0% found this document useful (0 votes)
148 views226 pages

Newlog

Uploaded by

Prudhvi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views226 pages

Newlog

Uploaded by

Prudhvi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 226

-----------------------------------------------------------------------------------

-------------------------------------------------
| ICM Trace File (dev_icm)
-----------------------------------------------------------------------------------
-------------------------------------------------
---------------------------------------------------
trc file: "dev_icm", trc level: 3, release: "754"
---------------------------------------------------
[Thr 140532589094656] Wed Apr 10 12:36:00:380 2024
[Thr 140532589094656] HttpSetParam: (zdate/contloctime_trace = 1) ignored
[Thr 140532589094656] H2SetParam: (zdate/contloctime_trace = 1) ignored
[Thr 140532589094656] SmtpSetParam: (zdate/contloctime_trace = 1) ignored
sysno 02
sid Q20
systemid 390 (AMD/Intel x86_64 with Linux)
relno 7540
patchlevel 0
patchno 200
intno 20170305
make multithreaded, Unicode, 64 bit, optimized
profile /usr/sap/Q20/SYS/profile/Q20_D02_vq20app
pid 25112
[Thr 140532589094656] Wed Apr 10 12:36:00:380 2024
[Thr 140532589094656] Trace file initialized
[Thr 140532589094656] <<- SapSSLSetTraceFile(fp=7fd01c056c90)==SAP_O_K
[Thr 140532589094656] TRACE FILE TRUNCATED
[Thr 140532589094656] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532589094656] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589094656] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532589094656] HttpSAPR3Handler: Response from AppServer
[Thr 140532589094656] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589094656] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532589094656] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589094656] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532589094656] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd01c0781e0
[Thr 140532589094656] ISC: don't cache response: status code=403
[Thr 140532589094656] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532589094656] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589094656] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532589094656] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589094656] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532589094656] HttpModHandler: process 2, header_len 151
[Thr 140532589094656] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532589094656] HttpModHandler: perform the actions: (128)
[Thr 140532589094656] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532589094656] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589094656] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532589094656] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589094656] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532589094656] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532589094656] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532589094656] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589094656] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589094656] HttpModHandler: process 3, header_len 0
[Thr 140532589094656] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589094656] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd01c0781e0
[Thr 140532589094656] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589094656] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532589094656] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532589094656] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532589094656] IcmHandleReadFromPartner(id=1/336311): HandleServData
returned: 702
[Thr 140532589094656] BINDUMP of content denied
[Thr 140532589094656] IcmWriteToConn(id=1/336311): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532589094656] Wed Apr 10 12:36:00:380 2024
[Thr 140532589094656] ->> SapSSLWriteNB(sssl_hdl=7fd01c0454e0, buf=7fd050515420,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532589094656] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532589094656] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532589094656] <<- SapSSLWriteNB(sssl_hdl=7fd01c0454e0)==SAP_O_K
[Thr 140532589094656] in/out: ... = "buf= 7fd050515420, written= 1008 of 1008
(all) io=idle"
[Thr 140532589094656] IcmWriteToConn(id=1/336311): wrote data to partner (len =
1008)
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532589094656] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532589094656] MPI<7496e>bc#7 FreeInbuf#1 0 4563b0 0 -> MPI_OK
[Thr 140532589094656] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532589094656] ICT: IctHttpCloseMessage( 7fd01c066160 ) -> u=0 rc=0
[Thr 140532589094656] ICT: IctHttpCloseMessage( 7fd01c0796a0 ) -> u=0 rc=0
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532589094656] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f9671d0,flags=0x0000,timeout=10000,&IOstate=7fd0
4b0d57fc)
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532589094656] CCL[SSL]: Srv-0002A5CE: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532589094656] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532589094656] CCL[SSL]: Srv-0002A5CE: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 36 (rq_id 25344997)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 36
[Thr 140532589094656] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532589094656] in: sssl_hdl = 7fd01c0454e0
[Thr 140532589094656] in: ... ni_hdl = 177
[Thr 140532589094656] in: flags = 0
[Thr 140532589094656] in: timeout = 10000
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532589094656] MPI<7496d>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:58329
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=110), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532589094656] MPI<7496d>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532589094656] MPI<7496d>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532589094656] MPI<7496e>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532589094656] Wed Apr 10 12:36:00:380 2024
[Thr 140532589094656] MPI<7496e>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532589094656] MPI<7496e>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25344997 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25344997
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 01000000B7210500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
12
[Thr 140532577003264] -IN-- session invalid T30_U11715_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532589094656] NiIShutdownHandle: shutdown -w of hdl 177
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 25344997, slot 82)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25344997)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 1/336311
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
25344997, slot 82)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589094656] NiIPeek: peek successful for hdl 177 (r)
[Thr 140532589094656] NiIRead: hdl 177 SSLState 0
[Thr 140532589094656] NiIRead: hdl 177 received data (rcd=31,pac=1,RAW_IO)
[Thr 140532589094656] SiPeek: hang up occurred in sock 29
[Thr 140532589094656] NiIPeek: peek for hdl 177 failed (r; rc=1)
[Thr 140532589094656] NiIRead: hdl 177 SSLState 0
[Thr 140532589094656] NiIRead: SiRecv failed for hdl 177/sock 29
[Thr 140532589094656] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.221:12950;
L=10.200.50.133:8443)
[Thr 140532589094656] NiICloseHandle: shutdown and close hdl 177/sock 29
[Thr 140532589094656] IcmConnClose: Connection 1/336311 closed
[Thr 140532589094656] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.221 ->
rc=0
[Thr 140532589094656] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966718 -> 0
[Thr 140532589094656] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
-> 0
[Thr 140532589094656] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=-1 -> 0
[Thr 140532589094656] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532589094656] REQ TRACE END: 1/336311/1
[Thr 140532589094656] IcmWorkerThread: Thread 3: Waiting for event
[Thr 140532589094656] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Wed Apr 10 12:36:02:080 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 2 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 36 (rq_id 25345002)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 36
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:65125
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=111), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] Dump of queue <IcmanQueue> in slot 2 (1 requests, in use,
port=59573):
[Thr 140532577003264] -1 <- 103 (rq_id 25345003, NOWP,
REQ_HANDLER_PLUGIN_RESP) -> -1
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25345002 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25345002
[Thr 140532577003264] -IN-- ca_blk 1 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_ICMAN_OPCODE_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
16
[Thr 140532577003264] -IN-- session T20_U7788_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 1
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_ICMAN_OPCODE_RESP
request (rq_id 25345002, slot 83)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25345002)
[Thr 140532577003264] IcmHandleRequest: change parameter >rdisp/TRACE=>1<
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 334 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_SET_PARAM(11)
[Thr 140532577003264] IcmHandleAdmMsg: set param rdisp/TRACE -> 1
[Thr 140532577003264] HttpSetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] H2SetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] SmtpSetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] IcmSetTrcLevel: Switch trace level to: 1
[Thr 140532577003264] *
[Thr 140532577003264] * SWITCH TRC-LEVEL to 1
[Thr 140532577003264] *
[Thr 140532577003264] eppSetTraceLevel: changing trace level to 1
[Thr 140532585924352] Wed Apr 10 12:40:26:480 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000121d2} {root-id=730EFE
[Thr 140532585924352] INTERNAL T17_U11839_M0, 000, SAPSYS, ,
time=12:40:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 12:45:26:461 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000121f5} {root-id=730EFE
[Thr 140532588566272] INTERNAL T22_U12000_M0, 000, SAPSYS, ,
time=12:45:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 12:45:29:958 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000121f9} {root-id=730EFE
[Thr 140532590679808] INTERNAL T22_U12000_M0, 000, SAPSYS, ,
time=12:45:28, W16, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 12:48:19:113 2024
[Thr 140532587509504] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532587509504] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532587509504] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532587509504] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532587509504] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532587509504] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532587509504] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532587509504] (754_STACK patchno 200,linuxx86_64_gcc43) CommonCryptoLib
8.5.50 (/usr/sap/Q20/D02/exe/libsapcrypto.so)
[Thr 140532587509504] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532587509504] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532587509504] >> ===== SecuSSL ErrStack: =====
[Thr 140532587509504] Peer not trusted
[Thr 140532587509504] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532587509504] # --- Messages -----------
[Thr 140532587509504] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532587509504] # --- Summary -----------
[Thr 140532587509504] #01 Certificate (End Entity): VALID
[Thr 140532587509504] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532587509504] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532587509504] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532587509504] #02 Certificate (Issuer): VALID
[Thr 140532587509504] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532587509504] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532587509504] ----- END VERIFICATION RESULT -----
[Thr 140532587509504] << =============================
[Thr 140532587509504] Target Hostname="apps.support.sap.com"
[Thr 140532587509504] SSL NI-hdl 183: local=10.200.50.156:60700
peer=155.56.96.48:443
[Thr 140532587509504] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd038060d00)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532587509504] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532587509504] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532587509504]
[Thr 140532587509504] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532587509504] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532587509504] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532587509504] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532587509504] SSL NI-hdl 183: local=10.200.50.156:60700
peer=155.56.96.48:443
[Thr 140532587509504] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532587509504] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532587509504] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532587509504] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532587509504] Target Hostname="apps.support.sap.com"
[Thr 140532587509504] >> ---- SecuSSL ErrStack: ----
[Thr 140532587509504] Peer not trusted
[Thr 140532587509504] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532587509504] # --- Messages -----------
[Thr 140532587509504] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532587509504] # --- Summary -----------
[Thr 140532587509504] #01 Certificate (End Entity): VALID
[Thr 140532587509504] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532587509504] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532587509504] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532587509504] #02 Certificate (Issuer): VALID
[Thr 140532587509504] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532587509504] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532587509504] ----- END VERIFICATION RESULT -----
[Thr 140532587509504] << ---------------------------
[Thr 140532587509504]
[Thr 140532587509504] {00012211} {root-id=36354432464532303635443246453230}
[icxxconn.c 2536]
[Thr 140532587509504] SYNC_RFC T6_U12089_M0, 000, AVANTRA_RFC,
tq20app.sap.swisspor, time=12:48:09, W17, program=SAPMSS
[Thr 140532587509504] role: Client, protocol: HTTPS, local:
10.200.50.156:60700, peer: 155.56.96.48:443
[Thr 140532588566272] Wed Apr 10 12:48:19:559 2024
[Thr 140532588566272] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532588566272] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532588566272] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532588566272] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532588566272] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532588566272] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532588566272] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532588566272] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532588566272] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532588566272] >> ===== SecuSSL ErrStack: =====
[Thr 140532588566272] Peer not trusted
[Thr 140532588566272] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532588566272] # --- Messages -----------
[Thr 140532588566272] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532588566272] # --- Summary -----------
[Thr 140532588566272] #01 Certificate (End Entity): VALID
[Thr 140532588566272] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532588566272] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588566272] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532588566272] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532588566272] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532588566272] #02 Certificate (Issuer): VALID
[Thr 140532588566272] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588566272] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532588566272] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532588566272] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532588566272] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532588566272] ----- END VERIFICATION RESULT -----
[Thr 140532588566272] << =============================
[Thr 140532588566272] Target Hostname="apps.support.sap.com"
[Thr 140532588566272] SSL NI-hdl 176: local=10.200.50.156:60708
peer=155.56.96.48:443
[Thr 140532588566272] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd034057e10)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532588566272] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532588566272] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532588566272]
[Thr 140532588566272] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532588566272] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532588566272] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532588566272] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532588566272] SSL NI-hdl 176: local=10.200.50.156:60708
peer=155.56.96.48:443
[Thr 140532588566272] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532588566272] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532588566272] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532588566272] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532588566272] Target Hostname="apps.support.sap.com"
[Thr 140532588566272] >> ---- SecuSSL ErrStack: ----
[Thr 140532588566272] Peer not trusted
[Thr 140532588566272] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532588566272] # --- Messages -----------
[Thr 140532588566272] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532588566272] # --- Summary -----------
[Thr 140532588566272] #01 Certificate (End Entity): VALID
[Thr 140532588566272] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532588566272] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588566272] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532588566272] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532588566272] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532588566272] #02 Certificate (Issuer): VALID
[Thr 140532588566272] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588566272] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532588566272] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532588566272] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532588566272] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532588566272] ----- END VERIFICATION RESULT -----
[Thr 140532588566272] << ---------------------------
[Thr 140532588566272]
[Thr 140532588566272] {00012212} {root-id=36354432464532303635443246453230}
[icxxconn.c 2536]
[Thr 140532588566272] ASYNC_RFC T30_U12140_M0, 000, AVANTRA_RFC,
vq20app.sap.swisspor, time=12:48:19, W14, program=SAPM
[Thr 140532588566272] role: Client, protocol: HTTPS, local:
10.200.50.156:60708, peer: 155.56.96.48:443
[Thr 140532590151424] Wed Apr 10 12:50:26:452 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001221f} {root-id=730EFE
[Thr 140532590151424] INTERNAL T32_U12206_M0, 000, SAPSYS, ,
time=12:50:26, W10, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 12:55:26:612 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012242} {root-id=730EFE
[Thr 140532587509504] INTERNAL T19_U12386_M0, 000, SAPSYS, ,
time=12:55:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 12:55:29:055 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012246} {root-id=730EFE
[Thr 140532590151424] INTERNAL T19_U12386_M0, 000, SAPSYS, ,
time=12:55:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 13:00:26:451 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001226a} {root-id=730EFE
[Thr 140532588566272] INTERNAL T30_U12526_M0, 000, SAPSYS, ,
time=13:00:26, W11, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 13:05:26:458 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001228d} {root-id=730EFE
[Thr 140532586452736] INTERNAL T26_U12686_M0, 000, SAPSYS, ,
time=13:05:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 13:05:28:979 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012291} {root-id=730EFE
[Thr 140532588566272] INTERNAL T26_U12686_M0, 000, SAPSYS, ,
time=13:05:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 13:10:26:452 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000122b5} {root-id=730EFE
[Thr 140532586981120] INTERNAL T19_U12848_M0, 000, SAPSYS, ,
time=13:10:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 13:15:26:474 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000122d8} {root-id=730EFE
[Thr 140532590151424] INTERNAL T33_U13007_M0, 000, SAPSYS, ,
time=13:15:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 13:15:28:966 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000122dc} {root-id=730EFE
[Thr 140532586981120] INTERNAL T33_U13007_M0, 000, SAPSYS, ,
time=13:15:28, W15, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 13:20:26:459 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012304} {root-id=730EFE
[Thr 140532589094656] INTERNAL T30_U13182_M0, 000, SAPSYS, ,
time=13:20:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 13:25:26:411 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012327} {root-id=730EFE
[Thr 140532590679808] INTERNAL T33_U13374_M0, 000, SAPSYS, ,
time=13:25:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 13:25:28:933 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001232b} {root-id=730EFE
[Thr 140532589094656] INTERNAL T33_U13374_M0, 000, SAPSYS, ,
time=13:25:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 13:30:26:583 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001234f} {root-id=730EFE
[Thr 140532589623040] INTERNAL T25_U13575_M0, 000, SAPSYS, ,
time=13:30:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 13:35:26:445 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012372} {root-id=730EFE
[Thr 140532588037888] INTERNAL T11_U13744_M0, 000, SAPSYS, ,
time=13:35:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 13:35:28:905 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012376} {root-id=730EFE
[Thr 140532589623040] INTERNAL T11_U13744_M0, 000, SAPSYS, ,
time=13:35:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 13:40:26:460 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001239a} {root-id=730EFE
[Thr 140532585924352] INTERNAL T24_U13892_M0, 000, SAPSYS, ,
time=13:40:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 13:45:26:438 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000123bd} {root-id=730EFE
[Thr 140532589094656] INTERNAL T0_U14051_M0, 000, SAPSYS, ,
time=13:45:26, W17, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 13:45:28:878 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000123c1} {root-id=730EFE
[Thr 140532585924352] INTERNAL T0_U14051_M0, 000, SAPSYS, ,
time=13:45:28, W17, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 13:50:26:458 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000123e5} {root-id=730EFE
[Thr 140532587509504] INTERNAL T26_U14248_M0, 000, SAPSYS, ,
time=13:50:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 13:55:26:495 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012408} {root-id=730EFE
[Thr 140532589623040] INTERNAL T24_U14422_M0, 000, SAPSYS, ,
time=13:55:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 13:55:28:968 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001240c} {root-id=730EFE
[Thr 140532587509504] INTERNAL T24_U14422_M0, 000, SAPSYS, ,
time=13:55:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 14:00:26:456 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012430} {root-id=730EFE
[Thr 140532586452736] INTERNAL T6_U14565_M0, 000, SAPSYS, ,
time=14:00:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 14:05:26:608 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012453} {root-id=730EFE
[Thr 140532585924352] INTERNAL T24_U14727_M0, 000, SAPSYS, ,
time=14:05:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 14:05:29:097 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012457} {root-id=730EFE
[Thr 140532586452736] INTERNAL T24_U14727_M0, 000, SAPSYS, ,
time=14:05:28, W15, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 14:10:26:479 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001247b} {root-id=730EFE
[Thr 140532590151424] INTERNAL T6_U14874_M0, 000, SAPSYS, ,
time=14:10:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 14:15:26:613 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001249e} {root-id=730EFE
[Thr 140532587509504] INTERNAL T30_U15055_M0, 000, SAPSYS, ,
time=14:15:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 14:15:29:195 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000124a2} {root-id=730EFE
[Thr 140532590151424] INTERNAL T30_U15055_M0, 000, SAPSYS, ,
time=14:15:29, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 14:20:26:470 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000124ca} {root-id=730EFE
[Thr 140532590679808] INTERNAL T29_U15229_M0, 000, SAPSYS, ,
time=14:20:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 14:25:26:446 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000124ed} {root-id=730EFE
[Thr 140532588566272] INTERNAL T31_U15411_M0, 000, SAPSYS, ,
time=14:25:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 14:25:28:956 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000124f1} {root-id=730EFE
[Thr 140532590679808] INTERNAL T31_U15411_M0, 000, SAPSYS, ,
time=14:25:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 14:30:26:605 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012516} {root-id=730EFE
[Thr 140532585924352] INTERNAL T24_U15595_M0, 000, SAPSYS, ,
time=14:30:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 14:35:26:480 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012539} {root-id=730EFE
[Thr 140532589094656] INTERNAL T33_U15756_M0, 000, SAPSYS, ,
time=14:35:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 14:35:28:956 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001253d} {root-id=730EFE
[Thr 140532585924352] INTERNAL T33_U15756_M0, 000, SAPSYS, ,
time=14:35:28, W14, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 14:40:26:576 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012561} {root-id=730EFE
[Thr 140532587509504] INTERNAL T31_U15904_M0, 000, SAPSYS, ,
time=14:40:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 14:45:26:532 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012584} {root-id=730EFE
[Thr 140532589623040] INTERNAL T21_U16068_M0, 000, SAPSYS, ,
time=14:45:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 14:45:29:028 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012588} {root-id=730EFE
[Thr 140532587509504] INTERNAL T21_U16068_M0, 000, SAPSYS, ,
time=14:45:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 14:50:26:472 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000125ac} {root-id=730EFE
[Thr 140532586452736] INTERNAL T34_U16289_M0, 000, SAPSYS, ,
time=14:50:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 14:55:26:472 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000125cf} {root-id=730EFE
[Thr 140532585924352] INTERNAL T17_U16509_M0, 000, SAPSYS, ,
time=14:55:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 14:55:28:937 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000125d3} {root-id=730EFE
[Thr 140532586452736] INTERNAL T17_U16509_M0, 000, SAPSYS, ,
time=14:55:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 15:00:26:461 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000125f7} {root-id=730EFE
[Thr 140532590151424] INTERNAL T22_U16660_M0, 000, SAPSYS, ,
time=15:00:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 15:05:26:479 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001261a} {root-id=730EFE
[Thr 140532587509504] INTERNAL T0_U16832_M0, 000, SAPSYS, ,
time=15:05:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 15:05:29:002 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001261e} {root-id=730EFE
[Thr 140532590151424] INTERNAL T0_U16832_M0, 000, SAPSYS, ,
time=15:05:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 15:10:26:474 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012642} {root-id=730EFE
[Thr 140532588566272] INTERNAL T33_U16983_M0, 000, SAPSYS, ,
time=15:10:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 15:15:26:602 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012665} {root-id=730EFE
[Thr 140532586452736] INTERNAL T22_U17141_M0, 000, SAPSYS, ,
time=15:15:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 15:15:29:166 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012669} {root-id=730EFE
[Thr 140532588566272] INTERNAL T22_U17141_M0, 000, SAPSYS, ,
time=15:15:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 15:20:26:451 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012691} {root-id=730EFE
[Thr 140532588037888] INTERNAL T33_U17322_M0, 000, SAPSYS, ,
time=15:20:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 15:25:26:421 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000126b4} {root-id=730EFE
[Thr 140532586981120] INTERNAL T25_U17496_M0, 000, SAPSYS, ,
time=15:25:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 15:25:28:939 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000126b8} {root-id=730EFE
[Thr 140532588037888] INTERNAL T25_U17496_M0, 000, SAPSYS, ,
time=15:25:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 15:30:26:482 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000126fc} {root-id=730EFE
[Thr 140532588037888] INTERNAL T33_U17643_M0, 000, SAPSYS, ,
time=15:30:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 15:35:26:477 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001271f} {root-id=730EFE
[Thr 140532589094656] INTERNAL T30_U17806_M0, 000, SAPSYS, ,
time=15:35:26, W10, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 15:35:28:968 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012723} {root-id=730EFE
[Thr 140532588037888] INTERNAL T30_U17806_M0, 000, SAPSYS, ,
time=15:35:28, W10, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 15:40:26:500 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012747} {root-id=730EFE
[Thr 140532587509504] INTERNAL T6_U17958_M0, 000, SAPSYS, ,
time=15:40:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 15:45:26:472 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001276a} {root-id=730EFE
[Thr 140532589623040] INTERNAL T34_U18176_M0, 000, SAPSYS, ,
time=15:45:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 15:45:28:951 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001276e} {root-id=730EFE
[Thr 140532587509504] INTERNAL T34_U18176_M0, 000, SAPSYS, ,
time=15:45:28, W16, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 15:50:26:606 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012792} {root-id=730EFE
[Thr 140532586452736] INTERNAL T9_U18378_M0, 000, SAPSYS, ,
time=15:50:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 15:54:35:136 2024
[Thr 140532586452736] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532586452736] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532586452736] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532586452736] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532586452736] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532586452736] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532586452736] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532586452736] (754_STACK patchno 200,linuxx86_64_gcc43) CommonCryptoLib
8.5.50 (/usr/sap/Q20/D02/exe/libsapcrypto.so)
[Thr 140532586452736] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532586452736] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532586452736] >> ===== SecuSSL ErrStack: =====
[Thr 140532586452736] Peer not trusted
[Thr 140532586452736] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532586452736] # --- Messages -----------
[Thr 140532586452736] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532586452736] # --- Summary -----------
[Thr 140532586452736] #01 Certificate (End Entity): VALID
[Thr 140532586452736] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532586452736] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586452736] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532586452736] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532586452736] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532586452736] #02 Certificate (Issuer): VALID
[Thr 140532586452736] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586452736] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532586452736] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532586452736] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532586452736] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532586452736] ----- END VERIFICATION RESULT -----
[Thr 140532586452736] << =============================
[Thr 140532586452736] Target Hostname="apps.support.sap.com"
[Thr 140532586452736] SSL NI-hdl 176: local=10.200.50.156:19400
peer=155.56.96.48:443
[Thr 140532586452736] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd02c042a30)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532586452736] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532586452736] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532586452736]
[Thr 140532586452736] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532586452736] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532586452736] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532586452736] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532586452736] SSL NI-hdl 176: local=10.200.50.156:19400
peer=155.56.96.48:443
[Thr 140532586452736] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532586452736] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532586452736] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532586452736] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532586452736] Target Hostname="apps.support.sap.com"
[Thr 140532586452736] >> ---- SecuSSL ErrStack: ----
[Thr 140532586452736] Peer not trusted
[Thr 140532586452736] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532586452736] # --- Messages -----------
[Thr 140532586452736] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532586452736] # --- Summary -----------
[Thr 140532586452736] #01 Certificate (End Entity): VALID
[Thr 140532586452736] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532586452736] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586452736] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532586452736] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532586452736] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532586452736] #02 Certificate (Issuer): VALID
[Thr 140532586452736] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586452736] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532586452736] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532586452736] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532586452736] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532586452736] ----- END VERIFICATION RESULT -----
[Thr 140532586452736] << ---------------------------
[Thr 140532586452736]
[Thr 140532586452736] {000127af} {root-id=730EFE781C731EEEBDE82B0FA40C2B3A}
[icxxconn.c 2536]
[Thr 140532586452736] GUI T30_U18420_M0, 000, DDIC, EC2AMAZ-6OB0VGC,
time=15:54:35, W19, program=RSHTTPPIN, high priori
[Thr 140532586452736] role: Client, protocol: HTTPS, local:
10.200.50.156:19400, peer: 155.56.96.48:443
[Thr 140532590151424] Wed Apr 10 15:55:26:475 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000127b6} {root-id=730EFE
[Thr 140532590151424] INTERNAL T22_U18564_M0, 000, SAPSYS, ,
time=15:55:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 15:55:28:970 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000127ba} {root-id=730EFE
[Thr 140532586981120] INTERNAL T22_U18564_M0, 000, SAPSYS, ,
time=15:55:28, W14, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 16:00:26:476 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000127de} {root-id=730EFE
[Thr 140532586452736] INTERNAL T33_U18718_M0, 000, SAPSYS, ,
time=16:00:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 16:06:31:594 2024
[Thr 140532586981120] *** ERROR => IcmReadFromPartner(id=2/337926): No data from
server received, role: Server, (rc=MPI_EBROKEN: pip
[Thr 140532589094656] Wed Apr 10 16:06:36:477 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00022807} {root-id=730EFE
[Thr 140532589094656] INTERNAL T0_U18878_M0, 000, SAPSYS, ,
time=16:05:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 16:06:38:346 2024
[Thr 140532587509504] *** ERROR => IcmReadFromPartner(id=6/337923): No data from
server received, role: Server, (rc=MPI_EBROKEN: pip
[Thr 140532587509504] *** ERROR => IcmCreateDpRequest: Session does not exist
[icxxthr.c 4773]
[Thr 140532588566272] *** ERROR => IcmReadFromPartner(id=7/337924): No data from
server received, role: Server, (rc=MPI_EBROKEN: pip
[Thr 140532588037888] Wed Apr 10 16:06:38:573 2024
[Thr 140532588037888] *** ERROR => IcmReadFromPartner(id=1/337921): No data from
server received, role: Server, (rc=MPI_EBROKEN: pip
[Thr 140532586981120] Wed Apr 10 16:06:42:271 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0001280d} {root-id=730EFE
[Thr 140532586981120] INTERNAL T0_U18878_M0, 000, SAPSYS, ,
time=16:06:39, W18, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 16:10:26:549 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012829} {root-id=730EFE
[Thr 140532586452736] INTERNAL T33_U19060_M0, 000, SAPSYS, ,
time=16:10:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 16:15:26:518 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052852} {root-id=730EFE
[Thr 140532589623040] INTERNAL T0_U19270_M0, 000, SAPSYS, ,
time=16:15:26, W14, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 16:20:27:562 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092879} {root-id=730EFE
[Thr 140532587509504] INTERNAL T0_U19491_M0, 000, SAPSYS, ,
time=16:20:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 16:20:27:950 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009287b} {root-id=730EFE
[Thr 140532590151424] INTERNAL T0_U19491_M0, 000, SAPSYS, ,
time=16:20:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 16:25:28:534 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000028a7} {root-id=730EFE
[Thr 140532585924352] INTERNAL T14_U19757_M0, 000, SAPSYS, ,
time=16:25:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 16:30:27:551 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000928ca} {root-id=730EFE
[Thr 140532586981120] INTERNAL T38_U19972_M0, 000, SAPSYS, ,
time=16:30:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 16:30:33:920 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000928ce} {root-id=730EFE
[Thr 140532587509504] INTERNAL T38_U19972_M0, 000, SAPSYS, ,
time=16:30:33, W17, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 16:35:27:364 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000928f2} {root-id=730EFE
[Thr 140532589094656] INTERNAL T39_U20230_M0, 000, SAPSYS, ,
time=16:35:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 16:40:27:445 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092915} {root-id=730EFE
[Thr 140532588566272] INTERNAL T12_U20490_M0, 000, SAPSYS, ,
time=16:40:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 16:40:32:580 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092919} {root-id=730EFE
[Thr 140532589094656] INTERNAL T12_U20490_M0, 000, SAPSYS, ,
time=16:40:32, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 16:45:27:872 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0002293e} {root-id=730EFE
[Thr 140532586452736] INTERNAL T22_U20820_M0, 000, SAPSYS, ,
time=16:45:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 16:50:27:471 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092961} {root-id=730EFE
[Thr 140532590151424] INTERNAL T15_U21189_M0, 000, SAPSYS, ,
time=16:50:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 16:50:33:753 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092965} {root-id=730EFE
[Thr 140532585924352] INTERNAL T15_U21189_M0, 000, SAPSYS, ,
time=16:50:33, W16, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 16:55:27:655 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092989} {root-id=730EFE
[Thr 140532589623040] INTERNAL T9_U21584_M0, 000, SAPSYS, ,
time=16:55:26, W15, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 17:00:29:843 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000929ac} {root-id=730EFE
[Thr 140532590679808] INTERNAL T36_U21770_M0, 000, SAPSYS, ,
time=17:00:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 17:00:36:493 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000929b0} {root-id=730EFE
[Thr 140532589623040] INTERNAL T36_U21770_M0, 000, SAPSYS, ,
time=17:00:36, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 17:05:27:819 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000929d4} {root-id=730EFE
[Thr 140532589094656] INTERNAL T10_U21990_M0, 000, SAPSYS, ,
time=17:05:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 17:10:27:661 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000929f7} {root-id=730EFE
[Thr 140532585924352] INTERNAL T28_U22256_M0, 000, SAPSYS, ,
time=17:10:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 17:10:33:583 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000929fb} {root-id=730EFE
[Thr 140532589094656] INTERNAL T28_U22256_M0, 000, SAPSYS, ,
time=17:10:33, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 17:15:27:708 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092a1f} {root-id=730EFE
[Thr 140532588566272] INTERNAL T27_U22528_M0, 000, SAPSYS, ,
time=17:15:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 17:20:27:630 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092a45} {root-id=730EFE
[Thr 140532588566272] INTERNAL T12_U22771_M0, 000, SAPSYS, ,
time=17:20:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 17:20:33:619 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092a4a} {root-id=730EFE
[Thr 140532590151424] INTERNAL T12_U22771_M0, 000, SAPSYS, ,
time=17:20:33, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 17:25:27:502 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052a70} {root-id=730EFE
[Thr 140532585924352] INTERNAL T21_U23011_M0, 000, SAPSYS, ,
time=17:25:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 17:30:27:775 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00062a9c} {root-id=730EFE
[Thr 140532590151424] INTERNAL T36_U23200_M0, 000, SAPSYS, ,
time=17:30:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 17:30:34:088 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00062aa1} {root-id=730EFE
[Thr 140532586981120] INTERNAL T36_U23200_M0, 000, SAPSYS, ,
time=17:30:33, W12, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 17:35:29:064 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092ac5} {root-id=730EFE
[Thr 140532589623040] INTERNAL T37_U23410_M0, 000, SAPSYS, ,
time=17:35:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 17:40:27:661 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092ae7} {root-id=730EFE
[Thr 140532585924352] INTERNAL T18_U23645_M0, 000, SAPSYS, ,
time=17:40:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 17:40:33:044 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092aec} {root-id=730EFE
[Thr 140532589623040] INTERNAL T18_U23645_M0, 000, SAPSYS, ,
time=17:40:32, W16, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 17:45:27:821 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052b11} {root-id=730EFE
[Thr 140532589623040] INTERNAL T35_U23912_M0, 000, SAPSYS, ,
time=17:45:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 17:46:00:897 2024
[Thr 140532589094656] SSL_get_state()==0x1180 "TLS read client certificate A"
[Thr 140532589094656] *** ERROR in secussl_read: SSL_read() lasterr 0x20001046
[Thr 140532589094656] => "received a fatal TLS certificate unknown alert message
from the peer"
[Thr 140532589094656] srv SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLS.pse"
(load=Fri Apr 5 11:51:37 2024, rcnt=10)
[Thr 140532589094656] Subject : CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532589094656] Issuer : CN=SubordinateCA-Production, DC=corp, DC=ads,
DC=swissport, DC=aero
[Thr 140532589094656] SerialNo:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532589094656] Validity - NotBefore: Tue Mar 26 11:09:13 2024
(240326100913Z)
[Thr 140532589094656] NotAfter: Thu Mar 26 11:09:13 2026
(260326100913Z)
[Thr 140532589094656] SSL_CTX ciphersuites=135:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532589094656] Server SSL_CTX 7fd00c089d00 pvflags=897
(TLSv1.2,TLSv1.1,TLSv1.0,BC)
[Thr 140532589094656] TLSextSNI server_name="vq20app.sap.swissport.aero"
[Thr 140532589094656] (754_STACK patchno 200,linuxx86_64_gcc43) CommonCryptoLib
8.5.50 (/usr/sap/Q20/D02/exe/libsapcrypto.so)
[Thr 140532589094656] secussl_read: SSL_read() failed (536875078/0x20001046)
[Thr 140532589094656] => "received a fatal TLS certificate unknown alert message
from the peer"
[Thr 140532589094656] SSL NI-hdl 148: local=10.200.50.133:8443
peer=10.75.16.232:59175
[Thr 140532589094656] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd01c0454e0)==SSSLERR_ALERT_CERTIFICATE_UNKNOWN
[Thr 140532589094656] *** ERROR => IcmConnInitServerSSL: SapSSLSessionStartNB
returned (-127): SSSLERR_ALERT_CERTIFICATE_UNKNOWN [ic
[Thr 140532590151424] Wed Apr 10 17:50:27:690 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092b37} {root-id=730EFE
[Thr 140532590151424] INTERNAL T11_U24215_M0, 000, SAPSYS, ,
time=17:50:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 17:50:33:588 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092b3c} {root-id=730EFE
[Thr 140532588037888] INTERNAL T11_U24215_M0, 000, SAPSYS, ,
time=17:50:32, W16, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 17:53:37:655 2024
[Thr 140532589623040] *** ERROR => NULL bytes in HTTP request {00022b55}
[http_plg.c 6916]
[Thr 140532589623040] role: Server, protocol: HTTP, local:
10.200.50.133:8002, peer: 10.9.168.118:61993
[Thr 140532589623040] *** WARNING => HttpParseRequestHeader: Hint: NULL bytes in
HTTP request are often caused by HTTPS traffic arri
[Thr 140532589623040] *** ERROR => HttpPlugInHandleNetData: HttpParseRequestHeader
failed (rc=701) [http_plg.c 2525]
[Thr 140532585924352] *** ERROR => NULL bytes in HTTP request {00022b57}
[http_plg.c 6916]
[Thr 140532585924352] role: Server, protocol: HTTP, local:
10.200.50.133:8002, peer: 10.9.168.118:61996
[Thr 140532585924352] *** WARNING => HttpParseRequestHeader: Hint: NULL bytes in
HTTP request are often caused by HTTPS traffic arri
[Thr 140532585924352] *** ERROR => HttpPlugInHandleNetData: HttpParseRequestHeader
failed (rc=701) [http_plg.c 2525]
[Thr 140532589094656] Wed Apr 10 17:53:45:176 2024
[Thr 140532589094656] *** ERROR => NULL bytes in HTTP request {00022b5a}
[http_plg.c 6916]
[Thr 140532589094656] role: Server, protocol: HTTP, local:
10.200.50.133:8002, peer: 10.9.168.118:62005
[Thr 140532589094656] *** WARNING => HttpParseRequestHeader: Hint: NULL bytes in
HTTP request are often caused by HTTPS traffic arri
[Thr 140532589094656] *** ERROR => HttpPlugInHandleNetData: HttpParseRequestHeader
failed (rc=701) [http_plg.c 2525]
[Thr 140532588566272] *** ERROR => NULL bytes in HTTP request {00022b5b}
[http_plg.c 6916]
[Thr 140532588566272] role: Server, protocol: HTTP, local:
10.200.50.133:8002, peer: 10.9.168.118:62006
[Thr 140532588566272] *** WARNING => HttpParseRequestHeader: Hint: NULL bytes in
HTTP request are often caused by HTTPS traffic arri
[Thr 140532588566272] *** ERROR => HttpPlugInHandleNetData: HttpParseRequestHeader
failed (rc=701) [http_plg.c 2525]
[Thr 140532588037888] Wed Apr 10 17:55:27:453 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00062b67} {root-id=730EFE
[Thr 140532588037888] INTERNAL T16_U24505_M0, 000, SAPSYS, ,
time=17:55:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 18:00:27:273 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052b8a} {root-id=730EFE
[Thr 140532588037888] INTERNAL T35_U24753_M0, 000, SAPSYS, ,
time=18:00:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 18:00:31:492 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052b8f} {root-id=730EFE
[Thr 140532589094656] INTERNAL T35_U24753_M0, 000, SAPSYS, ,
time=18:00:31, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 18:05:27:679 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092bb2} {root-id=730EFE
[Thr 140532586981120] INTERNAL T38_U25047_M0, 000, SAPSYS, ,
time=18:05:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 18:10:29:393 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092bd5} {root-id=730EFE
[Thr 140532585924352] INTERNAL T31_U25264_M0, 000, SAPSYS, ,
time=18:10:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 18:10:35:347 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092bda} {root-id=730EFE
[Thr 140532586452736] INTERNAL T31_U25264_M0, 000, SAPSYS, ,
time=18:10:34, W18, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 18:15:27:745 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052bff} {root-id=730EFE
[Thr 140532586981120] INTERNAL T2_U25507_M0, 000, SAPSYS, ,
