cb0 224 6 -> 7fd050314cb0
MPI_OK
[Thr 140532590151424] IcmPlFlushBuf: roll in workprocess
[Thr 140532590151424] IcmConnRollInWP: roll in work process
[Thr 140532590151424] IcmCreateDpRequest: Send request to AppServer
[Thr 140532590151424] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532590151424] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532590151424] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532590151424] DpResourcesOk: logons: act/max/usage = 6/1200/0.500000 %
[Thr 140532590151424] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532590151424] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532590151424] DpResourcesOk: ES: act/max/usage = 2184 MB/10992 MB/19.868996
%
[Thr 140532590151424] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532590151424] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532590151424] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532590151424] DpListRemove: remove elem 36 from tmadm_free_list
[Thr 140532590151424] DpListRemove: 1193 elems in tmadm_free_list
[Thr 140532590151424] DpListInsert: insert elem 36 into tmadm_inuse_list (at begin)
[Thr 140532590151424] DpListInsert: 7 elems in tmadm_inuse_list
[Thr 140532590151424] Thu Apr 11 09:02:10:171 2024
[Thr 140532590151424] DpGetFreeUid: new UID: 26441
[Thr 140532590151424] DpSesLockSessionEntry: lock T36_U26441_M0
[Thr 140532590151424] DpSesUnlockSessionEntry: unlocked invalid T36_M0
[Thr 140532590151424] DpInitInternalSession: initialized T36_M0_I0
[Thr 140532590151424] RqQQueueDestroy: Destroy queue <T36_U26440_M0> in slot 68
(49063)
[Thr 140532590151424] RqQQueueDestroy: locked session queue mutex for high priority
[Thr 140532590151424] RqQQueueSlotClear: clear slot 68
[Thr 140532590151424] RqQUnlockSessionQueue: unlocked session queue mutex for high
priority
[Thr 140532590151424] DpITmSlotClear: cleared T36_U26441
[Thr 140532590151424] DpTmSlotAllocate: allocated T36_U26441
[Thr 140532590151424] RqQQueueCreate: Created queue <T36_U26441_M0> in slot 68
(49064) with normal priority
[Thr 140532590151424] DpLogonInit: new logon T36_U26441, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532590151424] IcmSendRq: created T36_U26441_M0
[Thr 140532590151424] DpSesGetWorkerType: return workerType DIA for T36_U26441
[Thr 140532590151424] DpRqSlotAllocate: 1 pending requests
[Thr 140532590151424] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078225, slot 940)
[Thr 140532590151424] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078225) from
ICMAN to local WORKER
[Thr 140532590151424] rq_id 26078225
[Thr 140532590151424] -OUT- ca_blk -1 len 0
[Thr 140532590151424] -OUT- userTrace 3
[Thr 140532590151424] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532590151424] -OUT- mpi rq <7817d> mpi resp <7817e> prot
2
[Thr 140532590151424] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532590151424] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532590151424] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA2D4F51A0D40F}_{conn-id=730EFE781C731EEEBDFA2D4F51A0F40F}_1
[Thr 140532590151424] -OUT- sender address:
[Thr 140532590151424] -OUT- type LOCAL
[Thr 140532590151424] -OUT- agentType ICMAN
[Thr 140532590151424] -OUT- receiver address:
[Thr 140532590151424] -OUT- type LOCAL
[Thr 140532590151424] -OUT- agentType WORKER workerTyp DIA
[Thr 140532590151424] -OUT- session T36_U26441_M0
[Thr 140532590151424] RqQAddRequest: Add request rq_id 26078225 (DIA) to queue
<T36_U26441_M0> in slot 68 at the end
[Thr 140532590151424] Dump of queue <T36_U26441_M0> in slot 68 (1 requests,
port=0):
[Thr 140532590151424] -1 <- 83 (rq_id 26078225, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532590151424] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532590151424] RqQQueueAddToSessionQueue: Added queue <T36_U26441_M0> in
slot 68 to normal priority session queue at the end
[Thr 140532590151424] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532590151424] -1 <- 68 < T36_U26441_M0> -> -1
[Thr 140532590151424] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532590151424] RqQNotifySessionQueue: notify normal priority session queue
of queue <T36_U26441_M0> (DIA) (id=183)
[Thr 140532590151424] Info of W18 (inside function RqQNotifyWorker (end))
[Thr 140532590151424] noOfPendingQueues=>W18-0<
[Thr 140532590151424] noOfWaitForQueues=>W18-2<
[Thr 140532590151424] wait for queue 69 (T38_U26359_M0)
[Thr 140532590151424] wait for queue 23 (W18)
[Thr 140532590151424] lowestPriority: normal priority
[Thr 140532590151424] modCounter=>W18-2733059<
[Thr 140532590151424] RqQNotifyWorker: notify W18 about dispatch queues
(modCounter=>W18-2733059<)
[Thr 140532590151424] RqQSetWorkerState: W18 has state RUNNING (modCounter=>W18-
2733059<)
[Thr 140532590151424] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532590151424] RqQQueueGetNumberOfRequests: Queue <T36_U26441_M0> in slot 68
contains 1 requests of type DIA
[Thr 140532590151424] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078225), queue has 1 requests
[Thr 140532590151424] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078225,
slot 940)
[Thr 140532590151424] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532590151424] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532590151424] IcmHandleNetRead(id=9/345657): read_len: 144, HandleNetData
returned: 4
[Thr 140532590151424] IcmHandleNetRead(id=9/345657): status 1 -> 4
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd0280624d0,
&plen=7fd04b1d7c58, &more=7fd04b1d7c33, &ios=7fd04b1d7c38)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] Thu Apr 11 09:02:10:171 2024
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] IcmReadFromPartner(id=9/345657): read with maximum timeout
500
[Thr 140532590151424] IcmMpiWatchInsert: MPI watch entry <7817e>, number 11
inserted.
[Thr 140532590151424] MPI<7817e>bc#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532590151424] MPI<7817e>bc#6 GetInbuf -1 255cb0 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532590151424] IcmMpiWatchRemove: MPI watch entry <7817e>, number 11 removed
(wakeup was not sent).
[Thr 140532590151424] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532590151424] BINDUMP of content denied
[Thr 140532590151424] PlugInHandleServData(rqid=9/345657/1): role: Server(1),
status: 3
[Thr 140532590151424] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532590151424] ICT: IctIHttpOpenMessage: 7fd028064a10 typ=2
[Thr 140532590151424] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532590151424] HttpParseResponseHeader: Version: 1001
[Thr 140532590151424] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532590151424] HTTP response (raw) [9/345657/1]:
[Thr 140532590151424] HTTP/1.1 403 Forbidden
[Thr 140532590151424] content-type: text/html; charset=utf-8
[Thr 140532590151424] content-length: 857
[Thr 140532590151424] sap-perf-fesrec: 11080.000000
[Thr 140532590151424] content-encoding: gzip
[Thr 140532590151424] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532590151424] DTRACE(9/345657/1): {root-
id=730EFE781C731EEEBDFA2D4F51A0D40F}_{conn-id=730EFE781C731EEEBDFA2D4F51A0F40F}_1
[Thr 140532590151424] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532590151424] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532590151424] HttpSAPR3Handler: Response from AppServer
[Thr 140532590151424] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532590151424] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532590151424] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd028028480
[Thr 140532590151424] ISC: don't cache response: status code=403
[Thr 140532590151424] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532590151424] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532590151424] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532590151424] HttpModHandler: process 2, header_len 151
[Thr 140532590151424] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532590151424] HttpModHandler: perform the actions: (128)
[Thr 140532590151424] Thu Apr 11 09:02:10:187 2024
[Thr 140532590151424] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532590151424] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532590151424] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532590151424] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532590151424] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpModHandler: process 3, header_len 0
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd028028480
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532590151424] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532590151424] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532590151424] IcmHandleReadFromPartner(id=9/345657): HandleServData
returned: 702
[Thr 140532590151424] BINDUMP of content denied
[Thr 140532590151424] IcmWriteToConn(id=9/345657): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532590151424] ->> SapSSLWriteNB(sssl_hdl=7fd0280624d0, buf=7fd050314d20,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532590151424] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532590151424] <<- SapSSLWriteNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: ... = "buf= 7fd050314d20, written= 1008 of 1008
(all) io=idle"
[Thr 140532590151424] IcmWriteToConn(id=9/345657): wrote data to partner (len =
1008)
[Thr 140532590151424] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532590151424] MPI<7817e>bc#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532590151424] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532590151424] ICT: IctHttpCloseMessage( 7fd02803ad80 ) -> u=0 rc=0
[Thr 140532590151424] ICT: IctHttpCloseMessage( 7fd028064a10 ) -> u=0 rc=0
[Thr 140532590151424] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4b1d77fc)
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532590151424] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532590151424] in: sssl_hdl = 7fd0280624d0
[Thr 140532590151424] in: ... ni_hdl = 157
[Thr 140532590151424] in: flags = 0
[Thr 140532590151424] in: timeout = 10000
[Thr 140532590151424] MPI<7817d>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532590151424] Thu Apr 11 09:02:10:187 2024
[Thr 140532590151424] MPI<7817d>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532590151424] MPI<7817d>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532590151424] MPI<7817e>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532590151424] MPI<7817e>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532590151424] MPI<7817e>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532590151424] NiIShutdownHandle: shutdown -w of hdl 157
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 83 (rq_id 26078226)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 83
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=168), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078226 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078226
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 0900000039460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T36_U26441_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078226, slot 941)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078226)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345657
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078226, slot 941)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=3000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 3000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=3000)
[Thr 140532590151424] SiPeek: hang up occurred in sock 29
[Thr 140532590151424] NiIPeek: peek for hdl 157 failed (r; rc=1)
[Thr 140532590151424] NiIRead: hdl 157 SSLState 0
[Thr 140532590151424] NiIRead: SiRecv failed for hdl 157/sock 29
[Thr 140532590151424] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.199:3380;
L=10.200.50.133:8443)
[Thr 140532590151424] NiICloseHandle: shutdown and close hdl 157/sock 29
[Thr 140532590151424] Thu Apr 11 09:02:10:188 2024
[Thr 140532590151424] IcmConnClose: Connection 9/345657 closed
[Thr 140532590151424] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.199 ->
rc=0
[Thr 140532590151424] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532590151424] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
-> 0
[Thr 140532590151424] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=-1 -> 0
[Thr 140532590151424] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532590151424] REQ TRACE END: 9/345657/1
[Thr 140532590151424] IcmWorkerThread: Thread 1: Waiting for event
[Thr 140532590151424] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Thu Apr 11 09:02:13:190 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: call schedules, last t: 1712818903, next
t: 1712818933, cur t: 1712818933
[Thr 140532577003264] IcmCreateRequest: Append request 360777
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585924352] IcmWorkerHandleRequest: worker 9 got the semaphore
[Thr 140532585924352] REQUEST:
Type: SCHEDULER Index = 360777
[Thr 140532585924352] IcmGetSchedule: found slot 0
[Thr 140532585924352] IcmAlReportPerfData: Reporting data to CCMS Alerting
Infrastructure
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585924352] IcmConnCheckStoredClientConn: next client timeout check in 7
sec
[Thr 140532585924352] IcmConnInitContext: context initialized
[Thr 140532585924352] IcmGetServicePtr: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 1
[Thr 140532585924352] PlugInHandleAdmMessage: request received:
[Thr 140532585924352] PlugInHandleAdmMessage: opcode: ICM_COM_OP_CACHE_STAT (136),
len: 528, dest_type: 2, subhdlkey: 262145(4/0)
[Thr 140532585924352] HttpISubHandlerItCreate: add reference to table 7fd024010780,
now 2 references, 1 tables used
[Thr 140532585924352] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_ADM_MSG(4), header_l
[Thr 140532585924352] HttpCacheHandler: TASK_ADM_MSG 0 7fd024001ae0 (nil)
[Thr 140532585924352] SCACHE: adm request received:
[Thr 140532585924352] SCACHE: opcode: 136, len: 528, dest_type: 2, dest:
[Thr 140532585924352] MTX_LOCK 3247 7fd024004a70
[Thr 140532585924352] MTX_UNLOCK 3260 7fd024004a70
[Thr 140532585924352] IctCmGetCacheInfo#459358 -> 0
[Thr 140532585924352] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532585924352] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532585924352] HttpSubHandlerItDelete: remove reference to table
7fd024010780, now 1 references, 1 tables used
[Thr 140532585924352] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532585924352] IcmServDecrRefCount: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 0
[Thr 140532585924352] IcmGetSchedule: next schedule in 30 secs
[Thr 140532585924352] IcmWorkerThread: Thread 9: Waiting for event
[Thr 140532585924352] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:02:17:321 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:02:18:195 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331603 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331604 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331605 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331606: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331606 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] Thu Apr 11 09:02:23:199 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331607 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331608 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331609 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331610: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331610 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140533415016064] Thu Apr 11 09:02:24:792 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 158 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 158/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 158 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 158 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 158 from 10.200.51.221:61270
[Thr 140533415016064] NiIAccept: hdl 158 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345659/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.221 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360778
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532587509504] IcmWorkerHandleRequest: worker 6 got the semaphore
[Thr 140532587509504] REQ TRACE BEGIN: 9/345659/1
[Thr 140532587509504] REQUEST:
Type: ACCEPT_CONNECTION Index = 360778
[Thr 140532587509504] CONNECTION (id=9/345659):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 158, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.221:61270 ()
status: NOP
connect time: 11.04.2024 09:02:24
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532587509504] Thu Apr 11 09:02:24:793 2024
[Thr 140532587509504] MPI 188: event flag already open:7641 key=16641
[Thr 140532587509504] MPI 188: event flag already open:7640 key=16640
[Thr 140532587509504] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532587509504] MPI<7817f>bc#1 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532587509504] MPI<7817f>bc#2 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532587509504] MPI 187: event flag already open:7643 key=16643
[Thr 140532587509504] MPI 187: event flag already open:7642 key=16642
[Thr 140532587509504] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532587509504] MPI<78180>bb#1 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532587509504] MPI<78180>bb#2 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532587509504] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532587509504] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532587509504] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532587509504] out: sssl_hdl = 7fd038029420
[Thr 140532587509504] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd038029420,
cred_hdl=7fd00c064270)
[Thr 140532587509504] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532587509504] ->> SapSSLSetNiHdl(sssl_hdl=7fd038029420, ni_hdl=158)
[Thr 140532587509504] SSL NI-hdl 158: local=10.200.50.133:8443
peer=10.200.51.221:61270
[Thr 140532587509504] <<- SapSSLSetNiHdl(sssl_hdl=7fd038029420,
ni_hdl=158)==SAP_O_K
[Thr 140532587509504] ->> SapSSLSessionStartNB(sssl_hdl=7fd038029420, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532587509504] NiIBlockMode: leave blockmode for hdl 158 FALSE
[Thr 140532587509504] NiIHdlGetStatus: hdl 158/sock 29 ok, data pending (len=1)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532587509504] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532587509504] ClientHello session_id="982B63F5 04A0C149 D11362C3
EF395561 9DF711B0 5FD2A6E0 9726AEFF 014A2440"
[Thr 140532587509504] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532587509504] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532587509504] SapISSLServerCacheExpiration(): Calling
ServerCacheCleanup() (lifetime=1440)
[Thr 140532587509504]
SapISSLServerCacheExpiration(srv,"/usr/sap/Q20/D02/sec/SAPSSLS.pse"): Cache
max/before/now = 5000/488/480
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532587509504] TLS_AES_128_GCM_SHA256
[Thr 140532587509504] TLS_AES_256_GCM_SHA384
[Thr 140532587509504] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532587509504] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532587509504] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532587509504] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532587509504] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532587509504] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532587509504] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532587509504] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532587509504] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532587509504] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532587509504] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532587509504] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532587509504] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532587509504] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532587509504] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532587509504] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532587509504] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532587509504] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532587509504] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532587509504] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532587509504] [ssl_bytes_to_cipher_suites]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Received TLS Extensions:
[Thr 140532587509504] Id: 43 - supported_versions [RFC8446]
[Thr 140532587509504] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532587509504] Id: 51 - key_share [RFC8446]
[Thr 140532587509504] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532587509504] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532587509504] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532587509504] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532587509504] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532587509504] [ssl_parse_clienthello_tlsext]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532587509504] Thu Apr 11 09:02:24:793 2024
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Own TLS certificate:
[Thr 140532587509504] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532587509504] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532587509504] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532587509504] [ssl3_output_cert_chain]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: CA certificate:
[Thr 140532587509504] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532587509504] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532587509504] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532587509504] [ssl3_output_cert_chain]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Offering 2 certificate type(s) for
client authentication:
[Thr 140532587509504] rsa_sign(1)
[Thr 140532587509504] ecdsa_sign(64)
[Thr 140532587509504] [ssl3_get_req_cert_type]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532587509504] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532587509504] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532587509504] [ssl_get_encoded_trusted_ca_list]
[Thr 140532587509504] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532587509504] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532587509504] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532587509504] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532587509504] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Received message of type
"Certificate" containing no certificates.