time=18:15:26, W6, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 18:20:27:685 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012c29} {root-id=730EFE
[Thr 140532590151424] INTERNAL T10_U25766_M0, 000, SAPSYS, ,
time=18:20:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 18:20:33:506 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012c2e} {root-id=730EFE
[Thr 140532586981120] INTERNAL T10_U25766_M0, 000, SAPSYS, ,
time=18:20:33, W14, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 18:25:27:896 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052c53} {root-id=730EFE
[Thr 140532589094656] INTERNAL T19_U26023_M0, 000, SAPSYS, ,
time=18:25:26, W9, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 18:30:27:531 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052c7c} {root-id=730EFE
[Thr 140532589094656] INTERNAL T33_U26274_M0, 000, SAPSYS, ,
time=18:30:26, W9, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 18:30:32:982 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00052c81} {root-id=730EFE
[Thr 140532586981120] INTERNAL T33_U26274_M0, 000, SAPSYS, ,
time=18:30:32, W9, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 18:35:27:925 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092ca4} {root-id=730EFE
[Thr 140532590679808] INTERNAL T38_U26558_M0, 000, SAPSYS, ,
time=18:35:26, W9, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 18:40:28:052 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092cc8} {root-id=730EFE
[Thr 140532585924352] INTERNAL T11_U26802_M0, 000, SAPSYS, ,
time=18:40:26, W5, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 18:40:35:162 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092ccd} {root-id=730EFE
[Thr 140532590151424] INTERNAL T11_U26802_M0, 000, SAPSYS, ,
time=18:40:34, W5, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532577003264] Wed Apr 10 18:44:22:837 2024
[Thr 140532577003264] IcmHandleAdmMsg: set param rdisp/TRACE -> 3
[Thr 140532577003264] IcmSetTrcLevel: Switch trace level to: 3
[Thr 140532577003264] *
[Thr 140532577003264] * SWITCH TRC-LEVEL to 3
[Thr 140532577003264] *
[Thr 140532577003264] eppSetTraceLevel: changing trace level to 3
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_ICMAN_OPCODE_RESP request
(rq_id 25530648, slot 422)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530648
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530649)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=66), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530649 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530649
[Thr 140532577003264] -IN-- ca_blk 16 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 16
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530649, slot 423)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530649)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c0d7a20
[Thr 140532577003264] IcmCreateRequest: Append request 354089
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c0d7a20
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530649, slot 423)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 16 with request rq_id
25530649
[Thr 140532577003264] DpCaRelBlk: released ca_blk 16
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532588566272] IcmWorkerHandleRequest: worker 4 got the semaphore
[Thr 140532588566272] Wed Apr 10 18:44:22:841 2024
[Thr 140532588566272] REQUEST:
Type: ADMMSG Index = 354089
[Thr 140532588566272] MPI<75abc>bb#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532588566272] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532588566272] MPI<75abb>bc#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532588566272] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532588566272] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532588566272] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532588566272] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532588566272] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532588566272] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532588566272] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532588566272] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532588566272] MPI<75abc>bb#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532588566272] MPI<75abb>bc#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532588566272] IcmWorkerThread: Thread 4: Waiting for event
[Thr 140532588566272] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530650)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=67), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530650 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530650
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530650, slot 424)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530650)
[Thr 140532577003264] Wed Apr 10 18:44:22:844 2024
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c0e8cf0
[Thr 140532577003264] IcmCreateRequest: Append request 354090
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c0e8cf0
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530650, slot 424)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530650
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585924352] IcmWorkerHandleRequest: worker 9 got the semaphore
[Thr 140532585924352] REQUEST:
Type: ADMMSG Index = 354090
[Thr 140532585924352] MPI<75abe>bb#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532585924352] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532585924352] MPI<75abd>bc#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532585924352] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532585924352] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532585924352] MPI<75abe>bb#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532585924352] MPI<75abd>bc#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532585924352] IcmWorkerThread: Thread 9: Waiting for event
[Thr 140532585924352] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530654)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] Wed Apr 10 18:44:22:846 2024
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=68), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530654 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530654
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530654, slot 425)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530654)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c075e10
[Thr 140532577003264] IcmCreateRequest: Append request 354091
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c075e10
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530654, slot 425)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530654
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589623040] IcmWorkerHandleRequest: worker 2 got the semaphore
[Thr 140532589623040] REQUEST:
Type: ADMMSG Index = 354091
[Thr 140532589623040] MPI<75ac0>bb#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532589623040] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532589623040] MPI<75abf>bc#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532589623040] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532589623040] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532589623040] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532589623040] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532589623040] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532589623040] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532589623040] Wed Apr 10 18:44:22:846 2024
[Thr 140532589623040] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532589623040] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532589623040] MPI<75ac0>bb#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532589623040] MPI<75abf>bc#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532589623040] IcmWorkerThread: Thread 2: Waiting for event
[Thr 140532589623040] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530655)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=69), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530655 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530655
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530655, slot 426)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530655)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c077a20
[Thr 140532577003264] IcmCreateRequest: Append request 354092
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c077a20
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530655, slot 426)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530655
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] Wed Apr 10 18:44:22:847 2024
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532590679808] IcmWorkerHandleRequest: worker 0 got the semaphore
[Thr 140532590679808] REQUEST:
Type: ADMMSG Index = 354092
[Thr 140532590679808] MPI<75ac2>bb#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532590679808] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532590679808] MPI<75ac1>bc#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532590679808] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532590679808] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532590679808] MPI<75ac2>bb#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532590679808] MPI<75ac1>bc#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532590679808] IcmWorkerThread: Thread 0: Waiting for event
[Thr 140532590679808] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Wed Apr 10 18:44:24:427 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530661)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=70), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530661 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530661
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530661, slot 427)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530661)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c075240
[Thr 140532577003264] IcmCreateRequest: Append request 354093
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c075240
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530661, slot 427)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530661
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] Wed Apr 10 18:44:24:439 2024
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532588037888] IcmWorkerHandleRequest: worker 5 got the semaphore
[Thr 140532588037888] REQUEST:
Type: ADMMSG Index = 354093
[Thr 140532588037888] MPI<75ac4>bb#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532588037888] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532588037888] MPI<75ac3>bc#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532588037888] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532588037888] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532588037888] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532588037888] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532588037888] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532588037888] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532588037888] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532588037888] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532588037888] MPI<75ac4>bb#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532588037888] MPI<75ac3>bc#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532588037888] IcmWorkerThread: Thread 5: Waiting for event
[Thr 140532588037888] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530662)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=71), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530662 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530662
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] Wed Apr 10 18:44:24:439 2024
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530662, slot 428)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530662)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c06b130
[Thr 140532577003264] IcmCreateRequest: Append request 354094
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c06b130
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530662, slot 428)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530662
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532586981120] IcmWorkerHandleRequest: worker 7 got the semaphore
[Thr 140532586981120] REQUEST:
Type: ADMMSG Index = 354094
[Thr 140532586981120] MPI<75ac6>bb#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532586981120] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532586981120] MPI<75ac5>bc#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532586981120] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532586981120] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586981120] MPI<75ac6>bb#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532586981120] MPI<75ac5>bc#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532586981120] IcmWorkerThread: Thread 7: Waiting for event
[Thr 140532586981120] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Wed Apr 10 18:44:25:578 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530665)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=72), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530665 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530665
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530665, slot 429)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530665)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c0fdce0
[Thr 140532577003264] IcmCreateRequest: Append request 354095
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c0fdce0
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530665, slot 429)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530665
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532586452736] IcmWorkerHandleRequest: worker 8 got the semaphore
[Thr 140532586452736] REQUEST:
Wed Apr 10 18:44:25:578 2024
Type: ADMMSG Index = 354095
[Thr 140532586452736] MPI<75ac8>bb#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532586452736] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532586452736] MPI<75ac7>bc#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532586452736] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532586452736] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532586452736] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532586452736] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532586452736] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532586452736] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532586452736] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532586452736] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532586452736] MPI<75ac8>bb#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532586452736] MPI<75ac7>bc#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532586452736] IcmWorkerThread: Thread 8: Waiting for event
[Thr 140532586452736] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530666)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=73), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530666 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530666
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530666, slot 430)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530666)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] Wed Apr 10 18:44:25:579 2024
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c0fdce0
[Thr 140532577003264] IcmCreateRequest: Append request 354096
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c0fdce0
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530666, slot 430)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530666
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532590151424] IcmWorkerHandleRequest: worker 1 got the semaphore
[Thr 140532590151424] REQUEST:
Type: ADMMSG Index = 354096
[Thr 140532590151424] MPI<75aca>bb#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532590151424] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532590151424] MPI<75ac9>bc#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532590151424] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532590151424] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532590151424] MPI<75aca>bb#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532590151424] MPI<75ac9>bc#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532590151424] IcmWorkerThread: Thread 1: Waiting for event
[Thr 140532590151424] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Wed Apr 10 18:44:26:668 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530674)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=74), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530674 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530674
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530674, slot 431)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530674)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c06b130
[Thr 140532577003264] IcmCreateRequest: Append request 354097
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c06b130
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530674, slot 431)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530674
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2295710 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] Wed Apr 10 18:44:26:668 2024
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532587509504] IcmWorkerHandleRequest: worker 6 got the semaphore
[Thr 140532587509504] REQUEST:
Type: ADMMSG Index = 354097
[Thr 140532587509504] MPI<75acc>bb#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532587509504] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532587509504] MPI<75acb>bc#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532587509504] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532587509504] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532587509504] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532587509504] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532587509504] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532587509504] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532587509504] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532587509504] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532587509504] MPI<75acc>bb#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532587509504] MPI<75acb>bc#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532587509504] IcmWorkerThread: Thread 6: Waiting for event
[Thr 140532587509504] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532585395968] MPI<2>0#2295711 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2295712 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2295713: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2295713 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] Wed Apr 10 18:44:26:669 2024
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530675)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=75), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530675 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530675
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530675, slot 432)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530675)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c075240
[Thr 140532577003264] IcmCreateRequest: Append request 354098
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c075240
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530675, slot 432)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530675
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589094656] IcmWorkerHandleRequest: worker 3 got the semaphore
[Thr 140532589094656] REQUEST:
Type: ADMMSG Index = 354098
[Thr 140532589094656] MPI<75ace>bb#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532589094656] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532589094656] MPI<75acd>bc#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532589094656] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532589094656] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532589094656] MPI<75ace>bb#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532589094656] MPI<75acd>bc#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532589094656] Wed Apr 10 18:44:26:669 2024
[Thr 140532589094656] IcmWorkerThread: Thread 3: Waiting for event
[Thr 140532589094656] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Wed Apr 10 18:44:27:417 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530678)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=76), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530678 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530678
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530678, slot 433)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530678)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c077a20
[Thr 140532577003264] IcmCreateRequest: Append request 354099
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c077a20
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530678, slot 433)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530678
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532588566272] IcmWorkerHandleRequest: worker 4 got the semaphore
[Thr 140532588566272] REQUEST:
Wed Apr 10 18:44:27:417 2024
Type: ADMMSG Index = 354099
[Thr 140532588566272] MPI<75ad0>bb#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532588566272] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532588566272] MPI<75acf>bc#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532588566272] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532588566272] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532588566272] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532588566272] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532588566272] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532588566272] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532588566272] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532588566272] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532588566272] MPI<75ad0>bb#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532588566272] MPI<75acf>bc#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532588566272] IcmWorkerThread: Thread 4: Waiting for event
[Thr 140532588566272] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530679)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=77), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530679 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530679
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530679, slot 434)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530679)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] Wed Apr 10 18:44:27:418 2024
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c075e10
[Thr 140532577003264] IcmCreateRequest: Append request 354100
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c075e10
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530679, slot 434)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530679
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585924352] IcmWorkerHandleRequest: worker 9 got the semaphore
[Thr 140532585924352] REQUEST:
Type: ADMMSG Index = 354100
[Thr 140532585924352] MPI<75ad2>bb#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532585924352] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532585924352] MPI<75ad1>bc#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532585924352] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532585924352] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532585924352] MPI<75ad2>bb#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532585924352] MPI<75ad1>bc#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532585924352] IcmWorkerThread: Thread 9: Waiting for event
[Thr 140532585924352] DpRqFreePendingRequests: freed 0 pending request
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 181 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 181/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] Wed Apr 10 18:44:27:437 2024
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 181 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 181 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 181 from 10.200.51.221:24340
[Thr 140533415016064] NiIAccept: hdl 181 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 1/339178/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.221 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 354101
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532589623040] IcmWorkerHandleRequest: worker 2 got the semaphore
[Thr 140532589623040] REQ TRACE BEGIN: 1/339178/1
[Thr 140532589623040] REQUEST:
Type: ACCEPT_CONNECTION Index = 354101
[Thr 140532589623040] CONNECTION (id=1/339178):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 181, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.221:24340 ()
status: NOP
connect time: 10.04.2024 18:44:27
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532589623040] MPI 188: event flag already open:7641 key=16641
[Thr 140532589623040] MPI 188: event flag already open:7640 key=16640
[Thr 140532589623040] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532589623040] MPI<75ad3>bc#1 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532589623040] MPI<75ad3>bc#2 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532589623040] MPI 187: event flag already open:7643 key=16643
[Thr 140532589623040] MPI 187: event flag already open:7642 key=16642
[Thr 140532589623040] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532589623040] MPI<75ad4>bb#1 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532589623040] MPI<75ad4>bb#2 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532589623040] ->> SapSSLSessionInit(&sssl_hdl=7fd04f9671d0, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532589623040] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532589623040] Wed Apr 10 18:44:27:439 2024
[Thr 140532589623040] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532589623040] out: sssl_hdl = 7fd040061e40
[Thr 140532589623040] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd040061e40,
cred_hdl=7fd00c064270)
[Thr 140532589623040] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532589623040] ->> SapSSLSetNiHdl(sssl_hdl=7fd040061e40, ni_hdl=181)
[Thr 140532589623040] SSL NI-hdl 181: local=10.200.50.133:8443
peer=10.200.51.221:24340
[Thr 140532589623040] <<- SapSSLSetNiHdl(sssl_hdl=7fd040061e40,
ni_hdl=181)==SAP_O_K
[Thr 140532589623040] ->> SapSSLSessionStartNB(sssl_hdl=7fd040061e40, flags=0x0000,
timeout=500, &IOstat=7fd04f9671dc)
[Thr 140532589623040] NiIBlockMode: leave blockmode for hdl 181 FALSE
[Thr 140532589623040] NiIHdlGetStatus: hdl 181/sock 29 ok, data pending (len=1)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532589623040] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532589623040] ClientHello session_id="5D2DEED1 4377CF2E 850BA87A
AB78C8BD B5DEFBC5 7A0E51C5 5DCF9963 3968B799"
[Thr 140532589623040] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532589623040] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532589623040] TLS_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_AES_256_GCM_SHA384
[Thr 140532589623040] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532589623040] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532589623040] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532589623040] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532589623040] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532589623040] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532589623040] [ssl_bytes_to_cipher_suites]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Received TLS Extensions:
[Thr 140532589623040] Id: 43 - supported_versions [RFC8446]
[Thr 140532589623040] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532589623040] Id: 51 - key_share [RFC8446]
[Thr 140532589623040] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532589623040] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532589623040] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532589623040] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532589623040] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532589623040] [ssl_parse_clienthello_tlsext]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Own TLS certificate:
[Thr 140532589623040] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532589623040] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532589623040] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532589623040] [ssl3_output_cert_chain]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: CA certificate:
[Thr 140532589623040] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532589623040] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532589623040] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532589623040] [ssl3_output_cert_chain]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Offering 2 certificate type(s) for
client authentication:
[Thr 140532589623040] rsa_sign(1)
[Thr 140532589623040] ecdsa_sign(64)
[Thr 140532589623040] [ssl3_get_req_cert_type]
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532589623040] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532589623040] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532589623040] [ssl_get_encoded_trusted_ca_list]
[Thr 140532589623040] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532589623040] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532589623040] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532589623040] <-- SSL:SiPoll(sock=29, evt=R, slept = 4 ms) Ready
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] Wed Apr 10 18:44:27:451 2024
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Received message of type
"Certificate" containing no certificates.
[Thr 140532589623040] Renouncing client authentication: verification mode: 1
[Thr 140532589623040] [ssl3_decode_client_certificate]
[Thr 140532589623040] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532589623040] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532589623040] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532589623040] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532589623040] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532589623040] No Client Certificate
[Thr 140532589623040] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532589623040] (failed resume) new TLS session_id="CD3033C5 93E35F48
F54C96C2 14CA4B99 540C485A 1C21DE94 E2570C88 1AA81BBA
[Thr 140532589623040] SapSSLISessionStartFin(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532589623040] <<- SapSSLSessionStartNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532589623040] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd040061e40, &plen=(nil),
&more=(nil), &ios=7fd04b156c38)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] IcmReadFromConn(id=1/339178): request new MPI (0/0)
[Thr 140532589623040] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532589623040] MPI<75ad3>bc#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532589623040] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532589623040] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd040061e40,
&plen=7fd04b156b18, &more=7fd04b156b17, &ios=7fd04b156b1c)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] NiIPeek: peek successful for hdl 181 (r)
[Thr 140532589623040] ->> SapSSLReadNB(sssl_hdl=7fd040061e40, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=6920, max=6928)
[Thr 140532589623040] SSL:SSL_read(reclen= 6936) data, out= 6907
[Thr 140532589623040] <<- SapSSLReadNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "fl=0x00, max=65455, got=6907, more=N,
io=idle"
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd040061e40,
&plen=7fd04b156b18, &more=7fd04b156b17, &ios=7fd04b156b1c)
[Thr 140532589623040] Wed Apr 10 18:44:27:454 2024
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] NiIPeek: peek for hdl 181 timed out (r; 0ms)
[Thr 140532589623040] IcmReadFromConn(id=1/339178): no SSL data available
[Thr 140532589623040] IcmReadFromConn(id=1/339178): read 6907 bytes, 1 readops
(timeout 0)
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] HttpPlugInHandleNetData(rqid=1/339178/1): role: Server(1),
status: 1
[Thr 140532589623040] content-length: 0/0, buf_len: 6907, buf_offset: 0,
buf_status: 0
[Thr 140532589623040] ICT: IctIHttpOpenMessage: 7fd04005dda0 typ=1
[Thr 140532589623040] IctCheckIfValidHostname: Check [api-staging.swissport-
services.com] len 34
[Thr 140532589623040] HttpParseRequestHeader: content length: 6329
[Thr 140532589623040] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532589623040] HttpParseRequestHeader: Version: 1001
[Thr 140532589623040] HttpParseRequestHeader: no server port set
[Thr 140532589623040] HttpParseRequestHeader: Keep-Alive: 1
[Thr 140532589623040] ->> SapSSLGetPeerInfo(sssl_hdl=7fd040061e40,
&cert=7fd04b1566f0, &cert_len=7fd04b1566ec,
[Thr 140532589623040] &subject_dn=7fd04b1566f8, &issuer_dn=7fd04b156700,
&csuite_name=7fd04b156708)
[Thr 140532589623040] <<- SapSSLGetPeerInfo(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] out: cert_len = <no cert>
[Thr 140532589623040] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532589623040] HTTP request (raw) [1/339178/1]:
[Thr 140532589623040] POST
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_inv_ws/800/
zmm_i_inv_ws/inv_aws HTT
[Thr 140532589623040] x-forwarded-for: 52.63.148.205
[Thr 140532589623040] x-forwarded-proto: https
[Thr 140532589623040] x-forwarded-port: 443
[Thr 140532589623040] host: api-staging.swissport-services.com
[Thr 140532589623040] x-amzn-trace-id: Root=1-6616c1eb-53805ce0026e5f182bf65dc4
[Thr 140532589623040] content-length: 6329
[Thr 140532589623040] soapaction: urn:sap-
com:document:sap:rfc:functions:ZMM_I_INVOICE_WS:ZMM_I_INVOICE_WSRequest
[Thr 140532589623040] authorization: XXX
[Thr 140532589623040] content-type: text/xml; charset=UTF-8
[Thr 140532589623040] cookie: sap-usercontext=sap-client=800;
[Thr 140532589623040] accept: */*
[Thr 140532589623040] user-agent: AHC/2.1
[Thr 140532589623040] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532589623040] ->> SapSSLGetPeerInfo(sssl_hdl=7fd040061e40,
&cert=7fd04b155638, &cert_len=7fd04b155634,
[Thr 140532589623040] &subject_dn=7fd04b155640, &issuer_dn=7fd04b155648,
&csuite_name=7fd04b1556c8)
[Thr 140532589623040] <<- SapSSLGetPeerInfo(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] out: cert_len = <no cert>
[Thr 140532589623040] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532589623040] HttpCheckUserAgent: Function call IcmRegExec(expr=AHC/2.1)
failed with rc=1
[Thr 140532589623040] sap-cancel-on-close not found
[Thr 140532589623040] DpPlgGetVirtHost: search virt host for 2/api-
staging.swissport-services.com/8443
[Thr 140532589623040] Wed Apr 10 18:44:27:455 2024
[Thr 140532589623040] DpPlgGetVirtHost: no server defined, use default
[Thr 140532589623040] HttpGetVirtHost: use virt_host_idx 0 for api-
staging.swissport-services.com:8443
[Thr 140532589623040] HttpSrvHdlRequest: method: 2; path:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_inv_ws
[Thr 140532589623040] Handler 0: HttpAuthHandler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_in
[Thr 140532589623040] Handler 1: HttpModHandler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_inv
[Thr 140532589623040] Handler 2: HttpCacheHandler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_i
[Thr 140532589623040] Handler 6: HttpSAPR3Handler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_i
[Thr 140532589623040] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532589623040] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532589623040] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532589623040] >> start >>
CsiExecute(7fd02401e940,7fd04b150a20,99,1,7fd04b150a10,7fd04b1509f4,0)
[Thr 140532589623040] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532589623040] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532589623040] << end << CsiExecute(CSI_RC==OK)
[Thr 140532589623040] >> start >> CsiFreeInstance((nil))
[Thr 140532589623040] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532589623040] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532589623040] HttpModHandler: process 1, header_len 578
[Thr 140532589623040] ->> SapSSLGetPeerInfo(sssl_hdl=7fd040061e40,
&cert=7fd04b1518a0, &cert_len=7fd04b151580,
[Thr 140532589623040] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532589623040] <<- SapSSLGetPeerInfo(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] out: cert_len = <no cert>
[Thr 140532589623040] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532589623040] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532589623040] HttpModHandler: perform the actions: (128)
[Thr 140532589623040] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532589623040] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532589623040] HttpCacheHandler: TASK_REQUEST 578 7fd024001ae0 (nil)
[Thr 140532589623040] ISC: uncacheable request method 2
[Thr 140532589623040] HttpCacheHandler: cache miss.
[Thr 140532589623040] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532589623040] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532589623040] ICT: IctLookupPathTable() -> 0
[Thr 140532589623040] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532589623040] DTRACE(1/339178/1): {root-
id=730EFE781C731EEEBDEB3309ED4C5805}_{conn-id=730EFE781C731EEEBDEB3309ED4C7805}_1
[Thr 140532589623040] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532589623040] IcmPlFlushBuf: Flushing 6907 Bytes, buf_status: 6
[Thr 140532589623040] Wed Apr 10 18:44:27:456 2024
[Thr 140532589623040] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532589623040] flush buffer with mpi buffer id 7
[Thr 140532589623040] MPI<75ad3>bc#4 FlushOutbuf 7 1 0 255cb0 6987 6 ->
7fd050314cb0 MPI_OK
[Thr 140532589623040] IcmPlFlushBuf: roll in workprocess
[Thr 140532589623040] IcmConnRollInWP: roll in work process
[Thr 140532589623040] IcmCreateDpRequest: Send request to AppServer
[Thr 140532589623040] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532589623040] DpResourcesOk: ca blocks: act/max/usage = 15/6000/0.250000 %
[Thr 140532589623040] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532589623040] DpResourcesOk: logons: act/max/usage = 23/1200/1.916667 %
[Thr 140532589623040] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532589623040] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532589623040] DpResourcesOk: ES: act/max/usage = 2760 MB/10992 MB/25.109171
%
[Thr 140532589623040] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532589623040] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532589623040] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532589623040] DpListRemove: remove elem 22 from tmadm_free_list
[Thr 140532589623040] DpListRemove: 1176 elems in tmadm_free_list
[Thr 140532589623040] DpListInsert: insert elem 22 into tmadm_inuse_list (at begin)
[Thr 140532589623040] DpListInsert: 24 elems in tmadm_inuse_list
[Thr 140532589623040] DpGetFreeUid: new UID: 26998
[Thr 140532589623040] DpSesLockSessionEntry: lock T22_U26998_M0
[Thr 140532589623040] DpSesUnlockSessionEntry: unlocked invalid T22_M0
[Thr 140532589623040] DpInitInternalSession: initialized T22_M0_I0
[Thr 140532589623040] RqQQueueDestroy: Destroy queue <T22_U26997_M0> in slot 71
(51207)
[Thr 140532589623040] RqQQueueDestroy: locked session queue mutex for high priority
[Thr 140532589623040] RqQQueueSlotClear: clear slot 71
[Thr 140532589623040] RqQUnlockSessionQueue: unlocked session queue mutex for high
priority
[Thr 140532589623040] DpITmSlotClear: cleared T22_U26998
[Thr 140532589623040] DpTmSlotAllocate: allocated T22_U26998
[Thr 140532589623040] RqQQueueCreate: Created queue <T22_U26998_M0> in slot 71
(51209) with normal priority
[Thr 140532589623040] DpLogonInit: new logon T22_U26998, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532589623040] IcmSendRq: created T22_U26998_M0
[Thr 140532589623040] DpSesGetWorkerType: return workerType DIA for T22_U26998
[Thr 140532589623040] DpRqSlotAllocate: 1 pending requests
[Thr 140532589623040] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
25530682, slot 435)
[Thr 140532589623040] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 25530682) from
ICMAN to local WORKER
[Thr 140532589623040] rq_id 25530682
[Thr 140532589623040] -OUT- ca_blk -1 len 0
[Thr 140532589623040] -OUT- userTrace 3
[Thr 140532589623040] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532589623040] -OUT- mpi rq <75ad3> mpi resp <75ad4> prot
2
[Thr 140532589623040] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532589623040] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532589623040] -OUT- dtrace {root-
id=730EFE781C731EEEBDEB3309ED4C5805}_{conn-id=730EFE781C731EEEBDEB3309ED4C7805}_1
[Thr 140532589623040] -OUT- sender address:
[Thr 140532589623040] -OUT- type LOCAL
[Thr 140532589623040] -OUT- agentType ICMAN
[Thr 140532589623040] -OUT- receiver address:
[Thr 140532589623040] -OUT- type LOCAL
[Thr 140532589623040] -OUT- agentType WORKER workerTyp DIA
[Thr 140532589623040] -OUT- session T22_U26998_M0
[Thr 140532589623040] RqQAddRequest: Add request rq_id 25530682 (DIA) to queue
<T22_U26998_M0> in slot 71 at the end
[Thr 140532589623040] Dump of queue <T22_U26998_M0> in slot 71 (1 requests,
port=0):
[Thr 140532589623040] Wed Apr 10 18:44:27:456 2024
[Thr 140532589623040] -1 <- 88 (rq_id 25530682, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532589623040] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532589623040] RqQQueueAddToSessionQueue: Added queue <T22_U26998_M0> in
slot 71 to normal priority session queue at the end
[Thr 140532589623040] Session queue dump (normal priority, 1 elements, peak 2):
[Thr 140532589623040] -1 <- 71 < T22_U26998_M0> -> -1
[Thr 140532589623040] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532589623040] RqQNotifySessionQueue: notify normal priority session queue
of queue <T22_U26998_M0> (DIA) (id=79)
[Thr 140532589623040] Info of W15 (inside function RqQNotifyWorker (end))
[Thr 140532589623040] noOfPendingQueues=>W15-0<
[Thr 140532589623040] noOfWaitForQueues=>W15-2<
[Thr 140532589623040] wait for queue 81 (T29_U26820_M0)
[Thr 140532589623040] wait for queue 20 (W15)
[Thr 140532589623040] lowestPriority: normal priority
[Thr 140532589623040] modCounter=>W15-4043107<
[Thr 140532589623040] RqQNotifyWorker: notify W15 about dispatch queues
(modCounter=>W15-4043107<)
[Thr 140532589623040] RqQSetWorkerState: W15 has state RUNNING (modCounter=>W15-
4043107<)
[Thr 140532589623040] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532589623040] RqQQueueGetNumberOfRequests: Queue <T22_U26998_M0> in slot 71
contains 0 requests of type DIA
[Thr 140532589623040] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 25530682), queue has 0 requests
[Thr 140532589623040] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 25530682,
slot 435)
[Thr 140532589623040] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532589623040] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532589623040] IcmHandleNetRead(id=1/339178): read_len: 6907, HandleNetData
returned: 4
[Thr 140532589623040] IcmHandleNetRead(id=1/339178): status 1 -> 4
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd040061e40,
&plen=7fd04b156c58, &more=7fd04b156c33, &ios=7fd04b156c38)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] IcmReadFromPartner(id=1/339178): read with maximum timeout
500
[Thr 140532589623040] IcmMpiWatchInsert: MPI watch entry <75ad4>, number 11
inserted.
[Thr 140532589623040] MPI<75ad4>bb#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532577003264] Wed Apr 10 18:44:28:246 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530690)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=78), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530690 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530690
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530690, slot 436)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530690)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c0e8cf0
[Thr 140532577003264] IcmCreateRequest: Append request 354102
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c0e8cf0
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530690, slot 436)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530690
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532590679808] IcmWorkerHandleRequest: worker 0 got the semaphore
[Thr 140532590679808] REQUEST:
Wed Apr 10 18:44:28:246 2024
Type: ADMMSG Index = 354102
[Thr 140532590679808] MPI<75ad6>b8#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532590679808] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_GET_PARAMS (122)
[Thr 140532590679808] MPI<75ad5>b0#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532590679808] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532590679808] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532590679808] ICM_GET_NET_STRING_OFF: 7fd050314d38, len: 34, align: 8
[Thr 140532590679808] ICM_GET_NET_STRING_OFF 1: 7fd050314d82
[Thr 140532590679808] ICM_GET_NET_STRING_OFF 2: 7fd050314d88
[Thr 140532590679808] ICM_SET_NET_STRING_OFF: 7fd050525470, len: 457, align: 8
[Thr 140532590679808] ICM_SET_NET_STRING_OFF 1: 7fd050525808
[Thr 140532590679808] ICM_SET_NET_STRING_OFF 2: 7fd050525808
[Thr 140532590679808] MPI<75ad6>b8#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532590679808] MPI<75ad5>b0#5 FlushOutbuf -1 1 1 4663e8 3426 6 ->
7fd0505253e8 MPI_OK
[Thr 140532590679808] IcmWorkerThread: Thread 0: Waiting for event
[Thr 140532590679808] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530691)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=79), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530691 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530691
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 25530691, slot 437)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530691)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] Wed Apr 10 18:44:28:247 2024
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c0d7a20
[Thr 140532577003264] IcmCreateRequest: Append request 354103
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c0d7a20
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
25530691, slot 437)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 15 with request rq_id
25530691
[Thr 140532577003264] DpCaRelBlk: released ca_blk 15
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532588037888] IcmWorkerHandleRequest: worker 5 got the semaphore
[Thr 140532588037888] REQUEST:
Type: ADMMSG Index = 354103
[Thr 140532588037888] MPI<75ad8>b8#5 GetInbuf -1 4663e8 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532588037888] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532588037888] MPI<75ad7>b0#4 GetOutbuf 80000 255cb0 65536 (0) ->
7fd050314cd0 44564480 MPI_OK
[Thr 140532588037888] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532588037888] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532588037888] MPI<75ad8>b8#6 FreeInbuf#2 0 4663e8 0 -> MPI_OK
[Thr 140532588037888] MPI<75ad7>b0#5 FlushOutbuf -1 1 1 255cb0 10444 6 ->
7fd050314cb0 MPI_OK
[Thr 140532588037888] IcmWorkerThread: Thread 5: Waiting for event
[Thr 140532588037888] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532589623040] Wed Apr 10 18:44:29:192 2024
[Thr 140532589623040] MPI<75ad4>bb#6 GetInbuf -1 255cb0 755 (1) -> MPI_EOS: End Of
Stream
[Thr 140532589623040] IcmMpiWatchRemove: MPI watch entry <75ad4>, number 11 removed
(wakeup was not sent).
[Thr 140532589623040] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] PlugInHandleServData(rqid=1/339178/1): role: Server(1),
status: 3
[Thr 140532589623040] content-length: 0/-1, buf_len: 675, buf_offset: 0,
buf_status: 6
[Thr 140532589623040] ICT: IctIHttpOpenMessage: 7fd04007e8d0 typ=2
[Thr 140532589623040] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532589623040] HttpParseResponseHeader: Version: 1001
[Thr 140532589623040] HttpParseResponseHeader: Keep-Alive: 0
[Thr 140532589623040] HTTP response (raw) [1/339178/1]:
[Thr 140532589623040] HTTP/1.1 500 Invalid WSDL access, no SOAP request expected
[Thr 140532589623040] content-type: text/xml
[Thr 140532589623040] content-length: 482
[Thr 140532589623040] sap-icm-log-uname: SWPS_ZYC
[Thr 140532589623040] sap-icm-log-mandt: 800
[Thr 140532589623040] sap-perf-fesrec: 1693644.000000
[Thr 140532589623040] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532589623040] DTRACE(1/339178/1): {root-
id=730EFE781C731EEEBDEB3309ED4C5805}_{conn-id=730EFE781C731EEEBDEB3309ED4C7805}_1
[Thr 140532589623040] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532589623040] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532589623040] HttpSAPR3Handler: Response from AppServer
[Thr 140532589623040] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589623040] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532589623040] HttpCacheHandler: TASK_RESPONSE 193 7fd024001ae0 7fd04007d410
[Thr 140532589623040] ISC: don't cache response (no valid cache key).
[Thr 140532589623040] ICC: don't cache response. scc=0 status=0 len=0 meth=2
[Thr 140532589623040] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589623040] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532589623040] HttpModHandler: process 2, header_len 193
[Thr 140532589623040] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532589623040] HttpModHandler: perform the actions: (128)
[Thr 140532589623040] HttpModSerializeHeaderAndCertificate: serialize new http
header
[Thr 140532589623040] ICT: IctHttpCloseMessage( 7fd04007e8d0 ) -> u=0 rc=0
[Thr 140532589623040] ICT: IctIHttpOpenMessage: 7fd04007e8d0 typ=2
[Thr 140532589623040] Wed Apr 10 18:44:29:192 2024
[Thr 140532589623040] HttpModSerializeHeaderAndCertificate: buffer: 7fd050314d20,
base: 7fd050314cd0, buf_size: 65456, buf_used: 641
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] HTTP response (rewritten) [1/339178/1]:
[Thr 140532589623040] HTTP/1.1 500 Invalid WSDL access, no SOAP request expected
[Thr 140532589623040] content-type: text/xml
[Thr 140532589623040] content-length: 482
[Thr 140532589623040] sap-perf-fesrec: 1693644.000000
[Thr 140532589623040] connection: close
[Thr 140532589623040] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589623040] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532589623040] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532589623040] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpModHandler: process 3, header_len 0
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd04007d410
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532589623040] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532589623040] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532589623040] IcmHandleReadFromPartner(id=1/339178): HandleServData
returned: 702
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] IcmWriteToConn(id=1/339178): prepared to write data to
partner (len = 641, timeout = 2000)
[Thr 140532589623040] ->> SapSSLWriteNB(sssl_hdl=7fd040061e40, buf=7fd050314d20,
len=641, flags=0x0000, timeout=2000, &IOstate=7fd04
[Thr 140532589623040] SSL:SSL_write(len=641) net=670 (out=641 of 641, prev=0)
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=670 of 670)
[Thr 140532589623040] <<- SapSSLWriteNB(sssl_hdl=7fd040061e40)==SAP_O_K
[Thr 140532589623040] in/out: ... = "buf= 7fd050314d20, written= 641 of 641 (all)
io=idle"
[Thr 140532589623040] IcmWriteToConn(id=1/339178): wrote data to partner (len =
641)
[Thr 140532589623040] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532589623040] MPI<75ad4>bb#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532589623040] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532589623040] ICT: IctHttpCloseMessage( 7fd04005dda0 ) -> u=0 rc=0
[Thr 140532589623040] ICT: IctHttpCloseMessage( 7fd04007e8d0 ) -> u=0 rc=0
[Thr 140532589623040] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f9671d0,flags=0x0000,timeout=10000,&IOstate=7fd0
4b1567fc)
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532589623040] Wed Apr 10 18:44:29:192 2024
[Thr 140532589623040] CCL[SSL]: Srv-0002ABD6: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532589623040] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532589623040] in: sssl_hdl = 7fd040061e40
[Thr 140532589623040] in: ... ni_hdl = 181
[Thr 140532589623040] in: flags = 0
[Thr 140532589623040] in: timeout = 10000
[Thr 140532589623040] MPI<75ad3>bc#7 Close( bc ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532589623040] MPI<75ad3>bc#9 Delete( bc ) -> MPI_OK
[Thr 140532589623040] MPI<75ad3>bc#8 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532589623040] MPI<75ad4>bb#8 Close( bb ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532589623040] MPI<75ad4>bb#10 Delete( bb ) -> MPI_OK
[Thr 140532589623040] MPI<75ad4>bb#9 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532589623040] NiIShutdownHandle: shutdown -w of hdl 181
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 88 (rq_id 25530711)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 88
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:47230
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=80), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530711 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530711
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 01000000EA2C0500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
15
[Thr 140532577003264] -IN-- session T22_U26998_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 25530711, slot 438)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530711)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 1/339178
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
25530711, slot 438)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] Wed Apr 10 18:44:29:192 2024
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589623040] SiPeek: hang up occurred in sock 29
[Thr 140532589623040] NiIPeek: peek for hdl 181 failed (r; rc=1)
[Thr 140532589623040] NiIRead: hdl 181 SSLState 0
[Thr 140532589623040] NiIRead: SiRecv failed for hdl 181/sock 29
[Thr 140532589623040] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.221:24340;
L=10.200.50.133:8443)
[Thr 140532589623040] NiICloseHandle: shutdown and close hdl 181/sock 29
[Thr 140532589623040] IcmConnClose: Connection 1/339178 closed
[Thr 140532589623040] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.221 ->
rc=0
[Thr 140532589623040] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532589623040] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
-> 0
[Thr 140532589623040] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=-1 -> 0
[Thr 140532589623040] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532589623040] REQ TRACE END: 1/339178/1
[Thr 140532589623040] IcmWorkerThread: Thread 2: Waiting for event
[Thr 140532589623040] DpRqFreePendingRequests: freed 0 pending request
[Thr 140533415016064] Wed Apr 10 18:44:31:360 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 182 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 182/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 182 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 182 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 182 from 10.200.51.199:24222
[Thr 140533415016064] NiIAccept: hdl 182 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 6
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 1/339179/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.199 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 354104
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532586981120] IcmWorkerHandleRequest: worker 7 got the semaphore
[Thr 140532586981120] REQ TRACE BEGIN: 1/339179/1
[Thr 140532586981120] REQUEST:
Type: ACCEPT_CONNECTION Index = 354104
[Thr 140532586981120] CONNECTION (id=1/339179):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 182, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.199:24222 ()
status: NOP
connect time: 10.04.2024 18:44:31
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532586981120] MPI 187: event flag already open:7643 key=16643
[Thr 140532586981120] Wed Apr 10 18:44:31:360 2024
[Thr 140532586981120] MPI 187: event flag already open:7642 key=16642
[Thr 140532586981120] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532586981120] MPI<75ad9>bb#1 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532586981120] MPI<75ad9>bb#2 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532586981120] MPI 188: event flag already open:7641 key=16641
[Thr 140532586981120] MPI 188: event flag already open:7640 key=16640
[Thr 140532586981120] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532586981120] MPI<75ada>bc#1 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532586981120] MPI<75ada>bc#2 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532586981120] ->> SapSSLSessionInit(&sssl_hdl=7fd04f9671d0, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532586981120] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532586981120] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532586981120] out: sssl_hdl = 7fd014011190
[Thr 140532586981120] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd014011190,
cred_hdl=7fd00c064270)
[Thr 140532586981120] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532586981120] ->> SapSSLSetNiHdl(sssl_hdl=7fd014011190, ni_hdl=182)
[Thr 140532586981120] SSL NI-hdl 182: local=10.200.50.133:8443
peer=10.200.51.199:24222
[Thr 140532586981120] <<- SapSSLSetNiHdl(sssl_hdl=7fd014011190,
ni_hdl=182)==SAP_O_K
[Thr 140532586981120] ->> SapSSLSessionStartNB(sssl_hdl=7fd014011190, flags=0x0000,
timeout=500, &IOstat=7fd04f9671dc)
[Thr 140532586981120] NiIBlockMode: leave blockmode for hdl 182 FALSE
[Thr 140532586981120] NiIHdlGetStatus: hdl 182/sock 29 ok, data pending (len=1)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532586981120] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532586981120] ClientHello session_id="2A5B5881 852452D1 9C193719
3CFA1F9C 8734C8D3 27FC9A00 B743BF76 7413DE90"
[Thr 140532586981120] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532586981120] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532586981120] TLS_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_AES_256_GCM_SHA384
[Thr 140532586981120] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532586981120] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532586981120] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532586981120] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532586981120] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532586981120] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532586981120] [ssl_bytes_to_cipher_suites]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Received TLS Extensions:
[Thr 140532586981120] Id: 43 - supported_versions [RFC8446]
[Thr 140532586981120] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532586981120] Id: 51 - key_share [RFC8446]
[Thr 140532586981120] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532586981120] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532586981120] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532586981120] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532586981120] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532586981120] [ssl_parse_clienthello_tlsext]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Own TLS certificate:
[Thr 140532586981120] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532586981120] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532586981120] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532586981120] [ssl3_output_cert_chain]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: CA certificate:
[Thr 140532586981120] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532586981120] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532586981120] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532586981120] [ssl3_output_cert_chain]
[Thr 140532586981120] Wed Apr 10 18:44:31:361 2024
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Offering 2 certificate type(s) for
client authentication:
[Thr 140532586981120] rsa_sign(1)
[Thr 140532586981120] ecdsa_sign(64)
[Thr 140532586981120] [ssl3_get_req_cert_type]
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532586981120] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532586981120] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532586981120] [ssl_get_encoded_trusted_ca_list]
[Thr 140532586981120] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532586981120] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532586981120] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532586981120] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Received message of type
"Certificate" containing no certificates.
[Thr 140532586981120] Renouncing client authentication: verification mode: 1
[Thr 140532586981120] [ssl3_decode_client_certificate]
[Thr 140532586981120] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532586981120] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532586981120] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532586981120] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532586981120] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532586981120] No Client Certificate
[Thr 140532586981120] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532586981120] (failed resume) new TLS session_id="E42CF9A1 98C458FB
280A8F33 69C149AA 276C1ABE 1EA11E57 1895EF47 295A31D9
[Thr 140532586981120] SapSSLISessionStartFin(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532586981120] <<- SapSSLSessionStartNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532586981120] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014011190, &plen=(nil),
&more=(nil), &ios=7fd04aed1c38)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] IcmReadFromConn(id=1/339179): request new MPI (0/0)
[Thr 140532586981120] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532586981120] MPI<75ad9>bb#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532586981120] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532586981120] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586981120] Wed Apr 10 18:44:31:365 2024
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014011190,
&plen=7fd04aed1b18, &more=7fd04aed1b17, &ios=7fd04aed1b1c)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] NiIPeek: peek successful for hdl 182 (r)
[Thr 140532586981120] ->> SapSSLReadNB(sssl_hdl=7fd014011190, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532586981120] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532586981120] <<- SapSSLReadNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014011190,
&plen=7fd04aed1b18, &more=7fd04aed1b17, &ios=7fd04aed1b1c)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] NiIPeek: peek for hdl 182 timed out (r; 0ms)
[Thr 140532586981120] IcmReadFromConn(id=1/339179): no SSL data available
[Thr 140532586981120] IcmReadFromConn(id=1/339179): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] HttpPlugInHandleNetData(rqid=1/339179/1): role: Server(1),
status: 1
[Thr 140532586981120] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532586981120] ICT: IctIHttpOpenMessage: 7fd014063b80 typ=1
[Thr 140532586981120] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532586981120] HttpParseRequestHeader: no content length set
[Thr 140532586981120] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532586981120] HttpParseRequestHeader: Version: 1001
[Thr 140532586981120] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532586981120] ->> SapSSLGetPeerInfo(sssl_hdl=7fd014011190,
&cert=7fd04aed16f0, &cert_len=7fd04aed16ec,
[Thr 140532586981120] &subject_dn=7fd04aed16f8, &issuer_dn=7fd04aed1700,
&csuite_name=7fd04aed1708)
[Thr 140532586981120] <<- SapSSLGetPeerInfo(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] out: cert_len = <no cert>
[Thr 140532586981120] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586981120] HTTP request (raw) [1/339179/1]:
[Thr 140532586981120] GET /sap/bc/ping HTTP/1.1
[Thr 140532586981120] host: 10.200.50.133:8443
[Thr 140532586981120] connection: close
[Thr 140532586981120] user-agent: ELB-HealthChecker/2.0
[Thr 140532586981120] accept-encoding: gzip, compressed
[Thr 140532586981120] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532586981120] ->> SapSSLGetPeerInfo(sssl_hdl=7fd014011190,
&cert=7fd04aed0638, &cert_len=7fd04aed0634,
[Thr 140532586981120] &subject_dn=7fd04aed0640, &issuer_dn=7fd04aed0648,
&csuite_name=7fd04aed06c8)
[Thr 140532586981120] <<- SapSSLGetPeerInfo(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] out: cert_len = <no cert>
[Thr 140532586981120] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586981120] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532586981120] Wed Apr 10 18:44:31:367 2024
[Thr 140532586981120] sap-cancel-on-close not found
[Thr 140532586981120] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532586981120] DpPlgGetVirtHost: no server defined, use default
[Thr 140532586981120] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532586981120] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532586981120] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532586981120] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532586981120] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532586981120] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532586981120] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532586981120] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532586981120] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532586981120] >> start >>
CsiExecute(7fd02401e940,7fd04aecba20,12,1,7fd04aecba10,7fd04aecb9f4,0)
[Thr 140532586981120] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532586981120] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532586981120] << end << CsiExecute(CSI_RC==OK)
[Thr 140532586981120] >> start >> CsiFreeInstance((nil))
[Thr 140532586981120] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532586981120] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532586981120] HttpModHandler: process 1, header_len 144
[Thr 140532586981120] ->> SapSSLGetPeerInfo(sssl_hdl=7fd014011190,
&cert=7fd04aecc8a0, &cert_len=7fd04aecc580,
[Thr 140532586981120] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532586981120] <<- SapSSLGetPeerInfo(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] out: cert_len = <no cert>
[Thr 140532586981120] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586981120] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586981120] HttpModHandler: perform the actions: (128)
[Thr 140532586981120] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532586981120] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586981120] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532586981120] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532586981120] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532586981120] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532586981120] MTX_LOCK 1760 7fd024005020
[Thr 140532586981120] MTX_UNLOCK 1891 7fd024005020
[Thr 140532586981120] IctCmOpen#350390 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586981120] MTX_LOCK 1760 7fd024004a70
[Thr 140532586981120] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532586981120] Wed Apr 10 18:44:31:367 2024
[Thr 140532586981120] IctCmOpen#450785 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586981120] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532586981120] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532586981120] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532586981120] MTX_LOCK 1760 7fd024005020
[Thr 140532586981120] MTX_UNLOCK 1891 7fd024005020
[Thr 140532586981120] IctCmOpen#350391 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586981120] MTX_LOCK 1760 7fd024004a70
[Thr 140532586981120] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532586981120] IctCmOpen#450786 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586981120] HttpCacheHandler: cache miss.
[Thr 140532586981120] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586981120] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532586981120] ICT: IctLookupPathTable() -> 0
[Thr 140532586981120] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532586981120] DTRACE(1/339179/1): {root-
id=730EFE781C731EEEBDEB33548A20D806}_{conn-id=730EFE781C731EEEBDEB33548A20F806}_1
[Thr 140532586981120] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532586981120] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532586981120] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586981120] flush buffer with mpi buffer id 7
[Thr 140532586981120] MPI<75ad9>bb#4 FlushOutbuf 7 1 0 255cb0 224 6 -> 7fd050314cb0
MPI_OK
[Thr 140532586981120] IcmPlFlushBuf: roll in workprocess
[Thr 140532586981120] IcmConnRollInWP: roll in work process
[Thr 140532586981120] IcmCreateDpRequest: Send request to AppServer
[Thr 140532586981120] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532586981120] DpResourcesOk: ca blocks: act/max/usage = 13/6000/0.216667 %
[Thr 140532586981120] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532586981120] DpResourcesOk: logons: act/max/usage = 21/1200/1.750000 %
[Thr 140532586981120] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532586981120] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532586981120] DpResourcesOk: ES: act/max/usage = 2784 MB/10992 MB/25.327511
%
[Thr 140532586981120] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532586981120] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532586981120] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532586981120] DpListRemove: remove elem 31 from tmadm_free_list
[Thr 140532586981120] DpListRemove: 1178 elems in tmadm_free_list
[Thr 140532586981120] DpListInsert: insert elem 31 into tmadm_inuse_list (at begin)
[Thr 140532586981120] DpListInsert: 22 elems in tmadm_inuse_list
[Thr 140532586981120] DpGetFreeUid: new UID: 27003
[Thr 140532586981120] Wed Apr 10 18:44:31:368 2024
[Thr 140532586981120] DpSesLockSessionEntry: lock T31_U27003_M0
[Thr 140532586981120] DpSesUnlockSessionEntry: unlocked invalid T31_M0
[Thr 140532586981120] DpInitInternalSession: initialized T31_M0_I0
[Thr 140532586981120] RqQQueueDestroy: Destroy queue <T31_U27002_M0> in slot 56
(51222)
[Thr 140532586981120] RqQQueueDestroy: locked session queue mutex for high priority
[Thr 140532586981120] RqQQueueSlotClear: clear slot 56
[Thr 140532586981120] RqQUnlockSessionQueue: unlocked session queue mutex for high
priority
[Thr 140532586981120] DpITmSlotClear: cleared T31_U27003
[Thr 140532586981120] DpTmSlotAllocate: allocated T31_U27003
[Thr 140532586981120] RqQQueueCreate: Created queue <T31_U27003_M0> in slot 56
(51223) with normal priority
[Thr 140532586981120] DpLogonInit: new logon T31_U27003, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532586981120] IcmSendRq: created T31_U27003_M0
[Thr 140532586981120] DpSesGetWorkerType: return workerType DIA for T31_U27003
[Thr 140532586981120] DpRqSlotAllocate: 1 pending requests
[Thr 140532586981120] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
25530731, slot 439)
[Thr 140532586981120] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 25530731) from
ICMAN to local WORKER
[Thr 140532586981120] rq_id 25530731
[Thr 140532586981120] -OUT- ca_blk -1 len 0
[Thr 140532586981120] -OUT- userTrace 3
[Thr 140532586981120] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532586981120] -OUT- mpi rq <75ad9> mpi resp <75ada> prot
2
[Thr 140532586981120] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532586981120] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532586981120] -OUT- dtrace {root-
id=730EFE781C731EEEBDEB33548A20D806}_{conn-id=730EFE781C731EEEBDEB33548A20F806}_1
[Thr 140532586981120] -OUT- sender address:
[Thr 140532586981120] -OUT- type LOCAL
[Thr 140532586981120] -OUT- agentType ICMAN
[Thr 140532586981120] -OUT- receiver address:
[Thr 140532586981120] -OUT- type LOCAL
[Thr 140532586981120] -OUT- agentType WORKER workerTyp DIA
[Thr 140532586981120] -OUT- session T31_U27003_M0
[Thr 140532586981120] RqQAddRequest: Add request rq_id 25530731 (DIA) to queue
<T31_U27003_M0> in slot 56 at the end
[Thr 140532586981120] Dump of queue <T31_U27003_M0> in slot 56 (1 requests,
port=0):
[Thr 140532586981120] -1 <- 70 (rq_id 25530731, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532586981120] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532586981120] RqQQueueAddToSessionQueue: Added queue <T31_U27003_M0> in
slot 56 to normal priority session queue at the end
[Thr 140532586981120] Session queue dump (normal priority, 1 elements, peak 2):
[Thr 140532586981120] -1 <- 56 < T31_U27003_M0> -> -1
[Thr 140532586981120] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532586981120] RqQNotifySessionQueue: notify normal priority session queue
of queue <T31_U27003_M0> (DIA) (id=80)
[Thr 140532586981120] Info of W15 (inside function RqQNotifyWorker (end))
[Thr 140532586981120] noOfPendingQueues=>W15-0<
[Thr 140532586981120] noOfWaitForQueues=>W15-2<
[Thr 140532586981120] wait for queue 81 (T29_U26820_M0)
[Thr 140532586981120] wait for queue 20 (W15)
[Thr 140532586981120] lowestPriority: normal priority
[Thr 140532586981120] modCounter=>W15-4043123<
[Thr 140532586981120] RqQNotifyWorker: notify W15 about dispatch queues
(modCounter=>W15-4043123<)
[Thr 140532586981120] RqQSetWorkerState: W15 has state RUNNING (modCounter=>W15-
4043123<)
[Thr 140532586981120] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532586981120] RqQQueueGetNumberOfRequests: Queue <T31_U27003_M0> in slot 56
contains 0 requests of type DIA
[Thr 140532586981120] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 25530731), queue has 0 requests
[Thr 140532586981120] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 25530731,
slot 439)
[Thr 140532586981120] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532586981120] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532586981120] IcmHandleNetRead(id=1/339179): read_len: 144, HandleNetData
returned: 4
[Thr 140532586981120] IcmHandleNetRead(id=1/339179): status 1 -> 4
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014011190,
&plen=7fd04aed1c58, &more=7fd04aed1c33, &ios=7fd04aed1c38)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] Wed Apr 10 18:44:31:369 2024
[Thr 140532586981120] IcmReadFromPartner(id=1/339179): read with maximum timeout
500
[Thr 140532586981120] IcmMpiWatchInsert: MPI watch entry <75ada>, number 11
inserted.
[Thr 140532586981120] MPI<75ada>bc#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532586981120] Wed Apr 10 18:44:31:541 2024
[Thr 140532586981120] MPI<75ada>bc#6 GetInbuf -1 255cb0 1089 (1) -> MPI_EOS: End Of
Stream
[Thr 140532586981120] IcmMpiWatchRemove: MPI watch entry <75ada>, number 11 removed
(wakeup was not sent).
[Thr 140532586981120] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] PlugInHandleServData(rqid=1/339179/1): role: Server(1),
status: 3
[Thr 140532586981120] content-length: 0/-1, buf_len: 1009, buf_offset: 0,
buf_status: 6
[Thr 140532586981120] ICT: IctIHttpOpenMessage: 7fd014079220 typ=2
[Thr 140532586981120] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532586981120] HttpParseResponseHeader: Version: 1001
[Thr 140532586981120] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532586981120] HTTP response (raw) [1/339179/1]:
[Thr 140532586981120] HTTP/1.1 403 Forbidden
[Thr 140532586981120] content-type: text/html; charset=utf-8
[Thr 140532586981120] content-length: 857
[Thr 140532586981120] sap-perf-fesrec: 165951.000000
[Thr 140532586981120] content-encoding: gzip
[Thr 140532586981120] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532586981120] DTRACE(1/339179/1): {root-
id=730EFE781C731EEEBDEB33548A20D806}_{conn-id=730EFE781C731EEEBDEB33548A20F806}_1
[Thr 140532586981120] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532586981120] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586981120] HttpSAPR3Handler: Response from AppServer
[Thr 140532586981120] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586981120] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586981120] HttpCacheHandler: TASK_RESPONSE 152 7fd024001ae0 7fd01401e8a0
[Thr 140532586981120] ISC: don't cache response: status code=403
[Thr 140532586981120] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532586981120] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586981120] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532586981120] HttpModHandler: process 2, header_len 152
[Thr 140532586981120] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586981120] HttpModHandler: perform the actions: (128)
[Thr 140532586981120] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532586981120] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586981120] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] Wed Apr 10 18:44:31:541 2024
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532586981120] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532586981120] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpModHandler: process 3, header_len 0
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd01401e8a0
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532586981120] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532586981120] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532586981120] IcmHandleReadFromPartner(id=1/339179): HandleServData
returned: 702
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] IcmWriteToConn(id=1/339179): prepared to write data to
partner (len = 1009, timeout = 2000)
[Thr 140532586981120] ->> SapSSLWriteNB(sssl_hdl=7fd014011190, buf=7fd050314d20,
len=1009, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532586981120] SSL:SSL_write(len=1009) net=1038 (out=1009 of 1009,
prev=0)
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1038 of 1038)
[Thr 140532586981120] <<- SapSSLWriteNB(sssl_hdl=7fd014011190)==SAP_O_K
[Thr 140532586981120] in/out: ... = "buf= 7fd050314d20, written= 1009 of 1009
(all) io=idle"
[Thr 140532586981120] IcmWriteToConn(id=1/339179): wrote data to partner (len =
1009)
[Thr 140532586981120] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532586981120] MPI<75ada>bc#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532586981120] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532586981120] ICT: IctHttpCloseMessage( 7fd014063b80 ) -> u=0 rc=0
[Thr 140532586981120] ICT: IctHttpCloseMessage( 7fd014079220 ) -> u=0 rc=0
[Thr 140532586981120] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f9671d0,flags=0x0000,timeout=10000,&IOstate=7fd0
4aed17fc)
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532586981120] CCL[SSL]: Srv-0002ABD7: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532586981120] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532586981120] in: sssl_hdl = 7fd014011190
[Thr 140532586981120] in: ... ni_hdl = 182
[Thr 140532586981120] in: flags = 0
[Thr 140532586981120] in: timeout = 10000
[Thr 140532586981120] MPI<75ad9>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532586981120] MPI<75ad9>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532586981120] MPI<75ad9>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586981120] MPI<75ada>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532586981120] MPI<75ada>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532586981120] Wed Apr 10 18:44:31:541 2024
[Thr 140532586981120] MPI<75ada>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586981120] NiIShutdownHandle: shutdown -w of hdl 182
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 70 (rq_id 25530732)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 70
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:47230
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=81), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530732 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530732
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 01000000EB2C0500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
15
[Thr 140532577003264] -IN-- session T31_U27003_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 25530732, slot 440)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530732)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 1/339179
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
25530732, slot 440)
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2295714 WriteOOB 77
[Thr 140532585395968] MPI<2>0#2295715 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2295716 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2295717: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2295717 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] Wed Apr 10 18:44:31:542 2024
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532586981120] SiPeek: hang up occurred in sock 29
[Thr 140532586981120] NiIPeek: peek for hdl 182 failed (r; rc=1)
[Thr 140532586981120] NiIRead: hdl 182 SSLState 0
[Thr 140532586981120] NiIRead: SiRecv failed for hdl 182/sock 29
[Thr 140532586981120] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.199:24222;
L=10.200.50.133:8443)
[Thr 140532586981120] NiICloseHandle: shutdown and close hdl 182/sock 29
[Thr 140532586981120] IcmConnClose: Connection 1/339179 closed
[Thr 140532586981120] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.199 ->
rc=0
[Thr 140532586981120] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532586981120] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
-> 0
[Thr 140532586981120] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=-1 -> 0
[Thr 140532586981120] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532586981120] REQ TRACE END: 1/339179/1
[Thr 140532586981120] IcmWorkerThread: Thread 7: Waiting for event
[Thr 140532586981120] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Wed Apr 10 18:44:34:436 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Wed Apr 10 18:44:36:547 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2295718 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=4000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 4000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=4000)
[Thr 140532585395968] MPI<2>0#2295719 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2295720 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2295721: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2295721 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] Wed Apr 10 18:44:40:551 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: call schedules, last t: 1712767450, next
t: 1712767480, cur t: 1712767480
[Thr 140532577003264] IcmCreateRequest: Append request 354105
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532586452736] IcmWorkerHandleRequest: worker 8 got the semaphore
[Thr 140532586452736] REQUEST:
Type: SCHEDULER Index = 354105
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532586452736] IcmGetSchedule: found slot 0
[Thr 140532586452736] IcmAlReportPerfData: Reporting data to CCMS Alerting
Infrastructure
[Thr 140532586452736] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140532586452736] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140532586452736] IcmConnInitContext: context initialized
[Thr 140532586452736] IcmGetServicePtr: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 1
[Thr 140532586452736] PlugInHandleAdmMessage: request received:
[Thr 140532586452736] PlugInHandleAdmMessage: opcode: ICM_COM_OP_CACHE_STAT (136),
len: 528, dest_type: 2, subhdlkey: 262145(4/0)
[Thr 140532586452736] HttpISubHandlerItCreate: add reference to table 7fd024010780,
now 2 references, 1 tables used
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_ADM_MSG(4), header_l
[Thr 140532586452736] HttpCacheHandler: TASK_ADM_MSG 0 7fd024001ae0 (nil)
[Thr 140532586452736] SCACHE: adm request received:
[Thr 140532586452736] SCACHE: opcode: 136, len: 528, dest_type: 2, dest:
[Thr 140532586452736] MTX_LOCK 3247 7fd024004a70
[Thr 140532586452736] MTX_UNLOCK 3260 7fd024004a70
[Thr 140532586452736] IctCmGetCacheInfo#450787 -> 0
[Thr 140532586452736] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532586452736] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532586452736] HttpSubHandlerItDelete: remove reference to table
7fd024010780, now 1 references, 1 tables used
[Thr 140532586452736] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532586452736] IcmServDecrRefCount: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 0
[Thr 140532586452736] IcmGetSchedule: next schedule in 30 secs
[Thr 140532586452736] IcmWorkerThread: Thread 8: Waiting for event
[Thr 140532586452736] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Wed Apr 10 18:44:41:476 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 2 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 70 (rq_id 25530790)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 70
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=82), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] Dump of queue <IcmanQueue> in slot 2 (1 requests, in use,
port=59573):
[Thr 140532577003264] -1 <- 32 (rq_id 25530791, NOWP,
REQ_HANDLER_PLUGIN_RESP) -> -1
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 25530790 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 25530790
[Thr 140532577003264] -IN-- ca_blk 15 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_ICMAN_OPCODE_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T6_U26980_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 15
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_ICMAN_OPCODE_RESP
request (rq_id 25530790, slot 441)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 25530790)
[Thr 140532577003264] IcmHandleRequest: change parameter >rdisp/TRACE=>1<
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 334 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_SET_PARAM(11)
[Thr 140532577003264] IcmHandleAdmMsg: set param rdisp/TRACE -> 1
[Thr 140532577003264] HttpSetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] H2SetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] SmtpSetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] IcmSetTrcLevel: Switch trace level to: 1
[Thr 140532577003264] *
[Thr 140532577003264] * SWITCH TRC-LEVEL to 1
[Thr 140532577003264] *
[Thr 140532577003264] eppSetTraceLevel: changing trace level to 1
[Thr 140532590151424] Wed Apr 10 18:45:29:678 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012cf1} {root-id=730EFE
[Thr 140532590151424] INTERNAL T29_U27030_M0, 000, SAPSYS, ,
time=18:45:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 18:50:27:761 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012d14} {root-id=730EFE
[Thr 140532589623040] INTERNAL T32_U27319_M0, 000, SAPSYS, ,
time=18:50:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 18:50:33:744 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012d19} {root-id=730EFE
[Thr 140532589094656] INTERNAL T32_U27319_M0, 000, SAPSYS, ,
time=18:50:33, W15, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 18:55:27:854 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012d3c} {root-id=730EFE
[Thr 140532586981120] INTERNAL T40_U27577_M0, 000, SAPSYS, ,
time=18:55:26, W8, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 19:00:27:602 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012d5f} {root-id=730EFE
[Thr 140532585924352] INTERNAL T35_U27806_M0, 000, SAPSYS, ,
time=19:00:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 19:00:33:986 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012d64} {root-id=730EFE
[Thr 140532586452736] INTERNAL T35_U27806_M0, 000, SAPSYS, ,
time=19:00:33, W15, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 19:05:27:787 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012d87} {root-id=730EFE
[Thr 140532590679808] INTERNAL T27_U28024_M0, 000, SAPSYS, ,
time=19:05:26, W9, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 19:10:27:905 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012daa} {root-id=730EFE
[Thr 140532587509504] INTERNAL T26_U28229_M0, 000, SAPSYS, ,
time=19:10:26, W8, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 19:10:33:899 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012daf} {root-id=730EFE
[Thr 140532588037888] INTERNAL T26_U28229_M0, 000, SAPSYS, ,
time=19:10:33, W8, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 19:15:28:071 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012dd2} {root-id=730EFE
[Thr 140532589094656] INTERNAL T12_U28458_M0, 000, SAPSYS, ,
time=19:15:26, W8, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532577003264] Wed Apr 10 19:20:34:620 2024
[Thr 140532577003264] IcmHandleAdmMsg: set param icm/OP_PSE_CHANGED -> SAPSSLA.pse
[Thr 140532577003264] IcmSSLPseChanged: SSL Certificate SAPSSLA.pse was changed -
refresh
[Thr 140532577003264] = AnonClient SSL_CTX 7fd00c07ea70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532577003264] = AnonClient ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532577003264] Reload OK for SSL cred "/usr/sap/Q20/D02/sec/SAPSSLA.pse"
[Thr 140532585924352] Wed Apr 10 19:20:35:261 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00012dfa} {root-id=730EFE
[Thr 140532585924352] INTERNAL T26_U28693_M0, 000, SAPSYS, ,
time=19:20:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 19:20:41:745 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e03} {root-id=730EFE
[Thr 140532588566272] INTERNAL T26_U28693_M0, 000, SAPSYS, ,
time=19:20:41, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 19:25:28:083 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e25} {root-id=730EFE
[Thr 140532586981120] INTERNAL T30_U28930_M0, 000, SAPSYS, ,
time=19:25:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 19:30:28:308 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e49} {root-id=730EFE
[Thr 140532589623040] INTERNAL T33_U29157_M0, 000, SAPSYS, ,
time=19:30:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 19:30:35:421 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e4e} {root-id=730EFE
[Thr 140532590151424] INTERNAL T33_U29157_M0, 000, SAPSYS, ,
time=19:30:34, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 19:35:28:044 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e71} {root-id=730EFE
[Thr 140532590679808] INTERNAL T18_U29380_M0, 000, SAPSYS, ,
time=19:35:26, W13, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 19:40:27:964 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e94} {root-id=730EFE
[Thr 140532589094656] INTERNAL T41_U29588_M0, 000, SAPSYS, ,
time=19:40:26, W13, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 19:40:34:335 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092e99} {root-id=730EFE
[Thr 140532588037888] INTERNAL T41_U29588_M0, 000, SAPSYS, ,
time=19:40:33, W13, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 19:45:27:942 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092ebc} {root-id=730EFE
[Thr 140532588566272] INTERNAL T9_U29790_M0, 000, SAPSYS, ,
time=19:45:26, W5, program=SAPMSSY8, high priority, memor
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 19:50:27:971 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092edf} {root-id=730EFE
[Thr 140532586452736] INTERNAL T18_U30023_M0, 000, SAPSYS, ,
time=19:50:26, W3, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 19:50:34:287 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092ee4} {root-id=730EFE
[Thr 140532585924352] INTERNAL T18_U30023_M0, 000, SAPSYS, ,
time=19:50:33, W3, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 19:55:54:038 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f0a} {root-id=730EFE
[Thr 140532588566272] INTERNAL T11_U30249_M0, 000, SAPSYS, ,
time=19:55:51, W15, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 20:00:27:724 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f2a} {root-id=730EFE
[Thr 140532590679808] INTERNAL T12_U30450_M0, 000, SAPSYS, ,
time=20:00:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 20:00:31:088 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f2c} {root-id=730EFE
[Thr 140532586981120] INTERNAL T12_U30450_M0, 000, SAPSYS, ,
time=20:00:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 20:05:27:978 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f4e} {root-id=730EFE
[Thr 140532588566272] INTERNAL T12_U30719_M0, 000, SAPSYS, ,
time=20:05:26, W9, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 20:10:26:474 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f71} {root-id=730EFE
[Thr 140532586452736] INTERNAL T33_U30937_M0, 000, SAPSYS, ,
time=20:10:26, W9, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 20:10:29:339 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f75} {root-id=730EFE
[Thr 140532588566272] INTERNAL T33_U30937_M0, 000, SAPSYS, ,
time=20:10:29, W9, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 20:15:27:400 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092f99} {root-id=730EFE
[Thr 140532590151424] INTERNAL T38_U31179_M0, 000, SAPSYS, ,
time=20:15:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 20:20:27:545 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092fc1} {root-id=730EFE
[Thr 140532589094656] INTERNAL T26_U31443_M0, 000, SAPSYS, ,
time=20:20:26, W5, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 20:20:33:434 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092fc5} {root-id=730EFE
[Thr 140532590679808] INTERNAL T26_U31443_M0, 000, SAPSYS, ,
time=20:20:33, W5, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 20:25:27:639 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00092fe9} {root-id=730EFE
[Thr 140532588566272] INTERNAL T30_U31696_M0, 000, SAPSYS, ,
time=20:25:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 20:30:29:752 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009300c} {root-id=730EFE
[Thr 140532586452736] INTERNAL T8_U31935_M0, 000, SAPSYS, ,
time=20:30:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 20:30:36:374 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093011} {root-id=730EFE
[Thr 140532585924352] INTERNAL T8_U31935_M0, 000, SAPSYS, ,
time=20:30:35, W19, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 20:35:27:690 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093034} {root-id=730EFE
[Thr 140532590151424] INTERNAL T12_U233_M0, 000, SAPSYS, ,
time=20:35:26, W19, program=SAPMSSY8, high priority, memor
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532590679808] Wed Apr 10 20:40:27:777 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093057} {root-id=730EFE
[Thr 140532590679808] INTERNAL T38_U481_M0, 000, SAPSYS, ,
time=20:40:26, W19, program=SAPMSSY8, high priority, memor
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 20:40:32:747 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009305b} {root-id=730EFE
[Thr 140532590151424] INTERNAL T38_U481_M0, 000, SAPSYS, ,
time=20:40:32, W19, program=SAPMSSY8, high priority, memor
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 20:45:28:300 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009307f} {root-id=730EFE
[Thr 140532588037888] INTERNAL T32_U679_M0, 000, SAPSYS, ,
time=20:45:26, W9, program=SAPMSSY8, high priority, memory
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 20:50:27:991 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000930a2} {root-id=730EFE
[Thr 140532588566272] INTERNAL T12_U917_M0, 000, SAPSYS, ,
time=20:50:26, W2, program=SAPMSSY8, high priority, memory
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 20:50:34:796 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000930a6} {root-id=730EFE
[Thr 140532588037888] INTERNAL T12_U917_M0, 000, SAPSYS, ,
time=20:50:34, W2, program=SAPMSSY8, high priority, memory
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 20:55:27:937 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000930ca} {root-id=730EFE
[Thr 140532585924352] INTERNAL T32_U1118_M0, 000, SAPSYS, ,
time=20:55:26, W2, program=SAPMSSY8, high priority, memor
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 21:00:28:381 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000930ed} {root-id=730EFE
[Thr 140532590151424] INTERNAL T3_U1291_M0, 000, SAPSYS, ,
time=21:00:26, W5, program=SAPMSSY8, high priority, memory
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 21:00:35:382 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000930f1} {root-id=730EFE
[Thr 140532585924352] INTERNAL T3_U1291_M0, 000, SAPSYS, ,
time=21:00:34, W5, program=SAPMSSY8, high priority, memory
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 21:05:30:617 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093115} {root-id=730EFE
[Thr 140532587509504] INTERNAL T3_U1485_M0, 000, SAPSYS, ,
time=21:05:26, W14, program=SAPMSSY8, high priority, memor
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 21:10:28:111 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093138} {root-id=730EFE
[Thr 140532588037888] INTERNAL T38_U1664_M0, 000, SAPSYS, ,
time=21:10:26, W11, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 21:10:34:398 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009313c} {root-id=730EFE
[Thr 140532587509504] INTERNAL T38_U1664_M0, 000, SAPSYS, ,
time=21:10:33, W11, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 21:15:27:992 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093160} {root-id=730EFE
[Thr 140532586981120] INTERNAL T31_U1859_M0, 000, SAPSYS, ,
time=21:15:26, W5, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 21:20:27:612 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093188} {root-id=730EFE
[Thr 140532590151424] INTERNAL T3_U2075_M0, 000, SAPSYS, ,
time=21:20:26, W18, program=SAPMSSY8, high priority, memor
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 21:20:33:362 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009318c} {root-id=730EFE
[Thr 140532585924352] INTERNAL T3_U2075_M0, 000, SAPSYS, ,
time=21:20:32, W18, program=SAPMSSY8, high priority, memor
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 21:25:27:880 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000931b0} {root-id=730EFE
[Thr 140532587509504] INTERNAL T41_U2277_M0, 000, SAPSYS, ,
time=21:25:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 21:30:27:001 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000931d3} {root-id=730EFE
[Thr 140532588037888] INTERNAL T12_U2477_M0, 000, SAPSYS, ,
time=21:30:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 21:30:30:902 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000931d7} {root-id=730EFE
[Thr 140532587509504] INTERNAL T12_U2477_M0, 000, SAPSYS, ,
time=21:30:30, W18, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 21:35:26:799 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000931fb} {root-id=730EFE
[Thr 140532586981120] INTERNAL T10_U2772_M0, 000, SAPSYS, ,
time=21:35:26, W5, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 21:40:29:435 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009321e} {root-id=730EFE
[Thr 140532585924352] INTERNAL T41_U2970_M0, 000, SAPSYS, ,
time=21:40:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 21:40:35:087 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093222} {root-id=730EFE