[Thr 140532587509504] Renouncing client authentication: verification mode: 1
[Thr 140532587509504] [ssl3_decode_client_certificate]
[Thr 140532587509504] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532587509504] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532587509504] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532587509504] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532587509504] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532587509504] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532587509504] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532587509504] No Client Certificate
[Thr 140532587509504] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532587509504] (failed resume) new TLS session_id="C6D96CDD 049919F8
E581BC37 0787FF12 7FFA8081 84782571 4CEFCEFE 9AE232CD
[Thr 140532587509504] SapSSLISessionStartFin(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532587509504] <<- SapSSLSessionStartNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532587509504] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532587509504] ->> SapSSLReadPendingNB(sssl_hdl=7fd038029420, &plen=(nil),
&more=(nil), &ios=7fd04af52c38)
[Thr 140532587509504] <<- SapSSLReadPendingNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532587509504] IcmReadFromConn(id=9/345659): request new MPI (0/0)
[Thr 140532587509504] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532587509504] Thu Apr 11 09:02:24:796 2024
[Thr 140532587509504] MPI<7817f>bc#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532587509504] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532587509504] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532587509504] ->> SapSSLReadPendingNB(sssl_hdl=7fd038029420,
&plen=7fd04af52b18, &more=7fd04af52b17, &ios=7fd04af52b1c)
[Thr 140532587509504] <<- SapSSLReadPendingNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532587509504] NiIPeek: peek successful for hdl 158 (r)
[Thr 140532587509504] ->> SapSSLReadNB(sssl_hdl=7fd038029420, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532587509504] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532587509504] <<- SapSSLReadNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532587509504] ->> SapSSLReadPendingNB(sssl_hdl=7fd038029420,
&plen=7fd04af52b18, &more=7fd04af52b17, &ios=7fd04af52b1c)
[Thr 140532587509504] <<- SapSSLReadPendingNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532587509504] NiIPeek: peek for hdl 158 timed out (r; 0ms)
[Thr 140532587509504] IcmReadFromConn(id=9/345659): no SSL data available
[Thr 140532587509504] IcmReadFromConn(id=9/345659): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532587509504] BINDUMP of content denied
[Thr 140532587509504] HttpPlugInHandleNetData(rqid=9/345659/1): role: Server(1),
status: 1
[Thr 140532587509504] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532587509504] ICT: IctIHttpOpenMessage: 7fd038047880 typ=1
[Thr 140532587509504] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532587509504] HttpParseRequestHeader: no content length set
[Thr 140532587509504] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532587509504] HttpParseRequestHeader: Version: 1001
[Thr 140532587509504] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532587509504] ->> SapSSLGetPeerInfo(sssl_hdl=7fd038029420,
&cert=7fd04af526f0, &cert_len=7fd04af526ec,
[Thr 140532587509504] &subject_dn=7fd04af526f8, &issuer_dn=7fd04af52700,
&csuite_name=7fd04af52708)
[Thr 140532587509504] <<- SapSSLGetPeerInfo(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] out: cert_len = <no cert>
[Thr 140532587509504] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532587509504] HTTP request (raw) [9/345659/1]:
[Thr 140532587509504] GET /sap/bc/ping HTTP/1.1
[Thr 140532587509504] host: 10.200.50.133:8443
[Thr 140532587509504] connection: close
[Thr 140532587509504] user-agent: ELB-HealthChecker/2.0
[Thr 140532587509504] accept-encoding: gzip, compressed
[Thr 140532587509504] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532587509504] ->> SapSSLGetPeerInfo(sssl_hdl=7fd038029420,
&cert=7fd04af51638, &cert_len=7fd04af51634,
[Thr 140532587509504] &subject_dn=7fd04af51640, &issuer_dn=7fd04af51648,
&csuite_name=7fd04af516c8)
[Thr 140532587509504] <<- SapSSLGetPeerInfo(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] out: cert_len = <no cert>
[Thr 140532587509504] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532587509504] Thu Apr 11 09:02:24:796 2024
[Thr 140532587509504] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532587509504] sap-cancel-on-close not found
[Thr 140532587509504] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532587509504] DpPlgGetVirtHost: no server defined, use default
[Thr 140532587509504] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532587509504] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532587509504] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532587509504] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532587509504] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532587509504] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532587509504] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532587509504] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532587509504] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532587509504] >> start >>
CsiExecute(7fd02401e940,7fd04af4ca20,12,1,7fd04af4ca10,7fd04af4c9f4,0)
[Thr 140532587509504] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532587509504] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532587509504] << end << CsiExecute(CSI_RC==OK)
[Thr 140532587509504] >> start >> CsiFreeInstance((nil))
[Thr 140532587509504] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532587509504] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532587509504] HttpModHandler: process 1, header_len 144
[Thr 140532587509504] ->> SapSSLGetPeerInfo(sssl_hdl=7fd038029420,
&cert=7fd04af4d8a0, &cert_len=7fd04af4d580,
[Thr 140532587509504] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532587509504] <<- SapSSLGetPeerInfo(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] out: cert_len = <no cert>
[Thr 140532587509504] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532587509504] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532587509504] HttpModHandler: perform the actions: (128)
[Thr 140532587509504] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532587509504] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532587509504] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532587509504] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532587509504] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532587509504] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532587509504] MTX_LOCK 1760 7fd024005020
[Thr 140532587509504] MTX_UNLOCK 1891 7fd024005020
[Thr 140532587509504] IctCmOpen#357248 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532587509504] MTX_LOCK 1760 7fd024004a70
[Thr 140532587509504] Thu Apr 11 09:02:24:797 2024
[Thr 140532587509504] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532587509504] IctCmOpen#459359 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532587509504] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532587509504] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532587509504] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532587509504] MTX_LOCK 1760 7fd024005020
[Thr 140532587509504] MTX_UNLOCK 1891 7fd024005020
[Thr 140532587509504] IctCmOpen#357249 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532587509504] MTX_LOCK 1760 7fd024004a70
[Thr 140532587509504] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532587509504] IctCmOpen#459360 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532587509504] HttpCacheHandler: cache miss.
[Thr 140532587509504] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532587509504] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532587509504] ICT: IctLookupPathTable() -> 0
[Thr 140532587509504] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532587509504] DTRACE(9/345659/1): {root-
id=730EFE781C731EEEBDFA2E664C775410}_{conn-id=730EFE781C731EEEBDFA2E664C777410}_1
[Thr 140532587509504] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532587509504] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532587509504] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532587509504] flush buffer with mpi buffer id 7
[Thr 140532587509504] MPI<7817f>bc#4 FlushOutbuf 7 1 0 255cb0 224 6 -> 7fd050314cb0
MPI_OK
[Thr 140532587509504] IcmPlFlushBuf: roll in workprocess
[Thr 140532587509504] IcmConnRollInWP: roll in work process
[Thr 140532587509504] IcmCreateDpRequest: Send request to AppServer
[Thr 140532587509504] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532587509504] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532587509504] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532587509504] DpResourcesOk: logons: act/max/usage = 6/1200/0.500000 %
[Thr 140532587509504] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532587509504] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532587509504] DpResourcesOk: ES: act/max/usage = 2176 MB/10992 MB/19.796215
%
[Thr 140532587509504] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532587509504] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532587509504] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532587509504] DpListRemove: remove elem 36 from tmadm_free_list
[Thr 140532587509504] DpListRemove: 1193 elems in tmadm_free_list
[Thr 140532587509504] DpListInsert: insert elem 36 into tmadm_inuse_list (at begin)
[Thr 140532587509504] DpListInsert: 7 elems in tmadm_inuse_list
[Thr 140532587509504] Thu Apr 11 09:02:24:797 2024
[Thr 140532587509504] DpGetFreeUid: new UID: 26443
[Thr 140532587509504] DpSesLockSessionEntry: lock T36_U26443_M0
[Thr 140532587509504] DpSesUnlockSessionEntry: unlocked invalid T36_M0
[Thr 140532587509504] DpInitInternalSession: initialized T36_M0_I0
[Thr 140532587509504] RqQQueueDestroy: Destroy queue <T36_U26442_M0> in slot 68
(49067)
[Thr 140532587509504] RqQQueueDestroy: locked session queue mutex for high priority
[Thr 140532587509504] RqQQueueSlotClear: clear slot 68
[Thr 140532587509504] RqQUnlockSessionQueue: unlocked session queue mutex for high
priority
[Thr 140532587509504] DpITmSlotClear: cleared T36_U26443
[Thr 140532587509504] DpTmSlotAllocate: allocated T36_U26443
[Thr 140532587509504] RqQQueueCreate: Created queue <T36_U26443_M0> in slot 68
(49068) with normal priority
[Thr 140532587509504] DpLogonInit: new logon T36_U26443, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532587509504] IcmSendRq: created T36_U26443_M0
[Thr 140532587509504] DpSesGetWorkerType: return workerType DIA for T36_U26443
[Thr 140532587509504] DpRqSlotAllocate: 1 pending requests
[Thr 140532587509504] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078248, slot 942)
[Thr 140532587509504] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078248) from
ICMAN to local WORKER
[Thr 140532587509504] rq_id 26078248
[Thr 140532587509504] -OUT- ca_blk -1 len 0
[Thr 140532587509504] -OUT- userTrace 3
[Thr 140532587509504] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532587509504] -OUT- mpi rq <7817f> mpi resp <78180> prot
2
[Thr 140532587509504] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532587509504] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532587509504] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA2E664C775410}_{conn-id=730EFE781C731EEEBDFA2E664C777410}_1
[Thr 140532587509504] -OUT- sender address:
[Thr 140532587509504] -OUT- type LOCAL
[Thr 140532587509504] -OUT- agentType ICMAN
[Thr 140532587509504] -OUT- receiver address:
[Thr 140532587509504] -OUT- type LOCAL
[Thr 140532587509504] -OUT- agentType WORKER workerTyp DIA
[Thr 140532587509504] -OUT- session T36_U26443_M0
[Thr 140532587509504] RqQAddRequest: Add request rq_id 26078248 (DIA) to queue
<T36_U26443_M0> in slot 68 at the end
[Thr 140532587509504] Dump of queue <T36_U26443_M0> in slot 68 (1 requests,
port=0):
[Thr 140532587509504] -1 <- 83 (rq_id 26078248, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532587509504] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532587509504] RqQQueueAddToSessionQueue: Added queue <T36_U26443_M0> in
slot 68 to normal priority session queue at the end
[Thr 140532587509504] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532587509504] -1 <- 68 < T36_U26443_M0> -> -1
[Thr 140532587509504] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532587509504] RqQNotifySessionQueue: notify normal priority session queue
of queue <T36_U26443_M0> (DIA) (id=184)
[Thr 140532587509504] Info of W18 (inside function RqQNotifyWorker (end))
[Thr 140532587509504] noOfPendingQueues=>W18-0<
[Thr 140532587509504] noOfWaitForQueues=>W18-2<
[Thr 140532587509504] wait for queue 69 (T38_U26359_M0)
[Thr 140532587509504] wait for queue 23 (W18)
[Thr 140532587509504] lowestPriority: normal priority
[Thr 140532587509504] modCounter=>W18-2733082<
[Thr 140532587509504] RqQNotifyWorker: notify W18 about dispatch queues
(modCounter=>W18-2733082<)
[Thr 140532587509504] RqQSetWorkerState: W18 has state RUNNING (modCounter=>W18-
2733082<)
[Thr 140532587509504] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532587509504] RqQQueueGetNumberOfRequests: Queue <T36_U26443_M0> in slot 68
contains 1 requests of type DIA
[Thr 140532587509504] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078248), queue has 1 requests
[Thr 140532587509504] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078248,
slot 942)
[Thr 140532587509504] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532587509504] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532587509504] IcmHandleNetRead(id=9/345659): read_len: 144, HandleNetData
returned: 4
[Thr 140532587509504] IcmHandleNetRead(id=9/345659): status 1 -> 4
[Thr 140532587509504] ->> SapSSLReadPendingNB(sssl_hdl=7fd038029420,
&plen=7fd04af52c58, &more=7fd04af52c33, &ios=7fd04af52c38)
[Thr 140532587509504] <<- SapSSLReadPendingNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] Thu Apr 11 09:02:24:798 2024
[Thr 140532587509504] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532587509504] IcmReadFromPartner(id=9/345659): read with maximum timeout
500
[Thr 140532587509504] IcmMpiWatchInsert: MPI watch entry <78180>, number 11
inserted.
[Thr 140532587509504] MPI<78180>bb#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532587509504] MPI<78180>bb#6 GetInbuf -1 255cb0 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532587509504] IcmMpiWatchRemove: MPI watch entry <78180>, number 11 removed
(wakeup was not sent).
[Thr 140532587509504] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532587509504] BINDUMP of content denied
[Thr 140532587509504] PlugInHandleServData(rqid=9/345659/1): role: Server(1),
status: 3
[Thr 140532587509504] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532587509504] ICT: IctIHttpOpenMessage: 7fd038076440 typ=2
[Thr 140532587509504] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532587509504] HttpParseResponseHeader: Version: 1001
[Thr 140532587509504] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532587509504] HTTP response (raw) [9/345659/1]:
[Thr 140532587509504] HTTP/1.1 403 Forbidden
[Thr 140532587509504] content-type: text/html; charset=utf-8
[Thr 140532587509504] content-length: 857
[Thr 140532587509504] sap-perf-fesrec: 10827.000000
[Thr 140532587509504] content-encoding: gzip
[Thr 140532587509504] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532587509504] DTRACE(9/345659/1): {root-
id=730EFE781C731EEEBDFA2E664C775410}_{conn-id=730EFE781C731EEEBDFA2E664C777410}_1
[Thr 140532587509504] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532587509504] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532587509504] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532587509504] HttpSAPR3Handler: Response from AppServer
[Thr 140532587509504] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532587509504] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532587509504] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532587509504] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd038074f80
[Thr 140532587509504] ISC: don't cache response: status code=403
[Thr 140532587509504] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532587509504] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532587509504] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532587509504] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532587509504] HttpModHandler: process 2, header_len 151
[Thr 140532587509504] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532587509504] HttpModHandler: perform the actions: (128)
[Thr 140532587509504] Thu Apr 11 09:02:24:814 2024
[Thr 140532587509504] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532587509504] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532587509504] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532587509504] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532587509504] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532587509504] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532587509504] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532587509504] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532587509504] HttpModHandler: process 3, header_len 0
[Thr 140532587509504] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532587509504] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd038074f80
[Thr 140532587509504] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532587509504] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532587509504] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532587509504] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532587509504] IcmHandleReadFromPartner(id=9/345659): HandleServData
returned: 702
[Thr 140532587509504] BINDUMP of content denied
[Thr 140532587509504] IcmWriteToConn(id=9/345659): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532587509504] ->> SapSSLWriteNB(sssl_hdl=7fd038029420, buf=7fd050314d20,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532587509504] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532587509504] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532587509504] <<- SapSSLWriteNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: ... = "buf= 7fd050314d20, written= 1008 of 1008
(all) io=idle"
[Thr 140532587509504] IcmWriteToConn(id=9/345659): wrote data to partner (len =
1008)
[Thr 140532587509504] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532587509504] MPI<78180>bb#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532587509504] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532587509504] ICT: IctHttpCloseMessage( 7fd038047880 ) -> u=0 rc=0
[Thr 140532587509504] ICT: IctHttpCloseMessage( 7fd038076440 ) -> u=0 rc=0
[Thr 140532587509504] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4af527fc)
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532587509504] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532587509504] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532587509504] in: sssl_hdl = 7fd038029420
[Thr 140532587509504] in: ... ni_hdl = 158
[Thr 140532587509504] in: flags = 0
[Thr 140532587509504] in: timeout = 10000
[Thr 140532587509504] MPI<7817f>bc#7 Close( bc ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532587509504] Thu Apr 11 09:02:24:814 2024
[Thr 140532587509504] MPI<7817f>bc#9 Delete( bc ) -> MPI_OK
[Thr 140532587509504] MPI<7817f>bc#8 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532587509504] MPI<78180>bb#8 Close( bb ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532587509504] MPI<78180>bb#10 Delete( bb ) -> MPI_OK
[Thr 140532587509504] MPI<78180>bb#9 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532587509504] NiIShutdownHandle: shutdown -w of hdl 158
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 83 (rq_id 26078249)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 83
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=169), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078249 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078249
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 090000003B460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T36_U26443_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078249, slot 943)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078249)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345659
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078249, slot 943)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532587509504] SiPeek: hang up occurred in sock 29
[Thr 140532587509504] NiIPeek: peek for hdl 158 failed (r; rc=1)
[Thr 140532587509504] NiIRead: hdl 158 SSLState 0
[Thr 140532587509504] NiIRead: SiRecv failed for hdl 158/sock 29
[Thr 140532587509504] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.221:61270;
L=10.200.50.133:8443)
[Thr 140532587509504] NiICloseHandle: shutdown and close hdl 158/sock 29
[Thr 140532587509504] Thu Apr 11 09:02:24:815 2024
[Thr 140532587509504] IcmConnClose: Connection 9/345659 closed
[Thr 140532587509504] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.221 ->
rc=0
[Thr 140532587509504] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532587509504] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
-> 0
[Thr 140532587509504] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=-1 -> 0
[Thr 140532587509504] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532587509504] REQ TRACE END: 9/345659/1
[Thr 140532587509504] IcmWorkerThread: Thread 6: Waiting for event
[Thr 140532587509504] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:02:27:331 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:02:29:819 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331611 WriteOOB 77
[Thr 140532577003264] IcmCheckForBlockedThreads: check for blocked SSL-threads
[Thr 140532585395968] MPI<2>0#2331612 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331613 ReadOOB 77 -> MPI_OK
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331614: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331614 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532577003264] Thu Apr 11 09:02:34:823 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331615 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331616 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331617 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331618: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331618 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532599072512] Thu Apr 11 09:02:37:341 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:02:39:827 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331619 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=4000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 4000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=4000)
[Thr 140532585395968] MPI<2>0#2331620 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331621 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331622: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331622 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 159 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 159/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 159 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 159 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 159 from 10.200.51.199:38212
[Thr 140533415016064] NiIAccept: hdl 159 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] Thu Apr 11 09:02:39:908 2024
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345660/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.199 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360779
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532586981120] IcmWorkerHandleRequest: worker 7 got the semaphore
[Thr 140532586981120] REQ TRACE BEGIN: 9/345660/1
[Thr 140532586981120] REQUEST:
Type: ACCEPT_CONNECTION Index = 360779
[Thr 140532586981120] CONNECTION (id=9/345660):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 159, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.199:38212 ()
status: NOP
connect time: 11.04.2024 09:02:39
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532586981120] MPI 187: event flag already open:7643 key=16643
[Thr 140532586981120] MPI 187: event flag already open:7642 key=16642
[Thr 140532586981120] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532586981120] MPI<78181>bb#1 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532586981120] MPI<78181>bb#2 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532586981120] MPI 188: event flag already open:7641 key=16641
[Thr 140532586981120] MPI 188: event flag already open:7640 key=16640
[Thr 140532586981120] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532586981120] MPI<78182>bc#1 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532586981120] MPI<78182>bc#2 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532586981120] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532586981120] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532586981120] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532586981120] out: sssl_hdl = 7fd014006a10
[Thr 140532586981120] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd014006a10,
cred_hdl=7fd00c064270)
[Thr 140532586981120] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532586981120] Thu Apr 11 09:02:39:908 2024
[Thr 140532586981120] ->> SapSSLSetNiHdl(sssl_hdl=7fd014006a10, ni_hdl=159)
[Thr 140532586981120] SSL NI-hdl 159: local=10.200.50.133:8443
peer=10.200.51.199:38212
[Thr 140532586981120] <<- SapSSLSetNiHdl(sssl_hdl=7fd014006a10,
ni_hdl=159)==SAP_O_K
[Thr 140532586981120] ->> SapSSLSessionStartNB(sssl_hdl=7fd014006a10, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532586981120] NiIBlockMode: leave blockmode for hdl 159 FALSE
[Thr 140532586981120] NiIHdlGetStatus: hdl 159/sock 29 ok, data pending (len=1)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532586981120] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532586981120] ClientHello session_id="ACAFB609 B8ADBACD 5DDA4C4B
CA76E3A6 4B93D240 2B0A8BEE 72F6533C 9D4A27B4"
[Thr 140532586981120] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532586981120] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532586981120] TLS_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_AES_256_GCM_SHA384
[Thr 140532586981120] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532586981120] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532586981120] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532586981120] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532586981120] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532586981120] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532586981120] [ssl_bytes_to_cipher_suites]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Received TLS Extensions:
[Thr 140532586981120] Id: 43 - supported_versions [RFC8446]
[Thr 140532586981120] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532586981120] Id: 51 - key_share [RFC8446]
[Thr 140532586981120] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532586981120] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532586981120] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532586981120] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532586981120] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532586981120] [ssl_parse_clienthello_tlsext]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Own TLS certificate:
[Thr 140532586981120] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532586981120] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532586981120] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532586981120] [ssl3_output_cert_chain]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: CA certificate:
[Thr 140532586981120] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532586981120] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532586981120] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532586981120] [ssl3_output_cert_chain]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Offering 2 certificate type(s) for
client authentication:
[Thr 140532586981120] rsa_sign(1)
[Thr 140532586981120] ecdsa_sign(64)
[Thr 140532586981120] [ssl3_get_req_cert_type]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532586981120] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532586981120] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532586981120] [ssl_get_encoded_trusted_ca_list]
[Thr 140532586981120] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532586981120] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532586981120] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532586981120] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Received message of type
"Certificate" containing no certificates.