[Thr 140532586981120] INTERNAL T41_U2970_M0, 000, SAPSYS, ,
time=21:40:34, W18, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 21:45:29:850 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093246} {root-id=730EFE
[Thr 140532589623040] INTERNAL T12_U3147_M0, 000, SAPSYS, ,
time=21:45:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 21:50:26:754 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093269} {root-id=730EFE
[Thr 140532587509504] INTERNAL T35_U3527_M0, 000, SAPSYS, ,
time=21:50:26, W12, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 21:50:30:168 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009326d} {root-id=730EFE
[Thr 140532589623040] INTERNAL T35_U3527_M0, 000, SAPSYS, ,
time=21:50:29, W12, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 21:55:27:044 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093291} {root-id=730EFE
[Thr 140532589094656] INTERNAL T17_U3933_M0, 000, SAPSYS, ,
time=21:55:26, W7, program=SAPMSSY8, high priority, memor
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 22:00:27:526 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000932b4} {root-id=730EFE
[Thr 140532586981120] INTERNAL T27_U4227_M0, 000, SAPSYS, ,
time=22:00:26, W7, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 22:00:33:977 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000932b8} {root-id=730EFE
[Thr 140532585924352] INTERNAL T27_U4227_M0, 000, SAPSYS, ,
time=22:00:33, W7, program=SAPMSSY8, high priority, memor
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 22:00:55:623 2024
[Thr 140532587509504] *** ERROR => IcmCreateDpRequest: Session does not exist
[icxxthr.c 4773]
[Thr 140532590151424] Wed Apr 10 22:05:28:939 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000932dc} {root-id=730EFE
[Thr 140532590151424] INTERNAL T20_U4415_M0, 000, SAPSYS, ,
time=22:05:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 22:10:28:503 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000932ff} {root-id=730EFE
[Thr 140532588037888] INTERNAL T18_U4598_M0, 000, SAPSYS, ,
time=22:10:26, W5, program=SAPMSSY8, high priority, memor
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 22:10:35:446 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093303} {root-id=730EFE
[Thr 140532587509504] INTERNAL T18_U4598_M0, 000, SAPSYS, ,
time=22:10:34, W5, program=SAPMSSY8, high priority, memor
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 22:15:38:667 2024
[Thr 140532588037888] *** ERROR => IcmReadFromPartner(id=9/340774): No data from
server received, role: Server, (rc=MPI_EBROKEN: pip
[Thr 140532590679808] Wed Apr 10 22:15:41:645 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093329} {root-id=730EFE
[Thr 140532590679808] INTERNAL T40_U4804_M0, 000, SAPSYS, ,
time=22:15:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 22:20:27:628 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009334a} {root-id=730EFE
[Thr 140532585924352] INTERNAL T20_U5009_M0, 000, SAPSYS, ,
time=22:20:26, W5, program=SAPMSSY8, high priority, memor
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 22:20:31:418 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009334c} {root-id=730EFE
[Thr 140532586452736] INTERNAL T20_U5009_M0, 000, SAPSYS, ,
time=22:20:26, W5, program=SAPMSSY8, high priority, memor
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 22:25:27:589 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009336e} {root-id=730EFE
[Thr 140532590151424] INTERNAL T13_U5211_M0, 000, SAPSYS, ,
time=22:25:26, W12, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 22:30:27:910 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093391} {root-id=730EFE
[Thr 140532588037888] INTERNAL T40_U5392_M0, 000, SAPSYS, ,
time=22:30:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 22:30:34:736 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093395} {root-id=730EFE
[Thr 140532590151424] INTERNAL T40_U5392_M0, 000, SAPSYS, ,
time=22:30:34, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 22:35:28:070 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000933b9} {root-id=730EFE
[Thr 140532586981120] INTERNAL T20_U5573_M0, 000, SAPSYS, ,
time=22:35:26, W8, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 22:40:27:796 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000933dc} {root-id=730EFE
[Thr 140532585924352] INTERNAL T40_U5745_M0, 000, SAPSYS, ,
time=22:40:26, W6, program=SAPMSSY8, high priority, memor
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 22:40:33:489 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000933e0} {root-id=730EFE
[Thr 140532586981120] INTERNAL T40_U5745_M0, 000, SAPSYS, ,
time=22:40:33, W6, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 22:45:27:952 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093404} {root-id=730EFE
[Thr 140532588566272] INTERNAL T30_U5925_M0, 000, SAPSYS, ,
time=22:45:26, W12, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 22:50:29:398 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093427} {root-id=730EFE
[Thr 140532590151424] INTERNAL T26_U6130_M0, 000, SAPSYS, ,
time=22:50:26, W7, program=SAPMSSY8, high priority, memor
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 22:50:35:314 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009342b} {root-id=730EFE
[Thr 140532588566272] INTERNAL T26_U6130_M0, 000, SAPSYS, ,
time=22:50:34, W7, program=SAPMSSY8, high priority, memor
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 22:55:28:163 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009344f} {root-id=730EFE
[Thr 140532589623040] INTERNAL T41_U6329_M0, 000, SAPSYS, ,
time=22:55:26, W9, program=SAPMSSY8, high priority, memor
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 23:00:29:884 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093472} {root-id=730EFE
[Thr 140532586981120] INTERNAL T33_U6502_M0, 000, SAPSYS, ,
time=23:00:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 23:00:36:620 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093476} {root-id=730EFE
[Thr 140532589623040] INTERNAL T33_U6502_M0, 000, SAPSYS, ,
time=23:00:36, W16, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Wed Apr 10 23:05:28:047 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093499} {root-id=730EFE
[Thr 140532586981120] INTERNAL T33_U6686_M0, 000, SAPSYS, ,
time=23:05:26, W8, program=SAPMSSY8, high priority, memor
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Wed Apr 10 23:10:27:305 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000934bc} {root-id=730EFE
[Thr 140532585924352] INTERNAL T35_U6909_M0, 000, SAPSYS, ,
time=23:10:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 23:10:32:000 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000934c1} {root-id=730EFE
[Thr 140532587509504] INTERNAL T35_U6909_M0, 000, SAPSYS, ,
time=23:10:31, W16, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 23:15:28:041 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000934e4} {root-id=730EFE
[Thr 140532588566272] INTERNAL T10_U7192_M0, 000, SAPSYS, ,
time=23:15:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532588037888] Wed Apr 10 23:20:26:750 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009350b} {root-id=730EFE
[Thr 140532588037888] INTERNAL T22_U7382_M0, 000, SAPSYS, ,
time=23:20:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 23:20:29:577 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093510} {root-id=730EFE
[Thr 140532589623040] INTERNAL T22_U7382_M0, 000, SAPSYS, ,
time=23:20:29, W16, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 23:25:26:855 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093534} {root-id=730EFE
[Thr 140532587509504] INTERNAL T36_U7590_M0, 000, SAPSYS, ,
time=23:25:26, W15, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588566272] Wed Apr 10 23:30:26:555 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093557} {root-id=730EFE
[Thr 140532588566272] INTERNAL T11_U7741_M0, 000, SAPSYS, ,
time=23:30:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 23:30:29:039 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009355b} {root-id=730EFE
[Thr 140532587509504] INTERNAL T11_U7741_M0, 000, SAPSYS, ,
time=23:30:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 23:35:26:544 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009357f} {root-id=730EFE
[Thr 140532586452736] INTERNAL T27_U7902_M0, 000, SAPSYS, ,
time=23:35:26, W15, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589623040] Wed Apr 10 23:40:26:529 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000935a2} {root-id=730EFE
[Thr 140532589623040] INTERNAL T1_U8048_M0, 000, SAPSYS, ,
time=23:40:26, W17, program=SAPMSSY8, high priority, memor
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586452736] Wed Apr 10 23:40:28:978 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000935a6} {root-id=730EFE
[Thr 140532586452736] INTERNAL T1_U8048_M0, 000, SAPSYS, ,
time=23:40:28, W17, program=SAPMSSY8, high priority, memor
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 23:45:26:541 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000935ca} {root-id=730EFE
[Thr 140532589094656] INTERNAL T6_U8207_M0, 000, SAPSYS, ,
time=23:45:26, W19, program=SAPMSSY8, high priority, memor
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532587509504] Wed Apr 10 23:50:26:543 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000935ed} {root-id=730EFE
[Thr 140532587509504] INTERNAL T36_U8403_M0, 000, SAPSYS, ,
time=23:50:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589094656] Wed Apr 10 23:50:29:034 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000935f1} {root-id=730EFE
[Thr 140532589094656] INTERNAL T36_U8403_M0, 000, SAPSYS, ,
time=23:50:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532590151424] Wed Apr 10 23:55:26:543 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093615} {root-id=730EFE
[Thr 140532590151424] INTERNAL T24_U8579_M0, 000, SAPSYS, ,
time=23:55:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 00:00:26:747 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093638} {root-id=730EFE
[Thr 140532586452736] INTERNAL T6_U8723_M0, 000, SAPSYS, ,
time=00:00:26, W14, program=SAPMSSY8, high priority, memor
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 00:00:29:421 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009363c} {root-id=730EFE
[Thr 140532590151424] INTERNAL T6_U8723_M0, 000, SAPSYS, ,
time=00:00:29, W14, program=SAPMSSY8, high priority, memor
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 00:05:26:556 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093660} {root-id=730EFE
[Thr 140532588037888] INTERNAL T9_U8887_M0, 000, SAPSYS, ,
time=00:05:26, W16, program=SAPMSSY8, high priority, memor
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 00:10:26:537 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093683} {root-id=730EFE
[Thr 140532589094656] INTERNAL T5_U9040_M0, 000, SAPSYS, ,
time=00:10:26, W14, program=SAPMSSY8, high priority, memor
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 00:10:29:023 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093687} {root-id=730EFE
[Thr 140532588037888] INTERNAL T5_U9040_M0, 000, SAPSYS, ,
time=00:10:28, W14, program=SAPMSSY8, high priority, memor
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 00:15:26:566 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000936ab} {root-id=730EFE
[Thr 140532585924352] INTERNAL T36_U9202_M0, 000, SAPSYS, ,
time=00:15:26, W15, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 00:20:26:550 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000936ce} {root-id=730EFE
[Thr 140532590151424] INTERNAL T35_U9371_M0, 000, SAPSYS, ,
time=00:20:26, W17, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 00:20:28:984 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000936d2} {root-id=730EFE
[Thr 140532585924352] INTERNAL T35_U9371_M0, 000, SAPSYS, ,
time=00:20:28, W17, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 00:25:26:497 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000936f6} {root-id=730EFE
[Thr 140532590679808] INTERNAL T24_U9556_M0, 000, SAPSYS, ,
time=00:25:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 00:30:26:547 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093719} {root-id=730EFE
[Thr 140532588037888] INTERNAL T6_U9701_M0, 000, SAPSYS, ,
time=00:30:26, W19, program=SAPMSSY8, high priority, memor
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 00:30:29:001 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009371d} {root-id=730EFE
[Thr 140532590679808] INTERNAL T6_U9701_M0, 000, SAPSYS, ,
time=00:30:28, W19, program=SAPMSSY8, high priority, memor
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 00:35:26:689 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093741} {root-id=730EFE
[Thr 140532586981120] INTERNAL T11_U9899_M0, 000, SAPSYS, ,
time=00:35:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 00:40:26:541 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093764} {root-id=730EFE
[Thr 140532585924352] INTERNAL T35_U10042_M0, 000, SAPSYS, ,
time=00:40:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 00:40:29:024 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093768} {root-id=730EFE
[Thr 140532586981120] INTERNAL T35_U10042_M0, 000, SAPSYS, ,
time=00:40:28, W12, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 00:45:26:549 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009378c} {root-id=730EFE
[Thr 140532588566272] INTERNAL T24_U10200_M0, 000, SAPSYS, ,
time=00:45:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 00:50:26:551 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000937af} {root-id=730EFE
[Thr 140532590679808] INTERNAL T6_U10397_M0, 000, SAPSYS, ,
time=00:50:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 00:50:29:028 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000937b3} {root-id=730EFE
[Thr 140532588566272] INTERNAL T6_U10397_M0, 000, SAPSYS, ,
time=00:50:28, W18, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 00:55:26:534 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000937d7} {root-id=730EFE
[Thr 140532589623040] INTERNAL T35_U10567_M0, 000, SAPSYS, ,
time=00:55:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 01:00:26:549 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000937fa} {root-id=730EFE
[Thr 140532586981120] INTERNAL T24_U10710_M0, 000, SAPSYS, ,
time=01:00:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 01:00:29:025 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000937fe} {root-id=730EFE
[Thr 140532589623040] INTERNAL T24_U10710_M0, 000, SAPSYS, ,
time=01:00:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 01:05:26:549 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093822} {root-id=730EFE
[Thr 140532587509504] INTERNAL T6_U10877_M0, 000, SAPSYS, ,
time=01:05:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 01:10:26:718 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093845} {root-id=730EFE
[Thr 140532588566272] INTERNAL T33_U11030_M0, 000, SAPSYS, ,
time=01:10:26, W11, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 01:10:29:259 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093849} {root-id=730EFE
[Thr 140532587509504] INTERNAL T33_U11030_M0, 000, SAPSYS, ,
time=01:10:29, W11, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 01:15:26:551 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009386d} {root-id=730EFE
[Thr 140532586452736] INTERNAL T9_U11190_M0, 000, SAPSYS, ,
time=01:15:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 01:20:26:556 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093894} {root-id=730EFE
[Thr 140532586452736] INTERNAL T9_U11368_M0, 000, SAPSYS, ,
time=01:20:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 01:20:29:025 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093898} {root-id=730EFE
[Thr 140532590151424] INTERNAL T9_U11368_M0, 000, SAPSYS, ,
time=01:20:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 01:25:26:489 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000938bc} {root-id=730EFE
[Thr 140532588037888] INTERNAL T27_U11548_M0, 000, SAPSYS, ,
time=01:25:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 01:30:26:555 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000938df} {root-id=730EFE
[Thr 140532589094656] INTERNAL T27_U11694_M0, 000, SAPSYS, ,
time=01:30:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 01:30:29:032 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000938e3} {root-id=730EFE
[Thr 140532588037888] INTERNAL T27_U11694_M0, 000, SAPSYS, ,
time=01:30:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 01:35:26:561 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093907} {root-id=730EFE
[Thr 140532585924352] INTERNAL T5_U11854_M0, 000, SAPSYS, ,
time=01:35:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 01:40:26:557 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009392a} {root-id=730EFE
[Thr 140532590151424] INTERNAL T16_U12000_M0, 000, SAPSYS, ,
time=01:40:26, W15, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 01:40:29:019 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009392e} {root-id=730EFE
[Thr 140532585924352] INTERNAL T16_U12000_M0, 000, SAPSYS, ,
time=01:40:28, W15, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 01:45:26:682 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093952} {root-id=730EFE
[Thr 140532590679808] INTERNAL T24_U12161_M0, 000, SAPSYS, ,
time=01:45:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 01:50:26:564 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093975} {root-id=730EFE
[Thr 140532588037888] INTERNAL T36_U12359_M0, 000, SAPSYS, ,
time=01:50:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 01:50:29:052 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093979} {root-id=730EFE
[Thr 140532590679808] INTERNAL T36_U12359_M0, 000, SAPSYS, ,
time=01:50:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 01:55:26:582 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009399d} {root-id=730EFE
[Thr 140532586981120] INTERNAL T38_U12535_M0, 000, SAPSYS, ,
time=01:55:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 02:00:26:538 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000939c0} {root-id=730EFE
[Thr 140532585924352] INTERNAL T16_U12670_M0, 000, SAPSYS, ,
time=02:00:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 02:00:28:985 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000939c4} {root-id=730EFE
[Thr 140532586981120] INTERNAL T16_U12670_M0, 000, SAPSYS, ,
time=02:00:28, W12, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 02:05:26:558 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000939e8} {root-id=730EFE
[Thr 140532588566272] INTERNAL T33_U12814_M0, 000, SAPSYS, ,
time=02:05:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 02:10:26:540 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093a0b} {root-id=730EFE
[Thr 140532590679808] INTERNAL T6_U12954_M0, 000, SAPSYS, ,
time=02:10:26, W12, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 02:10:28:990 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093a0f} {root-id=730EFE
[Thr 140532588566272] INTERNAL T6_U12954_M0, 000, SAPSYS, ,
time=02:10:28, W12, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 02:15:26:564 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093a33} {root-id=730EFE
[Thr 140532589623040] INTERNAL T11_U13113_M0, 000, SAPSYS, ,
time=02:15:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 02:20:26:685 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093a5a} {root-id=730EFE
[Thr 140532589623040] INTERNAL T29_U13288_M0, 000, SAPSYS, ,
time=02:20:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 02:20:29:133 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093a5e} {root-id=730EFE
[Thr 140532586452736] INTERNAL T29_U13288_M0, 000, SAPSYS, ,
time=02:20:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 02:25:26:506 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093a82} {root-id=730EFE
[Thr 140532589094656] INTERNAL T31_U13485_M0, 000, SAPSYS, ,
time=02:25:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 02:30:26:571 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093aa5} {root-id=730EFE
[Thr 140532587509504] INTERNAL T30_U13630_M0, 000, SAPSYS, ,
time=02:30:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 02:30:29:026 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093aa9} {root-id=730EFE
[Thr 140532589094656] INTERNAL T30_U13630_M0, 000, SAPSYS, ,
time=02:30:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 02:35:26:627 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093acd} {root-id=730EFE
[Thr 140532590151424] INTERNAL T33_U13794_M0, 000, SAPSYS, ,
time=02:35:26, W13, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 02:40:26:553 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093af0} {root-id=730EFE
[Thr 140532586452736] INTERNAL T27_U13939_M0, 000, SAPSYS, ,
time=02:40:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 02:40:29:014 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093af4} {root-id=730EFE
[Thr 140532590151424] INTERNAL T27_U13939_M0, 000, SAPSYS, ,
time=02:40:28, W14, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 02:45:26:559 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093b18} {root-id=730EFE
[Thr 140532588037888] INTERNAL T29_U14096_M0, 000, SAPSYS, ,
time=02:45:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 02:50:26:555 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093b3b} {root-id=730EFE
[Thr 140532589094656] INTERNAL T35_U14293_M0, 000, SAPSYS, ,
time=02:50:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 02:50:29:009 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093b3f} {root-id=730EFE
[Thr 140532588037888] INTERNAL T35_U14293_M0, 000, SAPSYS, ,
time=02:50:28, W12, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 02:55:26:694 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093b63} {root-id=730EFE
[Thr 140532585924352] INTERNAL T33_U14472_M0, 000, SAPSYS, ,
time=02:55:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 03:00:26:562 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093b86} {root-id=730EFE
[Thr 140532590151424] INTERNAL T24_U14616_M0, 000, SAPSYS, ,
time=03:00:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 03:00:29:025 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093b8a} {root-id=730EFE
[Thr 140532585924352] INTERNAL T24_U14616_M0, 000, SAPSYS, ,
time=03:00:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 03:05:26:558 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093bae} {root-id=730EFE
[Thr 140532590679808] INTERNAL T36_U14775_M0, 000, SAPSYS, ,
time=03:05:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 03:10:26:576 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093bd1} {root-id=730EFE
[Thr 140532588037888] INTERNAL T16_U14925_M0, 000, SAPSYS, ,
time=03:10:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 03:10:29:048 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093bd5} {root-id=730EFE
[Thr 140532590679808] INTERNAL T16_U14925_M0, 000, SAPSYS, ,
time=03:10:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 03:15:26:562 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093bf9} {root-id=730EFE
[Thr 140532586981120] INTERNAL T38_U15083_M0, 000, SAPSYS, ,
time=03:15:26, W13, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 03:20:26:564 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093c1c} {root-id=730EFE
[Thr 140532585924352] INTERNAL T1_U15251_M0, 000, SAPSYS, ,
time=03:20:26, W15, program=SAPMSSY8, high priority, memo
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 03:20:29:100 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093c20} {root-id=730EFE
[Thr 140532586981120] INTERNAL T1_U15251_M0, 000, SAPSYS, ,
time=03:20:28, W15, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 03:25:26:515 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093c44} {root-id=730EFE
[Thr 140532588566272] INTERNAL T9_U15435_M0, 000, SAPSYS, ,
time=03:25:26, W18, program=SAPMSSY8, high priority, memo
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 03:30:26:691 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093c67} {root-id=730EFE
[Thr 140532590679808] INTERNAL T29_U15582_M0, 000, SAPSYS, ,
time=03:30:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 03:30:29:148 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093c6b} {root-id=730EFE
[Thr 140532588566272] INTERNAL T29_U15582_M0, 000, SAPSYS, ,
time=03:30:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 03:35:26:553 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093c8f} {root-id=730EFE
[Thr 140532589623040] INTERNAL T31_U15740_M0, 000, SAPSYS, ,
time=03:35:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 03:40:26:590 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093cb2} {root-id=730EFE
[Thr 140532586981120] INTERNAL T11_U15884_M0, 000, SAPSYS, ,
time=03:40:26, W13, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 03:40:29:323 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093cb6} {root-id=730EFE
[Thr 140532589623040] INTERNAL T11_U15884_M0, 000, SAPSYS, ,
time=03:40:29, W13, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 03:45:26:568 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093cda} {root-id=730EFE
[Thr 140532587509504] INTERNAL T35_U16045_M0, 000, SAPSYS, ,
time=03:45:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 03:50:26:571 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093cfd} {root-id=730EFE
[Thr 140532588566272] INTERNAL T27_U16243_M0, 000, SAPSYS, ,
time=03:50:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 03:50:29:082 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d01} {root-id=730EFE
[Thr 140532587509504] INTERNAL T27_U16243_M0, 000, SAPSYS, ,
time=03:50:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 03:55:26:569 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d25} {root-id=730EFE
[Thr 140532586452736] INTERNAL T38_U16411_M0, 000, SAPSYS, ,
time=03:55:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 04:00:26:564 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d47} {root-id=730EFE
[Thr 140532589623040] INTERNAL T1_U16557_M0, 000, SAPSYS, ,
time=04:00:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 04:00:29:051 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d4c} {root-id=730EFE
[Thr 140532586981120] INTERNAL T1_U16557_M0, 000, SAPSYS, ,
time=04:00:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 04:05:26:744 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d6f} {root-id=730EFE
[Thr 140532590151424] INTERNAL T36_U16718_M0, 000, SAPSYS, ,
time=04:05:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 04:10:26:554 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d92} {root-id=730EFE
[Thr 140532586452736] INTERNAL T23_U16870_M0, 000, SAPSYS, ,
time=04:10:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 04:10:28:994 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093d97} {root-id=730EFE
[Thr 140532585924352] INTERNAL T23_U16870_M0, 000, SAPSYS, ,
time=04:10:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 04:15:26:696 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093dba} {root-id=730EFE
[Thr 140532590679808] INTERNAL T30_U17021_M0, 000, SAPSYS, ,
time=04:15:26, W10, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 04:20:26:560 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093de1} {root-id=730EFE
[Thr 140532590679808] INTERNAL T38_U17198_M0, 000, SAPSYS, ,
time=04:20:26, W11, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 04:20:29:055 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093de6} {root-id=730EFE
[Thr 140532586981120] INTERNAL T38_U17198_M0, 000, SAPSYS, ,
time=04:20:28, W11, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 04:25:26:523 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e09} {root-id=730EFE
[Thr 140532589623040] INTERNAL T31_U17377_M0, 000, SAPSYS, ,
time=04:25:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 04:30:26:573 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e2c} {root-id=730EFE
[Thr 140532589094656] INTERNAL T6_U17521_M0, 000, SAPSYS, ,
time=04:30:26, W16, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 04:30:29:029 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e31} {root-id=730EFE
[Thr 140532590151424] INTERNAL T6_U17521_M0, 000, SAPSYS, ,
time=04:30:28, W16, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 04:35:26:550 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e54} {root-id=730EFE
[Thr 140532588037888] INTERNAL T1_U17682_M0, 000, SAPSYS, ,
time=04:35:26, W17, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 04:40:26:682 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e77} {root-id=730EFE
[Thr 140532585924352] INTERNAL T36_U17824_M0, 000, SAPSYS, ,
time=04:40:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 04:40:29:118 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e7c} {root-id=730EFE
[Thr 140532586452736] INTERNAL T36_U17824_M0, 000, SAPSYS, ,
time=04:40:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 04:45:26:631 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093e9f} {root-id=730EFE
[Thr 140532586981120] INTERNAL T29_U17981_M0, 000, SAPSYS, ,
time=04:45:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 04:50:26:573 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093ec2} {root-id=730EFE
[Thr 140532589623040] INTERNAL T24_U18178_M0, 000, SAPSYS, ,
time=04:50:26, W13, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 04:50:29:027 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093ec7} {root-id=730EFE
[Thr 140532588566272] INTERNAL T24_U18178_M0, 000, SAPSYS, ,
time=04:50:28, W13, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 04:55:26:572 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093eea} {root-id=730EFE
[Thr 140532590151424] INTERNAL T6_U18353_M0, 000, SAPSYS, ,
time=04:55:26, W11, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 05:00:26:577 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093f0d} {root-id=730EFE
[Thr 140532588037888] INTERNAL T29_U18496_M0, 000, SAPSYS, ,
time=05:00:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 05:00:29:051 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093f11} {root-id=730EFE
[Thr 140532590151424] INTERNAL T29_U18496_M0, 000, SAPSYS, ,
time=05:00:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 05:05:26:556 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093f35} {root-id=730EFE
[Thr 140532586452736] INTERNAL T31_U18657_M0, 000, SAPSYS, ,
time=05:05:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 05:10:26:572 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093f58} {root-id=730EFE
[Thr 140532586981120] INTERNAL T24_U18807_M0, 000, SAPSYS, ,
time=05:10:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 05:10:29:012 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093f5c} {root-id=730EFE
[Thr 140532586452736] INTERNAL T24_U18807_M0, 000, SAPSYS, ,
time=05:10:28, W12, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 05:15:26:698 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093f80} {root-id=730EFE
[Thr 140532588566272] INTERNAL T27_U18965_M0, 000, SAPSYS, ,
time=05:15:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 05:20:26:570 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093fa3} {root-id=730EFE
[Thr 140532590151424] INTERNAL T35_U19131_M0, 000, SAPSYS, ,
time=05:20:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 05:20:29:031 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093fa7} {root-id=730EFE
[Thr 140532588566272] INTERNAL T35_U19131_M0, 000, SAPSYS, ,
time=05:20:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 05:25:26:518 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093fcb} {root-id=730EFE
[Thr 140532585924352] INTERNAL T30_U19315_M0, 000, SAPSYS, ,
time=05:25:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 05:30:26:576 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093fee} {root-id=730EFE
[Thr 140532586452736] INTERNAL T23_U19460_M0, 000, SAPSYS, ,
time=05:30:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 05:30:29:079 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00093ff2} {root-id=730EFE
[Thr 140532585924352] INTERNAL T23_U19460_M0, 000, SAPSYS, ,
time=05:30:28, W16, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 05:35:26:579 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094016} {root-id=730EFE
[Thr 140532590679808] INTERNAL T36_U19621_M0, 000, SAPSYS, ,
time=05:35:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 05:40:26:577 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094039} {root-id=730EFE
[Thr 140532588566272] INTERNAL T30_U19767_M0, 000, SAPSYS, ,
time=05:40:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 05:40:29:055 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009403d} {root-id=730EFE
[Thr 140532590679808] INTERNAL T30_U19767_M0, 000, SAPSYS, ,
time=05:40:28, W16, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 05:45:26:608 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094061} {root-id=730EFE
[Thr 140532589094656] INTERNAL T16_U19925_M0, 000, SAPSYS, ,
time=05:45:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 05:50:26:933 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094084} {root-id=730EFE
[Thr 140532585924352] INTERNAL T29_U20123_M0, 000, SAPSYS, ,
time=05:50:26, W11, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 05:50:29:547 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094088} {root-id=730EFE
[Thr 140532589094656] INTERNAL T29_U20123_M0, 000, SAPSYS, ,
time=05:50:29, W11, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 05:55:26:577 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000940ac} {root-id=730EFE
[Thr 140532587509504] INTERNAL T5_U20294_M0, 000, SAPSYS, ,
time=05:55:26, W14, program=SAPMSSY8, high priority, memo
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 06:00:26:559 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000940cf} {root-id=730EFE
[Thr 140532590679808] INTERNAL T36_U20439_M0, 000, SAPSYS, ,
time=06:00:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 06:00:29:029 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000940d3} {root-id=730EFE
[Thr 140532587509504] INTERNAL T36_U20439_M0, 000, SAPSYS, ,
time=06:00:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 06:05:26:564 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000940f7} {root-id=730EFE
[Thr 140532589623040] INTERNAL T38_U20600_M0, 000, SAPSYS, ,
time=06:05:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 06:10:26:568 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009411a} {root-id=730EFE
[Thr 140532589094656] INTERNAL T29_U20750_M0, 000, SAPSYS, ,
time=06:10:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 06:10:29:022 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009411e} {root-id=730EFE
[Thr 140532589623040] INTERNAL T29_U20750_M0, 000, SAPSYS, ,
time=06:10:28, W14, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 06:15:26:591 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094142} {root-id=730EFE
[Thr 140532588037888] INTERNAL T5_U20908_M0, 000, SAPSYS, ,
time=06:15:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 06:20:26:577 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094165} {root-id=730EFE
[Thr 140532587509504] INTERNAL T33_U21076_M0, 000, SAPSYS, ,
time=06:20:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 06:20:29:028 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094169} {root-id=730EFE
[Thr 140532588037888] INTERNAL T33_U21076_M0, 000, SAPSYS, ,
time=06:20:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 06:25:26:666 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009418d} {root-id=730EFE
[Thr 140532586981120] INTERNAL T11_U21261_M0, 000, SAPSYS, ,
time=06:25:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 06:30:26:598 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000941b0} {root-id=730EFE
[Thr 140532589623040] INTERNAL T27_U21405_M0, 000, SAPSYS, ,
time=06:30:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 06:30:29:054 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000941b4} {root-id=730EFE
[Thr 140532586981120] INTERNAL T27_U21405_M0, 000, SAPSYS, ,
time=06:30:28, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 06:35:26:584 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000941d8} {root-id=730EFE
[Thr 140532590151424] INTERNAL T1_U21566_M0, 000, SAPSYS, ,
time=06:35:26, W15, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 06:40:26:573 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000941fb} {root-id=730EFE
[Thr 140532588037888] INTERNAL T38_U21709_M0, 000, SAPSYS, ,
time=06:40:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 06:40:29:014 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000941ff} {root-id=730EFE
[Thr 140532590151424] INTERNAL T38_U21709_M0, 000, SAPSYS, ,
time=06:40:28, W14, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 06:45:26:577 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094223} {root-id=730EFE
[Thr 140532586452736] INTERNAL T9_U21867_M0, 000, SAPSYS, ,
time=06:45:26, W13, program=SAPMSSY8, high priority, memo
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 06:50:26:565 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094246} {root-id=730EFE
[Thr 140532586981120] INTERNAL T31_U22065_M0, 000, SAPSYS, ,
time=06:50:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 06:50:29:014 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009424a} {root-id=730EFE
[Thr 140532586452736] INTERNAL T31_U22065_M0, 000, SAPSYS, ,
time=06:50:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 06:55:26:646 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009426e} {root-id=730EFE
[Thr 140532588566272] INTERNAL T16_U22238_M0, 000, SAPSYS, ,
time=06:55:26, W12, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 07:00:26:713 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094291} {root-id=730EFE
[Thr 140532590151424] INTERNAL T27_U22382_M0, 000, SAPSYS, ,
time=07:00:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 07:00:29:170 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094295} {root-id=730EFE
[Thr 140532588566272] INTERNAL T27_U22382_M0, 000, SAPSYS, ,
time=07:00:29, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 07:05:26:589 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000942b9} {root-id=730EFE
[Thr 140532585924352] INTERNAL T29_U22547_M0, 000, SAPSYS, ,
time=07:05:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 07:10:26:586 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000942dc} {root-id=730EFE
[Thr 140532586452736] INTERNAL T31_U22698_M0, 000, SAPSYS, ,
time=07:10:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 07:10:29:029 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000942e0} {root-id=730EFE
[Thr 140532585924352] INTERNAL T31_U22698_M0, 000, SAPSYS, ,
time=07:10:28, W14, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 07:15:26:578 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094304} {root-id=730EFE
[Thr 140532590679808] INTERNAL T6_U22853_M0, 000, SAPSYS, ,
time=07:15:26, W17, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 07:20:13:159 2024
[Thr 140532588037888] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532588037888] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532588037888] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532588037888] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532588037888] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532588037888] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532588037888] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532588037888] (754_STACK patchno 200,linuxx86_64_gcc43) CommonCryptoLib
8.5.50 (/usr/sap/Q20/D02/exe/libsapcrypto.so)
[Thr 140532588037888] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532588037888] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532588037888] >> ===== SecuSSL ErrStack: =====
[Thr 140532588037888] Peer not trusted
[Thr 140532588037888] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532588037888] # --- Messages -----------
[Thr 140532588037888] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532588037888] # --- Summary -----------
[Thr 140532588037888] #01 Certificate (End Entity): VALID
[Thr 140532588037888] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532588037888] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588037888] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532588037888] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532588037888] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532588037888] #02 Certificate (Issuer): VALID
[Thr 140532588037888] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588037888] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532588037888] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532588037888] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532588037888] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532588037888] ----- END VERIFICATION RESULT -----
[Thr 140532588037888] << =============================
[Thr 140532588037888] Target Hostname="apps.support.sap.com"
[Thr 140532588037888] SSL NI-hdl 154: local=10.200.50.156:25788
peer=155.56.96.48:443
[Thr 140532588037888] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd02001b090)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532588037888] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532588037888] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532588037888]
[Thr 140532588037888] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532588037888] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532588037888] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532588037888] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532588037888] SSL NI-hdl 154: local=10.200.50.156:25788
peer=155.56.96.48:443
[Thr 140532588037888] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532588037888] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532588037888] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532588037888] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532588037888] Target Hostname="apps.support.sap.com"
[Thr 140532588037888] >> ---- SecuSSL ErrStack: ----
[Thr 140532588037888] Peer not trusted
[Thr 140532588037888] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532588037888] # --- Messages -----------
[Thr 140532588037888] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532588037888] # --- Summary -----------
[Thr 140532588037888] #01 Certificate (End Entity): VALID
[Thr 140532588037888] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532588037888] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588037888] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532588037888] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532588037888] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532588037888] #02 Certificate (Issuer): VALID
[Thr 140532588037888] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532588037888] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532588037888] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532588037888] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532588037888] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532588037888] ----- END VERIFICATION RESULT -----
[Thr 140532588037888] << ---------------------------
[Thr 140532588037888]
[Thr 140532588037888] {00094329} {root-id=730EFE781C731EEEBDF863EF03F6EC88}
[icxxconn.c 2536]
[Thr 140532588037888] SYNC_RFC T30_U23008_M0, 000, SAP_BATCH,
vq20app.sap.swisspor, time=07:19:53, W13, program=SAPMSSY
[Thr 140532588037888] role: Client, protocol: HTTPS, local:
10.200.50.156:25788, peer: 155.56.96.48:443
[Thr 140532590151424] Thu Apr 11 07:20:26:573 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009432c} {root-id=730EFE
[Thr 140532590151424] INTERNAL T27_U23028_M0, 000, SAPSYS, ,
time=07:20:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532588566272] Thu Apr 11 07:20:29:010 2024
[Thr 140532588566272] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094330} {root-id=730EFE
[Thr 140532588566272] INTERNAL T27_U23028_M0, 000, SAPSYS, ,
time=07:20:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532588566272] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 07:20:33:179 2024
[Thr 140532590151424] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532590151424] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532590151424] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590151424] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532590151424] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532590151424] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532590151424] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532590151424] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532590151424] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590151424] >> ===== SecuSSL ErrStack: =====
[Thr 140532590151424] Peer not trusted
[Thr 140532590151424] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532590151424] # --- Messages -----------
[Thr 140532590151424] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532590151424] # --- Summary -----------
[Thr 140532590151424] #01 Certificate (End Entity): VALID
[Thr 140532590151424] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532590151424] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532590151424] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532590151424] #02 Certificate (Issuer): VALID
[Thr 140532590151424] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532590151424] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532590151424] ----- END VERIFICATION RESULT -----
[Thr 140532590151424] << =============================
[Thr 140532590151424] Target Hostname="apps.support.sap.com"
[Thr 140532590151424] SSL NI-hdl 156: local=10.200.50.156:51512
peer=155.56.96.48:443
[Thr 140532590151424] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd028013a10)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532590151424] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532590151424] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532590151424]
[Thr 140532590151424] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532590151424] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532590151424] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590151424] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532590151424] SSL NI-hdl 156: local=10.200.50.156:51512
peer=155.56.96.48:443
[Thr 140532590151424] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532590151424] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532590151424] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532590151424] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532590151424] Target Hostname="apps.support.sap.com"
[Thr 140532590151424] >> ---- SecuSSL ErrStack: ----
[Thr 140532590151424] Peer not trusted
[Thr 140532590151424] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532590151424] # --- Messages -----------
[Thr 140532590151424] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532590151424] # --- Summary -----------
[Thr 140532590151424] #01 Certificate (End Entity): VALID
[Thr 140532590151424] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532590151424] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532590151424] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532590151424] #02 Certificate (Issuer): VALID
[Thr 140532590151424] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532590151424] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532590151424] ----- END VERIFICATION RESULT -----
[Thr 140532590151424] << ---------------------------
[Thr 140532590151424]
[Thr 140532590151424] {00094336} {root-id=730EFE781C731EEEBDF863EF03F6EC88}
[icxxconn.c 2536]
[Thr 140532590151424] SYNC_RFC T30_U23008_M0, 000, SAP_BATCH,
vq20app.sap.swisspor, time=07:19:53, W13, program=SAPMSSY
[Thr 140532590151424] role: Client, protocol: HTTPS, local:
10.200.50.156:51512, peer: 155.56.96.48:443
[Thr 140532585924352] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532585924352] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532585924352] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532585924352] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532585924352] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532585924352] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532585924352] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532585924352] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532585924352] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532585924352] >> ===== SecuSSL ErrStack: =====
[Thr 140532585924352] Peer not trusted
[Thr 140532585924352] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532585924352] # --- Messages -----------
[Thr 140532585924352] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532585924352] # --- Summary -----------
[Thr 140532585924352] #01 Certificate (End Entity): VALID
[Thr 140532585924352] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532585924352] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532585924352] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532585924352] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532585924352] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532585924352] #02 Certificate (Issuer): VALID
[Thr 140532585924352] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532585924352] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532585924352] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532585924352] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532585924352] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532585924352] ----- END VERIFICATION RESULT -----
[Thr 140532585924352] << =============================
[Thr 140532585924352] Target Hostname="apps.support.sap.com"
[Thr 140532585924352] SSL NI-hdl 157: local=10.200.50.156:51522
peer=155.56.96.48:443