[Thr 140532586981120] Renouncing client authentication: verification mode: 1
[Thr 140532586981120] [ssl3_decode_client_certificate]
[Thr 140532586981120] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532586981120] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532586981120] Thu Apr 11 09:02:39:911 2024
[Thr 140532586981120] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532586981120] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532586981120] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532586981120] No Client Certificate
[Thr 140532586981120] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532586981120] (failed resume) new TLS session_id="6994A03E 901248AC
1966BD6B 52487F12 6F84A97C 5BC7AE47 AC917FFE 50F06CA2
[Thr 140532586981120] SapSSLISessionStartFin(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532586981120] <<- SapSSLSessionStartNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532586981120] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014006a10, &plen=(nil),
&more=(nil), &ios=7fd04aed1c38)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] IcmReadFromConn(id=9/345660): request new MPI (0/0)
[Thr 140532586981120] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532586981120] MPI<78181>bb#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532586981120] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532586981120] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014006a10,
&plen=7fd04aed1b18, &more=7fd04aed1b17, &ios=7fd04aed1b1c)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] NiIPeek: peek successful for hdl 159 (r)
[Thr 140532586981120] ->> SapSSLReadNB(sssl_hdl=7fd014006a10, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=6920, max=6928)
[Thr 140532586981120] SSL:SSL_read(reclen= 6936) data, out= 6907
[Thr 140532586981120] <<- SapSSLReadNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "fl=0x00, max=65455, got=6907, more=N,
io=idle"
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014006a10,
&plen=7fd04aed1b18, &more=7fd04aed1b17, &ios=7fd04aed1b1c)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] NiIPeek: peek for hdl 159 timed out (r; 0ms)
[Thr 140532586981120] IcmReadFromConn(id=9/345660): no SSL data available
[Thr 140532586981120] IcmReadFromConn(id=9/345660): read 6907 bytes, 1 readops
(timeout 0)
[Thr 140532586981120] Thu Apr 11 09:02:39:912 2024
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] HttpPlugInHandleNetData(rqid=9/345660/1): role: Server(1),
status: 1
[Thr 140532586981120] content-length: 0/0, buf_len: 6907, buf_offset: 0,
buf_status: 0
[Thr 140532586981120] ICT: IctIHttpOpenMessage: 7fd014067b10 typ=1
[Thr 140532586981120] IctCheckIfValidHostname: Check [api-staging.swissport-
services.com] len 34
[Thr 140532586981120] HttpParseRequestHeader: content length: 6329
[Thr 140532586981120] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532586981120] HttpParseRequestHeader: Version: 1001
[Thr 140532586981120] HttpParseRequestHeader: no server port set
[Thr 140532586981120] HttpParseRequestHeader: Keep-Alive: 1
[Thr 140532586981120] ->> SapSSLGetPeerInfo(sssl_hdl=7fd014006a10,
&cert=7fd04aed16f0, &cert_len=7fd04aed16ec,
[Thr 140532586981120] &subject_dn=7fd04aed16f8, &issuer_dn=7fd04aed1700,
&csuite_name=7fd04aed1708)
[Thr 140532586981120] <<- SapSSLGetPeerInfo(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] out: cert_len = <no cert>
[Thr 140532586981120] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586981120] HTTP request (raw) [9/345660/1]:
[Thr 140532586981120] POST
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_inv_ws/800/
zmm_i_inv_ws/inv_aws HTT
[Thr 140532586981120] x-forwarded-for: 52.63.148.205
[Thr 140532586981120] x-forwarded-proto: https
[Thr 140532586981120] x-forwarded-port: 443
[Thr 140532586981120] host: api-staging.swissport-services.com
[Thr 140532586981120] x-amzn-trace-id: Root=1-66178b0f-61b588a21454db094766223f
[Thr 140532586981120] content-length: 6329
[Thr 140532586981120] soapaction: urn:sap-
com:document:sap:rfc:functions:ZMM_I_INVOICE_WS:ZMM_I_INVOICE_WSRequest
[Thr 140532586981120] authorization: XXX
[Thr 140532586981120] content-type: text/xml; charset=UTF-8
[Thr 140532586981120] cookie: sap-usercontext=sap-client=800;
[Thr 140532586981120] accept: */*
[Thr 140532586981120] user-agent: AHC/2.1
[Thr 140532586981120] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532586981120] ->> SapSSLGetPeerInfo(sssl_hdl=7fd014006a10,
&cert=7fd04aed0638, &cert_len=7fd04aed0634,
[Thr 140532586981120] &subject_dn=7fd04aed0640, &issuer_dn=7fd04aed0648,
&csuite_name=7fd04aed06c8)
[Thr 140532586981120] <<- SapSSLGetPeerInfo(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] out: cert_len = <no cert>
[Thr 140532586981120] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586981120] HttpCheckUserAgent: Function call IcmRegExec(expr=AHC/2.1)
failed with rc=1
[Thr 140532586981120] sap-cancel-on-close not found
[Thr 140532586981120] DpPlgGetVirtHost: search virt host for 2/api-
staging.swissport-services.com/8443
[Thr 140532586981120] DpPlgGetVirtHost: no server defined, use default
[Thr 140532586981120] HttpGetVirtHost: use virt_host_idx 0 for api-
staging.swissport-services.com:8443
[Thr 140532586981120] HttpSrvHdlRequest: method: 2; path:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_inv_ws
[Thr 140532586981120] Handler 0: HttpAuthHandler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_in
[Thr 140532586981120] Handler 1: HttpModHandler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_inv
[Thr 140532586981120] Thu Apr 11 09:02:39:912 2024
[Thr 140532586981120] Handler 2: HttpCacheHandler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_i
[Thr 140532586981120] Handler 6: HttpSAPR3Handler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_i
[Thr 140532586981120] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532586981120] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532586981120] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532586981120] >> start >>
CsiExecute(7fd02401e940,7fd04aecba20,99,1,7fd04aecba10,7fd04aecb9f4,0)
[Thr 140532586981120] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532586981120] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532586981120] << end << CsiExecute(CSI_RC==OK)
[Thr 140532586981120] >> start >> CsiFreeInstance((nil))
[Thr 140532586981120] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532586981120] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532586981120] HttpModHandler: process 1, header_len 578
[Thr 140532586981120] ->> SapSSLGetPeerInfo(sssl_hdl=7fd014006a10,
&cert=7fd04aecc8a0, &cert_len=7fd04aecc580,
[Thr 140532586981120] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532586981120] <<- SapSSLGetPeerInfo(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] out: cert_len = <no cert>
[Thr 140532586981120] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586981120] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586981120] HttpModHandler: perform the actions: (128)
[Thr 140532586981120] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532586981120] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586981120] HttpCacheHandler: TASK_REQUEST 578 7fd024001ae0 (nil)
[Thr 140532586981120] ISC: uncacheable request method 2
[Thr 140532586981120] HttpCacheHandler: cache miss.
[Thr 140532586981120] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586981120] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532586981120] ICT: IctLookupPathTable() -> 0
[Thr 140532586981120] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532586981120] DTRACE(9/345660/1): {root-
id=730EFE781C731EEEBDFA2F869C475412}_{conn-id=730EFE781C731EEEBDFA2F869C477412}_1
[Thr 140532586981120] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532586981120] IcmPlFlushBuf: Flushing 6907 Bytes, buf_status: 6
[Thr 140532586981120] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586981120] flush buffer with mpi buffer id 7
[Thr 140532586981120] MPI<78181>bb#4 FlushOutbuf 7 1 0 255cb0 6987 6 ->
7fd050314cb0 MPI_OK
[Thr 140532586981120] IcmPlFlushBuf: roll in workprocess
[Thr 140532586981120] IcmConnRollInWP: roll in work process
[Thr 140532586981120] Thu Apr 11 09:02:39:913 2024
[Thr 140532586981120] IcmCreateDpRequest: Send request to AppServer
[Thr 140532586981120] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532586981120] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532586981120] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532586981120] DpResourcesOk: logons: act/max/usage = 6/1200/0.500000 %
[Thr 140532586981120] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532586981120] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532586981120] DpResourcesOk: ES: act/max/usage = 2176 MB/10992 MB/19.796215
%
[Thr 140532586981120] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532586981120] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532586981120] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532586981120] DpListRemove: remove elem 36 from tmadm_free_list
[Thr 140532586981120] DpListRemove: 1193 elems in tmadm_free_list
[Thr 140532586981120] DpListInsert: insert elem 36 into tmadm_inuse_list (at begin)
[Thr 140532586981120] DpListInsert: 7 elems in tmadm_inuse_list
[Thr 140532586981120] DpGetFreeUid: new UID: 26448
[Thr 140532586981120] DpSesLockSessionEntry: lock T36_U26448_M0
[Thr 140532586981120] DpSesUnlockSessionEntry: unlocked invalid T36_M0
[Thr 140532586981120] DpInitInternalSession: initialized T36_M0_I0
[Thr 140532586981120] RqQQueueDestroy: Destroy queue <T36_U26447_M0> in slot 68
(49076)
[Thr 140532586981120] RqQQueueDestroy: locked session queue mutex for high priority
[Thr 140532586981120] RqQQueueSlotClear: clear slot 68
[Thr 140532586981120] RqQUnlockSessionQueue: unlocked session queue mutex for high
priority
[Thr 140532586981120] DpITmSlotClear: cleared T36_U26448
[Thr 140532586981120] DpTmSlotAllocate: allocated T36_U26448
[Thr 140532586981120] RqQQueueCreate: Created queue <T36_U26448_M0> in slot 68
(49077) with normal priority
[Thr 140532586981120] DpLogonInit: new logon T36_U26448, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532586981120] IcmSendRq: created T36_U26448_M0
[Thr 140532586981120] DpSesGetWorkerType: return workerType DIA for T36_U26448
[Thr 140532586981120] DpRqSlotAllocate: 1 pending requests
[Thr 140532586981120] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078279, slot 944)
[Thr 140532586981120] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078279) from
ICMAN to local WORKER
[Thr 140532586981120] rq_id 26078279
[Thr 140532586981120] -OUT- ca_blk -1 len 0
[Thr 140532586981120] -OUT- userTrace 3
[Thr 140532586981120] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532586981120] -OUT- mpi rq <78181> mpi resp <78182> prot
2
[Thr 140532586981120] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532586981120] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532586981120] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA2F869C475412}_{conn-id=730EFE781C731EEEBDFA2F869C477412}_1
[Thr 140532586981120] -OUT- sender address:
[Thr 140532586981120] -OUT- type LOCAL
[Thr 140532586981120] -OUT- agentType ICMAN
[Thr 140532586981120] -OUT- receiver address:
[Thr 140532586981120] -OUT- type LOCAL
[Thr 140532586981120] -OUT- agentType WORKER workerTyp DIA
[Thr 140532586981120] -OUT- session T36_U26448_M0
[Thr 140532586981120] RqQAddRequest: Add request rq_id 26078279 (DIA) to queue
<T36_U26448_M0> in slot 68 at the end
[Thr 140532586981120] Dump of queue <T36_U26448_M0> in slot 68 (1 requests,
port=0):
[Thr 140532586981120] -1 <- 29 (rq_id 26078279, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532586981120] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532586981120] RqQQueueAddToSessionQueue: Added queue <T36_U26448_M0> in
slot 68 to normal priority session queue at the end
[Thr 140532586981120] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532586981120] -1 <- 68 < T36_U26448_M0> -> -1
[Thr 140532586981120] Thu Apr 11 09:02:39:913 2024
[Thr 140532586981120] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532586981120] RqQNotifySessionQueue: notify normal priority session queue
of queue <T36_U26448_M0> (DIA) (id=185)
[Thr 140532586981120] Info of W18 (inside function RqQNotifyWorker (end))
[Thr 140532586981120] noOfPendingQueues=>W18-0<
[Thr 140532586981120] noOfWaitForQueues=>W18-2<
[Thr 140532586981120] wait for queue 69 (T38_U26359_M0)
[Thr 140532586981120] wait for queue 23 (W18)
[Thr 140532586981120] lowestPriority: normal priority
[Thr 140532586981120] modCounter=>W18-2733102<
[Thr 140532586981120] RqQNotifyWorker: notify W18 about dispatch queues
(modCounter=>W18-2733102<)
[Thr 140532586981120] RqQSetWorkerState: W18 has state RUNNING (modCounter=>W18-
2733102<)
[Thr 140532586981120] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532586981120] RqQQueueGetNumberOfRequests: Queue <T36_U26448_M0> in slot 68
contains 1 requests of type DIA
[Thr 140532586981120] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078279), queue has 1 requests
[Thr 140532586981120] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078279,
slot 944)
[Thr 140532586981120] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532586981120] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532586981120] IcmHandleNetRead(id=9/345660): read_len: 6907, HandleNetData
returned: 4
[Thr 140532586981120] IcmHandleNetRead(id=9/345660): status 1 -> 4
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014006a10,
&plen=7fd04aed1c58, &more=7fd04aed1c33, &ios=7fd04aed1c38)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] IcmReadFromPartner(id=9/345660): read with maximum timeout
500
[Thr 140532586981120] IcmMpiWatchInsert: MPI watch entry <78182>, number 11
inserted.
[Thr 140532586981120] MPI<78182>bc#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532586981120] Thu Apr 11 09:02:40:016 2024
[Thr 140532586981120] MPI<78182>bc#6 GetInbuf -1 255cb0 753 (1) -> MPI_EOS: End Of
Stream
[Thr 140532586981120] IcmMpiWatchRemove: MPI watch entry <78182>, number 11 removed
(wakeup was not sent).
[Thr 140532586981120] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] PlugInHandleServData(rqid=9/345660/1): role: Server(1),
status: 3
[Thr 140532586981120] content-length: 0/-1, buf_len: 673, buf_offset: 0,
buf_status: 6
[Thr 140532586981120] ICT: IctIHttpOpenMessage: 7fd01407c6a0 typ=2
[Thr 140532586981120] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532586981120] HttpParseResponseHeader: Version: 1001
[Thr 140532586981120] HttpParseResponseHeader: Keep-Alive: 0
[Thr 140532586981120] HTTP response (raw) [9/345660/1]:
[Thr 140532586981120] HTTP/1.1 500 Invalid WSDL access, no SOAP request expected
[Thr 140532586981120] content-type: text/xml
[Thr 140532586981120] content-length: 482
[Thr 140532586981120] sap-icm-log-uname: SWPS_ZYC
[Thr 140532586981120] sap-icm-log-mandt: 800
[Thr 140532586981120] sap-perf-fesrec: 96083.000000
[Thr 140532586981120] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532586981120] DTRACE(9/345660/1): {root-
id=730EFE781C731EEEBDFA2F869C475412}_{conn-id=730EFE781C731EEEBDFA2F869C477412}_1
[Thr 140532586981120] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532586981120] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586981120] HttpSAPR3Handler: Response from AppServer
[Thr 140532586981120] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586981120] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586981120] HttpCacheHandler: TASK_RESPONSE 191 7fd024001ae0 7fd01407b1e0
[Thr 140532586981120] ISC: don't cache response (no valid cache key).
[Thr 140532586981120] ICC: don't cache response. scc=0 status=0 len=0 meth=2
[Thr 140532586981120] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586981120] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532586981120] HttpModHandler: process 2, header_len 191
[Thr 140532586981120] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586981120] HttpModHandler: perform the actions: (128)
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] Thu Apr 11 09:02:40:017 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 29 (rq_id 26078283)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 29
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=170), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078283 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078283
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 090000003C460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T36_U26448_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078283, slot 945)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078283)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345660
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078283, slot 945)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=3000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 3000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=3000)
[Thr 140532586981120] HttpModSerializeHeaderAndCertificate: serialize new http
header
[Thr 140532586981120] ICT: IctHttpCloseMessage( 7fd01407c6a0 ) -> u=0 rc=0
[Thr 140532586981120] ICT: IctIHttpOpenMessage: 7fd01407c6a0 typ=2
[Thr 140532586981120] HttpModSerializeHeaderAndCertificate: buffer: 7fd050314d20,
base: 7fd050314cd0, buf_size: 65456, buf_used: 639
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] HTTP response (rewritten) [9/345660/1]:
[Thr 140532586981120] HTTP/1.1 500 Invalid WSDL access, no SOAP request expected
[Thr 140532586981120] content-type: text/xml
[Thr 140532586981120] content-length: 482
[Thr 140532586981120] sap-perf-fesrec: 96083.000000
[Thr 140532586981120] connection: close
[Thr 140532586981120] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586981120] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] Thu Apr 11 09:02:40:017 2024
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532586981120] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532586981120] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpModHandler: process 3, header_len 0
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd01407b1e0
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532586981120] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532586981120] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532586981120] IcmHandleReadFromPartner(id=9/345660): HandleServData
returned: 702
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] IcmWriteToConn(id=9/345660): prepared to write data to
partner (len = 639, timeout = 2000)
[Thr 140532586981120] ->> SapSSLWriteNB(sssl_hdl=7fd014006a10, buf=7fd050314d20,
len=639, flags=0x0000, timeout=2000, &IOstate=7fd04
[Thr 140532586981120] SSL:SSL_write(len=639) net=668 (out=639 of 639, prev=0)
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=668 of 668)
[Thr 140532586981120] <<- SapSSLWriteNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "buf= 7fd050314d20, written= 639 of 639 (all)
io=idle"
[Thr 140532586981120] IcmWriteToConn(id=9/345660): wrote data to partner (len =
639)
[Thr 140532586981120] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532586981120] MPI<78182>bc#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532586981120] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532586981120] ICT: IctHttpCloseMessage( 7fd014067b10 ) -> u=0 rc=0
[Thr 140532586981120] ICT: IctHttpCloseMessage( 7fd01407c6a0 ) -> u=0 rc=0
[Thr 140532586981120] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4aed17fc)
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532586981120] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532586981120] in: sssl_hdl = 7fd014006a10
[Thr 140532586981120] in: ... ni_hdl = 159
[Thr 140532586981120] in: flags = 0
[Thr 140532586981120] in: timeout = 10000
[Thr 140532586981120] MPI<78181>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532586981120] MPI<78181>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532586981120] MPI<78181>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586981120] MPI<78182>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532586981120] MPI<78182>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532586981120] Thu Apr 11 09:02:40:018 2024
[Thr 140532586981120] MPI<78182>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586981120] NiIShutdownHandle: shutdown -w of hdl 159
[Thr 140532586981120] SiPeek: hang up occurred in sock 29
[Thr 140532586981120] NiIPeek: peek for hdl 159 failed (r; rc=1)
[Thr 140532586981120] NiIRead: hdl 159 SSLState 0
[Thr 140532586981120] NiIRead: SiRecv failed for hdl 159/sock 29
[Thr 140532586981120] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.199:38212;
L=10.200.50.133:8443)
[Thr 140532586981120] NiICloseHandle: shutdown and close hdl 159/sock 29
[Thr 140532586981120] IcmConnClose: Connection 9/345660 closed
[Thr 140532586981120] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.199 ->
rc=0
[Thr 140532586981120] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532586981120] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
-> 0
[Thr 140532586981120] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=-1 -> 0
[Thr 140532586981120] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532586981120] REQ TRACE END: 9/345660/1
[Thr 140532586981120] IcmWorkerThread: Thread 7: Waiting for event
[Thr 140532586981120] DpRqFreePendingRequests: freed 0 pending request
[Thr 140533415016064] Thu Apr 11 09:02:40:173 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 152 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 152/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 152 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 152 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 152 from 10.200.51.199:38224
[Thr 140533415016064] NiIAccept: hdl 152 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 9
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345661/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.199 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360780
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532588566272] IcmWorkerHandleRequest: worker 4 got the semaphore
[Thr 140532588566272] REQ TRACE BEGIN: 9/345661/1
[Thr 140532588566272] REQUEST:
Type: ACCEPT_CONNECTION Index = 360780
[Thr 140532588566272] CONNECTION (id=9/345661):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 152, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.199:38224 ()
status: NOP
connect time: 11.04.2024 09:02:40
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532588566272] MPI 188: event flag already open:7641 key=16641
[Thr 140532588566272] Thu Apr 11 09:02:40:173 2024
[Thr 140532588566272] MPI 188: event flag already open:7640 key=16640
[Thr 140532588566272] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532588566272] MPI<78183>bc#1 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532588566272] MPI<78183>bc#2 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532588566272] MPI 187: event flag already open:7643 key=16643
[Thr 140532588566272] MPI 187: event flag already open:7642 key=16642
[Thr 140532588566272] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532588566272] MPI<78184>bb#1 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532588566272] MPI<78184>bb#2 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532588566272] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532588566272] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532588566272] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532588566272] out: sssl_hdl = 7fd034057d70
[Thr 140532588566272] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd034057d70,
cred_hdl=7fd00c064270)
[Thr 140532588566272] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532588566272] ->> SapSSLSetNiHdl(sssl_hdl=7fd034057d70, ni_hdl=152)
[Thr 140532588566272] SSL NI-hdl 152: local=10.200.50.133:8443
peer=10.200.51.199:38224
[Thr 140532588566272] <<- SapSSLSetNiHdl(sssl_hdl=7fd034057d70,
ni_hdl=152)==SAP_O_K
[Thr 140532588566272] ->> SapSSLSessionStartNB(sssl_hdl=7fd034057d70, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532588566272] NiIBlockMode: leave blockmode for hdl 152 FALSE
[Thr 140532588566272] NiIHdlGetStatus: hdl 152/sock 29 ok, data pending (len=1)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532588566272] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532588566272] ClientHello session_id="B5A2448C FAD6CCE3 0DA77B19
880FAF94 21550486 3418FA36 45E32DB2 FB5EDD56"
[Thr 140532588566272] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532588566272] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532588566272] TLS_AES_128_GCM_SHA256
[Thr 140532588566272] TLS_AES_256_GCM_SHA384
[Thr 140532588566272] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532588566272] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532588566272] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532588566272] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532588566272] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532588566272] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532588566272] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532588566272] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532588566272] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532588566272] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532588566272] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532588566272] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532588566272] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532588566272] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532588566272] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532588566272] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532588566272] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532588566272] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532588566272] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532588566272] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532588566272] [ssl_bytes_to_cipher_suites]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Received TLS Extensions:
[Thr 140532588566272] Id: 43 - supported_versions [RFC8446]
[Thr 140532588566272] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532588566272] Id: 51 - key_share [RFC8446]
[Thr 140532588566272] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532588566272] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532588566272] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532588566272] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532588566272] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532588566272] [ssl_parse_clienthello_tlsext]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Own TLS certificate:
[Thr 140532588566272] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532588566272] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532588566272] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532588566272] [ssl3_output_cert_chain]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: CA certificate:
[Thr 140532588566272] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532588566272] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532588566272] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532588566272] [ssl3_output_cert_chain]
[Thr 140532588566272] Thu Apr 11 09:02:40:174 2024
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Offering 2 certificate type(s) for
client authentication:
[Thr 140532588566272] rsa_sign(1)
[Thr 140532588566272] ecdsa_sign(64)
[Thr 140532588566272] [ssl3_get_req_cert_type]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532588566272] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532588566272] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532588566272] [ssl_get_encoded_trusted_ca_list]
[Thr 140532588566272] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532588566272] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532588566272] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532588566272] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532588566272] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Received message of type
"Certificate" containing no certificates.
[Thr 140532588566272] Renouncing client authentication: verification mode: 1
[Thr 140532588566272] [ssl3_decode_client_certificate]
[Thr 140532588566272] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532588566272] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532588566272] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532588566272] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532588566272] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532588566272] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532588566272] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532588566272] No Client Certificate
[Thr 140532588566272] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532588566272] (failed resume) new TLS session_id="EAE661FD 1AFB017D
BB26647D 634EFD08 BDD01BD7 C4DAC132 8BCF7D12 3A428331
[Thr 140532588566272] SapSSLISessionStartFin(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532588566272] <<- SapSSLSessionStartNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532588566272] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532588566272] ->> SapSSLReadPendingNB(sssl_hdl=7fd034057d70, &plen=(nil),
&more=(nil), &ios=7fd04b054c38)
[Thr 140532588566272] <<- SapSSLReadPendingNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588566272] IcmReadFromConn(id=9/345661): request new MPI (0/0)
[Thr 140532588566272] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532588566272] MPI<78183>bc#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532588566272] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532588566272] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532588566272] Thu Apr 11 09:02:40:176 2024
[Thr 140532588566272] ->> SapSSLReadPendingNB(sssl_hdl=7fd034057d70,
&plen=7fd04b054b18, &more=7fd04b054b17, &ios=7fd04b054b1c)
[Thr 140532588566272] <<- SapSSLReadPendingNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588566272] NiIPeek: peek successful for hdl 152 (r)
[Thr 140532588566272] ->> SapSSLReadNB(sssl_hdl=7fd034057d70, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532588566272] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532588566272] <<- SapSSLReadNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532588566272] ->> SapSSLReadPendingNB(sssl_hdl=7fd034057d70,
&plen=7fd04b054b18, &more=7fd04b054b17, &ios=7fd04b054b1c)
[Thr 140532588566272] <<- SapSSLReadPendingNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588566272] NiIPeek: peek for hdl 152 timed out (r; 0ms)
[Thr 140532588566272] IcmReadFromConn(id=9/345661): no SSL data available
[Thr 140532588566272] IcmReadFromConn(id=9/345661): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532588566272] BINDUMP of content denied
[Thr 140532588566272] HttpPlugInHandleNetData(rqid=9/345661/1): role: Server(1),
status: 1
[Thr 140532588566272] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532588566272] ICT: IctIHttpOpenMessage: 7fd03405d690 typ=1
[Thr 140532588566272] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532588566272] HttpParseRequestHeader: no content length set
[Thr 140532588566272] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532588566272] HttpParseRequestHeader: Version: 1001
[Thr 140532588566272] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532588566272] ->> SapSSLGetPeerInfo(sssl_hdl=7fd034057d70,
&cert=7fd04b0546f0, &cert_len=7fd04b0546ec,
[Thr 140532588566272] &subject_dn=7fd04b0546f8, &issuer_dn=7fd04b054700,
&csuite_name=7fd04b054708)
[Thr 140532588566272] <<- SapSSLGetPeerInfo(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] out: cert_len = <no cert>
[Thr 140532588566272] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532588566272] HTTP request (raw) [9/345661/1]:
[Thr 140532588566272] GET /sap/bc/ping HTTP/1.1
[Thr 140532588566272] host: 10.200.50.133:8443
[Thr 140532588566272] connection: close
[Thr 140532588566272] user-agent: ELB-HealthChecker/2.0
[Thr 140532588566272] accept-encoding: gzip, compressed
[Thr 140532588566272] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532588566272] ->> SapSSLGetPeerInfo(sssl_hdl=7fd034057d70,
&cert=7fd04b053638, &cert_len=7fd04b053634,
[Thr 140532588566272] &subject_dn=7fd04b053640, &issuer_dn=7fd04b053648,
&csuite_name=7fd04b0536c8)
[Thr 140532588566272] <<- SapSSLGetPeerInfo(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] out: cert_len = <no cert>
[Thr 140532588566272] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532588566272] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532588566272] Thu Apr 11 09:02:40:177 2024
[Thr 140532588566272] sap-cancel-on-close not found
[Thr 140532588566272] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532588566272] DpPlgGetVirtHost: no server defined, use default
[Thr 140532588566272] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532588566272] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532588566272] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532588566272] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532588566272] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532588566272] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532588566272] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532588566272] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532588566272] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532588566272] >> start >>
CsiExecute(7fd02401e940,7fd04b04ea20,12,1,7fd04b04ea10,7fd04b04e9f4,0)
[Thr 140532588566272] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532588566272] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532588566272] << end << CsiExecute(CSI_RC==OK)
[Thr 140532588566272] >> start >> CsiFreeInstance((nil))
[Thr 140532588566272] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532588566272] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532588566272] HttpModHandler: process 1, header_len 144
[Thr 140532588566272] ->> SapSSLGetPeerInfo(sssl_hdl=7fd034057d70,
&cert=7fd04b04f8a0, &cert_len=7fd04b04f580,
[Thr 140532588566272] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532588566272] <<- SapSSLGetPeerInfo(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] out: cert_len = <no cert>
[Thr 140532588566272] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532588566272] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532588566272] HttpModHandler: perform the actions: (128)
[Thr 140532588566272] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532588566272] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532588566272] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532588566272] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532588566272] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532588566272] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532588566272] MTX_LOCK 1760 7fd024005020
[Thr 140532588566272] MTX_UNLOCK 1891 7fd024005020
[Thr 140532588566272] IctCmOpen#357250 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588566272] MTX_LOCK 1760 7fd024004a70
[Thr 140532588566272] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532588566272] Thu Apr 11 09:02:40:177 2024
[Thr 140532588566272] IctCmOpen#459361 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588566272] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532588566272] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532588566272] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532588566272] MTX_LOCK 1760 7fd024005020
[Thr 140532588566272] MTX_UNLOCK 1891 7fd024005020
[Thr 140532588566272] IctCmOpen#357251 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588566272] MTX_LOCK 1760 7fd024004a70
[Thr 140532588566272] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532588566272] IctCmOpen#459362 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588566272] HttpCacheHandler: cache miss.
[Thr 140532588566272] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532588566272] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532588566272] ICT: IctLookupPathTable() -> 0
[Thr 140532588566272] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532588566272] DTRACE(9/345661/1): {root-
id=730EFE781C731EEEBDFA2F8BA97C9413}_{conn-id=730EFE781C731EEEBDFA2F8BA97CB413}_1
[Thr 140532588566272] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532588566272] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532588566272] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532588566272] flush buffer with mpi buffer id 7
[Thr 140532588566272] MPI<78183>bc#4 FlushOutbuf 7 1 0 255cb0 224 6 -> 7fd050314cb0
MPI_OK
[Thr 140532588566272] IcmPlFlushBuf: roll in workprocess
[Thr 140532588566272] IcmConnRollInWP: roll in work process
[Thr 140532588566272] IcmCreateDpRequest: Send request to AppServer
[Thr 140532588566272] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532588566272] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532588566272] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532588566272] DpResourcesOk: logons: act/max/usage = 6/1200/0.500000 %
[Thr 140532588566272] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532588566272] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532588566272] DpResourcesOk: ES: act/max/usage = 2176 MB/10992 MB/19.796215
%
[Thr 140532588566272] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532588566272] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532588566272] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532588566272] DpListRemove: remove elem 36 from tmadm_free_list
[Thr 140532588566272] DpListRemove: 1193 elems in tmadm_free_list
[Thr 140532588566272] DpListInsert: insert elem 36 into tmadm_inuse_list (at begin)
[Thr 140532588566272] DpListInsert: 7 elems in tmadm_inuse_list
[Thr 140532588566272] DpGetFreeUid: new UID: 26449
[Thr 140532588566272] Thu Apr 11 09:02:40:178 2024
[Thr 140532588566272] DpSesLockSessionEntry: lock invalid T36_M0
[Thr 140532588566272] DpSesUnlockSessionEntry: unlocked invalid T36_M0
[Thr 140532588566272] DpInitInternalSession: initialized T36_M0_I0
[Thr 140532588566272] DpITmSlotClear: cleared T36_U26449
[Thr 140532588566272] DpTmSlotAllocate: allocated T36_U26449
[Thr 140532588566272] RqQQueueCreate: Created queue <T36_U26449_M0> in slot 68
(49079) with normal priority
[Thr 140532588566272] DpLogonInit: new logon T36_U26449, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532588566272] IcmSendRq: created T36_U26449_M0
[Thr 140532588566272] DpSesGetWorkerType: return workerType DIA for T36_U26449
[Thr 140532588566272] DpRqSlotAllocate: 1 pending requests
[Thr 140532588566272] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078288, slot 946)
[Thr 140532588566272] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078288) from
ICMAN to local WORKER
[Thr 140532588566272] rq_id 26078288
[Thr 140532588566272] -OUT- ca_blk -1 len 0
[Thr 140532588566272] -OUT- userTrace 3
[Thr 140532588566272] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532588566272] -OUT- mpi rq <78183> mpi resp <78184> prot
2
[Thr 140532588566272] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532588566272] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532588566272] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA2F8BA97C9413}_{conn-id=730EFE781C731EEEBDFA2F8BA97CB413}_1
[Thr 140532588566272] -OUT- sender address:
[Thr 140532588566272] -OUT- type LOCAL
[Thr 140532588566272] -OUT- agentType ICMAN
[Thr 140532588566272] -OUT- receiver address:
[Thr 140532588566272] -OUT- type LOCAL
[Thr 140532588566272] -OUT- agentType WORKER workerTyp DIA
[Thr 140532588566272] -OUT- session T36_U26449_M0
[Thr 140532588566272] RqQAddRequest: Add request rq_id 26078288 (DIA) to queue
<T36_U26449_M0> in slot 68 at the end
[Thr 140532588566272] Dump of queue <T36_U26449_M0> in slot 68 (1 requests,
port=0):
[Thr 140532588566272] -1 <- 29 (rq_id 26078288, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532588566272] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532588566272] RqQQueueAddToSessionQueue: Added queue <T36_U26449_M0> in
slot 68 to normal priority session queue at the end
[Thr 140532588566272] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532588566272] -1 <- 68 < T36_U26449_M0> -> -1
[Thr 140532588566272] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532588566272] RqQNotifySessionQueue: notify normal priority session queue
of queue <T36_U26449_M0> (DIA) (id=186)
[Thr 140532588566272] Info of W18 (inside function RqQNotifyWorker (end))
[Thr 140532588566272] noOfPendingQueues=>W18-0<
[Thr 140532588566272] noOfWaitForQueues=>W18-1<
[Thr 140532588566272] wait for queue 23 (W18)
[Thr 140532588566272] lowestPriority: normal priority
[Thr 140532588566272] modCounter=>W18-2733113<
[Thr 140532588566272] RqQNotifyWorker: notify W18 about dispatch queues
(modCounter=>W18-2733113<)
[Thr 140532588566272] RqQSetWorkerState: W18 has state RUNNING (modCounter=>W18-
2733113<)
[Thr 140532588566272] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532588566272] RqQQueueGetNumberOfRequests: Queue <T36_U26449_M0> in slot 68
contains 1 requests of type DIA
[Thr 140532588566272] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078288), queue has 1 requests
[Thr 140532588566272] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078288,
slot 946)
[Thr 140532588566272] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532588566272] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532588566272] IcmHandleNetRead(id=9/345661): read_len: 144, HandleNetData
returned: 4
[Thr 140532588566272] IcmHandleNetRead(id=9/345661): status 1 -> 4
[Thr 140532588566272] ->> SapSSLReadPendingNB(sssl_hdl=7fd034057d70,
&plen=7fd04b054c58, &more=7fd04b054c33, &ios=7fd04b054c38)
[Thr 140532588566272] <<- SapSSLReadPendingNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588566272] IcmReadFromPartner(id=9/345661): read with maximum timeout
500
[Thr 140532588566272] IcmMpiWatchInsert: MPI watch entry <78184>, number 11
inserted.
[Thr 140532588566272] MPI<78184>bb#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532588566272] MPI<78184>bb#6 GetInbuf -1 255cb0 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532588566272] Thu Apr 11 09:02:40:193 2024
[Thr 140532588566272] IcmMpiWatchRemove: MPI watch entry <78184>, number 11 removed
(wakeup was not sent).