[Thr 140532585924352] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd018010930)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532585924352] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532585924352] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532585924352]
[Thr 140532585924352] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532585924352] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532585924352] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532585924352] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532585924352] SSL NI-hdl 157: local=10.200.50.156:51522
peer=155.56.96.48:443
[Thr 140532585924352] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532585924352] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532585924352] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532585924352] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532585924352] Target Hostname="apps.support.sap.com"
[Thr 140532585924352] >> ---- SecuSSL ErrStack: ----
[Thr 140532585924352] Peer not trusted
[Thr 140532585924352] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532585924352] # --- Messages -----------
[Thr 140532585924352] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532585924352] # --- Summary -----------
[Thr 140532585924352] #01 Certificate (End Entity): VALID
[Thr 140532585924352] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532585924352] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532585924352] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532585924352] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532585924352] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532585924352] #02 Certificate (Issuer): VALID
[Thr 140532585924352] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532585924352] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532585924352] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532585924352] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532585924352] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532585924352] ----- END VERIFICATION RESULT -----
[Thr 140532585924352] << ---------------------------
[Thr 140532585924352]
[Thr 140532585924352] {00094337} {root-id=730EFE781C731EEEBDF863EF03F6EC88}
[icxxconn.c 2536]
[Thr 140532585924352] SYNC_RFC T35_U23007_M0, 000, SAP_BATCH, ,
time=07:20:33, W10, program=SAPMSSY1, low priority, mem
[Thr 140532585924352] role: Client, protocol: HTTPS, local:
10.200.50.156:51522, peer: 155.56.96.48:443
[Thr 140532586981120] Thu Apr 11 07:25:26:549 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094356} {root-id=730EFE
[Thr 140532586981120] INTERNAL T1_U23205_M0, 000, SAPSYS, ,
time=07:25:26, W13, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 07:30:26:600 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094379} {root-id=730EFE
[Thr 140532589623040] INTERNAL T38_U23353_M0, 000, SAPSYS, ,
time=07:30:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 07:30:29:055 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009437d} {root-id=730EFE
[Thr 140532586981120] INTERNAL T38_U23353_M0, 000, SAPSYS, ,
time=07:30:28, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 07:35:26:706 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000943a1} {root-id=730EFE
[Thr 140532590151424] INTERNAL T29_U23513_M0, 000, SAPSYS, ,
time=07:35:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 07:40:26:588 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000943c4} {root-id=730EFE
[Thr 140532590679808] INTERNAL T24_U23658_M0, 000, SAPSYS, ,
time=07:40:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 07:40:29:023 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000943c8} {root-id=730EFE
[Thr 140532590151424] INTERNAL T24_U23658_M0, 000, SAPSYS, ,
time=07:40:28, W17, program=SAPMSSY8, high priority, mem
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 07:45:26:599 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000943ec} {root-id=730EFE
[Thr 140532586452736] INTERNAL T33_U23817_M0, 000, SAPSYS, ,
time=07:45:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 07:48:12:473 2024
[Thr 140532589623040] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532589623040] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532589623040] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532589623040] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532589623040] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532589623040] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532589623040] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532589623040] (754_STACK patchno 200,linuxx86_64_gcc43) CommonCryptoLib
8.5.50 (/usr/sap/Q20/D02/exe/libsapcrypto.so)
[Thr 140532589623040] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532589623040] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532589623040] >> ===== SecuSSL ErrStack: =====
[Thr 140532589623040] Peer not trusted
[Thr 140532589623040] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532589623040] # --- Messages -----------
[Thr 140532589623040] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532589623040] # --- Summary -----------
[Thr 140532589623040] #01 Certificate (End Entity): VALID
[Thr 140532589623040] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532589623040] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532589623040] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532589623040] #02 Certificate (Issuer): VALID
[Thr 140532589623040] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532589623040] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532589623040] ----- END VERIFICATION RESULT -----
[Thr 140532589623040] << =============================
[Thr 140532589623040] Target Hostname="apps.support.sap.com"
[Thr 140532589623040] SSL NI-hdl 153: local=10.200.50.156:40404
peer=155.56.96.48:443
[Thr 140532589623040] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd040061e40)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532589623040] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532589623040] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532589623040]
[Thr 140532589623040] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532589623040] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532589623040] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532589623040] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532589623040] SSL NI-hdl 153: local=10.200.50.156:40404
peer=155.56.96.48:443
[Thr 140532589623040] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532589623040] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532589623040] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532589623040] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532589623040] Target Hostname="apps.support.sap.com"
[Thr 140532589623040] >> ---- SecuSSL ErrStack: ----
[Thr 140532589623040] Peer not trusted
[Thr 140532589623040] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532589623040] # --- Messages -----------
[Thr 140532589623040] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532589623040] # --- Summary -----------
[Thr 140532589623040] #01 Certificate (End Entity): VALID
[Thr 140532589623040] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532589623040] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532589623040] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532589623040] #02 Certificate (Issuer): VALID
[Thr 140532589623040] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532589623040] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532589623040] ----- END VERIFICATION RESULT -----
[Thr 140532589623040] << ---------------------------
[Thr 140532589623040]
[Thr 140532589623040] {00094401} {root-id=0050569232781EDE88C88C3E1D25C7B2}
[icxxconn.c 2536]
[Thr 140532589623040] SYNC_RFC T29_U23947_M0, 000, DDIC,
vq20app.sap.swisspor, time=07:47:52, W11, program=SAPMSSY1, lo
[Thr 140532589623040] role: Client, protocol: HTTPS, local:
10.200.50.156:40404, peer: 155.56.96.48:443
[Thr 140532587509504] Thu Apr 11 07:48:32:489 2024
[Thr 140532587509504] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532587509504] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532587509504] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532587509504] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532587509504] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532587509504] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532587509504] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532587509504] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532587509504] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532587509504] >> ===== SecuSSL ErrStack: =====
[Thr 140532587509504] Peer not trusted
[Thr 140532587509504] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532587509504] # --- Messages -----------
[Thr 140532587509504] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532587509504] # --- Summary -----------
[Thr 140532587509504] #01 Certificate (End Entity): VALID
[Thr 140532587509504] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532587509504] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532587509504] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532587509504] #02 Certificate (Issuer): VALID
[Thr 140532587509504] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532587509504] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532587509504] ----- END VERIFICATION RESULT -----
[Thr 140532587509504] << =============================
[Thr 140532587509504] Target Hostname="apps.support.sap.com"
[Thr 140532587509504] SSL NI-hdl 155: local=10.200.50.156:40404
peer=155.56.96.48:443
[Thr 140532587509504] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd0380512c0)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532587509504] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532587509504] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532587509504]
[Thr 140532587509504] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532587509504] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532587509504] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532587509504] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532587509504] SSL NI-hdl 155: local=10.200.50.156:40404
peer=155.56.96.48:443
[Thr 140532587509504] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532587509504] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532587509504] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532587509504] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532587509504] Target Hostname="apps.support.sap.com"
[Thr 140532587509504] >> ---- SecuSSL ErrStack: ----
[Thr 140532587509504] Peer not trusted
[Thr 140532587509504] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532587509504] # --- Messages -----------
[Thr 140532587509504] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532587509504] # --- Summary -----------
[Thr 140532587509504] #01 Certificate (End Entity): VALID
[Thr 140532587509504] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532587509504] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532587509504] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532587509504] #02 Certificate (Issuer): VALID
[Thr 140532587509504] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532587509504] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532587509504] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532587509504] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532587509504] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532587509504] ----- END VERIFICATION RESULT -----
[Thr 140532587509504] << ---------------------------
[Thr 140532587509504]
[Thr 140532587509504] {00094404} {root-id=0050569232781EDE88C88C3E1D25C7B2}
[icxxconn.c 2536]
[Thr 140532587509504] SYNC_RFC T29_U23947_M0, 000, DDIC,
vq20app.sap.swisspor, time=07:47:52, W11, program=SAPMSSY1, lo
[Thr 140532587509504] role: Client, protocol: HTTPS, local:
10.200.50.156:40404, peer: 155.56.96.48:443
[Thr 140532586981120] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532586981120] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532586981120] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532586981120] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532586981120] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532586981120] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532586981120] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532586981120] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532586981120] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532586981120] >> ===== SecuSSL ErrStack: =====
[Thr 140532586981120] Peer not trusted
[Thr 140532586981120] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532586981120] # --- Messages -----------
[Thr 140532586981120] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532586981120] # --- Summary -----------
[Thr 140532586981120] #01 Certificate (End Entity): VALID
[Thr 140532586981120] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532586981120] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586981120] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532586981120] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532586981120] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532586981120] #02 Certificate (Issuer): VALID
[Thr 140532586981120] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586981120] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532586981120] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532586981120] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532586981120] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532586981120] ----- END VERIFICATION RESULT -----
[Thr 140532586981120] << =============================
[Thr 140532586981120] Target Hostname="apps.support.sap.com"
[Thr 140532586981120] SSL NI-hdl 156: local=10.200.50.156:40406
peer=155.56.96.48:443
[Thr 140532586981120] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd014006a10)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532586981120] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532586981120] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532586981120]
[Thr 140532586981120] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532586981120] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532586981120] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532586981120] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532586981120] SSL NI-hdl 156: local=10.200.50.156:40406
peer=155.56.96.48:443
[Thr 140532586981120] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532586981120] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532586981120] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532586981120] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532586981120] Target Hostname="apps.support.sap.com"
[Thr 140532586981120] >> ---- SecuSSL ErrStack: ----
[Thr 140532586981120] Peer not trusted
[Thr 140532586981120] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532586981120] # --- Messages -----------
[Thr 140532586981120] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532586981120] # --- Summary -----------
[Thr 140532586981120] #01 Certificate (End Entity): VALID
[Thr 140532586981120] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532586981120] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586981120] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532586981120] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532586981120] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532586981120] #02 Certificate (Issuer): VALID
[Thr 140532586981120] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532586981120] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532586981120] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532586981120] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532586981120] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532586981120] ----- END VERIFICATION RESULT -----
[Thr 140532586981120] << ---------------------------
[Thr 140532586981120]
[Thr 140532586981120] {00094405} {root-id=0050569232781EDE88C88C3E1D25C7B2}
[icxxconn.c 2536]
[Thr 140532586981120] SYNC_RFC T27_U23946_M0, 000, DDIC, ,
time=07:48:32, W12, program=SAPMSSY1, low priority, memory=0
[Thr 140532586981120] role: Client, protocol: HTTPS, local:
10.200.50.156:40406, peer: 155.56.96.48:443
[Thr 140532590679808] Thu Apr 11 07:50:26:598 2024
[Thr 140532590679808] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094412} {root-id=730EFE
[Thr 140532590679808] INTERNAL T9_U24018_M0, 000, SAPSYS, ,
time=07:50:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590679808] role: Client, protocol: HTTP
[Thr 140532590151424] Thu Apr 11 07:50:29:068 2024
[Thr 140532590151424] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094416} {root-id=730EFE
[Thr 140532590151424] INTERNAL T9_U24018_M0, 000, SAPSYS, ,
time=07:50:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532590151424] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 07:55:26:577 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009443a} {root-id=730EFE
[Thr 140532586452736] INTERNAL T29_U24193_M0, 000, SAPSYS, ,
time=07:55:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 08:00:26:671 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009445d} {root-id=730EFE
[Thr 140532586981120] INTERNAL T24_U24337_M0, 000, SAPSYS, ,
time=08:00:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532586452736] Thu Apr 11 08:00:29:343 2024
[Thr 140532586452736] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094461} {root-id=730EFE
[Thr 140532586452736] INTERNAL T24_U24337_M0, 000, SAPSYS, ,
time=08:00:29, W16, program=SAPMSSY8, high priority, mem
[Thr 140532586452736] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 08:05:26:601 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094486} {root-id=730EFE
[Thr 140532589094656] INTERNAL T30_U24511_M0, 000, SAPSYS, ,
time=08:05:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532585924352] Thu Apr 11 08:10:26:728 2024
[Thr 140532585924352] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000944a9} {root-id=730EFE
[Thr 140532585924352] INTERNAL T11_U24660_M0, 000, SAPSYS, ,
time=08:10:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532585924352] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 08:10:29:192 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000944ad} {root-id=730EFE
[Thr 140532589094656] INTERNAL T11_U24660_M0, 000, SAPSYS, ,
time=08:10:29, W19, program=SAPMSSY8, high priority, mem
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 08:15:26:589 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000944d1} {root-id=730EFE
[Thr 140532587509504] INTERNAL T31_U24816_M0, 000, SAPSYS, ,
time=08:15:26, W17, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532590679808] Thu Apr 11 08:20:12:749 2024
[Thr 140532590679808] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532590679808] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532590679808] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590679808] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532590679808] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532590679808] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532590679808] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532590679808] (754_STACK patchno 200,linuxx86_64_gcc43) CommonCryptoLib
8.5.50 (/usr/sap/Q20/D02/exe/libsapcrypto.so)
[Thr 140532590679808] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532590679808] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590679808] >> ===== SecuSSL ErrStack: =====
[Thr 140532590679808] Peer not trusted
[Thr 140532590679808] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532590679808] # --- Messages -----------
[Thr 140532590679808] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532590679808] # --- Summary -----------
[Thr 140532590679808] #01 Certificate (End Entity): VALID
[Thr 140532590679808] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532590679808] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590679808] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532590679808] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532590679808] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532590679808] #02 Certificate (Issuer): VALID
[Thr 140532590679808] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590679808] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532590679808] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532590679808] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532590679808] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532590679808] ----- END VERIFICATION RESULT -----
[Thr 140532590679808] << =============================
[Thr 140532590679808] Target Hostname="apps.support.sap.com"
[Thr 140532590679808] SSL NI-hdl 153: local=10.200.50.156:40992
peer=155.56.96.48:443
[Thr 140532590679808] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd03c009ee0)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532590679808] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532590679808] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532590679808]
[Thr 140532590679808] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532590679808] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532590679808] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590679808] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532590679808] SSL NI-hdl 153: local=10.200.50.156:40992
peer=155.56.96.48:443
[Thr 140532590679808] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532590679808] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532590679808] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532590679808] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532590679808] Target Hostname="apps.support.sap.com"
[Thr 140532590679808] >> ---- SecuSSL ErrStack: ----
[Thr 140532590679808] Peer not trusted
[Thr 140532590679808] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532590679808] # --- Messages -----------
[Thr 140532590679808] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532590679808] # --- Summary -----------
[Thr 140532590679808] #01 Certificate (End Entity): VALID
[Thr 140532590679808] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532590679808] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590679808] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532590679808] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532590679808] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532590679808] #02 Certificate (Issuer): VALID
[Thr 140532590679808] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590679808] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532590679808] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532590679808] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532590679808] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532590679808] ----- END VERIFICATION RESULT -----
[Thr 140532590679808] << ---------------------------
[Thr 140532590679808]
[Thr 140532590679808] {000944f2} {root-id=730EFE781C731EEEBDF97028640270DE}
[icxxconn.c 2536]
[Thr 140532590679808] SYNC_RFC T30_U24975_M0, 000, SAP_BATCH,
vq20app.sap.swisspor, time=08:19:52, W12, program=SAPMSSY
[Thr 140532590679808] role: Client, protocol: HTTPS, local:
10.200.50.156:40992, peer: 155.56.96.48:443
[Thr 140532589623040] Thu Apr 11 08:20:26:593 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000944f5} {root-id=730EFE
[Thr 140532589623040] INTERNAL T1_U24983_M0, 000, SAPSYS, ,
time=08:20:26, W19, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 08:20:29:067 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000944f9} {root-id=730EFE
[Thr 140532586981120] INTERNAL T1_U24983_M0, 000, SAPSYS, ,
time=08:20:28, W19, program=SAPMSSY8, high priority, memo
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 08:20:32:772 2024
[Thr 140532589623040] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532589623040] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532589623040] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532589623040] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532589623040] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532589623040] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532589623040] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532589623040] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532589623040] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532589623040] >> ===== SecuSSL ErrStack: =====
[Thr 140532589623040] Peer not trusted
[Thr 140532589623040] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532589623040] # --- Messages -----------
[Thr 140532589623040] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532589623040] # --- Summary -----------
[Thr 140532589623040] #01 Certificate (End Entity): VALID
[Thr 140532589623040] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532589623040] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532589623040] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532589623040] #02 Certificate (Issuer): VALID
[Thr 140532589623040] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532589623040] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532589623040] ----- END VERIFICATION RESULT -----
[Thr 140532589623040] << =============================
[Thr 140532589623040] Target Hostname="apps.support.sap.com"
[Thr 140532589623040] SSL NI-hdl 155: local=10.200.50.156:21414
peer=155.56.96.48:443
[Thr 140532589623040] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd040011440)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532589623040] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532589623040] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532589623040]
[Thr 140532589623040] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532589623040] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532589623040] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532589623040] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532589623040] SSL NI-hdl 155: local=10.200.50.156:21414
peer=155.56.96.48:443
[Thr 140532589623040] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532589623040] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532589623040] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532589623040] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532589623040] Target Hostname="apps.support.sap.com"
[Thr 140532589623040] >> ---- SecuSSL ErrStack: ----
[Thr 140532589623040] Peer not trusted
[Thr 140532589623040] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532589623040] # --- Messages -----------
[Thr 140532589623040] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532589623040] # --- Summary -----------
[Thr 140532589623040] #01 Certificate (End Entity): VALID
[Thr 140532589623040] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532589623040] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532589623040] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532589623040] #02 Certificate (Issuer): VALID
[Thr 140532589623040] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532589623040] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532589623040] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532589623040] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532589623040] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532589623040] ----- END VERIFICATION RESULT -----
[Thr 140532589623040] << ---------------------------
[Thr 140532589623040]
[Thr 140532589623040] {000944ff} {root-id=730EFE781C731EEEBDF97028640270DE}
[icxxconn.c 2536]
[Thr 140532589623040] SYNC_RFC T30_U24975_M0, 000, SAP_BATCH,
vq20app.sap.swisspor, time=08:19:52, W12, program=SAPMSSY
[Thr 140532589623040] role: Client, protocol: HTTPS, local:
10.200.50.156:21414, peer: 155.56.96.48:443
[Thr 140532590151424] SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532590151424] *** ERROR in secussl_read: SSL_read() lasterr 0x2000051d
[Thr 140532590151424] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590151424] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt=11)
[Thr 140532590151424] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532590151424] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532590151424] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532590151424] secussl_read: SSL_read() failed (536872221/0x2000051d)
[Thr 140532590151424] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590151424] >> ===== SecuSSL ErrStack: =====
[Thr 140532590151424] Peer not trusted
[Thr 140532590151424] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532590151424] # --- Messages -----------
[Thr 140532590151424] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532590151424] # --- Summary -----------
[Thr 140532590151424] #01 Certificate (End Entity): VALID
[Thr 140532590151424] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532590151424] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532590151424] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532590151424] #02 Certificate (Issuer): VALID
[Thr 140532590151424] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532590151424] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532590151424] ----- END VERIFICATION RESULT -----
[Thr 140532590151424] << =============================
[Thr 140532590151424] Target Hostname="apps.support.sap.com"
[Thr 140532590151424] SSL NI-hdl 156: local=10.200.50.156:21424
peer=155.56.96.48:443
[Thr 140532590151424] <<- ERROR:
SapSSLSessionStartNB(sssl_hdl=7fd028013a10)==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532590151424] *** ERROR => SSL handshake with apps.support.sap.com:443
failed: SSSLERR_PEER_CERT_UNTRUSTED (-102)
[Thr 140532590151424] Peer's X.509 certificate (chain) validation failed (missing
trust?)
[Thr 140532590151424]
[Thr 140532590151424] SapSSLSessionStartNB()==SSSLERR_PEER_CERT_UNTRUSTED
[Thr 140532590151424] SSL:SSL_read() failed (536872221/0x2000051d)
[Thr 140532590151424] => "Failed to verify peer certificate. Peer not trusted."
[Thr 140532590151424] SSL:SSL_get_state()==0x2131 "TLS read server certificate B"
[Thr 140532590151424] SSL NI-hdl 156: local=10.200.50.156:21424
peer=155.56.96.48:443
[Thr 140532590151424] cli SSL session PSE "/usr/sap/Q20/D02/sec/SAPSSLC.pse"
(load=Fri Apr 5 11:51:48 2024, rcnt= 11)
[Thr 140532590151424] SSL_CTX ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 140532590151424] Client SSL_CTX 7fd00c0eda70 pvflags=896
(TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 140532590151424] TLSextSNI server_name="apps.support.sap.com"
[Thr 140532590151424] Target Hostname="apps.support.sap.com"
[Thr 140532590151424] >> ---- SecuSSL ErrStack: ----
[Thr 140532590151424] Peer not trusted
[Thr 140532590151424] ----- BEGIN VERIFICATION RESULT -----
[Thr 140532590151424] # --- Messages -----------
[Thr 140532590151424] ERROR: The chain of certificates is incomplete or untrusted,
missing certificate of [C8:02:5F:9F] CN=DigiCert
[Thr 140532590151424] # --- Summary -----------
[Thr 140532590151424] #01 Certificate (End Entity): VALID
[Thr 140532590151424] Subject: CN=apps.support.sap.com,
O=SAP SE, L=Walldorf, SP=Baden-Württemberg, C=DE
[Thr 140532590151424] Issuer: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
65:5E:5D:05:6D:DB:63:87:6B:30:2E:8B:20:DC:AA:40:EB:7C:22:73:AA:8A:DB:E4:08:86:
[Thr 140532590151424] Validity: Thu Sep 21 01:00:00 2023 /
Sat Sep 21 00:59:59 2024
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (Issuer - Only Invalid C
[Thr 140532590151424] #02 Certificate (Issuer): VALID
[Thr 140532590151424] Subject: CN=DigiCert Global G2 TLS RSA
SHA256 2020 CA1, O=DigiCert Inc, C=US
[Thr 140532590151424] Issuer: CN=DigiCert Global Root G2,
OU=www.digicert.com, O=DigiCert Inc, C=US
[Thr 140532590151424] Fingerprint (SHA256):
C8:02:5F:9F:C6:5F:DF:C9:5B:3C:A8:CC:78:67:B9:A5:87:B5:27:79:73:95:79:17:46:3F:
[Thr 140532590151424] Validity: Tue Mar 30 01:00:00 2021 /
Sun Mar 30 00:59:59 2031
[Thr 140532590151424] PKI validation: FAILED: Validation of
dependents - Issuer Certificate (ERROR: Issuer - No Cert
[Thr 140532590151424] ----- END VERIFICATION RESULT -----
[Thr 140532590151424] << ---------------------------
[Thr 140532590151424]
[Thr 140532590151424] {00094500} {root-id=730EFE781C731EEEBDF97028640270DE}
[icxxconn.c 2536]
[Thr 140532590151424] SYNC_RFC T31_U24974_M0, 000, SAP_BATCH, ,
time=08:20:32, W10, program=SAPMSSY1, low priority, mem
[Thr 140532590151424] role: Client, protocol: HTTPS, local:
10.200.50.156:21424, peer: 155.56.96.48:443
[Thr 140532587509504] Thu Apr 11 08:25:26:552 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009451f} {root-id=730EFE
[Thr 140532587509504] INTERNAL T24_U25173_M0, 000, SAPSYS, ,
time=08:25:26, W19, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 08:30:26:607 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094542} {root-id=730EFE
[Thr 140532588037888] INTERNAL T29_U25317_M0, 000, SAPSYS, ,
time=08:30:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 08:30:29:084 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094546} {root-id=730EFE
[Thr 140532587509504] INTERNAL T29_U25317_M0, 000, SAPSYS, ,
time=08:30:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 08:35:26:595 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009456a} {root-id=730EFE
[Thr 140532589623040] INTERNAL T31_U25487_M0, 000, SAPSYS, ,
time=08:35:26, W16, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589094656] Thu Apr 11 08:40:26:600 2024
[Thr 140532589094656] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009458d} {root-id=730EFE
[Thr 140532589094656] INTERNAL T6_U25641_M0, 000, SAPSYS, ,
time=08:40:26, W11, program=SAPMSSY8, high priority, memo
[Thr 140532589094656] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 08:40:29:075 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094591} {root-id=730EFE
[Thr 140532589623040] INTERNAL T6_U25641_M0, 000, SAPSYS, ,
time=08:40:28, W11, program=SAPMSSY8, high priority, memo
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 08:45:26:757 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000945b7} {root-id=730EFE
[Thr 140532587509504] INTERNAL T36_U25810_M0, 000, SAPSYS, ,
time=08:45:26, W14, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532588037888] Thu Apr 11 08:50:26:600 2024
[Thr 140532588037888] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000945da} {root-id=730EFE
[Thr 140532588037888] INTERNAL T35_U26011_M0, 000, SAPSYS, ,
time=08:50:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532588037888] role: Client, protocol: HTTP
[Thr 140532587509504] Thu Apr 11 08:50:29:064 2024
[Thr 140532587509504] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {000945de} {root-id=730EFE
[Thr 140532587509504] INTERNAL T35_U26011_M0, 000, SAPSYS, ,
time=08:50:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532587509504] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 08:55:26:620 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094602} {root-id=730EFE
[Thr 140532589623040] INTERNAL T24_U26202_M0, 000, SAPSYS, ,
time=08:55:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532589623040] Thu Apr 11 09:00:26:637 2024
[Thr 140532589623040] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {00094626} {root-id=730EFE
[Thr 140532589623040] INTERNAL T11_U26347_M0, 000, SAPSYS, ,
time=09:00:26, W18, program=SAPMSSY8, high priority, mem
[Thr 140532589623040] role: Client, protocol: HTTP
[Thr 140532586981120] Thu Apr 11 09:00:29:090 2024
[Thr 140532586981120] *** WARNING => Connect to baswaretest.swissport.aero:80
failed: NIEHOST_UNKNOWN(-2) {0009462a} {root-id=730EFE
[Thr 140532586981120] INTERNAL T11_U26347_M0, 000, SAPSYS, ,
time=09:00:28, W18, program=SAPMSSY8, high priority, mem
[Thr 140532586981120] role: Client, protocol: HTTP
[Thr 140532577003264] Thu Apr 11 09:01:30:766 2024
[Thr 140532577003264] IcmSetTrcLevel: Switch trace level to: 2
[Thr 140532577003264] *
[Thr 140532577003264] * SWITCH TRC-LEVEL to 2
[Thr 140532577003264] *
[Thr 140532577003264] eppSetTraceLevel: changing trace level to 2
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_ICMAN_OPCODE_RESP request
(rq_id 26077862, slot 934)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 1 with request rq_id
26077862
[Thr 140532577003264] DpCaRelBlk: released ca_blk 1
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] Thu Apr 11 09:01:35:772 2024
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532585395968] MPI<2>0#2331576 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331577 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331578: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331578 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] MPI<2>0#2331575 WriteOOB 77
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532599072512] Thu Apr 11 09:01:37:284 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140533415016064] Thu Apr 11 09:01:40:164 2024
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiICreateHandle: hdl 155 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 155/sock 29 (I4;
ST)
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 155 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 155 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 155 from 10.200.51.199:48258
[Thr 140533415016064] NiIAccept: hdl 155 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345654/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.199 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360773
[Thr 140532586452736] IcmWorkerHandleRequest: worker 8 got the semaphore
[Thr 140532586452736] REQ TRACE BEGIN: 9/345654/1
[Thr 140532586452736] REQUEST:
Type: ACCEPT_CONNECTION Index = 360773
[Thr 140532586452736] CONNECTION (id=9/345654):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 155, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.199:48258 ()
status: NOP
connect time: 11.04.2024 09:01:40
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140533415016064] IcmQueueAppend: queuelen: 0
[Thr 140533415016064] MAIN TRACE END
[Thr 140532586452736] MPI 187: event flag already open:7643 key=16643
[Thr 140532586452736] MPI 187: event flag already open:7642 key=16642
[Thr 140532586452736] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532586452736] MPI<78179>bb#1 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532586452736] MPI<78179>bb#2 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532586452736] MPI 188: event flag already open:7641 key=16641
[Thr 140532586452736] MPI 188: event flag already open:7640 key=16640
[Thr 140532586452736] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532586452736] MPI<7817a>bc#1 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532586452736] MPI<7817a>bc#2 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532586452736] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532586452736] Thu Apr 11 09:01:40:167 2024
[Thr 140532586452736] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532586452736] out: sssl_hdl = 7fd02c042a30
[Thr 140532586452736] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532586452736] SSL NI-hdl 155: local=10.200.50.133:8443
peer=10.200.51.199:48258
[Thr 140532586452736] <<- SapSSLSetNiHdl(sssl_hdl=7fd02c042a30,
ni_hdl=155)==SAP_O_K
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532586452736] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532586452736] ClientHello session_id="57767189 0BFECFE9 30C0CB29
A02C4AAB EACB9432 28160AE1 75AB3720 E7683655"
[Thr 140532586452736] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532586452736] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532586452736] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532586452736] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532586452736] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532586452736] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532586452736] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532586452736] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532586452736] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532586452736] (failed resume) new TLS session_id="1A3E2817 8DED6F04
1C52B262 CE4E0FDB C08BAFD1 780A9165 47636F31 F8B8A73B
[Thr 140532586452736] SapSSLISessionStartFin(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532586452736] <<- SapSSLSessionStartNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532586452736] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] IcmReadFromConn(id=9/345654): request new MPI (0/0)
[Thr 140532586452736] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532586452736] MPI<78179>bb#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532586452736] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532586452736] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586452736] Thu Apr 11 09:01:40:173 2024
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532586452736] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532586452736] <<- SapSSLReadNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] IcmReadFromConn(id=9/345654): no SSL data available
[Thr 140532586452736] IcmReadFromConn(id=9/345654): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532586452736] BINDUMP of content denied
[Thr 140532586452736] HttpPlugInHandleNetData(rqid=9/345654/1): role: Server(1),
status: 1
[Thr 140532586452736] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532586452736] ICT: IctIHttpOpenMessage: 7fd02c064b40 typ=1
[Thr 140532586452736] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532586452736] HttpParseRequestHeader: no content length set
[Thr 140532586452736] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532586452736] HttpParseRequestHeader: Version: 1001
[Thr 140532586452736] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532586452736] <<- SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] out: cert_len = <no cert>
[Thr 140532586452736] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586452736] HTTP request (raw) [9/345654/1]:
[Thr 140532586452736] GET /sap/bc/ping HTTP/1.1
[Thr 140532586452736] host: 10.200.50.133:8443
[Thr 140532586452736] connection: close
[Thr 140532586452736] user-agent: ELB-HealthChecker/2.0
[Thr 140532586452736] accept-encoding: gzip, compressed
[Thr 140532586452736] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532586452736] <<- SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] out: cert_len = <no cert>
[Thr 140532586452736] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586452736] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532586452736] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532586452736] DpPlgGetVirtHost: no server defined, use default
[Thr 140532586452736] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532586452736] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532586452736] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532586452736] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532586452736] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532586452736] Thu Apr 11 09:01:40:174 2024
[Thr 140532586452736] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532586452736] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532586452736] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532586452736] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532586452736] >> start >>
CsiExecute(7fd02401e940,7fd04ae4aa20,12,1,7fd04ae4aa10,7fd04ae4a9f4,0)
[Thr 140532586452736] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532586452736] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532586452736] << end << CsiExecute(CSI_RC==OK)
[Thr 140532586452736] >> start >> CsiFreeInstance((nil))
[Thr 140532586452736] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532586452736] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532586452736] HttpModHandler: process 1, header_len 144
[Thr 140532586452736] <<- SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] out: cert_len = <no cert>
[Thr 140532586452736] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586452736] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586452736] HttpModHandler: perform the actions: (128)
[Thr 140532586452736] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532586452736] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586452736] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532586452736] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532586452736] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532586452736] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532586452736] IctCmOpen#357242 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] IctCmOpen#459351 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532586452736] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532586452736] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532586452736] IctCmOpen#357243 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] IctCmOpen#459352 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] HttpCacheHandler: cache miss.
[Thr 140532586452736] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586452736] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532586452736] ICT: IctLookupPathTable() -> 0
[Thr 140532586452736] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532586452736] DTRACE(9/345654/1): {root-
id=730EFE781C731EEEBDFA2B13316013E9}_{conn-id=730EFE781C731EEEBDFA2B13316033E9}_1
[Thr 140532586452736] Thu Apr 11 09:01:40:175 2024
[Thr 140532586452736] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532586452736] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532586452736] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586452736] flush buffer with mpi buffer id 7
[Thr 140532586452736] MPI<78179>bb#4 FlushOutbuf 7 1 0 255cb0 224 6 -> 7fd050314cb0
MPI_OK
[Thr 140532586452736] IcmPlFlushBuf: roll in workprocess
[Thr 140532586452736] IcmConnRollInWP: roll in work process
[Thr 140532586452736] IcmCreateDpRequest: Send request to AppServer
[Thr 140532586452736] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532586452736] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532586452736] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532586452736] DpListRemove: remove elem 6 from tmadm_free_list
[Thr 140532586452736] DpListRemove: 1193 elems in tmadm_free_list
[Thr 140532586452736] DpListInsert: insert elem 6 into tmadm_inuse_list (at begin)
[Thr 140532586452736] DpListInsert: 7 elems in tmadm_inuse_list
[Thr 140532586452736] DpInitInternalSession: initialized T6_M0_I0
[Thr 140532586452736] DpITmSlotClear: cleared T6_U26389
[Thr 140532586452736] DpTmSlotAllocate: allocated T6_U26389
[Thr 140532586452736] RqQQueueCreate: Created queue <T6_U26389_M0> in slot 53
(48954) with normal priority
[Thr 140532586452736] DpLogonInit: new logon T6_U26389, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal priori
[Thr 140532586452736] IcmSendRq: created T6_U26389_M0
[Thr 140532586452736] DpSesGetWorkerType: return workerType DIA for T6_U26389
[Thr 140532586452736] DpRqSlotAllocate: 1 pending requests
[Thr 140532586452736] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26077880, slot 935)
[Thr 140532586452736] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26077880) from
ICMAN to local WORKER
[Thr 140532586452736] rq_id 26077880
[Thr 140532586452736] -OUT- ca_blk -1 len 0
[Thr 140532586452736] -OUT- userTrace 2
[Thr 140532586452736] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532586452736] -OUT- mpi rq <78179> mpi resp <7817a> prot
2
[Thr 140532586452736] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532586452736] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532586452736] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA2B13316013E9}_{conn-id=730EFE781C731EEEBDFA2B13316033E9}_1
[Thr 140532586452736] -OUT- sender address:
[Thr 140532586452736] -OUT- type LOCAL
[Thr 140532586452736] -OUT- agentType ICMAN
[Thr 140532586452736] -OUT- receiver address:
[Thr 140532586452736] -OUT- type LOCAL
[Thr 140532586452736] -OUT- agentType WORKER workerTyp DIA
[Thr 140532586452736] -OUT- session T6_U26389_M0
[Thr 140532586452736] RqQAddRequest: Add request rq_id 26077880 (DIA) to queue
<T6_U26389_M0> in slot 53 at the end
[Thr 140532586452736] Dump of queue <T6_U26389_M0> in slot 53 (1 requests, port=0):
[Thr 140532586452736] -1 <- 29 (rq_id 26077880, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532586452736] RqQQueueAddToSessionQueue: Added queue <T6_U26389_M0> in slot
53 to normal priority session queue at the end (
[Thr 140532586452736] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532586452736] -1 <- 53 < T6_U26389_M0> -> -1
[Thr 140532586452736] RqQNotifySessionQueue: notify normal priority session queue
of queue <T6_U26389_M0> (DIA) (id=181)
[Thr 140532586452736] Info of W13 (inside function RqQNotifyWorker (end))
[Thr 140532586452736] noOfPendingQueues=>W13-0<
[Thr 140532586452736] noOfWaitForQueues=>W13-2<
[Thr 140532586452736] wait for queue 69 (T38_U26359_M0)
[Thr 140532586452736] wait for queue 18 (W13)
[Thr 140532586452736] lowestPriority: normal priority
[Thr 140532586452736] modCounter=>W13-3399494<
[Thr 140532586452736] RqQNotifyWorker: notify W13 about dispatch queues
(modCounter=>W13-3399494<)
[Thr 140532586452736] RqQSetWorkerState: W13 has state RUNNING (modCounter=>W13-
3399494<)
[Thr 140532586452736] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532586452736] RqQQueueGetNumberOfRequests: Queue <T6_U26389_M0> in slot 53
contains 1 requests of type DIA
[Thr 140532586452736] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26077880), queue has 1 requests
[Thr 140532586452736] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26077880,
slot 935)
[Thr 140532586452736] Thu Apr 11 09:01:40:175 2024
[Thr 140532586452736] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532586452736] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532586452736] IcmHandleNetRead(id=9/345654): read_len: 144, HandleNetData
returned: 4
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] IcmReadFromPartner(id=9/345654): read with maximum timeout
500
[Thr 140532586452736] IcmMpiWatchInsert: MPI watch entry <7817a>, number 11
inserted.