[Thr 140532588566272] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532588566272] BINDUMP of content denied
[Thr 140532588566272] PlugInHandleServData(rqid=9/345661/1): role: Server(1),
status: 3
[Thr 140532588566272] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532588566272] ICT: IctIHttpOpenMessage: 7fd034065240 typ=2
[Thr 140532588566272] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532588566272] HttpParseResponseHeader: Version: 1001
[Thr 140532588566272] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532588566272] HTTP response (raw) [9/345661/1]:
[Thr 140532588566272] HTTP/1.1 403 Forbidden
[Thr 140532588566272] content-type: text/html; charset=utf-8
[Thr 140532588566272] content-length: 857
[Thr 140532588566272] sap-perf-fesrec: 10804.000000
[Thr 140532588566272] content-encoding: gzip
[Thr 140532588566272] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532588566272] DTRACE(9/345661/1): {root-
id=730EFE781C731EEEBDFA2F8BA97C9413}_{conn-id=730EFE781C731EEEBDFA2F8BA97CB413}_1
[Thr 140532588566272] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532588566272] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532588566272] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532588566272] HttpSAPR3Handler: Response from AppServer
[Thr 140532588566272] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532588566272] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532588566272] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532588566272] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd034058580
[Thr 140532588566272] ISC: don't cache response: status code=403
[Thr 140532588566272] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532588566272] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532588566272] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532588566272] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532588566272] HttpModHandler: process 2, header_len 151
[Thr 140532588566272] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532588566272] HttpModHandler: perform the actions: (128)
[Thr 140532588566272] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532588566272] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532588566272] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532588566272] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532588566272] Thu Apr 11 09:02:40:193 2024
[Thr 140532588566272] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532588566272] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532588566272] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588566272] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588566272] HttpModHandler: process 3, header_len 0
[Thr 140532588566272] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588566272] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd034058580
[Thr 140532588566272] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588566272] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532588566272] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532588566272] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532588566272] IcmHandleReadFromPartner(id=9/345661): HandleServData
returned: 702
[Thr 140532588566272] BINDUMP of content denied
[Thr 140532588566272] IcmWriteToConn(id=9/345661): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532588566272] ->> SapSSLWriteNB(sssl_hdl=7fd034057d70, buf=7fd050314d20,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532588566272] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532588566272] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532588566272] <<- SapSSLWriteNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "buf= 7fd050314d20, written= 1008 of 1008
(all) io=idle"
[Thr 140532588566272] IcmWriteToConn(id=9/345661): wrote data to partner (len =
1008)
[Thr 140532588566272] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532588566272] MPI<78184>bb#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532588566272] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532588566272] ICT: IctHttpCloseMessage( 7fd03405d690 ) -> u=0 rc=0
[Thr 140532588566272] ICT: IctHttpCloseMessage( 7fd034065240 ) -> u=0 rc=0
[Thr 140532588566272] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4b0547fc)
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532588566272] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532588566272] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532588566272] in: sssl_hdl = 7fd034057d70
[Thr 140532588566272] in: ... ni_hdl = 152
[Thr 140532588566272] in: flags = 0
[Thr 140532588566272] in: timeout = 10000
[Thr 140532588566272] MPI<78183>bc#7 Close( bc ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532588566272] MPI<78183>bc#9 Delete( bc ) -> MPI_OK
[Thr 140532588566272] MPI<78183>bc#8 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532588566272] MPI<78184>bb#8 Close( bb ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532588566272] MPI<78184>bb#10 Delete( bb ) -> MPI_OK
[Thr 140532588566272] MPI<78184>bb#9 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532588566272] Thu Apr 11 09:02:40:194 2024
[Thr 140532588566272] NiIShutdownHandle: shutdown -w of hdl 152
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 29 (rq_id 26078289)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 29
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=171), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078289 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078289
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 090000003D460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T36_U26449_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078289, slot 947)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078289)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345661
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078289, slot 947)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=3000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 3000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=3000)
[Thr 140532588566272] SiPeek: hang up occurred in sock 29
[Thr 140532588566272] NiIPeek: peek for hdl 152 failed (r; rc=1)
[Thr 140532588566272] NiIRead: hdl 152 SSLState 0
[Thr 140532588566272] NiIRead: SiRecv failed for hdl 152/sock 29
[Thr 140532588566272] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.199:38224;
L=10.200.50.133:8443)
[Thr 140532588566272] NiICloseHandle: shutdown and close hdl 152/sock 29
[Thr 140532588566272] IcmConnClose: Connection 9/345661 closed
[Thr 140532588566272] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.199 ->
rc=0
[Thr 140532588566272] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532588566272] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
-> 0
[Thr 140532588566272] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=-1 -> 0
[Thr 140532588566272] Thu Apr 11 09:02:40:195 2024
[Thr 140532588566272] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532588566272] REQ TRACE END: 9/345661/1
[Thr 140532588566272] IcmWorkerThread: Thread 4: Waiting for event
[Thr 140532588566272] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Thu Apr 11 09:02:43:196 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: call schedules, last t: 1712818933, next
t: 1712818963, cur t: 1712818963
[Thr 140532577003264] IcmCreateRequest: Append request 360781
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532589094656] IcmWorkerHandleRequest: worker 3 got the semaphore
[Thr 140532589094656] REQUEST:
Type: SCHEDULER Index = 360781
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589094656] IcmGetSchedule: found slot 0
[Thr 140532589094656] IcmAlReportPerfData: Reporting data to CCMS Alerting
Infrastructure
[Thr 140532589094656] IcmConnCheckStoredClientConn: next client timeout check in 6
sec
[Thr 140532589094656] IcmConnInitContext: context initialized
[Thr 140532589094656] IcmGetServicePtr: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 1
[Thr 140532589094656] PlugInHandleAdmMessage: request received:
[Thr 140532589094656] PlugInHandleAdmMessage: opcode: ICM_COM_OP_CACHE_STAT (136),
len: 528, dest_type: 2, subhdlkey: 262145(4/0)
[Thr 140532589094656] HttpISubHandlerItCreate: add reference to table 7fd024010780,
now 2 references, 1 tables used
[Thr 140532589094656] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_ADM_MSG(4), header_l
[Thr 140532589094656] HttpCacheHandler: TASK_ADM_MSG 0 7fd024001ae0 (nil)
[Thr 140532589094656] SCACHE: adm request received:
[Thr 140532589094656] SCACHE: opcode: 136, len: 528, dest_type: 2, dest:
[Thr 140532589094656] MTX_LOCK 3247 7fd024004a70
[Thr 140532589094656] MTX_UNLOCK 3260 7fd024004a70
[Thr 140532589094656] IctCmGetCacheInfo#459363 -> 0
[Thr 140532589094656] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532589094656] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532589094656] HttpSubHandlerItDelete: remove reference to table
7fd024010780, now 1 references, 1 tables used
[Thr 140532589094656] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532589094656] IcmServDecrRefCount: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 0
[Thr 140532589094656] IcmGetSchedule: next schedule in 30 secs
[Thr 140532589094656] IcmWorkerThread: Thread 3: Waiting for event
[Thr 140532589094656] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:02:47:351 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:02:48:201 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331623 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331624 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331625 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331626: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331626 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532577003264] Thu Apr 11 09:02:48:605 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 29 (rq_id 26078369)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 29
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=172), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078369 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078369
[Thr 140532577003264] -IN-- ca_blk 0 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T36_U26451_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 0
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 26078369, slot 948)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078369)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c06b130
[Thr 140532577003264] IcmCreateRequest: Append request 360782
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c06b130
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
26078369, slot 948)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 0 with request rq_id
26078369
[Thr 140532577003264] DpCaRelBlk: released ca_blk 0
[Thr 140532590679808] IcmWorkerHandleRequest: worker 0 got the semaphore
[Thr 140532590679808] REQUEST:
Type: ADMMSG Index = 360782
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] Thu Apr 11 09:02:48:605 2024
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532590679808] MPI<78186>bc#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532590679808] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532590679808] MPI<78185>bb#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532590679808] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532590679808] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532590679808] MPI<78186>bc#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532590679808] MPI<78185>bb#5 FlushOutbuf -1 1 1 4663e8 10444 6 ->
7fd0505253e8 MPI_OK
[Thr 140532590679808] IcmWorkerThread: Thread 0: Waiting for event
[Thr 140532590679808] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Thu Apr 11 09:02:53:608 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331627 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331628 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331629 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331630: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331630 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140533415016064] Thu Apr 11 09:02:54:819 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 153 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 153/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 153 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 153 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 153 from 10.200.51.221:24360
[Thr 140533415016064] NiIAccept: hdl 153 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345663/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.221 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360783
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532586452736] IcmWorkerHandleRequest: worker 8 got the semaphore
[Thr 140532586452736] REQ TRACE BEGIN: 9/345663/1
[Thr 140532586452736] REQUEST:
Type: ACCEPT_CONNECTION Index = 360783
[Thr 140532586452736] CONNECTION (id=9/345663):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 153, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.221:24360 ()
status: NOP
connect time: 11.04.2024 09:02:54
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532586452736] Thu Apr 11 09:02:54:820 2024
[Thr 140532586452736] MPI 187: event flag already open:7643 key=16643
[Thr 140532586452736] MPI 187: event flag already open:7642 key=16642
[Thr 140532586452736] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532586452736] MPI<78187>bb#1 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532586452736] MPI<78187>bb#2 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532586452736] MPI 188: event flag already open:7641 key=16641
[Thr 140532586452736] MPI 188: event flag already open:7640 key=16640
[Thr 140532586452736] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532586452736] MPI<78188>bc#1 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532586452736] MPI<78188>bc#2 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532586452736] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532586452736] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532586452736] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532586452736] out: sssl_hdl = 7fd02c042a30
[Thr 140532586452736] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd02c042a30,
cred_hdl=7fd00c064270)
[Thr 140532586452736] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532586452736] ->> SapSSLSetNiHdl(sssl_hdl=7fd02c042a30, ni_hdl=153)
[Thr 140532586452736] SSL NI-hdl 153: local=10.200.50.133:8443
peer=10.200.51.221:24360
[Thr 140532586452736] <<- SapSSLSetNiHdl(sssl_hdl=7fd02c042a30,
ni_hdl=153)==SAP_O_K
[Thr 140532586452736] ->> SapSSLSessionStartNB(sssl_hdl=7fd02c042a30, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532586452736] NiIBlockMode: leave blockmode for hdl 153 FALSE
[Thr 140532586452736] NiIHdlGetStatus: hdl 153/sock 29 ok, data pending (len=1)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532586452736] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532586452736] ClientHello session_id="A0AEDB21 B553EF1B E45F90AB
DAD70563 B343F058 DDAACF13 72B5B5BE AC560F2E"
[Thr 140532586452736] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532586452736] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532586452736] TLS_AES_128_GCM_SHA256
[Thr 140532586452736] TLS_AES_256_GCM_SHA384
[Thr 140532586452736] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532586452736] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532586452736] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532586452736] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532586452736] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532586452736] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532586452736] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532586452736] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532586452736] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586452736] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532586452736] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532586452736] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532586452736] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532586452736] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532586452736] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532586452736] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532586452736] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586452736] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532586452736] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532586452736] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532586452736] [ssl_bytes_to_cipher_suites]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Received TLS Extensions:
[Thr 140532586452736] Id: 43 - supported_versions [RFC8446]
[Thr 140532586452736] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532586452736] Id: 51 - key_share [RFC8446]
[Thr 140532586452736] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532586452736] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532586452736] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532586452736] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532586452736] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532586452736] [ssl_parse_clienthello_tlsext]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Own TLS certificate:
[Thr 140532586452736] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532586452736] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532586452736] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532586452736] [ssl3_output_cert_chain]
[Thr 140532586452736] Thu Apr 11 09:02:54:820 2024
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: CA certificate:
[Thr 140532586452736] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532586452736] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532586452736] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532586452736] [ssl3_output_cert_chain]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Offering 2 certificate type(s) for
client authentication:
[Thr 140532586452736] rsa_sign(1)
[Thr 140532586452736] ecdsa_sign(64)
[Thr 140532586452736] [ssl3_get_req_cert_type]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532586452736] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532586452736] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532586452736] [ssl_get_encoded_trusted_ca_list]
[Thr 140532586452736] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532586452736] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532586452736] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532586452736] <-- SSL:SiPoll(sock=29, evt=R, slept = 2 ms) Ready
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Received message of type
"Certificate" containing no certificates.
[Thr 140532586452736] Renouncing client authentication: verification mode: 1
[Thr 140532586452736] [ssl3_decode_client_certificate]
[Thr 140532586452736] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532586452736] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532586452736] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532586452736] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532586452736] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586452736] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532586452736] No Client Certificate
[Thr 140532586452736] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532586452736] (failed resume) new TLS session_id="C9A5A9BF D98D0418
45A4EC02 E8E81CD5 E7293EC4 BD09232D D18F7A1C 2413E68A
[Thr 140532586452736] SapSSLISessionStartFin(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532586452736] <<- SapSSLSessionStartNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532586452736] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532586452736] ->> SapSSLReadPendingNB(sssl_hdl=7fd02c042a30, &plen=(nil),
&more=(nil), &ios=7fd04ae50c38)
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] IcmReadFromConn(id=9/345663): request new MPI (0/0)
[Thr 140532586452736] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532586452736] MPI<78187>bb#3 GetOutbuf 0 4663e8 65536 (0) -> 7fd050525408
44564480 MPI_OK
[Thr 140532586452736] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532586452736] Thu Apr 11 09:02:54:824 2024
[Thr 140532586452736] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532586452736] ->> SapSSLReadPendingNB(sssl_hdl=7fd02c042a30,
&plen=7fd04ae50b18, &more=7fd04ae50b17, &ios=7fd04ae50b1c)
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] NiIPeek: peek successful for hdl 153 (r)
[Thr 140532586452736] ->> SapSSLReadNB(sssl_hdl=7fd02c042a30, buf=7fd050525458,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532586452736] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532586452736] <<- SapSSLReadNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532586452736] ->> SapSSLReadPendingNB(sssl_hdl=7fd02c042a30,
&plen=7fd04ae50b18, &more=7fd04ae50b17, &ios=7fd04ae50b1c)
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] NiIPeek: peek for hdl 153 timed out (r; 0ms)
[Thr 140532586452736] IcmReadFromConn(id=9/345663): no SSL data available
[Thr 140532586452736] IcmReadFromConn(id=9/345663): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532586452736] BINDUMP of content denied
[Thr 140532586452736] HttpPlugInHandleNetData(rqid=9/345663/1): role: Server(1),
status: 1
[Thr 140532586452736] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532586452736] ICT: IctIHttpOpenMessage: 7fd02c064b40 typ=1
[Thr 140532586452736] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532586452736] HttpParseRequestHeader: no content length set
[Thr 140532586452736] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532586452736] HttpParseRequestHeader: Version: 1001
[Thr 140532586452736] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532586452736] ->> SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30,
&cert=7fd04ae506f0, &cert_len=7fd04ae506ec,
[Thr 140532586452736] &subject_dn=7fd04ae506f8, &issuer_dn=7fd04ae50700,
&csuite_name=7fd04ae50708)
[Thr 140532586452736] <<- SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] out: cert_len = <no cert>
[Thr 140532586452736] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586452736] HTTP request (raw) [9/345663/1]:
[Thr 140532586452736] GET /sap/bc/ping HTTP/1.1
[Thr 140532586452736] host: 10.200.50.133:8443
[Thr 140532586452736] connection: close
[Thr 140532586452736] user-agent: ELB-HealthChecker/2.0
[Thr 140532586452736] accept-encoding: gzip, compressed
[Thr 140532586452736] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532586452736] ->> SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30,
&cert=7fd04ae4f638, &cert_len=7fd04ae4f634,
[Thr 140532586452736] &subject_dn=7fd04ae4f640, &issuer_dn=7fd04ae4f648,
&csuite_name=7fd04ae4f6c8)
[Thr 140532586452736] <<- SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] out: cert_len = <no cert>
[Thr 140532586452736] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586452736] Thu Apr 11 09:02:54:825 2024
[Thr 140532586452736] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532586452736] sap-cancel-on-close not found
[Thr 140532586452736] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532586452736] DpPlgGetVirtHost: no server defined, use default
[Thr 140532586452736] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532586452736] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532586452736] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532586452736] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532586452736] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532586452736] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532586452736] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532586452736] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532586452736] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532586452736] >> start >>
CsiExecute(7fd02401e940,7fd04ae4aa20,12,1,7fd04ae4aa10,7fd04ae4a9f4,0)
[Thr 140532586452736] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532586452736] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532586452736] << end << CsiExecute(CSI_RC==OK)
[Thr 140532586452736] >> start >> CsiFreeInstance((nil))
[Thr 140532586452736] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532586452736] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532586452736] HttpModHandler: process 1, header_len 144
[Thr 140532586452736] ->> SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30,
&cert=7fd04ae4b8a0, &cert_len=7fd04ae4b580,
[Thr 140532586452736] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532586452736] <<- SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] out: cert_len = <no cert>
[Thr 140532586452736] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586452736] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586452736] HttpModHandler: perform the actions: (128)
[Thr 140532586452736] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532586452736] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586452736] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532586452736] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532586452736] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532586452736] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532586452736] MTX_LOCK 1760 7fd024005020
[Thr 140532586452736] MTX_UNLOCK 1891 7fd024005020
[Thr 140532586452736] IctCmOpen#357252 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] MTX_LOCK 1760 7fd024004a70
[Thr 140532586452736] Thu Apr 11 09:02:54:825 2024
[Thr 140532586452736] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532586452736] IctCmOpen#459364 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532586452736] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532586452736] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532586452736] MTX_LOCK 1760 7fd024005020
[Thr 140532586452736] MTX_UNLOCK 1891 7fd024005020
[Thr 140532586452736] IctCmOpen#357253 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] MTX_LOCK 1760 7fd024004a70
[Thr 140532586452736] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532586452736] IctCmOpen#459365 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] HttpCacheHandler: cache miss.
[Thr 140532586452736] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586452736] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532586452736] ICT: IctLookupPathTable() -> 0
[Thr 140532586452736] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532586452736] DTRACE(9/345663/1): {root-
id=730EFE781C731EEEBDFA30A30A3D1419}_{conn-id=730EFE781C731EEEBDFA30A30A3D3419}_1
[Thr 140532586452736] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532586452736] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532586452736] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532586452736] flush buffer with mpi buffer id 40
[Thr 140532586452736] MPI<78187>bb#4 FlushOutbuf 40 1 0 4663e8 224 6 ->
7fd0505253e8 MPI_OK
[Thr 140532586452736] IcmPlFlushBuf: roll in workprocess
[Thr 140532586452736] IcmConnRollInWP: roll in work process
[Thr 140532586452736] IcmCreateDpRequest: Send request to AppServer
[Thr 140532586452736] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532586452736] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532586452736] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532586452736] DpResourcesOk: logons: act/max/usage = 8/1200/0.666667 %
[Thr 140532586452736] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532586452736] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532586452736] DpResourcesOk: ES: act/max/usage = 2184 MB/10992 MB/19.868996
%
[Thr 140532586452736] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532586452736] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532586452736] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532586452736] DpListRemove: remove elem 22 from tmadm_free_list
[Thr 140532586452736] DpListRemove: 1191 elems in tmadm_free_list
[Thr 140532586452736] DpListInsert: insert elem 22 into tmadm_inuse_list (at begin)
[Thr 140532586452736] DpListInsert: 9 elems in tmadm_inuse_list
[Thr 140532586452736] Thu Apr 11 09:02:54:826 2024
[Thr 140532586452736] DpGetFreeUid: new UID: 26465
[Thr 140532586452736] DpSesLockSessionEntry: lock invalid T22_M0
[Thr 140532586452736] DpSesUnlockSessionEntry: unlocked invalid T22_M0
[Thr 140532586452736] DpInitInternalSession: initialized T22_M0_I0
[Thr 140532586452736] DpITmSlotClear: cleared T22_U26465
[Thr 140532586452736] DpTmSlotAllocate: allocated T22_U26465
[Thr 140532586452736] RqQQueueCreate: Created queue <T22_U26465_M0> in slot 74
(49112) with normal priority
[Thr 140532586452736] DpLogonInit: new logon T22_U26465, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532586452736] IcmSendRq: created T22_U26465_M0
[Thr 140532586452736] DpSesGetWorkerType: return workerType DIA for T22_U26465
[Thr 140532586452736] DpRqSlotAllocate: 1 pending requests
[Thr 140532586452736] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078621, slot 949)
[Thr 140532586452736] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078621) from
ICMAN to local WORKER
[Thr 140532586452736] rq_id 26078621
[Thr 140532586452736] -OUT- ca_blk -1 len 0
[Thr 140532586452736] -OUT- userTrace 3
[Thr 140532586452736] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532586452736] -OUT- mpi rq <78187> mpi resp <78188> prot
2
[Thr 140532586452736] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532586452736] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532586452736] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA30A30A3D1419}_{conn-id=730EFE781C731EEEBDFA30A30A3D3419}_1
[Thr 140532586452736] -OUT- sender address:
[Thr 140532586452736] -OUT- type LOCAL
[Thr 140532586452736] -OUT- agentType ICMAN
[Thr 140532586452736] -OUT- receiver address:
[Thr 140532586452736] -OUT- type LOCAL
[Thr 140532586452736] -OUT- agentType WORKER workerTyp DIA
[Thr 140532586452736] -OUT- session T22_U26465_M0
[Thr 140532586452736] RqQAddRequest: Add request rq_id 26078621 (DIA) to queue
<T22_U26465_M0> in slot 74 at the end
[Thr 140532586452736] Dump of queue <T22_U26465_M0> in slot 74 (1 requests,
port=0):
[Thr 140532586452736] -1 <- 94 (rq_id 26078621, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532586452736] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532586452736] RqQQueueAddToSessionQueue: Added queue <T22_U26465_M0> in
slot 74 to normal priority session queue at the end
[Thr 140532586452736] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532586452736] -1 <- 74 < T22_U26465_M0> -> -1
[Thr 140532586452736] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532586452736] RqQNotifySessionQueue: notify normal priority session queue
of queue <T22_U26465_M0> (DIA) (id=187)
[Thr 140532586452736] Info of W14 (inside function RqQNotifyWorker (end))
[Thr 140532586452736] noOfPendingQueues=>W14-0<
[Thr 140532586452736] noOfWaitForQueues=>W14-2<
[Thr 140532586452736] wait for queue 69 (T38_U26359_M0)
[Thr 140532586452736] wait for queue 19 (W14)
[Thr 140532586452736] lowestPriority: normal priority
[Thr 140532586452736] modCounter=>W14-3782687<
[Thr 140532586452736] RqQNotifyWorker: notify W14 about dispatch queues
(modCounter=>W14-3782687<)
[Thr 140532586452736] RqQSetWorkerState: W14 has state RUNNING (modCounter=>W14-
3782687<)
[Thr 140532586452736] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532586452736] RqQQueueGetNumberOfRequests: Queue <T22_U26465_M0> in slot 74
contains 1 requests of type DIA
[Thr 140532586452736] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078621), queue has 1 requests
[Thr 140532586452736] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078621,
slot 949)
[Thr 140532586452736] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532586452736] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532586452736] IcmHandleNetRead(id=9/345663): read_len: 144, HandleNetData
returned: 4
[Thr 140532586452736] IcmHandleNetRead(id=9/345663): status 1 -> 4
[Thr 140532586452736] ->> SapSSLReadPendingNB(sssl_hdl=7fd02c042a30,
&plen=7fd04ae50c58, &more=7fd04ae50c33, &ios=7fd04ae50c38)
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] IcmReadFromPartner(id=9/345663): read with maximum timeout
500
[Thr 140532586452736] IcmMpiWatchInsert: MPI watch entry <78188>, number 11
inserted.
[Thr 140532586452736] MPI<78188>bc#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532586452736] Thu Apr 11 09:02:54:842 2024
[Thr 140532586452736] MPI<78188>bc#6 GetInbuf -1 4663e8 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532586452736] IcmMpiWatchRemove: MPI watch entry <78188>, number 11 removed
(wakeup was not sent).
[Thr 140532586452736] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532586452736] BINDUMP of content denied
[Thr 140532586452736] PlugInHandleServData(rqid=9/345663/1): role: Server(1),
status: 3
[Thr 140532586452736] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532586452736] ICT: IctIHttpOpenMessage: 7fd02c077470 typ=2
[Thr 140532586452736] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532586452736] HttpParseResponseHeader: Version: 1001
[Thr 140532586452736] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532586452736] HTTP response (raw) [9/345663/1]:
[Thr 140532586452736] HTTP/1.1 403 Forbidden
[Thr 140532586452736] content-type: text/html; charset=utf-8
[Thr 140532586452736] content-length: 857
[Thr 140532586452736] sap-perf-fesrec: 11110.000000
[Thr 140532586452736] content-encoding: gzip
[Thr 140532586452736] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532586452736] DTRACE(9/345663/1): {root-
id=730EFE781C731EEEBDFA30A30A3D1419}_{conn-id=730EFE781C731EEEBDFA30A30A3D3419}_1
[Thr 140532586452736] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532586452736] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586452736] HttpSAPR3Handler: Response from AppServer
[Thr 140532586452736] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586452736] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586452736] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd02c075fb0
[Thr 140532586452736] ISC: don't cache response: status code=403
[Thr 140532586452736] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532586452736] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586452736] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] Thu Apr 11 09:02:54:842 2024
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532586452736] HttpModHandler: process 2, header_len 151
[Thr 140532586452736] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586452736] HttpModHandler: perform the actions: (128)
[Thr 140532586452736] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532586452736] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586452736] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 94 (rq_id 26078622)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 94
[Thr 140532586452736] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532586452736] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpModHandler: process 3, header_len 0
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd02c075fb0
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532586452736] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532586452736] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532586452736] IcmHandleReadFromPartner(id=9/345663): HandleServData
returned: 702
[Thr 140532586452736] BINDUMP of content denied
[Thr 140532586452736] IcmWriteToConn(id=9/345663): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532586452736] ->> SapSSLWriteNB(sssl_hdl=7fd02c042a30, buf=7fd050525458,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532586452736] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532586452736] <<- SapSSLWriteNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "buf= 7fd050525458, written= 1008 of 1008
(all) io=idle"
[Thr 140532586452736] IcmWriteToConn(id=9/345663): wrote data to partner (len =
1008)
[Thr 140532586452736] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532586452736] MPI<78188>bc#7 FreeInbuf#1 0 4663e8 0 -> MPI_OK
[Thr 140532586452736] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532586452736] ICT: IctHttpCloseMessage( 7fd02c064b40 ) -> u=0 rc=0
[Thr 140532586452736] ICT: IctHttpCloseMessage( 7fd02c077470 ) -> u=0 rc=0
[Thr 140532586452736] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4ae507fc)
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532586452736] Thu Apr 11 09:02:54:843 2024
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532586452736] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532586452736] in: sssl_hdl = 7fd02c042a30
[Thr 140532586452736] in: ... ni_hdl = 153
[Thr 140532586452736] in: flags = 0
[Thr 140532586452736] in: timeout = 10000
[Thr 140532586452736] MPI<78187>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532586452736] MPI<78187>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532586452736] MPI<78187>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586452736] MPI<78188>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532586452736] MPI<78188>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532586452736] MPI<78188>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586452736] NiIShutdownHandle: shutdown -w of hdl 153
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59391
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=173), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078622 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078622
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 090000003F460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
14
[Thr 140532577003264] -IN-- session T22_U26465_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078622, slot 950)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078622)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345663
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078622, slot 950)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532586452736] SiPeek: hang up occurred in sock 29
[Thr 140532586452736] NiIPeek: peek for hdl 153 failed (r; rc=1)
[Thr 140532586452736] NiIRead: hdl 153 SSLState 0
[Thr 140532586452736] NiIRead: SiRecv failed for hdl 153/sock 29
[Thr 140532586452736] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.221:24360;
L=10.200.50.133:8443)
[Thr 140532586452736] NiICloseHandle: shutdown and close hdl 153/sock 29
[Thr 140532586452736] IcmConnClose: Connection 9/345663 closed
[Thr 140532586452736] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.221 ->
rc=0
[Thr 140532586452736] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532586452736] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
-> 0
[Thr 140532586452736] Thu Apr 11 09:02:54:844 2024
[Thr 140532586452736] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=-1 -> 0
[Thr 140532586452736] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532586452736] REQ TRACE END: 9/345663/1
[Thr 140532586452736] IcmWorkerThread: Thread 8: Waiting for event
[Thr 140532586452736] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:02:57:355 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:02:59:849 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331631 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331632 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331633 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331634: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331634 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] Thu Apr 11 09:03:04:851 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331635 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331636 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331637 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331638: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331638 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532599072512] Thu Apr 11 09:03:07:365 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:03:09:856 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331639 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=4000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 4000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=4000)
[Thr 140532585395968] MPI<2>0#2331640 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331641 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331642: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331642 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140533415016064] Thu Apr 11 09:03:10:186 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 154 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 154/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 154 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 154 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 154 from 10.200.51.199:56924
[Thr 140533415016064] NiIAccept: hdl 154 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345664/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.199 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360784
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532588037888] IcmWorkerHandleRequest: worker 5 got the semaphore
[Thr 140532588037888] REQ TRACE BEGIN: 9/345664/1
[Thr 140532588037888] REQUEST:
Type: ACCEPT_CONNECTION Index = 360784
[Thr 140532588037888] CONNECTION (id=9/345664):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 154, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.199:56924 ()
status: NOP
connect time: 11.04.2024 09:03:10
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532588037888] Thu Apr 11 09:03:10:186 2024
[Thr 140532588037888] MPI 188: event flag already open:7641 key=16641
[Thr 140532588037888] MPI 188: event flag already open:7640 key=16640
[Thr 140532588037888] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532588037888] MPI<78189>bc#1 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532588037888] MPI<78189>bc#2 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532588037888] MPI 187: event flag already open:7643 key=16643
[Thr 140532588037888] MPI 187: event flag already open:7642 key=16642
[Thr 140532588037888] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532588037888] MPI<7818a>bb#1 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532588037888] MPI<7818a>bb#2 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532588037888] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532588037888] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532588037888] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532588037888] out: sssl_hdl = 7fd020048b80
[Thr 140532588037888] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd020048b80,
cred_hdl=7fd00c064270)
[Thr 140532588037888] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532588037888] ->> SapSSLSetNiHdl(sssl_hdl=7fd020048b80, ni_hdl=154)
[Thr 140532588037888] SSL NI-hdl 154: local=10.200.50.133:8443
peer=10.200.51.199:56924
[Thr 140532588037888] <<- SapSSLSetNiHdl(sssl_hdl=7fd020048b80,
ni_hdl=154)==SAP_O_K
[Thr 140532588037888] ->> SapSSLSessionStartNB(sssl_hdl=7fd020048b80, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532588037888] NiIBlockMode: leave blockmode for hdl 154 FALSE
[Thr 140532588037888] NiIHdlGetStatus: hdl 154/sock 29 ok, data pending (len=1)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532588037888] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532588037888] ClientHello session_id="78F8D380 D9150243 A0D5CF80
93504C9B 174838B2 A3A3F0D5 597373D3 2FC1086D"
[Thr 140532588037888] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532588037888] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532588037888] TLS_AES_128_GCM_SHA256
[Thr 140532588037888] TLS_AES_256_GCM_SHA384
[Thr 140532588037888] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532588037888] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532588037888] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532588037888] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532588037888] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532588037888] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532588037888] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532588037888] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532588037888] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532588037888] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532588037888] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532588037888] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532588037888] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532588037888] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532588037888] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532588037888] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532588037888] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532588037888] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532588037888] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532588037888] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532588037888] [ssl_bytes_to_cipher_suites]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Received TLS Extensions:
[Thr 140532588037888] Id: 43 - supported_versions [RFC8446]
[Thr 140532588037888] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532588037888] Id: 51 - key_share [RFC8446]
[Thr 140532588037888] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532588037888] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532588037888] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532588037888] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532588037888] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532588037888] [ssl_parse_clienthello_tlsext]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Own TLS certificate:
[Thr 140532588037888] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532588037888] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532588037888] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532588037888] [ssl3_output_cert_chain]
[Thr 140532588037888] Thu Apr 11 09:03:10:187 2024
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: CA certificate:
[Thr 140532588037888] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532588037888] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532588037888] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532588037888] [ssl3_output_cert_chain]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Offering 2 certificate type(s) for
client authentication:
[Thr 140532588037888] rsa_sign(1)
[Thr 140532588037888] ecdsa_sign(64)
[Thr 140532588037888] [ssl3_get_req_cert_type]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532588037888] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532588037888] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532588037888] [ssl_get_encoded_trusted_ca_list]
[Thr 140532588037888] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532588037888] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532588037888] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532588037888] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532588037888] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Received message of type
"Certificate" containing no certificates.
[Thr 140532588037888] Renouncing client authentication: verification mode: 1
[Thr 140532588037888] [ssl3_decode_client_certificate]
[Thr 140532588037888] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532588037888] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532588037888] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532588037888] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532588037888] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532588037888] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532588037888] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532588037888] No Client Certificate
[Thr 140532588037888] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532588037888] (failed resume) new TLS session_id="41DF2CD8 F00BA3A0
8C117CC3 F46F167E B624F1A5 6481E8AA B7FF004D 94F8265B
[Thr 140532588037888] SapSSLISessionStartFin(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532588037888] <<- SapSSLSessionStartNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532588037888] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532588037888] ->> SapSSLReadPendingNB(sssl_hdl=7fd020048b80, &plen=(nil),
&more=(nil), &ios=7fd04afd3c38)
[Thr 140532588037888] <<- SapSSLReadPendingNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588037888] IcmReadFromConn(id=9/345664): request new MPI (0/0)
[Thr 140532588037888] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532588037888] MPI<78189>bc#3 GetOutbuf 0 4663e8 65536 (0) -> 7fd050525408
44564480 MPI_OK
[Thr 140532588037888] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532588037888] Thu Apr 11 09:03:10:190 2024
[Thr 140532588037888] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532588037888] ->> SapSSLReadPendingNB(sssl_hdl=7fd020048b80,
&plen=7fd04afd3b18, &more=7fd04afd3b17, &ios=7fd04afd3b1c)
[Thr 140532588037888] <<- SapSSLReadPendingNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588037888] NiIPeek: peek successful for hdl 154 (r)
[Thr 140532588037888] ->> SapSSLReadNB(sssl_hdl=7fd020048b80, buf=7fd050525458,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532588037888] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532588037888] <<- SapSSLReadNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532588037888] ->> SapSSLReadPendingNB(sssl_hdl=7fd020048b80,
&plen=7fd04afd3b18, &more=7fd04afd3b17, &ios=7fd04afd3b1c)
[Thr 140532588037888] <<- SapSSLReadPendingNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588037888] NiIPeek: peek for hdl 154 timed out (r; 0ms)
[Thr 140532588037888] IcmReadFromConn(id=9/345664): no SSL data available
[Thr 140532588037888] IcmReadFromConn(id=9/345664): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532588037888] BINDUMP of content denied
[Thr 140532588037888] HttpPlugInHandleNetData(rqid=9/345664/1): role: Server(1),
status: 1
[Thr 140532588037888] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532588037888] ICT: IctIHttpOpenMessage: 7fd020065b60 typ=1
[Thr 140532588037888] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532588037888] HttpParseRequestHeader: no content length set
[Thr 140532588037888] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532588037888] HttpParseRequestHeader: Version: 1001
[Thr 140532588037888] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532588037888] ->> SapSSLGetPeerInfo(sssl_hdl=7fd020048b80,
&cert=7fd04afd36f0, &cert_len=7fd04afd36ec,
[Thr 140532588037888] &subject_dn=7fd04afd36f8, &issuer_dn=7fd04afd3700,
&csuite_name=7fd04afd3708)
[Thr 140532588037888] <<- SapSSLGetPeerInfo(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] out: cert_len = <no cert>
[Thr 140532588037888] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532588037888] HTTP request (raw) [9/345664/1]:
[Thr 140532588037888] GET /sap/bc/ping HTTP/1.1
[Thr 140532588037888] host: 10.200.50.133:8443
[Thr 140532588037888] connection: close
[Thr 140532588037888] user-agent: ELB-HealthChecker/2.0
[Thr 140532588037888] accept-encoding: gzip, compressed
[Thr 140532588037888] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532588037888] ->> SapSSLGetPeerInfo(sssl_hdl=7fd020048b80,
&cert=7fd04afd2638, &cert_len=7fd04afd2634,
[Thr 140532588037888] &subject_dn=7fd04afd2640, &issuer_dn=7fd04afd2648,
&csuite_name=7fd04afd26c8)
[Thr 140532588037888] <<- SapSSLGetPeerInfo(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] out: cert_len = <no cert>
[Thr 140532588037888] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532588037888] Thu Apr 11 09:03:10:190 2024
[Thr 140532588037888] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532588037888] sap-cancel-on-close not found
[Thr 140532588037888] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532588037888] DpPlgGetVirtHost: no server defined, use default
[Thr 140532588037888] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532588037888] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532588037888] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532588037888] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532588037888] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532588037888] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532588037888] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532588037888] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532588037888] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532588037888] >> start >>
CsiExecute(7fd02401e940,7fd04afcda20,12,1,7fd04afcda10,7fd04afcd9f4,0)
[Thr 140532588037888] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532588037888] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532588037888] << end << CsiExecute(CSI_RC==OK)
[Thr 140532588037888] >> start >> CsiFreeInstance((nil))
[Thr 140532588037888] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532588037888] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532588037888] HttpModHandler: process 1, header_len 144
[Thr 140532588037888] ->> SapSSLGetPeerInfo(sssl_hdl=7fd020048b80,
&cert=7fd04afce8a0, &cert_len=7fd04afce580,
[Thr 140532588037888] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532588037888] <<- SapSSLGetPeerInfo(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] out: cert_len = <no cert>
[Thr 140532588037888] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532588037888] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532588037888] HttpModHandler: perform the actions: (128)
[Thr 140532588037888] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532588037888] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532588037888] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532588037888] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532588037888] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532588037888] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532588037888] MTX_LOCK 1760 7fd024005020
[Thr 140532588037888] MTX_UNLOCK 1891 7fd024005020
[Thr 140532588037888] IctCmOpen#357254 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588037888] MTX_LOCK 1760 7fd024004a70
[Thr 140532588037888] Thu Apr 11 09:03:10:190 2024
[Thr 140532588037888] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532588037888] IctCmOpen#459366 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588037888] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532588037888] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532588037888] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532588037888] MTX_LOCK 1760 7fd024005020
[Thr 140532588037888] MTX_UNLOCK 1891 7fd024005020
[Thr 140532588037888] IctCmOpen#357255 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588037888] MTX_LOCK 1760 7fd024004a70
[Thr 140532588037888] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532588037888] IctCmOpen#459367 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588037888] HttpCacheHandler: cache miss.