[Thr 140532586452736] MPI<7817a>bc#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532586452736] MPI<7817a>bc#6 GetInbuf -1 255cb0 1087 (1) -> MPI_EOS: End Of
Stream
[Thr 140532586452736] IcmMpiWatchRemove: MPI watch entry <7817a>, number 11 removed
(wakeup was not sent).
[Thr 140532586452736] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532586452736] BINDUMP of content denied
[Thr 140532586452736] PlugInHandleServData(rqid=9/345654/1): role: Server(1),
status: 3
[Thr 140532586452736] content-length: 0/-1, buf_len: 1007, buf_offset: 0,
buf_status: 6
[Thr 140532586452736] ICT: IctIHttpOpenMessage: 7fd02c077470 typ=2
[Thr 140532586452736] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532586452736] HttpParseResponseHeader: Version: 1001
[Thr 140532586452736] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532586452736] HTTP response (raw) [9/345654/1]:
[Thr 140532586452736] HTTP/1.1 403 Forbidden
[Thr 140532586452736] content-type: text/html; charset=utf-8
[Thr 140532586452736] content-length: 857
[Thr 140532586452736] sap-perf-fesrec: 3698.000000
[Thr 140532586452736] content-encoding: gzip
[Thr 140532586452736] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532586452736] DTRACE(9/345654/1): {root-
id=730EFE781C731EEEBDFA2B13316013E9}_{conn-id=730EFE781C731EEEBDFA2B13316033E9}_1
[Thr 140532586452736] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532586452736] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 29 (rq_id 26077881)
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:60019
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=165), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26077881 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] Thu Apr 11 09:01:40:189 2024
[Thr 140532577003264] rq_id 26077881
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 2
[Thr 140532577003264] -IN-- sDataLen 8 sData 0900000036460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
13
[Thr 140532577003264] -IN-- session T6_U26389_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26077881, slot 936)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26077881)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345654
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26077881, slot 936)
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331579 WriteOOB 77
[Thr 140532585395968] MPI<2>0#2331580 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331581 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331582: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331582 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532586452736] HttpSAPR3Handler: Response from AppServer
[Thr 140532586452736] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586452736] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586452736] HttpCacheHandler: TASK_RESPONSE 150 7fd024001ae0 7fd02c075fb0
[Thr 140532586452736] ISC: don't cache response: status code=403
[Thr 140532586452736] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532586452736] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586452736] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532586452736] HttpModHandler: process 2, header_len 150
[Thr 140532586452736] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586452736] HttpModHandler: perform the actions: (128)
[Thr 140532586452736] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532586452736] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586452736] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532586452736] Thu Apr 11 09:01:40:189 2024
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532586452736] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532586452736] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpModHandler: process 3, header_len 0
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd02c075fb0
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532586452736] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532586452736] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532586452736] IcmHandleReadFromPartner(id=9/345654): HandleServData
returned: 702
[Thr 140532586452736] BINDUMP of content denied
[Thr 140532586452736] IcmWriteToConn(id=9/345654): prepared to write data to
partner (len = 1007, timeout = 2000)
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1036 of 1036)
[Thr 140532586452736] <<- SapSSLWriteNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "buf= 7fd050314d20, written= 1007 of 1007
(all) io=idle"
[Thr 140532586452736] IcmWriteToConn(id=9/345654): wrote data to partner (len =
1007)
[Thr 140532586452736] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532586452736] MPI<7817a>bc#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532586452736] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532586452736] ICT: IctHttpCloseMessage( 7fd02c064b40 ) -> u=0 rc=0
[Thr 140532586452736] ICT: IctHttpCloseMessage( 7fd02c077470 ) -> u=0 rc=0
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532586452736] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532586452736] in: sssl_hdl = 7fd02c042a30
[Thr 140532586452736] in: ... ni_hdl = 155
[Thr 140532586452736] in: flags = 0
[Thr 140532586452736] in: timeout = 10000
[Thr 140532586452736] MPI<78179>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532586452736] MPI<78179>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532586452736] MPI<78179>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586452736] MPI<7817a>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532586452736] MPI<7817a>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532586452736] MPI<7817a>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586452736] NiIShutdownHandle: shutdown -w of hdl 155
[Thr 140532586452736] SiPeek: hang up occurred in sock 29
[Thr 140532586452736] NiIPeek: peek for hdl 155 failed (r; rc=1)
[Thr 140532586452736] Thu Apr 11 09:01:40:190 2024
[Thr 140532586452736] NiIRead: SiRecv failed for hdl 155/sock 29
[Thr 140532586452736] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.199:48258;
L=10.200.50.133:8443)
[Thr 140532586452736] NiICloseHandle: shutdown and close hdl 155/sock 29
[Thr 140532586452736] IcmConnClose: Connection 9/345654 closed
[Thr 140532586452736] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.199 ->
rc=0
[Thr 140532586452736] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532586452736] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
-> 0
[Thr 140532586452736] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=-1 -> 0
[Thr 140532586452736] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532586452736] REQ TRACE END: 9/345654/1
[Thr 140532586452736] IcmWorkerThread: Thread 8: Waiting for event
[Thr 140532586452736] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Thu Apr 11 09:01:42:954 2024
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 29 (rq_id 26077894)
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:47230
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=166), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26077894 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26077894
[Thr 140532577003264] -IN-- ca_blk 1 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_ICMAN_OPCODE_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
15
[Thr 140532577003264] -IN-- session T31_U25632_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 1
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_ICMAN_OPCODE_RESP
request (rq_id 26077894, slot 937)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26077894)
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_TRACE_UP(5)
[Thr 140532577003264] IcmHandleAdmMsg: increase trace level
[Thr 140532577003264] IcmSetTrcLevel: Switch trace level to: 3
[Thr 140532577003264] *
[Thr 140532577003264] * SWITCH TRC-LEVEL to 3
[Thr 140532577003264] *
[Thr 140532577003264] eppSetTraceLevel: changing trace level to 3
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_ICMAN_OPCODE_RESP request
(rq_id 26077894, slot 937)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 1 with request rq_id
26077894
[Thr 140532577003264] DpCaRelBlk: released ca_blk 1
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=1000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 1000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=1000)
[Thr 140532577003264] Thu Apr 11 09:01:43:955 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: call schedules, last t: 1712818873, next
t: 1712818903, cur t: 1712818903
[Thr 140532577003264] IcmCreateRequest: Append request 360774
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532588037888] IcmWorkerHandleRequest: worker 5 got the semaphore
[Thr 140532588037888] REQUEST:
Type: SCHEDULER Index = 360774
[Thr 140532588037888] IcmGetSchedule: found slot 0
[Thr 140532588037888] IcmAlReportPerfData: Reporting data to CCMS Alerting
Infrastructure
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532588037888] IcmConnCheckStoredClientConn: next client timeout check in 7
sec
[Thr 140532588037888] IcmConnInitContext: context initialized
[Thr 140532588037888] IcmGetServicePtr: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 1
[Thr 140532588037888] PlugInHandleAdmMessage: request received:
[Thr 140532588037888] PlugInHandleAdmMessage: opcode: ICM_COM_OP_CACHE_STAT (136),
len: 528, dest_type: 2, subhdlkey: 262145(4/0)
[Thr 140532588037888] HttpISubHandlerItCreate: add reference to table 7fd024010780,
now 2 references, 1 tables used
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_ADM_MSG(4), header_l
[Thr 140532588037888] HttpCacheHandler: TASK_ADM_MSG 0 7fd024001ae0 (nil)
[Thr 140532588037888] SCACHE: adm request received:
[Thr 140532588037888] SCACHE: opcode: 136, len: 528, dest_type: 2, dest:
[Thr 140532588037888] MTX_LOCK 3247 7fd024004a70
[Thr 140532588037888] MTX_UNLOCK 3260 7fd024004a70
[Thr 140532588037888] IctCmGetCacheInfo#459353 -> 0
[Thr 140532588037888] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532588037888] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532588037888] HttpSubHandlerItDelete: remove reference to table
7fd024010780, now 1 references, 1 tables used
[Thr 140532588037888] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532588037888] IcmServDecrRefCount: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 0
[Thr 140532588037888] IcmGetSchedule: next schedule in 30 secs
[Thr 140532588037888] IcmWorkerThread: Thread 5: Waiting for event
[Thr 140532588037888] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:01:47:294 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:01:48:960 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331583 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331584 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331585 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331586: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331586 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532577003264] Thu Apr 11 09:01:53:963 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331587 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331588 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331589 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331590: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331590 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140533415016064] Thu Apr 11 09:01:54:773 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 156 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 156/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 156 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 156 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 156 from 10.200.51.221:15868
[Thr 140533415016064] NiIAccept: hdl 156 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345656/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.221 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360775
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532589623040] IcmWorkerHandleRequest: worker 2 got the semaphore
[Thr 140532589623040] REQ TRACE BEGIN: 9/345656/1
[Thr 140532589623040] REQUEST:
Type: ACCEPT_CONNECTION Index = 360775
[Thr 140532589623040] CONNECTION (id=9/345656):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 156, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.221:15868 ()
status: NOP
connect time: 11.04.2024 09:01:54
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532589623040] Thu Apr 11 09:01:54:773 2024
[Thr 140532589623040] MPI 188: event flag already open:7641 key=16641
[Thr 140532589623040] MPI 188: event flag already open:7640 key=16640
[Thr 140532589623040] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532589623040] MPI<7817b>bc#1 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532589623040] MPI<7817b>bc#2 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532589623040] MPI 187: event flag already open:7643 key=16643
[Thr 140532589623040] MPI 187: event flag already open:7642 key=16642
[Thr 140532589623040] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532589623040] MPI<7817c>bb#1 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532589623040] MPI<7817c>bb#2 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532589623040] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532589623040] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532589623040] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532589623040] out: sssl_hdl = 7fd04004ab80
[Thr 140532589623040] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd04004ab80,
cred_hdl=7fd00c064270)
[Thr 140532589623040] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532589623040] ->> SapSSLSetNiHdl(sssl_hdl=7fd04004ab80, ni_hdl=156)
[Thr 140532589623040] SSL NI-hdl 156: local=10.200.50.133:8443
peer=10.200.51.221:15868
[Thr 140532589623040] <<- SapSSLSetNiHdl(sssl_hdl=7fd04004ab80,
ni_hdl=156)==SAP_O_K
[Thr 140532589623040] ->> SapSSLSessionStartNB(sssl_hdl=7fd04004ab80, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532589623040] NiIBlockMode: leave blockmode for hdl 156 FALSE
[Thr 140532589623040] NiIHdlGetStatus: hdl 156/sock 29 ok, data pending (len=1)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532589623040] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532589623040] ClientHello session_id="12F586E5 50E563FD 150643EF
48691F8A A073731C CE1D58F7 88113A8B 75131115"
[Thr 140532589623040] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532589623040] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532589623040] TLS_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_AES_256_GCM_SHA384
[Thr 140532589623040] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532589623040] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532589623040] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532589623040] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532589623040] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532589623040] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532589623040] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532589623040] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532589623040] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532589623040] [ssl_bytes_to_cipher_suites]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Received TLS Extensions:
[Thr 140532589623040] Id: 43 - supported_versions [RFC8446]
[Thr 140532589623040] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532589623040] Id: 51 - key_share [RFC8446]
[Thr 140532589623040] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532589623040] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532589623040] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532589623040] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532589623040] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532589623040] [ssl_parse_clienthello_tlsext]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Own TLS certificate:
[Thr 140532589623040] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532589623040] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532589623040] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532589623040] [ssl3_output_cert_chain]
[Thr 140532589623040] Thu Apr 11 09:01:54:773 2024
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: CA certificate:
[Thr 140532589623040] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532589623040] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532589623040] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532589623040] [ssl3_output_cert_chain]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Offering 2 certificate type(s) for
client authentication:
[Thr 140532589623040] rsa_sign(1)
[Thr 140532589623040] ecdsa_sign(64)
[Thr 140532589623040] [ssl3_get_req_cert_type]
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532589623040] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532589623040] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532589623040] [ssl_get_encoded_trusted_ca_list]
[Thr 140532589623040] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532589623040] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532589623040] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532589623040] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Received message of type
"Certificate" containing no certificates.
[Thr 140532589623040] Renouncing client authentication: verification mode: 1
[Thr 140532589623040] [ssl3_decode_client_certificate]
[Thr 140532589623040] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532589623040] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532589623040] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532589623040] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532589623040] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532589623040] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532589623040] No Client Certificate
[Thr 140532589623040] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532589623040] (failed resume) new TLS session_id="1C849BC6 ED3BC7E7
E987D049 315C8CC1 C78131C7 469A36BD 20D81C9A 9BF98202
[Thr 140532589623040] SapSSLISessionStartFin(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532589623040] <<- SapSSLSessionStartNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532589623040] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd04004ab80, &plen=(nil),
&more=(nil), &ios=7fd04b156c38)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] IcmReadFromConn(id=9/345656): request new MPI (0/0)
[Thr 140532589623040] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532589623040] MPI<7817b>bc#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532589623040] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532589623040] Thu Apr 11 09:01:54:776 2024
[Thr 140532589623040] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd04004ab80,
&plen=7fd04b156b18, &more=7fd04b156b17, &ios=7fd04b156b1c)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] NiIPeek: peek successful for hdl 156 (r)
[Thr 140532589623040] ->> SapSSLReadNB(sssl_hdl=7fd04004ab80, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532589623040] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532589623040] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532589623040] <<- SapSSLReadNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd04004ab80,
&plen=7fd04b156b18, &more=7fd04b156b17, &ios=7fd04b156b1c)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] NiIPeek: peek for hdl 156 timed out (r; 0ms)
[Thr 140532589623040] IcmReadFromConn(id=9/345656): no SSL data available
[Thr 140532589623040] IcmReadFromConn(id=9/345656): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] HttpPlugInHandleNetData(rqid=9/345656/1): role: Server(1),
status: 1
[Thr 140532589623040] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532589623040] ICT: IctIHttpOpenMessage: 7fd04005dda0 typ=1
[Thr 140532589623040] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532589623040] HttpParseRequestHeader: no content length set
[Thr 140532589623040] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532589623040] HttpParseRequestHeader: Version: 1001
[Thr 140532589623040] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532589623040] ->> SapSSLGetPeerInfo(sssl_hdl=7fd04004ab80,
&cert=7fd04b1566f0, &cert_len=7fd04b1566ec,
[Thr 140532589623040] &subject_dn=7fd04b1566f8, &issuer_dn=7fd04b156700,
&csuite_name=7fd04b156708)
[Thr 140532589623040] <<- SapSSLGetPeerInfo(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] out: cert_len = <no cert>
[Thr 140532589623040] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532589623040] HTTP request (raw) [9/345656/1]:
[Thr 140532589623040] GET /sap/bc/ping HTTP/1.1
[Thr 140532589623040] host: 10.200.50.133:8443
[Thr 140532589623040] connection: close
[Thr 140532589623040] user-agent: ELB-HealthChecker/2.0
[Thr 140532589623040] accept-encoding: gzip, compressed
[Thr 140532589623040] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532589623040] ->> SapSSLGetPeerInfo(sssl_hdl=7fd04004ab80,
&cert=7fd04b155638, &cert_len=7fd04b155634,
[Thr 140532589623040] &subject_dn=7fd04b155640, &issuer_dn=7fd04b155648,
&csuite_name=7fd04b1556c8)
[Thr 140532589623040] <<- SapSSLGetPeerInfo(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] out: cert_len = <no cert>
[Thr 140532589623040] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532589623040] Thu Apr 11 09:01:54:777 2024
[Thr 140532589623040] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532589623040] sap-cancel-on-close not found
[Thr 140532589623040] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532589623040] DpPlgGetVirtHost: no server defined, use default
[Thr 140532589623040] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532589623040] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532589623040] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532589623040] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532589623040] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532589623040] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532589623040] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532589623040] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532589623040] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532589623040] >> start >>
CsiExecute(7fd02401e940,7fd04b150a20,12,1,7fd04b150a10,7fd04b1509f4,0)
[Thr 140532589623040] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532589623040] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532589623040] << end << CsiExecute(CSI_RC==OK)
[Thr 140532589623040] >> start >> CsiFreeInstance((nil))
[Thr 140532589623040] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532589623040] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532589623040] HttpModHandler: process 1, header_len 144
[Thr 140532589623040] ->> SapSSLGetPeerInfo(sssl_hdl=7fd04004ab80,
&cert=7fd04b1518a0, &cert_len=7fd04b151580,
[Thr 140532589623040] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532589623040] <<- SapSSLGetPeerInfo(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] out: cert_len = <no cert>
[Thr 140532589623040] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532589623040] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532589623040] HttpModHandler: perform the actions: (128)
[Thr 140532589623040] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532589623040] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532589623040] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532589623040] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532589623040] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532589623040] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532589623040] MTX_LOCK 1760 7fd024005020
[Thr 140532589623040] MTX_UNLOCK 1891 7fd024005020
[Thr 140532589623040] IctCmOpen#357244 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532589623040] MTX_LOCK 1760 7fd024004a70
[Thr 140532589623040] Thu Apr 11 09:01:54:777 2024
[Thr 140532589623040] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532589623040] IctCmOpen#459354 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532589623040] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532589623040] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532589623040] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532589623040] MTX_LOCK 1760 7fd024005020
[Thr 140532589623040] MTX_UNLOCK 1891 7fd024005020
[Thr 140532589623040] IctCmOpen#357245 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532589623040] MTX_LOCK 1760 7fd024004a70
[Thr 140532589623040] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532589623040] IctCmOpen#459355 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532589623040] HttpCacheHandler: cache miss.
[Thr 140532589623040] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532589623040] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532589623040] ICT: IctLookupPathTable() -> 0
[Thr 140532589623040] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532589623040] DTRACE(9/345656/1): {root-
id=730EFE781C731EEEBDFA2C29B87B140E}_{conn-id=730EFE781C731EEEBDFA2C29B87B340E}_1
[Thr 140532589623040] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532589623040] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532589623040] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532589623040] flush buffer with mpi buffer id 7
[Thr 140532589623040] MPI<7817b>bc#4 FlushOutbuf 7 1 0 255cb0 224 6 -> 7fd050314cb0
MPI_OK
[Thr 140532589623040] IcmPlFlushBuf: roll in workprocess
[Thr 140532589623040] IcmConnRollInWP: roll in work process
[Thr 140532589623040] IcmCreateDpRequest: Send request to AppServer
[Thr 140532589623040] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532589623040] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532589623040] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532589623040] DpResourcesOk: logons: act/max/usage = 6/1200/0.500000 %
[Thr 140532589623040] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532589623040] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532589623040] DpResourcesOk: ES: act/max/usage = 2184 MB/10992 MB/19.868996
%
[Thr 140532589623040] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532589623040] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532589623040] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532589623040] DpListRemove: remove elem 36 from tmadm_free_list
[Thr 140532589623040] DpListRemove: 1193 elems in tmadm_free_list
[Thr 140532589623040] DpListInsert: insert elem 36 into tmadm_inuse_list (at begin)
[Thr 140532589623040] DpListInsert: 7 elems in tmadm_inuse_list
[Thr 140532589623040] Thu Apr 11 09:01:54:778 2024
[Thr 140532589623040] DpGetFreeUid: new UID: 26438
[Thr 140532589623040] DpSesLockSessionEntry: lock invalid T36_M0
[Thr 140532589623040] DpSesUnlockSessionEntry: unlocked invalid T36_M0
[Thr 140532589623040] DpInitInternalSession: initialized T36_M0_I0
[Thr 140532589623040] DpITmSlotClear: cleared T36_U26438
[Thr 140532589623040] DpTmSlotAllocate: allocated T36_U26438
[Thr 140532589623040] RqQQueueCreate: Created queue <T36_U26438_M0> in slot 68
(49059) with normal priority
[Thr 140532589623040] DpLogonInit: new logon T36_U26438, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532589623040] IcmSendRq: created T36_U26438_M0
[Thr 140532589623040] DpSesGetWorkerType: return workerType DIA for T36_U26438
[Thr 140532589623040] DpRqSlotAllocate: 1 pending requests
[Thr 140532589623040] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078206, slot 938)
[Thr 140532589623040] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078206) from
ICMAN to local WORKER
[Thr 140532589623040] rq_id 26078206
[Thr 140532589623040] -OUT- ca_blk -1 len 0
[Thr 140532589623040] -OUT- userTrace 3
[Thr 140532589623040] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532589623040] -OUT- mpi rq <7817b> mpi resp <7817c> prot
2
[Thr 140532589623040] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532589623040] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532589623040] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA2C29B87B140E}_{conn-id=730EFE781C731EEEBDFA2C29B87B340E}_1
[Thr 140532589623040] -OUT- sender address:
[Thr 140532589623040] -OUT- type LOCAL
[Thr 140532589623040] -OUT- agentType ICMAN
[Thr 140532589623040] -OUT- receiver address:
[Thr 140532589623040] -OUT- type LOCAL
[Thr 140532589623040] -OUT- agentType WORKER workerTyp DIA
[Thr 140532589623040] -OUT- session T36_U26438_M0
[Thr 140532589623040] RqQAddRequest: Add request rq_id 26078206 (DIA) to queue
<T36_U26438_M0> in slot 68 at the end
[Thr 140532589623040] Dump of queue <T36_U26438_M0> in slot 68 (1 requests,
port=0):
[Thr 140532589623040] -1 <- 83 (rq_id 26078206, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532589623040] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532589623040] RqQQueueAddToSessionQueue: Added queue <T36_U26438_M0> in
slot 68 to normal priority session queue at the end
[Thr 140532589623040] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532589623040] -1 <- 68 < T36_U26438_M0> -> -1
[Thr 140532589623040] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532589623040] RqQNotifySessionQueue: notify normal priority session queue
of queue <T36_U26438_M0> (DIA) (id=182)
[Thr 140532589623040] Info of W18 (inside function RqQNotifyWorker (end))
[Thr 140532589623040] noOfPendingQueues=>W18-0<
[Thr 140532589623040] noOfWaitForQueues=>W18-2<
[Thr 140532589623040] wait for queue 69 (T38_U26359_M0)
[Thr 140532589623040] wait for queue 23 (W18)
[Thr 140532589623040] lowestPriority: normal priority
[Thr 140532589623040] modCounter=>W18-2733039<
[Thr 140532589623040] RqQNotifyWorker: notify W18 about dispatch queues
(modCounter=>W18-2733039<)
[Thr 140532589623040] RqQSetWorkerState: W18 has state RUNNING (modCounter=>W18-
2733039<)
[Thr 140532589623040] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532589623040] RqQQueueGetNumberOfRequests: Queue <T36_U26438_M0> in slot 68
contains 1 requests of type DIA
[Thr 140532589623040] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078206), queue has 1 requests
[Thr 140532589623040] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078206,
slot 938)
[Thr 140532589623040] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532589623040] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532589623040] IcmHandleNetRead(id=9/345656): read_len: 144, HandleNetData
returned: 4
[Thr 140532589623040] IcmHandleNetRead(id=9/345656): status 1 -> 4
[Thr 140532589623040] ->> SapSSLReadPendingNB(sssl_hdl=7fd04004ab80,
&plen=7fd04b156c58, &more=7fd04b156c33, &ios=7fd04b156c38)
[Thr 140532589623040] <<- SapSSLReadPendingNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532589623040] IcmReadFromPartner(id=9/345656): read with maximum timeout
500
[Thr 140532589623040] IcmMpiWatchInsert: MPI watch entry <7817c>, number 11
inserted.
[Thr 140532589623040] MPI<7817c>bb#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532589623040] Thu Apr 11 09:01:54:795 2024
[Thr 140532589623040] MPI<7817c>bb#6 GetInbuf -1 255cb0 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532589623040] IcmMpiWatchRemove: MPI watch entry <7817c>, number 11 removed
(wakeup was not sent).
[Thr 140532589623040] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] PlugInHandleServData(rqid=9/345656/1): role: Server(1),
status: 3
[Thr 140532589623040] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532589623040] ICT: IctIHttpOpenMessage: 7fd0400796c0 typ=2
[Thr 140532589623040] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532589623040] HttpParseResponseHeader: Version: 1001
[Thr 140532589623040] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532589623040] HTTP response (raw) [9/345656/1]:
[Thr 140532589623040] HTTP/1.1 403 Forbidden
[Thr 140532589623040] content-type: text/html; charset=utf-8
[Thr 140532589623040] content-length: 857
[Thr 140532589623040] sap-perf-fesrec: 11678.000000
[Thr 140532589623040] content-encoding: gzip
[Thr 140532589623040] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532589623040] DTRACE(9/345656/1): {root-
id=730EFE781C731EEEBDFA2C29B87B140E}_{conn-id=730EFE781C731EEEBDFA2C29B87B340E}_1
[Thr 140532589623040] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532589623040] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532589623040] HttpSAPR3Handler: Response from AppServer
[Thr 140532589623040] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589623040] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532589623040] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd040078200
[Thr 140532589623040] ISC: don't cache response: status code=403
[Thr 140532589623040] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532589623040] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589623040] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532589623040] HttpModHandler: process 2, header_len 151
[Thr 140532589623040] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532589623040] HttpModHandler: perform the actions: (128)
[Thr 140532589623040] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532589623040] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532589623040] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532589623040] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532589623040] Thu Apr 11 09:01:54:795 2024
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532589623040] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532589623040] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpModHandler: process 3, header_len 0
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd040078200
[Thr 140532589623040] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532589623040] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532589623040] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532589623040] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532589623040] IcmHandleReadFromPartner(id=9/345656): HandleServData
returned: 702
[Thr 140532589623040] BINDUMP of content denied
[Thr 140532589623040] IcmWriteToConn(id=9/345656): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532589623040] ->> SapSSLWriteNB(sssl_hdl=7fd04004ab80, buf=7fd050314d20,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532589623040] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532589623040] <<- SapSSLWriteNB(sssl_hdl=7fd04004ab80)==SAP_O_K
[Thr 140532589623040] in/out: ... = "buf= 7fd050314d20, written= 1008 of 1008
(all) io=idle"
[Thr 140532589623040] IcmWriteToConn(id=9/345656): wrote data to partner (len =
1008)
[Thr 140532589623040] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532589623040] MPI<7817c>bb#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532589623040] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532589623040] ICT: IctHttpCloseMessage( 7fd04005dda0 ) -> u=0 rc=0
[Thr 140532589623040] ICT: IctHttpCloseMessage( 7fd0400796c0 ) -> u=0 rc=0
[Thr 140532589623040] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4b1567fc)
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532589623040] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532589623040] CCL[SSL]: Srv-0002B94B: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532589623040] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532589623040] in: sssl_hdl = 7fd04004ab80
[Thr 140532589623040] in: ... ni_hdl = 156
[Thr 140532589623040] in: flags = 0
[Thr 140532589623040] in: timeout = 10000
[Thr 140532589623040] MPI<7817b>bc#7 Close( bc ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532589623040] MPI<7817b>bc#9 Delete( bc ) -> MPI_OK
[Thr 140532589623040] MPI<7817b>bc#8 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532589623040] MPI<7817c>bb#8 Close( bb ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532589623040] MPI<7817c>bb#10 Delete( bb ) -> MPI_OK
[Thr 140532589623040] Thu Apr 11 09:01:54:795 2024
[Thr 140532589623040] MPI<7817c>bb#9 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532589623040] NiIShutdownHandle: shutdown -w of hdl 156
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 83 (rq_id 26078207)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 83
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=167), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078207 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078207
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 0900000038460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T36_U26438_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078207, slot 939)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078207)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345656
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078207, slot 939)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589623040] SiPeek: hang up occurred in sock 29
[Thr 140532589623040] NiIPeek: peek for hdl 156 failed (r; rc=1)
[Thr 140532589623040] NiIRead: hdl 156 SSLState 0
[Thr 140532589623040] NiIRead: SiRecv failed for hdl 156/sock 29
[Thr 140532589623040] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.221:15868;
L=10.200.50.133:8443)
[Thr 140532589623040] NiICloseHandle: shutdown and close hdl 156/sock 29
[Thr 140532589623040] IcmConnClose: Connection 9/345656 closed
[Thr 140532589623040] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.221 ->
rc=0
[Thr 140532589623040] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532589623040] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
-> 0
[Thr 140532589623040] Thu Apr 11 09:01:54:796 2024
[Thr 140532589623040] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=-1 -> 0
[Thr 140532589623040] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532589623040] REQ TRACE END: 9/345656/1
[Thr 140532589623040] IcmWorkerThread: Thread 2: Waiting for event
[Thr 140532589623040] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:01:57:303 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:01:59:799 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331591 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331592 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331593 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331594: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331594 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532577003264] Thu Apr 11 09:02:04:803 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331595 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331596 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331597 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331598: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331598 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532599072512] Thu Apr 11 09:02:07:311 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:02:09:807 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331599 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=4000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 4000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=4000)
[Thr 140532585395968] MPI<2>0#2331600 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331601 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331602: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331602 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140533415016064] Thu Apr 11 09:02:10:165 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 157 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 157/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 157 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 157 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 157 from 10.200.51.199:3380
[Thr 140533415016064] NiIAccept: hdl 157 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345657/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.199 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360776
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532590151424] IcmWorkerHandleRequest: worker 1 got the semaphore
[Thr 140532590151424] REQ TRACE BEGIN: 9/345657/1
[Thr 140532590151424] REQUEST:
Type: ACCEPT_CONNECTION Index = 360776
[Thr 140532590151424] CONNECTION (id=9/345657):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 157, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.199:3380 ()
status: NOP
connect time: 11.04.2024 09:02:10
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532590151424] Thu Apr 11 09:02:10:166 2024
[Thr 140532590151424] MPI 187: event flag already open:7643 key=16643
[Thr 140532590151424] MPI 187: event flag already open:7642 key=16642
[Thr 140532590151424] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532590151424] MPI<7817d>bb#1 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532590151424] MPI<7817d>bb#2 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532590151424] MPI 188: event flag already open:7641 key=16641
[Thr 140532590151424] MPI 188: event flag already open:7640 key=16640
[Thr 140532590151424] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532590151424] MPI<7817e>bc#1 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532590151424] MPI<7817e>bc#2 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532590151424] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532590151424] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532590151424] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532590151424] out: sssl_hdl = 7fd0280624d0
[Thr 140532590151424] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd0280624d0,
cred_hdl=7fd00c064270)
[Thr 140532590151424] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532590151424] ->> SapSSLSetNiHdl(sssl_hdl=7fd0280624d0, ni_hdl=157)
[Thr 140532590151424] SSL NI-hdl 157: local=10.200.50.133:8443
peer=10.200.51.199:3380
[Thr 140532590151424] <<- SapSSLSetNiHdl(sssl_hdl=7fd0280624d0,
ni_hdl=157)==SAP_O_K
[Thr 140532590151424] ->> SapSSLSessionStartNB(sssl_hdl=7fd0280624d0, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532590151424] NiIBlockMode: leave blockmode for hdl 157 FALSE
[Thr 140532590151424] NiIHdlGetStatus: hdl 157/sock 29 ok, data pending (len=1)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532590151424] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532590151424] ClientHello session_id="E1AC946F 80AE9C7F E757F254
D442A63B 1647811F 306D479C 16F84484 7F703040"
[Thr 140532590151424] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532590151424] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532590151424] TLS_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_AES_256_GCM_SHA384
[Thr 140532590151424] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532590151424] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532590151424] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532590151424] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532590151424] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532590151424] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532590151424] [ssl_bytes_to_cipher_suites]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Received TLS Extensions:
[Thr 140532590151424] Id: 43 - supported_versions [RFC8446]
[Thr 140532590151424] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532590151424] Id: 51 - key_share [RFC8446]
[Thr 140532590151424] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532590151424] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532590151424] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532590151424] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532590151424] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532590151424] [ssl_parse_clienthello_tlsext]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Own TLS certificate:
[Thr 140532590151424] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532590151424] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532590151424] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532590151424] [ssl3_output_cert_chain]
[Thr 140532590151424] Thu Apr 11 09:02:10:166 2024
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: CA certificate:
[Thr 140532590151424] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532590151424] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532590151424] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532590151424] [ssl3_output_cert_chain]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Offering 2 certificate type(s) for
client authentication:
[Thr 140532590151424] rsa_sign(1)
[Thr 140532590151424] ecdsa_sign(64)
[Thr 140532590151424] [ssl3_get_req_cert_type]
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532590151424] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532590151424] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532590151424] [ssl_get_encoded_trusted_ca_list]
[Thr 140532590151424] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532590151424] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532590151424] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532590151424] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Received message of type
"Certificate" containing no certificates.
[Thr 140532590151424] Renouncing client authentication: verification mode: 1
[Thr 140532590151424] [ssl3_decode_client_certificate]
[Thr 140532590151424] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532590151424] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532590151424] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532590151424] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532590151424] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532590151424] No Client Certificate
[Thr 140532590151424] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532590151424] (failed resume) new TLS session_id="76A7A62F A3213FBF
F8B0B2E0 8ED6B42C B589FE70 C26FE600 6AFC9F8D C42EC64A
[Thr 140532590151424] SapSSLISessionStartFin(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532590151424] <<- SapSSLSessionStartNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532590151424] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd0280624d0, &plen=(nil),
&more=(nil), &ios=7fd04b1d7c38)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] IcmReadFromConn(id=9/345657): request new MPI (0/0)
[Thr 140532590151424] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532590151424] MPI<7817d>bb#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532590151424] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532590151424] Thu Apr 11 09:02:10:169 2024
[Thr 140532590151424] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd0280624d0,
&plen=7fd04b1d7b18, &more=7fd04b1d7b17, &ios=7fd04b1d7b1c)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] NiIPeek: peek successful for hdl 157 (r)
[Thr 140532590151424] ->> SapSSLReadNB(sssl_hdl=7fd0280624d0, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532590151424] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532590151424] <<- SapSSLReadNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd0280624d0,
&plen=7fd04b1d7b18, &more=7fd04b1d7b17, &ios=7fd04b1d7b1c)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] NiIPeek: peek for hdl 157 timed out (r; 0ms)
[Thr 140532590151424] IcmReadFromConn(id=9/345657): no SSL data available
[Thr 140532590151424] IcmReadFromConn(id=9/345657): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532590151424] BINDUMP of content denied
[Thr 140532590151424] HttpPlugInHandleNetData(rqid=9/345657/1): role: Server(1),
status: 1
[Thr 140532590151424] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532590151424] ICT: IctIHttpOpenMessage: 7fd02803ad80 typ=1
[Thr 140532590151424] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532590151424] HttpParseRequestHeader: no content length set
[Thr 140532590151424] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532590151424] HttpParseRequestHeader: Version: 1001
[Thr 140532590151424] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532590151424] ->> SapSSLGetPeerInfo(sssl_hdl=7fd0280624d0,
&cert=7fd04b1d76f0, &cert_len=7fd04b1d76ec,
[Thr 140532590151424] &subject_dn=7fd04b1d76f8, &issuer_dn=7fd04b1d7700,
&csuite_name=7fd04b1d7708)
[Thr 140532590151424] <<- SapSSLGetPeerInfo(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] out: cert_len = <no cert>
[Thr 140532590151424] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532590151424] HTTP request (raw) [9/345657/1]:
[Thr 140532590151424] GET /sap/bc/ping HTTP/1.1
[Thr 140532590151424] host: 10.200.50.133:8443
[Thr 140532590151424] connection: close
[Thr 140532590151424] user-agent: ELB-HealthChecker/2.0
[Thr 140532590151424] accept-encoding: gzip, compressed
[Thr 140532590151424] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532590151424] ->> SapSSLGetPeerInfo(sssl_hdl=7fd0280624d0,
&cert=7fd04b1d6638, &cert_len=7fd04b1d6634,
[Thr 140532590151424] &subject_dn=7fd04b1d6640, &issuer_dn=7fd04b1d6648,
&csuite_name=7fd04b1d66c8)
[Thr 140532590151424] <<- SapSSLGetPeerInfo(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] out: cert_len = <no cert>
[Thr 140532590151424] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532590151424] Thu Apr 11 09:02:10:170 2024
[Thr 140532590151424] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532590151424] sap-cancel-on-close not found
[Thr 140532590151424] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532590151424] DpPlgGetVirtHost: no server defined, use default
[Thr 140532590151424] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532590151424] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532590151424] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532590151424] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532590151424] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532590151424] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532590151424] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532590151424] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532590151424] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532590151424] >> start >>
CsiExecute(7fd02401e940,7fd04b1d1a20,12,1,7fd04b1d1a10,7fd04b1d19f4,0)
[Thr 140532590151424] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532590151424] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532590151424] << end << CsiExecute(CSI_RC==OK)
[Thr 140532590151424] >> start >> CsiFreeInstance((nil))
[Thr 140532590151424] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532590151424] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532590151424] HttpModHandler: process 1, header_len 144
[Thr 140532590151424] ->> SapSSLGetPeerInfo(sssl_hdl=7fd0280624d0,
&cert=7fd04b1d28a0, &cert_len=7fd04b1d2580,
[Thr 140532590151424] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532590151424] <<- SapSSLGetPeerInfo(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] out: cert_len = <no cert>
[Thr 140532590151424] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532590151424] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532590151424] HttpModHandler: perform the actions: (128)
[Thr 140532590151424] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532590151424] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532590151424] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532590151424] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532590151424] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532590151424] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532590151424] MTX_LOCK 1760 7fd024005020
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024005020
[Thr 140532590151424] IctCmOpen#357246 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] MTX_LOCK 1760 7fd024004a70
[Thr 140532590151424] Thu Apr 11 09:02:10:170 2024
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532590151424] IctCmOpen#459356 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532590151424] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532590151424] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532590151424] MTX_LOCK 1760 7fd024005020
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024005020
[Thr 140532590151424] IctCmOpen#357247 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] MTX_LOCK 1760 7fd024004a70
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532590151424] IctCmOpen#459357 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] HttpCacheHandler: cache miss.
[Thr 140532590151424] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532590151424] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532590151424] ICT: IctLookupPathTable() -> 0
[Thr 140532590151424] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532590151424] DTRACE(9/345657/1): {root-
id=730EFE781C731EEEBDFA2D4F51A0D40F}_{conn-id=730EFE781C731EEEBDFA2D4F51A0F40F}_1
[Thr 140532590151424] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532590151424] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532590151424] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532590151424] flush buffer with mpi buffer id 7
[Thr 140532590151424] MPI<7817d>bb#4 FlushOutbuf 7 1 0 255cb0 224 6 -> 7fd050314cb0
MPI_OK
[Thr 140532590151424] IcmPlFlushBuf: roll in workprocess
[Thr 140532590151424] IcmConnRollInWP: roll in work process
[Thr 140532590151424] IcmCreateDpRequest: Send request to AppServer
[Thr 140532590151424] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532590151424] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532590151424] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532590151424] DpResourcesOk: logons: act/max/usage = 6/1200/0.500000 %
[Thr 140532590151424] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532590151424] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532590151424] DpResourcesOk: ES: act/max/usage = 2184 MB/10992 MB/19.868996
%
[Thr 140532590151424] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532590151424] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532590151424] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532590151424] DpListRemove: remove elem 36 from tmadm_free_list
[Thr 140532590151424] DpListRemove: 1193 elems in tmadm_free_list
[Thr 140532590151424] DpListInsert: insert elem 36 into tmadm_inuse_list (at begin)
[Thr 140532590151424] DpListInsert: 7 elems in tmadm_inuse_list
[Thr 140532590151424] Thu Apr 11 09:02:10:171 2024
[Thr 140532590151424] DpGetFreeUid: new UID: 26441
[Thr 140532590151424] DpSesLockSessionEntry: lock T36_U26441_M0
[Thr 140532590151424] DpSesUnlockSessionEntry: unlocked invalid T36_M0
[Thr 140532590151424] DpInitInternalSession: initialized T36_M0_I0
[Thr 140532590151424] RqQQueueDestroy: Destroy queue <T36_U26440_M0> in slot 68
(49063)
[Thr 140532590151424] RqQQueueDestroy: locked session queue mutex for high priority
[Thr 140532590151424] RqQQueueSlotClear: clear slot 68
[Thr 140532590151424] RqQUnlockSessionQueue: unlocked session queue mutex for high
priority
[Thr 140532590151424] DpITmSlotClear: cleared T36_U26441
[Thr 140532590151424] DpTmSlotAllocate: allocated T36_U26441
[Thr 140532590151424] RqQQueueCreate: Created queue <T36_U26441_M0> in slot 68
(49064) with normal priority
[Thr 140532590151424] DpLogonInit: new logon T36_U26441, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532590151424] IcmSendRq: created T36_U26441_M0
[Thr 140532590151424] DpSesGetWorkerType: return workerType DIA for T36_U26441
[Thr 140532590151424] DpRqSlotAllocate: 1 pending requests
[Thr 140532590151424] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078225, slot 940)
[Thr 140532590151424] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078225) from
ICMAN to local WORKER
[Thr 140532590151424] rq_id 26078225
[Thr 140532590151424] -OUT- ca_blk -1 len 0
[Thr 140532590151424] -OUT- userTrace 3
[Thr 140532590151424] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532590151424] -OUT- mpi rq <7817d> mpi resp <7817e> prot
2
[Thr 140532590151424] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532590151424] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532590151424] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA2D4F51A0D40F}_{conn-id=730EFE781C731EEEBDFA2D4F51A0F40F}_1
[Thr 140532590151424] -OUT- sender address:
[Thr 140532590151424] -OUT- type LOCAL
[Thr 140532590151424] -OUT- agentType ICMAN
[Thr 140532590151424] -OUT- receiver address:
[Thr 140532590151424] -OUT- type LOCAL
[Thr 140532590151424] -OUT- agentType WORKER workerTyp DIA
[Thr 140532590151424] -OUT- session T36_U26441_M0
[Thr 140532590151424] RqQAddRequest: Add request rq_id 26078225 (DIA) to queue
<T36_U26441_M0> in slot 68 at the end
[Thr 140532590151424] Dump of queue <T36_U26441_M0> in slot 68 (1 requests,
port=0):
[Thr 140532590151424] -1 <- 83 (rq_id 26078225, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532590151424] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532590151424] RqQQueueAddToSessionQueue: Added queue <T36_U26441_M0> in
slot 68 to normal priority session queue at the end
[Thr 140532590151424] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532590151424] -1 <- 68 < T36_U26441_M0> -> -1
[Thr 140532590151424] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532590151424] RqQNotifySessionQueue: notify normal priority session queue
of queue <T36_U26441_M0> (DIA) (id=183)
[Thr 140532590151424] Info of W18 (inside function RqQNotifyWorker (end))
[Thr 140532590151424] noOfPendingQueues=>W18-0<
[Thr 140532590151424] noOfWaitForQueues=>W18-2<
[Thr 140532590151424] wait for queue 69 (T38_U26359_M0)
[Thr 140532590151424] wait for queue 23 (W18)
[Thr 140532590151424] lowestPriority: normal priority
[Thr 140532590151424] modCounter=>W18-2733059<
[Thr 140532590151424] RqQNotifyWorker: notify W18 about dispatch queues
(modCounter=>W18-2733059<)
[Thr 140532590151424] RqQSetWorkerState: W18 has state RUNNING (modCounter=>W18-
2733059<)
[Thr 140532590151424] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532590151424] RqQQueueGetNumberOfRequests: Queue <T36_U26441_M0> in slot 68
contains 1 requests of type DIA
[Thr 140532590151424] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078225), queue has 1 requests
[Thr 140532590151424] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078225,
slot 940)
[Thr 140532590151424] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532590151424] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532590151424] IcmHandleNetRead(id=9/345657): read_len: 144, HandleNetData
returned: 4
[Thr 140532590151424] IcmHandleNetRead(id=9/345657): status 1 -> 4
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd0280624d0,
&plen=7fd04b1d7c58, &more=7fd04b1d7c33, &ios=7fd04b1d7c38)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] Thu Apr 11 09:02:10:171 2024
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] IcmReadFromPartner(id=9/345657): read with maximum timeout
500
[Thr 140532590151424] IcmMpiWatchInsert: MPI watch entry <7817e>, number 11
inserted.
[Thr 140532590151424] MPI<7817e>bc#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532590151424] MPI<7817e>bc#6 GetInbuf -1 255cb0 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532590151424] IcmMpiWatchRemove: MPI watch entry <7817e>, number 11 removed
(wakeup was not sent).
[Thr 140532590151424] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532590151424] BINDUMP of content denied
[Thr 140532590151424] PlugInHandleServData(rqid=9/345657/1): role: Server(1),
status: 3
[Thr 140532590151424] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532590151424] ICT: IctIHttpOpenMessage: 7fd028064a10 typ=2
[Thr 140532590151424] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532590151424] HttpParseResponseHeader: Version: 1001
[Thr 140532590151424] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532590151424] HTTP response (raw) [9/345657/1]:
[Thr 140532590151424] HTTP/1.1 403 Forbidden
[Thr 140532590151424] content-type: text/html; charset=utf-8
[Thr 140532590151424] content-length: 857
[Thr 140532590151424] sap-perf-fesrec: 11080.000000
[Thr 140532590151424] content-encoding: gzip
[Thr 140532590151424] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532590151424] DTRACE(9/345657/1): {root-
id=730EFE781C731EEEBDFA2D4F51A0D40F}_{conn-id=730EFE781C731EEEBDFA2D4F51A0F40F}_1
[Thr 140532590151424] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532590151424] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532590151424] HttpSAPR3Handler: Response from AppServer
[Thr 140532590151424] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532590151424] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532590151424] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd028028480
[Thr 140532590151424] ISC: don't cache response: status code=403
[Thr 140532590151424] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532590151424] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532590151424] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532590151424] HttpModHandler: process 2, header_len 151
[Thr 140532590151424] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532590151424] HttpModHandler: perform the actions: (128)
[Thr 140532590151424] Thu Apr 11 09:02:10:187 2024
[Thr 140532590151424] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532590151424] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532590151424] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532590151424] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532590151424] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpModHandler: process 3, header_len 0
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd028028480
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532590151424] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532590151424] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532590151424] IcmHandleReadFromPartner(id=9/345657): HandleServData
returned: 702
[Thr 140532590151424] BINDUMP of content denied
[Thr 140532590151424] IcmWriteToConn(id=9/345657): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532590151424] ->> SapSSLWriteNB(sssl_hdl=7fd0280624d0, buf=7fd050314d20,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532590151424] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532590151424] <<- SapSSLWriteNB(sssl_hdl=7fd0280624d0)==SAP_O_K
[Thr 140532590151424] in/out: ... = "buf= 7fd050314d20, written= 1008 of 1008
(all) io=idle"
[Thr 140532590151424] IcmWriteToConn(id=9/345657): wrote data to partner (len =
1008)
[Thr 140532590151424] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532590151424] MPI<7817e>bc#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532590151424] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532590151424] ICT: IctHttpCloseMessage( 7fd02803ad80 ) -> u=0 rc=0
[Thr 140532590151424] ICT: IctHttpCloseMessage( 7fd028064a10 ) -> u=0 rc=0
[Thr 140532590151424] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4b1d77fc)
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532590151424] CCL[SSL]: Srv-0002B94C: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532590151424] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532590151424] in: sssl_hdl = 7fd0280624d0
[Thr 140532590151424] in: ... ni_hdl = 157
[Thr 140532590151424] in: flags = 0
[Thr 140532590151424] in: timeout = 10000
[Thr 140532590151424] MPI<7817d>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532590151424] Thu Apr 11 09:02:10:187 2024
[Thr 140532590151424] MPI<7817d>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532590151424] MPI<7817d>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532590151424] MPI<7817e>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532590151424] MPI<7817e>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532590151424] MPI<7817e>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532590151424] NiIShutdownHandle: shutdown -w of hdl 157
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 83 (rq_id 26078226)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 83
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=168), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078226 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078226
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 0900000039460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T36_U26441_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078226, slot 941)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078226)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345657
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078226, slot 941)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=3000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 3000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=3000)
[Thr 140532590151424] SiPeek: hang up occurred in sock 29
[Thr 140532590151424] NiIPeek: peek for hdl 157 failed (r; rc=1)
[Thr 140532590151424] NiIRead: hdl 157 SSLState 0
[Thr 140532590151424] NiIRead: SiRecv failed for hdl 157/sock 29
[Thr 140532590151424] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.199:3380;
L=10.200.50.133:8443)
[Thr 140532590151424] NiICloseHandle: shutdown and close hdl 157/sock 29
[Thr 140532590151424] Thu Apr 11 09:02:10:188 2024
[Thr 140532590151424] IcmConnClose: Connection 9/345657 closed
[Thr 140532590151424] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.199 ->
rc=0
[Thr 140532590151424] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532590151424] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
-> 0
[Thr 140532590151424] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=-1 -> 0
[Thr 140532590151424] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532590151424] REQ TRACE END: 9/345657/1
[Thr 140532590151424] IcmWorkerThread: Thread 1: Waiting for event
[Thr 140532590151424] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Thu Apr 11 09:02:13:190 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: call schedules, last t: 1712818903, next
t: 1712818933, cur t: 1712818933
[Thr 140532577003264] IcmCreateRequest: Append request 360777
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585924352] IcmWorkerHandleRequest: worker 9 got the semaphore
[Thr 140532585924352] REQUEST:
Type: SCHEDULER Index = 360777
[Thr 140532585924352] IcmGetSchedule: found slot 0
[Thr 140532585924352] IcmAlReportPerfData: Reporting data to CCMS Alerting
Infrastructure
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585924352] IcmConnCheckStoredClientConn: next client timeout check in 7
sec
[Thr 140532585924352] IcmConnInitContext: context initialized
[Thr 140532585924352] IcmGetServicePtr: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 1
[Thr 140532585924352] PlugInHandleAdmMessage: request received:
[Thr 140532585924352] PlugInHandleAdmMessage: opcode: ICM_COM_OP_CACHE_STAT (136),
len: 528, dest_type: 2, subhdlkey: 262145(4/0)
[Thr 140532585924352] HttpISubHandlerItCreate: add reference to table 7fd024010780,
now 2 references, 1 tables used
[Thr 140532585924352] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_ADM_MSG(4), header_l
[Thr 140532585924352] HttpCacheHandler: TASK_ADM_MSG 0 7fd024001ae0 (nil)
[Thr 140532585924352] SCACHE: adm request received:
[Thr 140532585924352] SCACHE: opcode: 136, len: 528, dest_type: 2, dest:
[Thr 140532585924352] MTX_LOCK 3247 7fd024004a70
[Thr 140532585924352] MTX_UNLOCK 3260 7fd024004a70
[Thr 140532585924352] IctCmGetCacheInfo#459358 -> 0
[Thr 140532585924352] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532585924352] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532585924352] HttpSubHandlerItDelete: remove reference to table
7fd024010780, now 1 references, 1 tables used
[Thr 140532585924352] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532585924352] IcmServDecrRefCount: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 0
[Thr 140532585924352] IcmGetSchedule: next schedule in 30 secs
[Thr 140532585924352] IcmWorkerThread: Thread 9: Waiting for event
[Thr 140532585924352] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:02:17:321 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:02:18:195 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331603 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331604 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331605 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331606: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331606 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] Thu Apr 11 09:02:23:199 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331607 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331608 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331609 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331610: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331610 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140533415016064] Thu Apr 11 09:02:24:792 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 158 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 158/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 158 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 158 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 158 from 10.200.51.221:61270
[Thr 140533415016064] NiIAccept: hdl 158 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345659/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.221 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360778
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532587509504] IcmWorkerHandleRequest: worker 6 got the semaphore
[Thr 140532587509504] REQ TRACE BEGIN: 9/345659/1
[Thr 140532587509504] REQUEST:
Type: ACCEPT_CONNECTION Index = 360778
[Thr 140532587509504] CONNECTION (id=9/345659):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 158, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.221:61270 ()
status: NOP
connect time: 11.04.2024 09:02:24
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532587509504] Thu Apr 11 09:02:24:793 2024
[Thr 140532587509504] MPI 188: event flag already open:7641 key=16641
[Thr 140532587509504] MPI 188: event flag already open:7640 key=16640
[Thr 140532587509504] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532587509504] MPI<7817f>bc#1 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532587509504] MPI<7817f>bc#2 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532587509504] MPI 187: event flag already open:7643 key=16643
[Thr 140532587509504] MPI 187: event flag already open:7642 key=16642
[Thr 140532587509504] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532587509504] MPI<78180>bb#1 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532587509504] MPI<78180>bb#2 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532587509504] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532587509504] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532587509504] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532587509504] out: sssl_hdl = 7fd038029420
[Thr 140532587509504] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd038029420,
cred_hdl=7fd00c064270)
[Thr 140532587509504] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532587509504] ->> SapSSLSetNiHdl(sssl_hdl=7fd038029420, ni_hdl=158)
[Thr 140532587509504] SSL NI-hdl 158: local=10.200.50.133:8443
peer=10.200.51.221:61270
[Thr 140532587509504] <<- SapSSLSetNiHdl(sssl_hdl=7fd038029420,
ni_hdl=158)==SAP_O_K
[Thr 140532587509504] ->> SapSSLSessionStartNB(sssl_hdl=7fd038029420, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532587509504] NiIBlockMode: leave blockmode for hdl 158 FALSE
[Thr 140532587509504] NiIHdlGetStatus: hdl 158/sock 29 ok, data pending (len=1)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532587509504] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532587509504] ClientHello session_id="982B63F5 04A0C149 D11362C3
EF395561 9DF711B0 5FD2A6E0 9726AEFF 014A2440"
[Thr 140532587509504] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532587509504] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532587509504] SapISSLServerCacheExpiration(): Calling
ServerCacheCleanup() (lifetime=1440)
[Thr 140532587509504]
SapISSLServerCacheExpiration(srv,"/usr/sap/Q20/D02/sec/SAPSSLS.pse"): Cache
max/before/now = 5000/488/480
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532587509504] TLS_AES_128_GCM_SHA256
[Thr 140532587509504] TLS_AES_256_GCM_SHA384
[Thr 140532587509504] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532587509504] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532587509504] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532587509504] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532587509504] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532587509504] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532587509504] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532587509504] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532587509504] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532587509504] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532587509504] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532587509504] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532587509504] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532587509504] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532587509504] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532587509504] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532587509504] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532587509504] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532587509504] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532587509504] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532587509504] [ssl_bytes_to_cipher_suites]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Received TLS Extensions:
[Thr 140532587509504] Id: 43 - supported_versions [RFC8446]
[Thr 140532587509504] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532587509504] Id: 51 - key_share [RFC8446]
[Thr 140532587509504] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532587509504] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532587509504] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532587509504] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532587509504] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532587509504] [ssl_parse_clienthello_tlsext]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532587509504] Thu Apr 11 09:02:24:793 2024
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Own TLS certificate:
[Thr 140532587509504] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532587509504] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532587509504] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532587509504] [ssl3_output_cert_chain]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: CA certificate:
[Thr 140532587509504] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532587509504] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532587509504] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532587509504] [ssl3_output_cert_chain]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Offering 2 certificate type(s) for
client authentication:
[Thr 140532587509504] rsa_sign(1)
[Thr 140532587509504] ecdsa_sign(64)
[Thr 140532587509504] [ssl3_get_req_cert_type]
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532587509504] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532587509504] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532587509504] [ssl_get_encoded_trusted_ca_list]
[Thr 140532587509504] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532587509504] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532587509504] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532587509504] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532587509504] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Received message of type
"Certificate" containing no certificates.
[Thr 140532587509504] Renouncing client authentication: verification mode: 1
[Thr 140532587509504] [ssl3_decode_client_certificate]
[Thr 140532587509504] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532587509504] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532587509504] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532587509504] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532587509504] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532587509504] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532587509504] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532587509504] No Client Certificate
[Thr 140532587509504] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532587509504] (failed resume) new TLS session_id="C6D96CDD 049919F8
E581BC37 0787FF12 7FFA8081 84782571 4CEFCEFE 9AE232CD
[Thr 140532587509504] SapSSLISessionStartFin(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532587509504] <<- SapSSLSessionStartNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532587509504] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532587509504] ->> SapSSLReadPendingNB(sssl_hdl=7fd038029420, &plen=(nil),
&more=(nil), &ios=7fd04af52c38)
[Thr 140532587509504] <<- SapSSLReadPendingNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532587509504] IcmReadFromConn(id=9/345659): request new MPI (0/0)
[Thr 140532587509504] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532587509504] Thu Apr 11 09:02:24:796 2024
[Thr 140532587509504] MPI<7817f>bc#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532587509504] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532587509504] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532587509504] ->> SapSSLReadPendingNB(sssl_hdl=7fd038029420,
&plen=7fd04af52b18, &more=7fd04af52b17, &ios=7fd04af52b1c)
[Thr 140532587509504] <<- SapSSLReadPendingNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532587509504] NiIPeek: peek successful for hdl 158 (r)
[Thr 140532587509504] ->> SapSSLReadNB(sssl_hdl=7fd038029420, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532587509504] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532587509504] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532587509504] <<- SapSSLReadNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532587509504] ->> SapSSLReadPendingNB(sssl_hdl=7fd038029420,
&plen=7fd04af52b18, &more=7fd04af52b17, &ios=7fd04af52b1c)
[Thr 140532587509504] <<- SapSSLReadPendingNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532587509504] NiIPeek: peek for hdl 158 timed out (r; 0ms)
[Thr 140532587509504] IcmReadFromConn(id=9/345659): no SSL data available
[Thr 140532587509504] IcmReadFromConn(id=9/345659): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532587509504] BINDUMP of content denied
[Thr 140532587509504] HttpPlugInHandleNetData(rqid=9/345659/1): role: Server(1),
status: 1
[Thr 140532587509504] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532587509504] ICT: IctIHttpOpenMessage: 7fd038047880 typ=1
[Thr 140532587509504] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532587509504] HttpParseRequestHeader: no content length set
[Thr 140532587509504] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532587509504] HttpParseRequestHeader: Version: 1001
[Thr 140532587509504] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532587509504] ->> SapSSLGetPeerInfo(sssl_hdl=7fd038029420,
&cert=7fd04af526f0, &cert_len=7fd04af526ec,
[Thr 140532587509504] &subject_dn=7fd04af526f8, &issuer_dn=7fd04af52700,
&csuite_name=7fd04af52708)
[Thr 140532587509504] <<- SapSSLGetPeerInfo(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] out: cert_len = <no cert>
[Thr 140532587509504] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532587509504] HTTP request (raw) [9/345659/1]:
[Thr 140532587509504] GET /sap/bc/ping HTTP/1.1
[Thr 140532587509504] host: 10.200.50.133:8443
[Thr 140532587509504] connection: close
[Thr 140532587509504] user-agent: ELB-HealthChecker/2.0
[Thr 140532587509504] accept-encoding: gzip, compressed
[Thr 140532587509504] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532587509504] ->> SapSSLGetPeerInfo(sssl_hdl=7fd038029420,
&cert=7fd04af51638, &cert_len=7fd04af51634,
[Thr 140532587509504] &subject_dn=7fd04af51640, &issuer_dn=7fd04af51648,
&csuite_name=7fd04af516c8)
[Thr 140532587509504] <<- SapSSLGetPeerInfo(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] out: cert_len = <no cert>
[Thr 140532587509504] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532587509504] Thu Apr 11 09:02:24:796 2024
[Thr 140532587509504] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532587509504] sap-cancel-on-close not found
[Thr 140532587509504] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532587509504] DpPlgGetVirtHost: no server defined, use default
[Thr 140532587509504] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532587509504] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532587509504] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532587509504] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532587509504] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532587509504] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532587509504] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532587509504] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532587509504] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532587509504] >> start >>
CsiExecute(7fd02401e940,7fd04af4ca20,12,1,7fd04af4ca10,7fd04af4c9f4,0)
[Thr 140532587509504] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532587509504] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532587509504] << end << CsiExecute(CSI_RC==OK)
[Thr 140532587509504] >> start >> CsiFreeInstance((nil))
[Thr 140532587509504] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532587509504] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532587509504] HttpModHandler: process 1, header_len 144
[Thr 140532587509504] ->> SapSSLGetPeerInfo(sssl_hdl=7fd038029420,
&cert=7fd04af4d8a0, &cert_len=7fd04af4d580,
[Thr 140532587509504] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532587509504] <<- SapSSLGetPeerInfo(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] out: cert_len = <no cert>
[Thr 140532587509504] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532587509504] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532587509504] HttpModHandler: perform the actions: (128)
[Thr 140532587509504] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532587509504] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532587509504] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532587509504] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532587509504] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532587509504] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532587509504] MTX_LOCK 1760 7fd024005020
[Thr 140532587509504] MTX_UNLOCK 1891 7fd024005020
[Thr 140532587509504] IctCmOpen#357248 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532587509504] MTX_LOCK 1760 7fd024004a70
[Thr 140532587509504] Thu Apr 11 09:02:24:797 2024
[Thr 140532587509504] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532587509504] IctCmOpen#459359 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532587509504] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532587509504] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532587509504] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532587509504] MTX_LOCK 1760 7fd024005020
[Thr 140532587509504] MTX_UNLOCK 1891 7fd024005020
[Thr 140532587509504] IctCmOpen#357249 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532587509504] MTX_LOCK 1760 7fd024004a70
[Thr 140532587509504] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532587509504] IctCmOpen#459360 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532587509504] HttpCacheHandler: cache miss.
[Thr 140532587509504] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532587509504] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532587509504] ICT: IctLookupPathTable() -> 0
[Thr 140532587509504] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532587509504] DTRACE(9/345659/1): {root-
id=730EFE781C731EEEBDFA2E664C775410}_{conn-id=730EFE781C731EEEBDFA2E664C777410}_1
[Thr 140532587509504] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532587509504] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532587509504] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532587509504] flush buffer with mpi buffer id 7
[Thr 140532587509504] MPI<7817f>bc#4 FlushOutbuf 7 1 0 255cb0 224 6 -> 7fd050314cb0
MPI_OK
[Thr 140532587509504] IcmPlFlushBuf: roll in workprocess
[Thr 140532587509504] IcmConnRollInWP: roll in work process
[Thr 140532587509504] IcmCreateDpRequest: Send request to AppServer
[Thr 140532587509504] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532587509504] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532587509504] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532587509504] DpResourcesOk: logons: act/max/usage = 6/1200/0.500000 %
[Thr 140532587509504] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532587509504] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532587509504] DpResourcesOk: ES: act/max/usage = 2176 MB/10992 MB/19.796215
%
[Thr 140532587509504] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532587509504] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532587509504] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532587509504] DpListRemove: remove elem 36 from tmadm_free_list
[Thr 140532587509504] DpListRemove: 1193 elems in tmadm_free_list
[Thr 140532587509504] DpListInsert: insert elem 36 into tmadm_inuse_list (at begin)
[Thr 140532587509504] DpListInsert: 7 elems in tmadm_inuse_list
[Thr 140532587509504] Thu Apr 11 09:02:24:797 2024
[Thr 140532587509504] DpGetFreeUid: new UID: 26443
[Thr 140532587509504] DpSesLockSessionEntry: lock T36_U26443_M0
[Thr 140532587509504] DpSesUnlockSessionEntry: unlocked invalid T36_M0
[Thr 140532587509504] DpInitInternalSession: initialized T36_M0_I0
[Thr 140532587509504] RqQQueueDestroy: Destroy queue <T36_U26442_M0> in slot 68
(49067)
[Thr 140532587509504] RqQQueueDestroy: locked session queue mutex for high priority
[Thr 140532587509504] RqQQueueSlotClear: clear slot 68
[Thr 140532587509504] RqQUnlockSessionQueue: unlocked session queue mutex for high
priority
[Thr 140532587509504] DpITmSlotClear: cleared T36_U26443
[Thr 140532587509504] DpTmSlotAllocate: allocated T36_U26443
[Thr 140532587509504] RqQQueueCreate: Created queue <T36_U26443_M0> in slot 68
(49068) with normal priority
[Thr 140532587509504] DpLogonInit: new logon T36_U26443, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532587509504] IcmSendRq: created T36_U26443_M0
[Thr 140532587509504] DpSesGetWorkerType: return workerType DIA for T36_U26443
[Thr 140532587509504] DpRqSlotAllocate: 1 pending requests
[Thr 140532587509504] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078248, slot 942)
[Thr 140532587509504] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078248) from
ICMAN to local WORKER
[Thr 140532587509504] rq_id 26078248
[Thr 140532587509504] -OUT- ca_blk -1 len 0
[Thr 140532587509504] -OUT- userTrace 3
[Thr 140532587509504] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532587509504] -OUT- mpi rq <7817f> mpi resp <78180> prot
2
[Thr 140532587509504] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532587509504] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532587509504] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA2E664C775410}_{conn-id=730EFE781C731EEEBDFA2E664C777410}_1
[Thr 140532587509504] -OUT- sender address:
[Thr 140532587509504] -OUT- type LOCAL
[Thr 140532587509504] -OUT- agentType ICMAN
[Thr 140532587509504] -OUT- receiver address:
[Thr 140532587509504] -OUT- type LOCAL
[Thr 140532587509504] -OUT- agentType WORKER workerTyp DIA
[Thr 140532587509504] -OUT- session T36_U26443_M0
[Thr 140532587509504] RqQAddRequest: Add request rq_id 26078248 (DIA) to queue
<T36_U26443_M0> in slot 68 at the end
[Thr 140532587509504] Dump of queue <T36_U26443_M0> in slot 68 (1 requests,
port=0):
[Thr 140532587509504] -1 <- 83 (rq_id 26078248, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532587509504] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532587509504] RqQQueueAddToSessionQueue: Added queue <T36_U26443_M0> in
slot 68 to normal priority session queue at the end
[Thr 140532587509504] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532587509504] -1 <- 68 < T36_U26443_M0> -> -1
[Thr 140532587509504] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532587509504] RqQNotifySessionQueue: notify normal priority session queue
of queue <T36_U26443_M0> (DIA) (id=184)
[Thr 140532587509504] Info of W18 (inside function RqQNotifyWorker (end))
[Thr 140532587509504] noOfPendingQueues=>W18-0<
[Thr 140532587509504] noOfWaitForQueues=>W18-2<
[Thr 140532587509504] wait for queue 69 (T38_U26359_M0)
[Thr 140532587509504] wait for queue 23 (W18)
[Thr 140532587509504] lowestPriority: normal priority
[Thr 140532587509504] modCounter=>W18-2733082<
[Thr 140532587509504] RqQNotifyWorker: notify W18 about dispatch queues
(modCounter=>W18-2733082<)
[Thr 140532587509504] RqQSetWorkerState: W18 has state RUNNING (modCounter=>W18-
2733082<)
[Thr 140532587509504] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532587509504] RqQQueueGetNumberOfRequests: Queue <T36_U26443_M0> in slot 68
contains 1 requests of type DIA
[Thr 140532587509504] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078248), queue has 1 requests
[Thr 140532587509504] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078248,
slot 942)
[Thr 140532587509504] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532587509504] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532587509504] IcmHandleNetRead(id=9/345659): read_len: 144, HandleNetData
returned: 4
[Thr 140532587509504] IcmHandleNetRead(id=9/345659): status 1 -> 4
[Thr 140532587509504] ->> SapSSLReadPendingNB(sssl_hdl=7fd038029420,
&plen=7fd04af52c58, &more=7fd04af52c33, &ios=7fd04af52c38)
[Thr 140532587509504] <<- SapSSLReadPendingNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] Thu Apr 11 09:02:24:798 2024
[Thr 140532587509504] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532587509504] IcmReadFromPartner(id=9/345659): read with maximum timeout
500
[Thr 140532587509504] IcmMpiWatchInsert: MPI watch entry <78180>, number 11
inserted.
[Thr 140532587509504] MPI<78180>bb#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532587509504] MPI<78180>bb#6 GetInbuf -1 255cb0 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532587509504] IcmMpiWatchRemove: MPI watch entry <78180>, number 11 removed
(wakeup was not sent).
[Thr 140532587509504] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532587509504] BINDUMP of content denied
[Thr 140532587509504] PlugInHandleServData(rqid=9/345659/1): role: Server(1),
status: 3
[Thr 140532587509504] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532587509504] ICT: IctIHttpOpenMessage: 7fd038076440 typ=2
[Thr 140532587509504] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532587509504] HttpParseResponseHeader: Version: 1001
[Thr 140532587509504] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532587509504] HTTP response (raw) [9/345659/1]:
[Thr 140532587509504] HTTP/1.1 403 Forbidden
[Thr 140532587509504] content-type: text/html; charset=utf-8
[Thr 140532587509504] content-length: 857
[Thr 140532587509504] sap-perf-fesrec: 10827.000000
[Thr 140532587509504] content-encoding: gzip
[Thr 140532587509504] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532587509504] DTRACE(9/345659/1): {root-
id=730EFE781C731EEEBDFA2E664C775410}_{conn-id=730EFE781C731EEEBDFA2E664C777410}_1
[Thr 140532587509504] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532587509504] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532587509504] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532587509504] HttpSAPR3Handler: Response from AppServer
[Thr 140532587509504] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532587509504] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532587509504] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532587509504] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd038074f80
[Thr 140532587509504] ISC: don't cache response: status code=403
[Thr 140532587509504] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532587509504] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532587509504] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532587509504] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532587509504] HttpModHandler: process 2, header_len 151
[Thr 140532587509504] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532587509504] HttpModHandler: perform the actions: (128)
[Thr 140532587509504] Thu Apr 11 09:02:24:814 2024
[Thr 140532587509504] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532587509504] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532587509504] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532587509504] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532587509504] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532587509504] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532587509504] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532587509504] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532587509504] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532587509504] HttpModHandler: process 3, header_len 0
[Thr 140532587509504] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532587509504] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd038074f80
[Thr 140532587509504] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532587509504] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532587509504] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532587509504] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532587509504] IcmHandleReadFromPartner(id=9/345659): HandleServData
returned: 702
[Thr 140532587509504] BINDUMP of content denied
[Thr 140532587509504] IcmWriteToConn(id=9/345659): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532587509504] ->> SapSSLWriteNB(sssl_hdl=7fd038029420, buf=7fd050314d20,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532587509504] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532587509504] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532587509504] <<- SapSSLWriteNB(sssl_hdl=7fd038029420)==SAP_O_K
[Thr 140532587509504] in/out: ... = "buf= 7fd050314d20, written= 1008 of 1008
(all) io=idle"
[Thr 140532587509504] IcmWriteToConn(id=9/345659): wrote data to partner (len =
1008)
[Thr 140532587509504] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532587509504] MPI<78180>bb#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532587509504] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532587509504] ICT: IctHttpCloseMessage( 7fd038047880 ) -> u=0 rc=0
[Thr 140532587509504] ICT: IctHttpCloseMessage( 7fd038076440 ) -> u=0 rc=0
[Thr 140532587509504] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4af527fc)
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532587509504] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532587509504] CCL[SSL]: Srv-0002B94D: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532587509504] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532587509504] in: sssl_hdl = 7fd038029420
[Thr 140532587509504] in: ... ni_hdl = 158
[Thr 140532587509504] in: flags = 0
[Thr 140532587509504] in: timeout = 10000
[Thr 140532587509504] MPI<7817f>bc#7 Close( bc ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532587509504] Thu Apr 11 09:02:24:814 2024
[Thr 140532587509504] MPI<7817f>bc#9 Delete( bc ) -> MPI_OK
[Thr 140532587509504] MPI<7817f>bc#8 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532587509504] MPI<78180>bb#8 Close( bb ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532587509504] MPI<78180>bb#10 Delete( bb ) -> MPI_OK
[Thr 140532587509504] MPI<78180>bb#9 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532587509504] NiIShutdownHandle: shutdown -w of hdl 158
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 83 (rq_id 26078249)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 83
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=169), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078249 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078249
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 090000003B460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T36_U26443_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078249, slot 943)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078249)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345659
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078249, slot 943)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532587509504] SiPeek: hang up occurred in sock 29
[Thr 140532587509504] NiIPeek: peek for hdl 158 failed (r; rc=1)
[Thr 140532587509504] NiIRead: hdl 158 SSLState 0
[Thr 140532587509504] NiIRead: SiRecv failed for hdl 158/sock 29
[Thr 140532587509504] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.221:61270;
L=10.200.50.133:8443)
[Thr 140532587509504] NiICloseHandle: shutdown and close hdl 158/sock 29
[Thr 140532587509504] Thu Apr 11 09:02:24:815 2024
[Thr 140532587509504] IcmConnClose: Connection 9/345659 closed
[Thr 140532587509504] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.221 ->
rc=0
[Thr 140532587509504] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532587509504] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
-> 0
[Thr 140532587509504] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=-1 -> 0
[Thr 140532587509504] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532587509504] REQ TRACE END: 9/345659/1
[Thr 140532587509504] IcmWorkerThread: Thread 6: Waiting for event
[Thr 140532587509504] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:02:27:331 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:02:29:819 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331611 WriteOOB 77
[Thr 140532577003264] IcmCheckForBlockedThreads: check for blocked SSL-threads
[Thr 140532585395968] MPI<2>0#2331612 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331613 ReadOOB 77 -> MPI_OK
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331614: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331614 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532577003264] Thu Apr 11 09:02:34:823 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331615 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331616 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331617 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331618: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331618 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532599072512] Thu Apr 11 09:02:37:341 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:02:39:827 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331619 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=4000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 4000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=4000)
[Thr 140532585395968] MPI<2>0#2331620 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331621 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331622: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331622 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 159 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 159/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 159 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 159 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 159 from 10.200.51.199:38212
[Thr 140533415016064] NiIAccept: hdl 159 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] Thu Apr 11 09:02:39:908 2024
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345660/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.199 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360779
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532586981120] IcmWorkerHandleRequest: worker 7 got the semaphore
[Thr 140532586981120] REQ TRACE BEGIN: 9/345660/1
[Thr 140532586981120] REQUEST:
Type: ACCEPT_CONNECTION Index = 360779
[Thr 140532586981120] CONNECTION (id=9/345660):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 159, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.199:38212 ()
status: NOP
connect time: 11.04.2024 09:02:39
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532586981120] MPI 187: event flag already open:7643 key=16643
[Thr 140532586981120] MPI 187: event flag already open:7642 key=16642
[Thr 140532586981120] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532586981120] MPI<78181>bb#1 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532586981120] MPI<78181>bb#2 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532586981120] MPI 188: event flag already open:7641 key=16641
[Thr 140532586981120] MPI 188: event flag already open:7640 key=16640
[Thr 140532586981120] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532586981120] MPI<78182>bc#1 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532586981120] MPI<78182>bc#2 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532586981120] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532586981120] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532586981120] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532586981120] out: sssl_hdl = 7fd014006a10
[Thr 140532586981120] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd014006a10,
cred_hdl=7fd00c064270)
[Thr 140532586981120] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532586981120] Thu Apr 11 09:02:39:908 2024
[Thr 140532586981120] ->> SapSSLSetNiHdl(sssl_hdl=7fd014006a10, ni_hdl=159)
[Thr 140532586981120] SSL NI-hdl 159: local=10.200.50.133:8443
peer=10.200.51.199:38212
[Thr 140532586981120] <<- SapSSLSetNiHdl(sssl_hdl=7fd014006a10,
ni_hdl=159)==SAP_O_K
[Thr 140532586981120] ->> SapSSLSessionStartNB(sssl_hdl=7fd014006a10, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532586981120] NiIBlockMode: leave blockmode for hdl 159 FALSE
[Thr 140532586981120] NiIHdlGetStatus: hdl 159/sock 29 ok, data pending (len=1)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532586981120] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532586981120] ClientHello session_id="ACAFB609 B8ADBACD 5DDA4C4B
CA76E3A6 4B93D240 2B0A8BEE 72F6533C 9D4A27B4"
[Thr 140532586981120] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532586981120] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532586981120] TLS_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_AES_256_GCM_SHA384
[Thr 140532586981120] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532586981120] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532586981120] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532586981120] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532586981120] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532586981120] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532586981120] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532586981120] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532586981120] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532586981120] [ssl_bytes_to_cipher_suites]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Received TLS Extensions:
[Thr 140532586981120] Id: 43 - supported_versions [RFC8446]
[Thr 140532586981120] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532586981120] Id: 51 - key_share [RFC8446]
[Thr 140532586981120] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532586981120] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532586981120] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532586981120] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532586981120] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532586981120] [ssl_parse_clienthello_tlsext]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Own TLS certificate:
[Thr 140532586981120] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532586981120] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532586981120] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532586981120] [ssl3_output_cert_chain]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: CA certificate:
[Thr 140532586981120] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532586981120] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532586981120] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532586981120] [ssl3_output_cert_chain]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Offering 2 certificate type(s) for
client authentication:
[Thr 140532586981120] rsa_sign(1)
[Thr 140532586981120] ecdsa_sign(64)
[Thr 140532586981120] [ssl3_get_req_cert_type]
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532586981120] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532586981120] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532586981120] [ssl_get_encoded_trusted_ca_list]
[Thr 140532586981120] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532586981120] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532586981120] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532586981120] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Received message of type
"Certificate" containing no certificates.