[Thr 140532588037888] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532588037888] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532588037888] ICT: IctLookupPathTable() -> 0
[Thr 140532588037888] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532588037888] DTRACE(9/345664/1): {root-
id=730EFE781C731EEEBDFA31C81E88D41A}_{conn-id=730EFE781C731EEEBDFA31C81E88F41A}_1
[Thr 140532588037888] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532588037888] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532588037888] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532588037888] flush buffer with mpi buffer id 40
[Thr 140532588037888] MPI<78189>bc#4 FlushOutbuf 40 1 0 4663e8 224 6 ->
7fd0505253e8 MPI_OK
[Thr 140532588037888] IcmPlFlushBuf: roll in workprocess
[Thr 140532588037888] IcmConnRollInWP: roll in work process
[Thr 140532588037888] IcmCreateDpRequest: Send request to AppServer
[Thr 140532588037888] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532588037888] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532588037888] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532588037888] DpResourcesOk: logons: act/max/usage = 8/1200/0.666667 %
[Thr 140532588037888] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532588037888] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532588037888] DpResourcesOk: ES: act/max/usage = 2184 MB/10992 MB/19.868996
%
[Thr 140532588037888] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532588037888] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532588037888] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532588037888] DpListRemove: remove elem 22 from tmadm_free_list
[Thr 140532588037888] DpListRemove: 1191 elems in tmadm_free_list
[Thr 140532588037888] DpListInsert: insert elem 22 into tmadm_inuse_list (at begin)
[Thr 140532588037888] DpListInsert: 9 elems in tmadm_inuse_list
[Thr 140532588037888] Thu Apr 11 09:03:10:191 2024
[Thr 140532588037888] DpGetFreeUid: new UID: 26468
[Thr 140532588037888] DpSesLockSessionEntry: lock T22_U26468_M0
[Thr 140532588037888] DpSesUnlockSessionEntry: unlocked invalid T22_M0
[Thr 140532588037888] DpInitInternalSession: initialized T22_M0_I0
[Thr 140532588037888] RqQQueueDestroy: Destroy queue <T22_U26467_M0> in slot 74
(49116)
[Thr 140532588037888] RqQQueueDestroy: locked session queue mutex for high priority
[Thr 140532588037888] RqQQueueSlotClear: clear slot 74
[Thr 140532588037888] RqQUnlockSessionQueue: unlocked session queue mutex for high
priority
[Thr 140532588037888] DpITmSlotClear: cleared T22_U26468
[Thr 140532588037888] DpTmSlotAllocate: allocated T22_U26468
[Thr 140532588037888] RqQQueueCreate: Created queue <T22_U26468_M0> in slot 74
(49117) with normal priority
[Thr 140532588037888] DpLogonInit: new logon T22_U26468, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532588037888] IcmSendRq: created T22_U26468_M0
[Thr 140532588037888] DpSesGetWorkerType: return workerType DIA for T22_U26468
[Thr 140532588037888] DpRqSlotAllocate: 1 pending requests
[Thr 140532588037888] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078641, slot 951)
[Thr 140532588037888] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078641) from
ICMAN to local WORKER
[Thr 140532588037888] rq_id 26078641
[Thr 140532588037888] -OUT- ca_blk -1 len 0
[Thr 140532588037888] -OUT- userTrace 3
[Thr 140532588037888] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532588037888] -OUT- mpi rq <78189> mpi resp <7818a> prot
2
[Thr 140532588037888] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532588037888] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532588037888] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA31C81E88D41A}_{conn-id=730EFE781C731EEEBDFA31C81E88F41A}_1
[Thr 140532588037888] -OUT- sender address:
[Thr 140532588037888] -OUT- type LOCAL
[Thr 140532588037888] -OUT- agentType ICMAN
[Thr 140532588037888] -OUT- receiver address:
[Thr 140532588037888] -OUT- type LOCAL
[Thr 140532588037888] -OUT- agentType WORKER workerTyp DIA
[Thr 140532588037888] -OUT- session T22_U26468_M0
[Thr 140532588037888] RqQAddRequest: Add request rq_id 26078641 (DIA) to queue
<T22_U26468_M0> in slot 74 at the end
[Thr 140532588037888] Dump of queue <T22_U26468_M0> in slot 74 (1 requests,
port=0):
[Thr 140532588037888] -1 <- 94 (rq_id 26078641, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532588037888] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532588037888] RqQQueueAddToSessionQueue: Added queue <T22_U26468_M0> in
slot 74 to normal priority session queue at the end
[Thr 140532588037888] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532588037888] -1 <- 74 < T22_U26468_M0> -> -1
[Thr 140532588037888] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532588037888] RqQNotifySessionQueue: notify normal priority session queue
of queue <T22_U26468_M0> (DIA) (id=188)
[Thr 140532588037888] Info of W14 (inside function RqQNotifyWorker (end))
[Thr 140532588037888] noOfPendingQueues=>W14-0<
[Thr 140532588037888] noOfWaitForQueues=>W14-2<
[Thr 140532588037888] wait for queue 69 (T38_U26359_M0)
[Thr 140532588037888] wait for queue 19 (W14)
[Thr 140532588037888] lowestPriority: normal priority
[Thr 140532588037888] modCounter=>W14-3782710<
[Thr 140532588037888] RqQNotifyWorker: notify W14 about dispatch queues
(modCounter=>W14-3782710<)
[Thr 140532588037888] RqQSetWorkerState: W14 has state RUNNING (modCounter=>W14-
3782710<)
[Thr 140532588037888] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532588037888] RqQQueueGetNumberOfRequests: Queue <T22_U26468_M0> in slot 74
contains 1 requests of type DIA
[Thr 140532588037888] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078641), queue has 1 requests
[Thr 140532588037888] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078641,
slot 951)
[Thr 140532588037888] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532588037888] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532588037888] IcmHandleNetRead(id=9/345664): read_len: 144, HandleNetData
returned: 4
[Thr 140532588037888] IcmHandleNetRead(id=9/345664): status 1 -> 4
[Thr 140532588037888] ->> SapSSLReadPendingNB(sssl_hdl=7fd020048b80,
&plen=7fd04afd3c58, &more=7fd04afd3c33, &ios=7fd04afd3c38)
[Thr 140532588037888] <<- SapSSLReadPendingNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] Thu Apr 11 09:03:10:191 2024
[Thr 140532588037888] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588037888] IcmReadFromPartner(id=9/345664): read with maximum timeout
500
[Thr 140532588037888] IcmMpiWatchInsert: MPI watch entry <7818a>, number 11
inserted.
[Thr 140532588037888] MPI<7818a>bb#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532588037888] MPI<7818a>bb#6 GetInbuf -1 4663e8 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532588037888] IcmMpiWatchRemove: MPI watch entry <7818a>, number 11 removed
(wakeup was not sent).
[Thr 140532588037888] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532588037888] BINDUMP of content denied
[Thr 140532588037888] PlugInHandleServData(rqid=9/345664/1): role: Server(1),
status: 3
[Thr 140532588037888] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532588037888] ICT: IctIHttpOpenMessage: 7fd020078090 typ=2
[Thr 140532588037888] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532588037888] HttpParseResponseHeader: Version: 1001
[Thr 140532588037888] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532588037888] HTTP response (raw) [9/345664/1]:
[Thr 140532588037888] HTTP/1.1 403 Forbidden
[Thr 140532588037888] content-type: text/html; charset=utf-8
[Thr 140532588037888] content-length: 857
[Thr 140532588037888] sap-perf-fesrec: 10742.000000
[Thr 140532588037888] content-encoding: gzip
[Thr 140532588037888] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532588037888] DTRACE(9/345664/1): {root-
id=730EFE781C731EEEBDFA31C81E88D41A}_{conn-id=730EFE781C731EEEBDFA31C81E88F41A}_1
[Thr 140532588037888] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532588037888] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532588037888] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532588037888] HttpSAPR3Handler: Response from AppServer
[Thr 140532588037888] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532588037888] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532588037888] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532588037888] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd020076bd0
[Thr 140532588037888] ISC: don't cache response: status code=403
[Thr 140532588037888] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532588037888] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532588037888] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532588037888] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532588037888] HttpModHandler: process 2, header_len 151
[Thr 140532588037888] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532588037888] HttpModHandler: perform the actions: (128)
[Thr 140532588037888] Thu Apr 11 09:03:10:207 2024
[Thr 140532588037888] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532588037888] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532588037888] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532588037888] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532588037888] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532588037888] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532588037888] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588037888] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588037888] HttpModHandler: process 3, header_len 0
[Thr 140532588037888] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588037888] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd020076bd0
[Thr 140532588037888] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588037888] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532588037888] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532588037888] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532588037888] IcmHandleReadFromPartner(id=9/345664): HandleServData
returned: 702
[Thr 140532588037888] BINDUMP of content denied
[Thr 140532588037888] IcmWriteToConn(id=9/345664): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532588037888] ->> SapSSLWriteNB(sssl_hdl=7fd020048b80, buf=7fd050525458,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532588037888] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532588037888] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532588037888] <<- SapSSLWriteNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: ... = "buf= 7fd050525458, written= 1008 of 1008
(all) io=idle"
[Thr 140532588037888] IcmWriteToConn(id=9/345664): wrote data to partner (len =
1008)
[Thr 140532588037888] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532588037888] MPI<7818a>bb#7 FreeInbuf#1 0 4663e8 0 -> MPI_OK
[Thr 140532588037888] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532588037888] ICT: IctHttpCloseMessage( 7fd020065b60 ) -> u=0 rc=0
[Thr 140532588037888] ICT: IctHttpCloseMessage( 7fd020078090 ) -> u=0 rc=0
[Thr 140532588037888] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4afd37fc)
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532588037888] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532588037888] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532588037888] in: sssl_hdl = 7fd020048b80
[Thr 140532588037888] in: ... ni_hdl = 154
[Thr 140532588037888] in: flags = 0
[Thr 140532588037888] in: timeout = 10000
[Thr 140532588037888] MPI<78189>bc#7 Close( bc ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532588037888] Thu Apr 11 09:03:10:207 2024
[Thr 140532588037888] MPI<78189>bc#9 Delete( bc ) -> MPI_OK
[Thr 140532588037888] MPI<78189>bc#8 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532588037888] MPI<7818a>bb#8 Close( bb ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532588037888] MPI<7818a>bb#10 Delete( bb ) -> MPI_OK
[Thr 140532588037888] MPI<7818a>bb#9 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532588037888] NiIShutdownHandle: shutdown -w of hdl 154
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 94 (rq_id 26078642)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 94
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59391
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=174), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078642 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078642
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 0900000040460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
14
[Thr 140532577003264] -IN-- session T22_U26468_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078642, slot 952)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078642)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345664
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078642, slot 952)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=3000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 3000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=3000)
[Thr 140532588037888] SiPeek: hang up occurred in sock 29
[Thr 140532588037888] NiIPeek: peek for hdl 154 failed (r; rc=1)
[Thr 140532588037888] NiIRead: hdl 154 SSLState 0
[Thr 140532588037888] NiIRead: SiRecv failed for hdl 154/sock 29
[Thr 140532588037888] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.199:56924;
L=10.200.50.133:8443)
[Thr 140532588037888] NiICloseHandle: shutdown and close hdl 154/sock 29
[Thr 140532588037888] Thu Apr 11 09:03:10:208 2024
[Thr 140532588037888] IcmConnClose: Connection 9/345664 closed
[Thr 140532588037888] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.199 ->
rc=0
[Thr 140532588037888] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532588037888] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
-> 0
[Thr 140532588037888] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=-1 -> 0
[Thr 140532588037888] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532588037888] REQ TRACE END: 9/345664/1
[Thr 140532588037888] IcmWorkerThread: Thread 5: Waiting for event
[Thr 140532588037888] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Thu Apr 11 09:03:13:211 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: call schedules, last t: 1712818963, next
t: 1712818993, cur t: 1712818993
[Thr 140532577003264] IcmCreateRequest: Append request 360785
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589623040] IcmWorkerHandleRequest: worker 2 got the semaphore
[Thr 140532589623040] REQUEST:
Type: SCHEDULER Index = 360785
[Thr 140532589623040] IcmGetSchedule: found slot 0
[Thr 140532589623040] IcmAlReportPerfData: Reporting data to CCMS Alerting
Infrastructure
[Thr 140532589623040] IcmConnCheckStoredClientConn: next client timeout check in 7
sec
[Thr 140532589623040] IcmConnInitContext: context initialized
[Thr 140532589623040] IcmGetServicePtr: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 1
[Thr 140532589623040] PlugInHandleAdmMessage: request received:
[Thr 140532589623040] PlugInHandleAdmMessage: opcode: ICM_COM_OP_CACHE_STAT (136),
len: 528, dest_type: 2, subhdlkey: 262145(4/0)
[Thr 140532589623040] HttpISubHandlerItCreate: add reference to table 7fd024010780,
now 2 references, 1 tables used
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_ADM_MSG(4), header_l
[Thr 140532589623040] HttpCacheHandler: TASK_ADM_MSG 0 7fd024001ae0 (nil)
[Thr 140532589623040] SCACHE: adm request received:
[Thr 140532589623040] SCACHE: opcode: 136, len: 528, dest_type: 2, dest:
[Thr 140532589623040] MTX_LOCK 3247 7fd024004a70
[Thr 140532589623040] MTX_UNLOCK 3260 7fd024004a70
[Thr 140532589623040] IctCmGetCacheInfo#459368 -> 0
[Thr 140532589623040] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532589623040] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532589623040] HttpSubHandlerItDelete: remove reference to table
7fd024010780, now 1 references, 1 tables used
[Thr 140532589623040] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532589623040] IcmServDecrRefCount: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 0
[Thr 140532589623040] IcmGetSchedule: next schedule in 30 secs
[Thr 140532589623040] IcmWorkerThread: Thread 2: Waiting for event
[Thr 140532589623040] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:03:17:375 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:03:18:215 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331643 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331644 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331645 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331646: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331646 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532577003264] Thu Apr 11 09:03:23:219 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331647 WriteOOB 77
[Thr 140532585395968] MPI<2>0#2331648 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331649 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331650: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331650 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140533415016064] Thu Apr 11 09:03:24:833 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 155 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 155/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 155 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 155 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 155 from 10.200.51.221:61054
[Thr 140533415016064] NiIAccept: hdl 155 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345666/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.221 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360786
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532590151424] IcmWorkerHandleRequest: worker 1 got the semaphore
[Thr 140532590151424] REQ TRACE BEGIN: 9/345666/1
[Thr 140532590151424] REQUEST:
Type: ACCEPT_CONNECTION Index = 360786
[Thr 140532590151424] CONNECTION (id=9/345666):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 155, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.221:61054 ()
status: NOP
connect time: 11.04.2024 09:03:24
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532590151424] Thu Apr 11 09:03:24:833 2024
[Thr 140532590151424] MPI 187: event flag already open:7643 key=16643
[Thr 140532590151424] MPI 187: event flag already open:7642 key=16642
[Thr 140532590151424] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532590151424] MPI<7818b>bb#1 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532590151424] MPI<7818b>bb#2 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532590151424] MPI 188: event flag already open:7641 key=16641
[Thr 140532590151424] MPI 188: event flag already open:7640 key=16640
[Thr 140532590151424] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532590151424] MPI<7818c>bc#1 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532590151424] MPI<7818c>bc#2 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532590151424] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532590151424] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532590151424] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532590151424] out: sssl_hdl = 7fd028013a10
[Thr 140532590151424] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd028013a10,
cred_hdl=7fd00c064270)
[Thr 140532590151424] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532590151424] ->> SapSSLSetNiHdl(sssl_hdl=7fd028013a10, ni_hdl=155)
[Thr 140532590151424] SSL NI-hdl 155: local=10.200.50.133:8443
peer=10.200.51.221:61054
[Thr 140532590151424] <<- SapSSLSetNiHdl(sssl_hdl=7fd028013a10,
ni_hdl=155)==SAP_O_K
[Thr 140532590151424] ->> SapSSLSessionStartNB(sssl_hdl=7fd028013a10, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532590151424] NiIBlockMode: leave blockmode for hdl 155 FALSE
[Thr 140532590151424] NiIHdlGetStatus: hdl 155/sock 29 ok, data pending (len=1)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532590151424] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532590151424] ClientHello session_id="82ABE6F0 BA40C76D 7C0E4BC7
D427B6A0 B0435036 D2BFE12A C55BFF0A 46F482E0"
[Thr 140532590151424] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532590151424] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532590151424] TLS_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_AES_256_GCM_SHA384
[Thr 140532590151424] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532590151424] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532590151424] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532590151424] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532590151424] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532590151424] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532590151424] [ssl_bytes_to_cipher_suites]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Received TLS Extensions:
[Thr 140532590151424] Id: 43 - supported_versions [RFC8446]
[Thr 140532590151424] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532590151424] Id: 51 - key_share [RFC8446]
[Thr 140532590151424] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532590151424] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532590151424] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532590151424] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532590151424] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532590151424] [ssl_parse_clienthello_tlsext]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Own TLS certificate:
[Thr 140532590151424] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532590151424] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532590151424] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532590151424] [ssl3_output_cert_chain]
[Thr 140532590151424] Thu Apr 11 09:03:24:834 2024
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: CA certificate:
[Thr 140532590151424] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532590151424] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532590151424] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532590151424] [ssl3_output_cert_chain]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Offering 2 certificate type(s) for
client authentication:
[Thr 140532590151424] rsa_sign(1)
[Thr 140532590151424] ecdsa_sign(64)
[Thr 140532590151424] [ssl3_get_req_cert_type]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532590151424] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532590151424] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532590151424] [ssl_get_encoded_trusted_ca_list]
[Thr 140532590151424] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532590151424] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532590151424] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532590151424] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Received message of type
"Certificate" containing no certificates.
[Thr 140532590151424] Renouncing client authentication: verification mode: 1
[Thr 140532590151424] [ssl3_decode_client_certificate]
[Thr 140532590151424] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532590151424] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532590151424] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532590151424] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532590151424] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532590151424] No Client Certificate
[Thr 140532590151424] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532590151424] (failed resume) new TLS session_id="D30642DE F14CA763
8292BDEC C1FD0755 E4EBEC35 C5192E9B BC15D04A 9F331DCC
[Thr 140532590151424] SapSSLISessionStartFin(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532590151424] <<- SapSSLSessionStartNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532590151424] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd028013a10, &plen=(nil),
&more=(nil), &ios=7fd04b1d7c38)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] IcmReadFromConn(id=9/345666): request new MPI (0/0)
[Thr 140532590151424] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532590151424] MPI<7818b>bb#3 GetOutbuf 0 4663e8 65536 (0) -> 7fd050525408
44564480 MPI_OK
[Thr 140532590151424] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532590151424] Thu Apr 11 09:03:24:837 2024
[Thr 140532590151424] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd028013a10,
&plen=7fd04b1d7b18, &more=7fd04b1d7b17, &ios=7fd04b1d7b1c)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] NiIPeek: peek successful for hdl 155 (r)
[Thr 140532590151424] ->> SapSSLReadNB(sssl_hdl=7fd028013a10, buf=7fd050525458,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532590151424] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532590151424] <<- SapSSLReadNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd028013a10,
&plen=7fd04b1d7b18, &more=7fd04b1d7b17, &ios=7fd04b1d7b1c)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] NiIPeek: peek for hdl 155 timed out (r; 0ms)
[Thr 140532590151424] IcmReadFromConn(id=9/345666): no SSL data available
[Thr 140532590151424] IcmReadFromConn(id=9/345666): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532590151424] BINDUMP of content denied
[Thr 140532590151424] HttpPlugInHandleNetData(rqid=9/345666/1): role: Server(1),
status: 1
[Thr 140532590151424] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532590151424] ICT: IctIHttpOpenMessage: 7fd02803ad80 typ=1
[Thr 140532590151424] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532590151424] HttpParseRequestHeader: no content length set
[Thr 140532590151424] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532590151424] HttpParseRequestHeader: Version: 1001
[Thr 140532590151424] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532590151424] ->> SapSSLGetPeerInfo(sssl_hdl=7fd028013a10,
&cert=7fd04b1d76f0, &cert_len=7fd04b1d76ec,
[Thr 140532590151424] &subject_dn=7fd04b1d76f8, &issuer_dn=7fd04b1d7700,
&csuite_name=7fd04b1d7708)
[Thr 140532590151424] <<- SapSSLGetPeerInfo(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] out: cert_len = <no cert>
[Thr 140532590151424] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532590151424] HTTP request (raw) [9/345666/1]:
[Thr 140532590151424] GET /sap/bc/ping HTTP/1.1
[Thr 140532590151424] host: 10.200.50.133:8443
[Thr 140532590151424] connection: close
[Thr 140532590151424] user-agent: ELB-HealthChecker/2.0
[Thr 140532590151424] accept-encoding: gzip, compressed
[Thr 140532590151424] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532590151424] ->> SapSSLGetPeerInfo(sssl_hdl=7fd028013a10,
&cert=7fd04b1d6638, &cert_len=7fd04b1d6634,
[Thr 140532590151424] &subject_dn=7fd04b1d6640, &issuer_dn=7fd04b1d6648,
&csuite_name=7fd04b1d66c8)
[Thr 140532590151424] <<- SapSSLGetPeerInfo(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] out: cert_len = <no cert>
[Thr 140532590151424] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532590151424] Thu Apr 11 09:03:24:838 2024
[Thr 140532590151424] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532590151424] sap-cancel-on-close not found
[Thr 140532590151424] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532590151424] DpPlgGetVirtHost: no server defined, use default
[Thr 140532590151424] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532590151424] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532590151424] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532590151424] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532590151424] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532590151424] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532590151424] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532590151424] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532590151424] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532590151424] >> start >>
CsiExecute(7fd02401e940,7fd04b1d1a20,12,1,7fd04b1d1a10,7fd04b1d19f4,0)
[Thr 140532590151424] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532590151424] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532590151424] << end << CsiExecute(CSI_RC==OK)
[Thr 140532590151424] >> start >> CsiFreeInstance((nil))
[Thr 140532590151424] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532590151424] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532590151424] HttpModHandler: process 1, header_len 144
[Thr 140532590151424] ->> SapSSLGetPeerInfo(sssl_hdl=7fd028013a10,
&cert=7fd04b1d28a0, &cert_len=7fd04b1d2580,
[Thr 140532590151424] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532590151424] <<- SapSSLGetPeerInfo(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] out: cert_len = <no cert>
[Thr 140532590151424] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532590151424] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532590151424] HttpModHandler: perform the actions: (128)
[Thr 140532590151424] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532590151424] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532590151424] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532590151424] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532590151424] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532590151424] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532590151424] MTX_LOCK 1760 7fd024005020
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024005020
[Thr 140532590151424] IctCmOpen#357256 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] MTX_LOCK 1760 7fd024004a70
[Thr 140532590151424] Thu Apr 11 09:03:24:838 2024
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532590151424] IctCmOpen#459369 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532590151424] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532590151424] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532590151424] MTX_LOCK 1760 7fd024005020
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024005020
[Thr 140532590151424] IctCmOpen#357257 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] MTX_LOCK 1760 7fd024004a70
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532590151424] IctCmOpen#459370 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] HttpCacheHandler: cache miss.
[Thr 140532590151424] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532590151424] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532590151424] ICT: IctLookupPathTable() -> 0
[Thr 140532590151424] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532590151424] DTRACE(9/345666/1): {root-
id=730EFE781C731EEEBDFA32DF7FB7541B}_{conn-id=730EFE781C731EEEBDFA32DF7FB7741B}_1
[Thr 140532590151424] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532590151424] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532590151424] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532590151424] flush buffer with mpi buffer id 40
[Thr 140532590151424] MPI<7818b>bb#4 FlushOutbuf 40 1 0 4663e8 224 6 ->
7fd0505253e8 MPI_OK
[Thr 140532590151424] IcmPlFlushBuf: roll in workprocess
[Thr 140532590151424] IcmConnRollInWP: roll in work process
[Thr 140532590151424] IcmCreateDpRequest: Send request to AppServer
[Thr 140532590151424] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532590151424] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532590151424] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532590151424] DpResourcesOk: logons: act/max/usage = 8/1200/0.666667 %
[Thr 140532590151424] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532590151424] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532590151424] DpResourcesOk: ES: act/max/usage = 2184 MB/10992 MB/19.868996
%
[Thr 140532590151424] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532590151424] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532590151424] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532590151424] DpListRemove: remove elem 22 from tmadm_free_list
[Thr 140532590151424] DpListRemove: 1191 elems in tmadm_free_list
[Thr 140532590151424] DpListInsert: insert elem 22 into tmadm_inuse_list (at begin)
[Thr 140532590151424] DpListInsert: 9 elems in tmadm_inuse_list
[Thr 140532590151424] Thu Apr 11 09:03:24:839 2024
[Thr 140532590151424] DpGetFreeUid: new UID: 26471
[Thr 140532590151424] DpSesLockSessionEntry: lock invalid T22_M0
[Thr 140532590151424] DpSesUnlockSessionEntry: unlocked invalid T22_M0
[Thr 140532590151424] DpInitInternalSession: initialized T22_M0_I0
[Thr 140532590151424] DpITmSlotClear: cleared T22_U26471
[Thr 140532590151424] DpTmSlotAllocate: allocated T22_U26471
[Thr 140532590151424] RqQQueueCreate: Created queue <T22_U26471_M0> in slot 74
(49123) with normal priority
[Thr 140532590151424] DpLogonInit: new logon T22_U26471, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532590151424] IcmSendRq: created T22_U26471_M0
[Thr 140532590151424] DpSesGetWorkerType: return workerType DIA for T22_U26471
[Thr 140532590151424] DpRqSlotAllocate: 1 pending requests
[Thr 140532590151424] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078666, slot 953)
[Thr 140532590151424] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078666) from
ICMAN to local WORKER
[Thr 140532590151424] rq_id 26078666
[Thr 140532590151424] -OUT- ca_blk -1 len 0
[Thr 140532590151424] -OUT- userTrace 3
[Thr 140532590151424] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532590151424] -OUT- mpi rq <7818b> mpi resp <7818c> prot
2
[Thr 140532590151424] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532590151424] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532590151424] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA32DF7FB7541B}_{conn-id=730EFE781C731EEEBDFA32DF7FB7741B}_1
[Thr 140532590151424] -OUT- sender address:
[Thr 140532590151424] -OUT- type LOCAL
[Thr 140532590151424] -OUT- agentType ICMAN
[Thr 140532590151424] -OUT- receiver address:
[Thr 140532590151424] -OUT- type LOCAL
[Thr 140532590151424] -OUT- agentType WORKER workerTyp DIA
[Thr 140532590151424] -OUT- session T22_U26471_M0
[Thr 140532590151424] RqQAddRequest: Add request rq_id 26078666 (DIA) to queue
<T22_U26471_M0> in slot 74 at the end
[Thr 140532590151424] Dump of queue <T22_U26471_M0> in slot 74 (1 requests,
port=0):
[Thr 140532590151424] -1 <- 94 (rq_id 26078666, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532590151424] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532590151424] RqQQueueAddToSessionQueue: Added queue <T22_U26471_M0> in
slot 74 to normal priority session queue at the end
[Thr 140532590151424] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532590151424] -1 <- 74 < T22_U26471_M0> -> -1
[Thr 140532590151424] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532590151424] RqQNotifySessionQueue: notify normal priority session queue
of queue <T22_U26471_M0> (DIA) (id=189)
[Thr 140532590151424] Info of W14 (inside function RqQNotifyWorker (end))
[Thr 140532590151424] noOfPendingQueues=>W14-0<
[Thr 140532590151424] noOfWaitForQueues=>W14-2<
[Thr 140532590151424] wait for queue 69 (T38_U26359_M0)
[Thr 140532590151424] wait for queue 19 (W14)
[Thr 140532590151424] lowestPriority: normal priority
[Thr 140532590151424] modCounter=>W14-3782730<
[Thr 140532590151424] RqQNotifyWorker: notify W14 about dispatch queues
(modCounter=>W14-3782730<)
[Thr 140532590151424] RqQSetWorkerState: W14 has state RUNNING (modCounter=>W14-
3782730<)
[Thr 140532590151424] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532590151424] RqQQueueGetNumberOfRequests: Queue <T22_U26471_M0> in slot 74
contains 1 requests of type DIA
[Thr 140532590151424] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078666), queue has 1 requests
[Thr 140532590151424] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078666,
slot 953)
[Thr 140532590151424] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532590151424] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532590151424] IcmHandleNetRead(id=9/345666): read_len: 144, HandleNetData
returned: 4
[Thr 140532590151424] IcmHandleNetRead(id=9/345666): status 1 -> 4
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd028013a10,
&plen=7fd04b1d7c58, &more=7fd04b1d7c33, &ios=7fd04b1d7c38)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] IcmReadFromPartner(id=9/345666): read with maximum timeout
500
[Thr 140532590151424] IcmMpiWatchInsert: MPI watch entry <7818c>, number 11
inserted.
[Thr 140532590151424] MPI<7818c>bc#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532590151424] Thu Apr 11 09:03:24:855 2024
[Thr 140532590151424] MPI<7818c>bc#6 GetInbuf -1 4663e8 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532590151424] IcmMpiWatchRemove: MPI watch entry <7818c>, number 11 removed
(wakeup was not sent).
[Thr 140532590151424] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532590151424] BINDUMP of content denied
[Thr 140532590151424] PlugInHandleServData(rqid=9/345666/1): role: Server(1),
status: 3
[Thr 140532590151424] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532590151424] ICT: IctIHttpOpenMessage: 7fd028064a10 typ=2
[Thr 140532590151424] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532590151424] HttpParseResponseHeader: Version: 1001
[Thr 140532590151424] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532590151424] HTTP response (raw) [9/345666/1]:
[Thr 140532590151424] HTTP/1.1 403 Forbidden
[Thr 140532590151424] content-type: text/html; charset=utf-8
[Thr 140532590151424] content-length: 857
[Thr 140532590151424] sap-perf-fesrec: 10793.000000
[Thr 140532590151424] content-encoding: gzip
[Thr 140532590151424] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532590151424] DTRACE(9/345666/1): {root-
id=730EFE781C731EEEBDFA32DF7FB7541B}_{conn-id=730EFE781C731EEEBDFA32DF7FB7741B}_1
[Thr 140532590151424] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532590151424] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532590151424] HttpSAPR3Handler: Response from AppServer
[Thr 140532590151424] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532590151424] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532590151424] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd028028480
[Thr 140532590151424] ISC: don't cache response: status code=403
[Thr 140532590151424] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532590151424] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532590151424] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532590151424] HttpModHandler: process 2, header_len 151
[Thr 140532590151424] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532590151424] HttpModHandler: perform the actions: (128)
[Thr 140532590151424] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532590151424] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532590151424] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] Thu Apr 11 09:03:24:855 2024
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532590151424] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532590151424] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpModHandler: process 3, header_len 0
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd028028480
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532590151424] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532590151424] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532590151424] IcmHandleReadFromPartner(id=9/345666): HandleServData
returned: 702
[Thr 140532590151424] BINDUMP of content denied
[Thr 140532590151424] IcmWriteToConn(id=9/345666): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532590151424] ->> SapSSLWriteNB(sssl_hdl=7fd028013a10, buf=7fd050525458,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532590151424] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532590151424] <<- SapSSLWriteNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "buf= 7fd050525458, written= 1008 of 1008
(all) io=idle"
[Thr 140532590151424] IcmWriteToConn(id=9/345666): wrote data to partner (len =
1008)
[Thr 140532590151424] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532590151424] MPI<7818c>bc#7 FreeInbuf#1 0 4663e8 0 -> MPI_OK
[Thr 140532590151424] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532590151424] ICT: IctHttpCloseMessage( 7fd02803ad80 ) -> u=0 rc=0
[Thr 140532590151424] ICT: IctHttpCloseMessage( 7fd028064a10 ) -> u=0 rc=0
[Thr 140532590151424] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4b1d77fc)
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532590151424] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532590151424] in: sssl_hdl = 7fd028013a10
[Thr 140532590151424] in: ... ni_hdl = 155
[Thr 140532590151424] in: flags = 0
[Thr 140532590151424] in: timeout = 10000
[Thr 140532590151424] MPI<7818b>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532590151424] MPI<7818b>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532590151424] MPI<7818b>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532590151424] MPI<7818c>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532590151424] MPI<7818c>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532590151424] Thu Apr 11 09:03:24:855 2024
[Thr 140532590151424] MPI<7818c>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532590151424] NiIShutdownHandle: shutdown -w of hdl 155
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 94 (rq_id 26078667)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 94
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59391
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=175), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078667 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078667
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 0900000042460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
14
[Thr 140532577003264] -IN-- session T22_U26471_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078667, slot 954)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078667)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345666
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078667, slot 954)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532590151424] SiPeek: hang up occurred in sock 29
[Thr 140532590151424] NiIPeek: peek for hdl 155 failed (r; rc=1)
[Thr 140532590151424] NiIRead: hdl 155 SSLState 0
[Thr 140532590151424] NiIRead: SiRecv failed for hdl 155/sock 29
[Thr 140532590151424] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.221:61054;
L=10.200.50.133:8443)
[Thr 140532590151424] NiICloseHandle: shutdown and close hdl 155/sock 29
[Thr 140532590151424] IcmConnClose: Connection 9/345666 closed
[Thr 140532590151424] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.221 ->
rc=0
[Thr 140532590151424] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532590151424] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
-> 0
[Thr 140532590151424] Thu Apr 11 09:03:24:856 2024
[Thr 140532590151424] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=-1 -> 0
[Thr 140532590151424] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532590151424] REQ TRACE END: 9/345666/1
[Thr 140532590151424] IcmWorkerThread: Thread 1: Waiting for event
[Thr 140532590151424] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:03:27:385 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:03:29:859 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331651 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331652 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331653 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331654: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331654 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] Thu Apr 11 09:03:34:864 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331655 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331656 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331657 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331658: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331658 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532599072512] Thu Apr 11 09:03:37:386 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:03:39:560 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 94 (rq_id 26078683)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 94
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:26046
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=176), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078683 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078683
[Thr 140532577003264] -IN-- ca_blk 1 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_ICMAN_OPCODE_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
17
[Thr 140532577003264] -IN-- session T31_U25632_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 1
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_ICMAN_OPCODE_RESP
request (rq_id 26078683, slot 955)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078683)
[Thr 140532577003264] IcmHandleRequest: change parameter >rdisp/TRACE=>1<
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 334 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_SET_PARAM(11)
[Thr 140532577003264] IcmHandleAdmMsg: set param rdisp/TRACE -> 1
[Thr 140532577003264] HttpSetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] H2SetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] SmtpSetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] IcmSetTrcLevel: Switch trace level to: 1
[Thr 140532577003264] *
[Thr 140532577003264] * SWITCH TRC-LEVEL to 1
[Thr 140532577003264] *
[Thr 140532577003264] eppSetTraceLevel: changing trace level to 1

You might also like