[Thr 140532586981120] Renouncing client authentication: verification mode: 1
[Thr 140532586981120] [ssl3_decode_client_certificate]
[Thr 140532586981120] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532586981120] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532586981120] Thu Apr 11 09:02:39:911 2024
[Thr 140532586981120] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532586981120] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532586981120] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586981120] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532586981120] No Client Certificate
[Thr 140532586981120] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532586981120] (failed resume) new TLS session_id="6994A03E 901248AC
1966BD6B 52487F12 6F84A97C 5BC7AE47 AC917FFE 50F06CA2
[Thr 140532586981120] SapSSLISessionStartFin(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532586981120] <<- SapSSLSessionStartNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532586981120] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014006a10, &plen=(nil),
&more=(nil), &ios=7fd04aed1c38)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] IcmReadFromConn(id=9/345660): request new MPI (0/0)
[Thr 140532586981120] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532586981120] MPI<78181>bb#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532586981120] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532586981120] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014006a10,
&plen=7fd04aed1b18, &more=7fd04aed1b17, &ios=7fd04aed1b1c)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] NiIPeek: peek successful for hdl 159 (r)
[Thr 140532586981120] ->> SapSSLReadNB(sssl_hdl=7fd014006a10, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586981120] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=6920, max=6928)
[Thr 140532586981120] SSL:SSL_read(reclen= 6936) data, out= 6907
[Thr 140532586981120] <<- SapSSLReadNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "fl=0x00, max=65455, got=6907, more=N,
io=idle"
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014006a10,
&plen=7fd04aed1b18, &more=7fd04aed1b17, &ios=7fd04aed1b1c)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] NiIPeek: peek for hdl 159 timed out (r; 0ms)
[Thr 140532586981120] IcmReadFromConn(id=9/345660): no SSL data available
[Thr 140532586981120] IcmReadFromConn(id=9/345660): read 6907 bytes, 1 readops
(timeout 0)
[Thr 140532586981120] Thu Apr 11 09:02:39:912 2024
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] HttpPlugInHandleNetData(rqid=9/345660/1): role: Server(1),
status: 1
[Thr 140532586981120] content-length: 0/0, buf_len: 6907, buf_offset: 0,
buf_status: 0
[Thr 140532586981120] ICT: IctIHttpOpenMessage: 7fd014067b10 typ=1
[Thr 140532586981120] IctCheckIfValidHostname: Check [api-staging.swissport-
services.com] len 34
[Thr 140532586981120] HttpParseRequestHeader: content length: 6329
[Thr 140532586981120] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532586981120] HttpParseRequestHeader: Version: 1001
[Thr 140532586981120] HttpParseRequestHeader: no server port set
[Thr 140532586981120] HttpParseRequestHeader: Keep-Alive: 1
[Thr 140532586981120] ->> SapSSLGetPeerInfo(sssl_hdl=7fd014006a10,
&cert=7fd04aed16f0, &cert_len=7fd04aed16ec,
[Thr 140532586981120] &subject_dn=7fd04aed16f8, &issuer_dn=7fd04aed1700,
&csuite_name=7fd04aed1708)
[Thr 140532586981120] <<- SapSSLGetPeerInfo(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] out: cert_len = <no cert>
[Thr 140532586981120] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586981120] HTTP request (raw) [9/345660/1]:
[Thr 140532586981120] POST
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_inv_ws/800/
zmm_i_inv_ws/inv_aws HTT
[Thr 140532586981120] x-forwarded-for: 52.63.148.205
[Thr 140532586981120] x-forwarded-proto: https
[Thr 140532586981120] x-forwarded-port: 443
[Thr 140532586981120] host: api-staging.swissport-services.com
[Thr 140532586981120] x-amzn-trace-id: Root=1-66178b0f-61b588a21454db094766223f
[Thr 140532586981120] content-length: 6329
[Thr 140532586981120] soapaction: urn:sap-
com:document:sap:rfc:functions:ZMM_I_INVOICE_WS:ZMM_I_INVOICE_WSRequest
[Thr 140532586981120] authorization: XXX
[Thr 140532586981120] content-type: text/xml; charset=UTF-8
[Thr 140532586981120] cookie: sap-usercontext=sap-client=800;
[Thr 140532586981120] accept: */*
[Thr 140532586981120] user-agent: AHC/2.1
[Thr 140532586981120] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532586981120] ->> SapSSLGetPeerInfo(sssl_hdl=7fd014006a10,
&cert=7fd04aed0638, &cert_len=7fd04aed0634,
[Thr 140532586981120] &subject_dn=7fd04aed0640, &issuer_dn=7fd04aed0648,
&csuite_name=7fd04aed06c8)
[Thr 140532586981120] <<- SapSSLGetPeerInfo(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] out: cert_len = <no cert>
[Thr 140532586981120] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586981120] HttpCheckUserAgent: Function call IcmRegExec(expr=AHC/2.1)
failed with rc=1
[Thr 140532586981120] sap-cancel-on-close not found
[Thr 140532586981120] DpPlgGetVirtHost: search virt host for 2/api-
staging.swissport-services.com/8443
[Thr 140532586981120] DpPlgGetVirtHost: no server defined, use default
[Thr 140532586981120] HttpGetVirtHost: use virt_host_idx 0 for api-
staging.swissport-services.com:8443
[Thr 140532586981120] HttpSrvHdlRequest: method: 2; path:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_inv_ws
[Thr 140532586981120] Handler 0: HttpAuthHandler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_in
[Thr 140532586981120] Handler 1: HttpModHandler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_inv
[Thr 140532586981120] Thu Apr 11 09:02:39:912 2024
[Thr 140532586981120] Handler 2: HttpCacheHandler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_i
[Thr 140532586981120] Handler 6: HttpSAPR3Handler matches url:
/sap/bc/srt/wsdl/flv_10000A11MAD1/bndg_url/sap/bc/srt/rfc/sap/zmm_i_i
[Thr 140532586981120] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532586981120] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532586981120] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532586981120] >> start >>
CsiExecute(7fd02401e940,7fd04aecba20,99,1,7fd04aecba10,7fd04aecb9f4,0)
[Thr 140532586981120] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532586981120] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532586981120] << end << CsiExecute(CSI_RC==OK)
[Thr 140532586981120] >> start >> CsiFreeInstance((nil))
[Thr 140532586981120] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532586981120] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532586981120] HttpModHandler: process 1, header_len 578
[Thr 140532586981120] ->> SapSSLGetPeerInfo(sssl_hdl=7fd014006a10,
&cert=7fd04aecc8a0, &cert_len=7fd04aecc580,
[Thr 140532586981120] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532586981120] <<- SapSSLGetPeerInfo(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] out: cert_len = <no cert>
[Thr 140532586981120] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586981120] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586981120] HttpModHandler: perform the actions: (128)
[Thr 140532586981120] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532586981120] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586981120] HttpCacheHandler: TASK_REQUEST 578 7fd024001ae0 (nil)
[Thr 140532586981120] ISC: uncacheable request method 2
[Thr 140532586981120] HttpCacheHandler: cache miss.
[Thr 140532586981120] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586981120] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532586981120] ICT: IctLookupPathTable() -> 0
[Thr 140532586981120] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532586981120] DTRACE(9/345660/1): {root-
id=730EFE781C731EEEBDFA2F869C475412}_{conn-id=730EFE781C731EEEBDFA2F869C477412}_1
[Thr 140532586981120] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532586981120] IcmPlFlushBuf: Flushing 6907 Bytes, buf_status: 6
[Thr 140532586981120] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532586981120] flush buffer with mpi buffer id 7
[Thr 140532586981120] MPI<78181>bb#4 FlushOutbuf 7 1 0 255cb0 6987 6 ->
7fd050314cb0 MPI_OK
[Thr 140532586981120] IcmPlFlushBuf: roll in workprocess
[Thr 140532586981120] IcmConnRollInWP: roll in work process
[Thr 140532586981120] Thu Apr 11 09:02:39:913 2024
[Thr 140532586981120] IcmCreateDpRequest: Send request to AppServer
[Thr 140532586981120] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532586981120] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532586981120] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532586981120] DpResourcesOk: logons: act/max/usage = 6/1200/0.500000 %
[Thr 140532586981120] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532586981120] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532586981120] DpResourcesOk: ES: act/max/usage = 2176 MB/10992 MB/19.796215
%
[Thr 140532586981120] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532586981120] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532586981120] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532586981120] DpListRemove: remove elem 36 from tmadm_free_list
[Thr 140532586981120] DpListRemove: 1193 elems in tmadm_free_list
[Thr 140532586981120] DpListInsert: insert elem 36 into tmadm_inuse_list (at begin)
[Thr 140532586981120] DpListInsert: 7 elems in tmadm_inuse_list
[Thr 140532586981120] DpGetFreeUid: new UID: 26448
[Thr 140532586981120] DpSesLockSessionEntry: lock T36_U26448_M0
[Thr 140532586981120] DpSesUnlockSessionEntry: unlocked invalid T36_M0
[Thr 140532586981120] DpInitInternalSession: initialized T36_M0_I0
[Thr 140532586981120] RqQQueueDestroy: Destroy queue <T36_U26447_M0> in slot 68
(49076)
[Thr 140532586981120] RqQQueueDestroy: locked session queue mutex for high priority
[Thr 140532586981120] RqQQueueSlotClear: clear slot 68
[Thr 140532586981120] RqQUnlockSessionQueue: unlocked session queue mutex for high
priority
[Thr 140532586981120] DpITmSlotClear: cleared T36_U26448
[Thr 140532586981120] DpTmSlotAllocate: allocated T36_U26448
[Thr 140532586981120] RqQQueueCreate: Created queue <T36_U26448_M0> in slot 68
(49077) with normal priority
[Thr 140532586981120] DpLogonInit: new logon T36_U26448, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532586981120] IcmSendRq: created T36_U26448_M0
[Thr 140532586981120] DpSesGetWorkerType: return workerType DIA for T36_U26448
[Thr 140532586981120] DpRqSlotAllocate: 1 pending requests
[Thr 140532586981120] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078279, slot 944)
[Thr 140532586981120] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078279) from
ICMAN to local WORKER
[Thr 140532586981120] rq_id 26078279
[Thr 140532586981120] -OUT- ca_blk -1 len 0
[Thr 140532586981120] -OUT- userTrace 3
[Thr 140532586981120] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532586981120] -OUT- mpi rq <78181> mpi resp <78182> prot
2
[Thr 140532586981120] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532586981120] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532586981120] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA2F869C475412}_{conn-id=730EFE781C731EEEBDFA2F869C477412}_1
[Thr 140532586981120] -OUT- sender address:
[Thr 140532586981120] -OUT- type LOCAL
[Thr 140532586981120] -OUT- agentType ICMAN
[Thr 140532586981120] -OUT- receiver address:
[Thr 140532586981120] -OUT- type LOCAL
[Thr 140532586981120] -OUT- agentType WORKER workerTyp DIA
[Thr 140532586981120] -OUT- session T36_U26448_M0
[Thr 140532586981120] RqQAddRequest: Add request rq_id 26078279 (DIA) to queue
<T36_U26448_M0> in slot 68 at the end
[Thr 140532586981120] Dump of queue <T36_U26448_M0> in slot 68 (1 requests,
port=0):
[Thr 140532586981120] -1 <- 29 (rq_id 26078279, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532586981120] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532586981120] RqQQueueAddToSessionQueue: Added queue <T36_U26448_M0> in
slot 68 to normal priority session queue at the end
[Thr 140532586981120] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532586981120] -1 <- 68 < T36_U26448_M0> -> -1
[Thr 140532586981120] Thu Apr 11 09:02:39:913 2024
[Thr 140532586981120] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532586981120] RqQNotifySessionQueue: notify normal priority session queue
of queue <T36_U26448_M0> (DIA) (id=185)
[Thr 140532586981120] Info of W18 (inside function RqQNotifyWorker (end))
[Thr 140532586981120] noOfPendingQueues=>W18-0<
[Thr 140532586981120] noOfWaitForQueues=>W18-2<
[Thr 140532586981120] wait for queue 69 (T38_U26359_M0)
[Thr 140532586981120] wait for queue 23 (W18)
[Thr 140532586981120] lowestPriority: normal priority
[Thr 140532586981120] modCounter=>W18-2733102<
[Thr 140532586981120] RqQNotifyWorker: notify W18 about dispatch queues
(modCounter=>W18-2733102<)
[Thr 140532586981120] RqQSetWorkerState: W18 has state RUNNING (modCounter=>W18-
2733102<)
[Thr 140532586981120] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532586981120] RqQQueueGetNumberOfRequests: Queue <T36_U26448_M0> in slot 68
contains 1 requests of type DIA
[Thr 140532586981120] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078279), queue has 1 requests
[Thr 140532586981120] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078279,
slot 944)
[Thr 140532586981120] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532586981120] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532586981120] IcmHandleNetRead(id=9/345660): read_len: 6907, HandleNetData
returned: 4
[Thr 140532586981120] IcmHandleNetRead(id=9/345660): status 1 -> 4
[Thr 140532586981120] ->> SapSSLReadPendingNB(sssl_hdl=7fd014006a10,
&plen=7fd04aed1c58, &more=7fd04aed1c33, &ios=7fd04aed1c38)
[Thr 140532586981120] <<- SapSSLReadPendingNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586981120] IcmReadFromPartner(id=9/345660): read with maximum timeout
500
[Thr 140532586981120] IcmMpiWatchInsert: MPI watch entry <78182>, number 11
inserted.
[Thr 140532586981120] MPI<78182>bc#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532586981120] Thu Apr 11 09:02:40:016 2024
[Thr 140532586981120] MPI<78182>bc#6 GetInbuf -1 255cb0 753 (1) -> MPI_EOS: End Of
Stream
[Thr 140532586981120] IcmMpiWatchRemove: MPI watch entry <78182>, number 11 removed
(wakeup was not sent).
[Thr 140532586981120] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] PlugInHandleServData(rqid=9/345660/1): role: Server(1),
status: 3
[Thr 140532586981120] content-length: 0/-1, buf_len: 673, buf_offset: 0,
buf_status: 6
[Thr 140532586981120] ICT: IctIHttpOpenMessage: 7fd01407c6a0 typ=2
[Thr 140532586981120] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532586981120] HttpParseResponseHeader: Version: 1001
[Thr 140532586981120] HttpParseResponseHeader: Keep-Alive: 0
[Thr 140532586981120] HTTP response (raw) [9/345660/1]:
[Thr 140532586981120] HTTP/1.1 500 Invalid WSDL access, no SOAP request expected
[Thr 140532586981120] content-type: text/xml
[Thr 140532586981120] content-length: 482
[Thr 140532586981120] sap-icm-log-uname: SWPS_ZYC
[Thr 140532586981120] sap-icm-log-mandt: 800
[Thr 140532586981120] sap-perf-fesrec: 96083.000000
[Thr 140532586981120] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532586981120] DTRACE(9/345660/1): {root-
id=730EFE781C731EEEBDFA2F869C475412}_{conn-id=730EFE781C731EEEBDFA2F869C477412}_1
[Thr 140532586981120] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532586981120] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586981120] HttpSAPR3Handler: Response from AppServer
[Thr 140532586981120] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586981120] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586981120] HttpCacheHandler: TASK_RESPONSE 191 7fd024001ae0 7fd01407b1e0
[Thr 140532586981120] ISC: don't cache response (no valid cache key).
[Thr 140532586981120] ICC: don't cache response. scc=0 status=0 len=0 meth=2
[Thr 140532586981120] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586981120] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532586981120] HttpModHandler: process 2, header_len 191
[Thr 140532586981120] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586981120] HttpModHandler: perform the actions: (128)
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] Thu Apr 11 09:02:40:017 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 29 (rq_id 26078283)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 29
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=170), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078283 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078283
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 090000003C460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T36_U26448_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078283, slot 945)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078283)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345660
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078283, slot 945)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=3000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 3000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=3000)
[Thr 140532586981120] HttpModSerializeHeaderAndCertificate: serialize new http
header
[Thr 140532586981120] ICT: IctHttpCloseMessage( 7fd01407c6a0 ) -> u=0 rc=0
[Thr 140532586981120] ICT: IctIHttpOpenMessage: 7fd01407c6a0 typ=2
[Thr 140532586981120] HttpModSerializeHeaderAndCertificate: buffer: 7fd050314d20,
base: 7fd050314cd0, buf_size: 65456, buf_used: 639
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] HTTP response (rewritten) [9/345660/1]:
[Thr 140532586981120] HTTP/1.1 500 Invalid WSDL access, no SOAP request expected
[Thr 140532586981120] content-type: text/xml
[Thr 140532586981120] content-length: 482
[Thr 140532586981120] sap-perf-fesrec: 96083.000000
[Thr 140532586981120] connection: close
[Thr 140532586981120] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586981120] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532586981120] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586981120] Thu Apr 11 09:02:40:017 2024
[Thr 140532586981120] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532586981120] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532586981120] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpModHandler: process 3, header_len 0
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd01407b1e0
[Thr 140532586981120] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586981120] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532586981120] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532586981120] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532586981120] IcmHandleReadFromPartner(id=9/345660): HandleServData
returned: 702
[Thr 140532586981120] BINDUMP of content denied
[Thr 140532586981120] IcmWriteToConn(id=9/345660): prepared to write data to
partner (len = 639, timeout = 2000)
[Thr 140532586981120] ->> SapSSLWriteNB(sssl_hdl=7fd014006a10, buf=7fd050314d20,
len=639, flags=0x0000, timeout=2000, &IOstate=7fd04
[Thr 140532586981120] SSL:SSL_write(len=639) net=668 (out=639 of 639, prev=0)
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=668 of 668)
[Thr 140532586981120] <<- SapSSLWriteNB(sssl_hdl=7fd014006a10)==SAP_O_K
[Thr 140532586981120] in/out: ... = "buf= 7fd050314d20, written= 639 of 639 (all)
io=idle"
[Thr 140532586981120] IcmWriteToConn(id=9/345660): wrote data to partner (len =
639)
[Thr 140532586981120] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532586981120] MPI<78182>bc#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532586981120] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532586981120] ICT: IctHttpCloseMessage( 7fd014067b10 ) -> u=0 rc=0
[Thr 140532586981120] ICT: IctHttpCloseMessage( 7fd01407c6a0 ) -> u=0 rc=0
[Thr 140532586981120] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4aed17fc)
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532586981120] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532586981120] CCL[SSL]: Srv-0002B94E: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532586981120] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532586981120] in: sssl_hdl = 7fd014006a10
[Thr 140532586981120] in: ... ni_hdl = 159
[Thr 140532586981120] in: flags = 0
[Thr 140532586981120] in: timeout = 10000
[Thr 140532586981120] MPI<78181>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532586981120] MPI<78181>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532586981120] MPI<78181>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586981120] MPI<78182>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532586981120] MPI<78182>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532586981120] Thu Apr 11 09:02:40:018 2024
[Thr 140532586981120] MPI<78182>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586981120] NiIShutdownHandle: shutdown -w of hdl 159
[Thr 140532586981120] SiPeek: hang up occurred in sock 29
[Thr 140532586981120] NiIPeek: peek for hdl 159 failed (r; rc=1)
[Thr 140532586981120] NiIRead: hdl 159 SSLState 0
[Thr 140532586981120] NiIRead: SiRecv failed for hdl 159/sock 29
[Thr 140532586981120] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.199:38212;
L=10.200.50.133:8443)
[Thr 140532586981120] NiICloseHandle: shutdown and close hdl 159/sock 29
[Thr 140532586981120] IcmConnClose: Connection 9/345660 closed
[Thr 140532586981120] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.199 ->
rc=0
[Thr 140532586981120] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532586981120] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
-> 0
[Thr 140532586981120] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=-1 -> 0
[Thr 140532586981120] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532586981120] REQ TRACE END: 9/345660/1
[Thr 140532586981120] IcmWorkerThread: Thread 7: Waiting for event
[Thr 140532586981120] DpRqFreePendingRequests: freed 0 pending request
[Thr 140533415016064] Thu Apr 11 09:02:40:173 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 152 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 152/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 152 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 152 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 152 from 10.200.51.199:38224
[Thr 140533415016064] NiIAccept: hdl 152 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 9
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345661/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.199 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360780
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532588566272] IcmWorkerHandleRequest: worker 4 got the semaphore
[Thr 140532588566272] REQ TRACE BEGIN: 9/345661/1
[Thr 140532588566272] REQUEST:
Type: ACCEPT_CONNECTION Index = 360780
[Thr 140532588566272] CONNECTION (id=9/345661):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 152, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.199:38224 ()
status: NOP
connect time: 11.04.2024 09:02:40
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532588566272] MPI 188: event flag already open:7641 key=16641
[Thr 140532588566272] Thu Apr 11 09:02:40:173 2024
[Thr 140532588566272] MPI 188: event flag already open:7640 key=16640
[Thr 140532588566272] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532588566272] MPI<78183>bc#1 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532588566272] MPI<78183>bc#2 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532588566272] MPI 187: event flag already open:7643 key=16643
[Thr 140532588566272] MPI 187: event flag already open:7642 key=16642
[Thr 140532588566272] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532588566272] MPI<78184>bb#1 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532588566272] MPI<78184>bb#2 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532588566272] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532588566272] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532588566272] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532588566272] out: sssl_hdl = 7fd034057d70
[Thr 140532588566272] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd034057d70,
cred_hdl=7fd00c064270)
[Thr 140532588566272] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532588566272] ->> SapSSLSetNiHdl(sssl_hdl=7fd034057d70, ni_hdl=152)
[Thr 140532588566272] SSL NI-hdl 152: local=10.200.50.133:8443
peer=10.200.51.199:38224
[Thr 140532588566272] <<- SapSSLSetNiHdl(sssl_hdl=7fd034057d70,
ni_hdl=152)==SAP_O_K
[Thr 140532588566272] ->> SapSSLSessionStartNB(sssl_hdl=7fd034057d70, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532588566272] NiIBlockMode: leave blockmode for hdl 152 FALSE
[Thr 140532588566272] NiIHdlGetStatus: hdl 152/sock 29 ok, data pending (len=1)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532588566272] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532588566272] ClientHello session_id="B5A2448C FAD6CCE3 0DA77B19
880FAF94 21550486 3418FA36 45E32DB2 FB5EDD56"
[Thr 140532588566272] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532588566272] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532588566272] TLS_AES_128_GCM_SHA256
[Thr 140532588566272] TLS_AES_256_GCM_SHA384
[Thr 140532588566272] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532588566272] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532588566272] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532588566272] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532588566272] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532588566272] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532588566272] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532588566272] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532588566272] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532588566272] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532588566272] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532588566272] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532588566272] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532588566272] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532588566272] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532588566272] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532588566272] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532588566272] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532588566272] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532588566272] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532588566272] [ssl_bytes_to_cipher_suites]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Received TLS Extensions:
[Thr 140532588566272] Id: 43 - supported_versions [RFC8446]
[Thr 140532588566272] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532588566272] Id: 51 - key_share [RFC8446]
[Thr 140532588566272] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532588566272] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532588566272] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532588566272] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532588566272] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532588566272] [ssl_parse_clienthello_tlsext]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Own TLS certificate:
[Thr 140532588566272] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532588566272] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532588566272] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532588566272] [ssl3_output_cert_chain]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: CA certificate:
[Thr 140532588566272] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532588566272] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532588566272] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532588566272] [ssl3_output_cert_chain]
[Thr 140532588566272] Thu Apr 11 09:02:40:174 2024
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Offering 2 certificate type(s) for
client authentication:
[Thr 140532588566272] rsa_sign(1)
[Thr 140532588566272] ecdsa_sign(64)
[Thr 140532588566272] [ssl3_get_req_cert_type]
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532588566272] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532588566272] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532588566272] [ssl_get_encoded_trusted_ca_list]
[Thr 140532588566272] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532588566272] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532588566272] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532588566272] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532588566272] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Received message of type
"Certificate" containing no certificates.
[Thr 140532588566272] Renouncing client authentication: verification mode: 1
[Thr 140532588566272] [ssl3_decode_client_certificate]
[Thr 140532588566272] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532588566272] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532588566272] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532588566272] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532588566272] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532588566272] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532588566272] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532588566272] No Client Certificate
[Thr 140532588566272] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532588566272] (failed resume) new TLS session_id="EAE661FD 1AFB017D
BB26647D 634EFD08 BDD01BD7 C4DAC132 8BCF7D12 3A428331
[Thr 140532588566272] SapSSLISessionStartFin(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532588566272] <<- SapSSLSessionStartNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532588566272] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532588566272] ->> SapSSLReadPendingNB(sssl_hdl=7fd034057d70, &plen=(nil),
&more=(nil), &ios=7fd04b054c38)
[Thr 140532588566272] <<- SapSSLReadPendingNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588566272] IcmReadFromConn(id=9/345661): request new MPI (0/0)
[Thr 140532588566272] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532588566272] MPI<78183>bc#3 GetOutbuf 0 255cb0 65536 (0) -> 7fd050314cd0
44564480 MPI_OK
[Thr 140532588566272] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050314cd0,
len=80
[Thr 140532588566272] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532588566272] Thu Apr 11 09:02:40:176 2024
[Thr 140532588566272] ->> SapSSLReadPendingNB(sssl_hdl=7fd034057d70,
&plen=7fd04b054b18, &more=7fd04b054b17, &ios=7fd04b054b1c)
[Thr 140532588566272] <<- SapSSLReadPendingNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588566272] NiIPeek: peek successful for hdl 152 (r)
[Thr 140532588566272] ->> SapSSLReadNB(sssl_hdl=7fd034057d70, buf=7fd050314d20,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588566272] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532588566272] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532588566272] <<- SapSSLReadNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532588566272] ->> SapSSLReadPendingNB(sssl_hdl=7fd034057d70,
&plen=7fd04b054b18, &more=7fd04b054b17, &ios=7fd04b054b1c)
[Thr 140532588566272] <<- SapSSLReadPendingNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588566272] NiIPeek: peek for hdl 152 timed out (r; 0ms)
[Thr 140532588566272] IcmReadFromConn(id=9/345661): no SSL data available
[Thr 140532588566272] IcmReadFromConn(id=9/345661): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532588566272] BINDUMP of content denied
[Thr 140532588566272] HttpPlugInHandleNetData(rqid=9/345661/1): role: Server(1),
status: 1
[Thr 140532588566272] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532588566272] ICT: IctIHttpOpenMessage: 7fd03405d690 typ=1
[Thr 140532588566272] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532588566272] HttpParseRequestHeader: no content length set
[Thr 140532588566272] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532588566272] HttpParseRequestHeader: Version: 1001
[Thr 140532588566272] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532588566272] ->> SapSSLGetPeerInfo(sssl_hdl=7fd034057d70,
&cert=7fd04b0546f0, &cert_len=7fd04b0546ec,
[Thr 140532588566272] &subject_dn=7fd04b0546f8, &issuer_dn=7fd04b054700,
&csuite_name=7fd04b054708)
[Thr 140532588566272] <<- SapSSLGetPeerInfo(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] out: cert_len = <no cert>
[Thr 140532588566272] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532588566272] HTTP request (raw) [9/345661/1]:
[Thr 140532588566272] GET /sap/bc/ping HTTP/1.1
[Thr 140532588566272] host: 10.200.50.133:8443
[Thr 140532588566272] connection: close
[Thr 140532588566272] user-agent: ELB-HealthChecker/2.0
[Thr 140532588566272] accept-encoding: gzip, compressed
[Thr 140532588566272] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532588566272] ->> SapSSLGetPeerInfo(sssl_hdl=7fd034057d70,
&cert=7fd04b053638, &cert_len=7fd04b053634,
[Thr 140532588566272] &subject_dn=7fd04b053640, &issuer_dn=7fd04b053648,
&csuite_name=7fd04b0536c8)
[Thr 140532588566272] <<- SapSSLGetPeerInfo(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] out: cert_len = <no cert>
[Thr 140532588566272] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532588566272] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532588566272] Thu Apr 11 09:02:40:177 2024
[Thr 140532588566272] sap-cancel-on-close not found
[Thr 140532588566272] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532588566272] DpPlgGetVirtHost: no server defined, use default
[Thr 140532588566272] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532588566272] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532588566272] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532588566272] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532588566272] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532588566272] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532588566272] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532588566272] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532588566272] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532588566272] >> start >>
CsiExecute(7fd02401e940,7fd04b04ea20,12,1,7fd04b04ea10,7fd04b04e9f4,0)
[Thr 140532588566272] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532588566272] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532588566272] << end << CsiExecute(CSI_RC==OK)
[Thr 140532588566272] >> start >> CsiFreeInstance((nil))
[Thr 140532588566272] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532588566272] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532588566272] HttpModHandler: process 1, header_len 144
[Thr 140532588566272] ->> SapSSLGetPeerInfo(sssl_hdl=7fd034057d70,
&cert=7fd04b04f8a0, &cert_len=7fd04b04f580,
[Thr 140532588566272] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532588566272] <<- SapSSLGetPeerInfo(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] out: cert_len = <no cert>
[Thr 140532588566272] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532588566272] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532588566272] HttpModHandler: perform the actions: (128)
[Thr 140532588566272] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532588566272] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532588566272] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532588566272] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532588566272] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532588566272] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532588566272] MTX_LOCK 1760 7fd024005020
[Thr 140532588566272] MTX_UNLOCK 1891 7fd024005020
[Thr 140532588566272] IctCmOpen#357250 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588566272] MTX_LOCK 1760 7fd024004a70
[Thr 140532588566272] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532588566272] Thu Apr 11 09:02:40:177 2024
[Thr 140532588566272] IctCmOpen#459361 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588566272] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532588566272] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532588566272] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532588566272] MTX_LOCK 1760 7fd024005020
[Thr 140532588566272] MTX_UNLOCK 1891 7fd024005020
[Thr 140532588566272] IctCmOpen#357251 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588566272] MTX_LOCK 1760 7fd024004a70
[Thr 140532588566272] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532588566272] IctCmOpen#459362 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588566272] HttpCacheHandler: cache miss.
[Thr 140532588566272] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532588566272] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532588566272] ICT: IctLookupPathTable() -> 0
[Thr 140532588566272] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532588566272] DTRACE(9/345661/1): {root-
id=730EFE781C731EEEBDFA2F8BA97C9413}_{conn-id=730EFE781C731EEEBDFA2F8BA97CB413}_1
[Thr 140532588566272] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532588566272] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532588566272] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050314cd0, len=80
[Thr 140532588566272] flush buffer with mpi buffer id 7
[Thr 140532588566272] MPI<78183>bc#4 FlushOutbuf 7 1 0 255cb0 224 6 -> 7fd050314cb0
MPI_OK
[Thr 140532588566272] IcmPlFlushBuf: roll in workprocess
[Thr 140532588566272] IcmConnRollInWP: roll in work process
[Thr 140532588566272] IcmCreateDpRequest: Send request to AppServer
[Thr 140532588566272] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532588566272] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532588566272] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532588566272] DpResourcesOk: logons: act/max/usage = 6/1200/0.500000 %
[Thr 140532588566272] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532588566272] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532588566272] DpResourcesOk: ES: act/max/usage = 2176 MB/10992 MB/19.796215
%
[Thr 140532588566272] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532588566272] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532588566272] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532588566272] DpListRemove: remove elem 36 from tmadm_free_list
[Thr 140532588566272] DpListRemove: 1193 elems in tmadm_free_list
[Thr 140532588566272] DpListInsert: insert elem 36 into tmadm_inuse_list (at begin)
[Thr 140532588566272] DpListInsert: 7 elems in tmadm_inuse_list
[Thr 140532588566272] DpGetFreeUid: new UID: 26449
[Thr 140532588566272] Thu Apr 11 09:02:40:178 2024
[Thr 140532588566272] DpSesLockSessionEntry: lock invalid T36_M0
[Thr 140532588566272] DpSesUnlockSessionEntry: unlocked invalid T36_M0
[Thr 140532588566272] DpInitInternalSession: initialized T36_M0_I0
[Thr 140532588566272] DpITmSlotClear: cleared T36_U26449
[Thr 140532588566272] DpTmSlotAllocate: allocated T36_U26449
[Thr 140532588566272] RqQQueueCreate: Created queue <T36_U26449_M0> in slot 68
(49079) with normal priority
[Thr 140532588566272] DpLogonInit: new logon T36_U26449, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532588566272] IcmSendRq: created T36_U26449_M0
[Thr 140532588566272] DpSesGetWorkerType: return workerType DIA for T36_U26449
[Thr 140532588566272] DpRqSlotAllocate: 1 pending requests
[Thr 140532588566272] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078288, slot 946)
[Thr 140532588566272] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078288) from
ICMAN to local WORKER
[Thr 140532588566272] rq_id 26078288
[Thr 140532588566272] -OUT- ca_blk -1 len 0
[Thr 140532588566272] -OUT- userTrace 3
[Thr 140532588566272] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532588566272] -OUT- mpi rq <78183> mpi resp <78184> prot
2
[Thr 140532588566272] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532588566272] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532588566272] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA2F8BA97C9413}_{conn-id=730EFE781C731EEEBDFA2F8BA97CB413}_1
[Thr 140532588566272] -OUT- sender address:
[Thr 140532588566272] -OUT- type LOCAL
[Thr 140532588566272] -OUT- agentType ICMAN
[Thr 140532588566272] -OUT- receiver address:
[Thr 140532588566272] -OUT- type LOCAL
[Thr 140532588566272] -OUT- agentType WORKER workerTyp DIA
[Thr 140532588566272] -OUT- session T36_U26449_M0
[Thr 140532588566272] RqQAddRequest: Add request rq_id 26078288 (DIA) to queue
<T36_U26449_M0> in slot 68 at the end
[Thr 140532588566272] Dump of queue <T36_U26449_M0> in slot 68 (1 requests,
port=0):
[Thr 140532588566272] -1 <- 29 (rq_id 26078288, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532588566272] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532588566272] RqQQueueAddToSessionQueue: Added queue <T36_U26449_M0> in
slot 68 to normal priority session queue at the end
[Thr 140532588566272] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532588566272] -1 <- 68 < T36_U26449_M0> -> -1
[Thr 140532588566272] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532588566272] RqQNotifySessionQueue: notify normal priority session queue
of queue <T36_U26449_M0> (DIA) (id=186)
[Thr 140532588566272] Info of W18 (inside function RqQNotifyWorker (end))
[Thr 140532588566272] noOfPendingQueues=>W18-0<
[Thr 140532588566272] noOfWaitForQueues=>W18-1<
[Thr 140532588566272] wait for queue 23 (W18)
[Thr 140532588566272] lowestPriority: normal priority
[Thr 140532588566272] modCounter=>W18-2733113<
[Thr 140532588566272] RqQNotifyWorker: notify W18 about dispatch queues
(modCounter=>W18-2733113<)
[Thr 140532588566272] RqQSetWorkerState: W18 has state RUNNING (modCounter=>W18-
2733113<)
[Thr 140532588566272] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532588566272] RqQQueueGetNumberOfRequests: Queue <T36_U26449_M0> in slot 68
contains 1 requests of type DIA
[Thr 140532588566272] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078288), queue has 1 requests
[Thr 140532588566272] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078288,
slot 946)
[Thr 140532588566272] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532588566272] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532588566272] IcmHandleNetRead(id=9/345661): read_len: 144, HandleNetData
returned: 4
[Thr 140532588566272] IcmHandleNetRead(id=9/345661): status 1 -> 4
[Thr 140532588566272] ->> SapSSLReadPendingNB(sssl_hdl=7fd034057d70,
&plen=7fd04b054c58, &more=7fd04b054c33, &ios=7fd04b054c38)
[Thr 140532588566272] <<- SapSSLReadPendingNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588566272] IcmReadFromPartner(id=9/345661): read with maximum timeout
500
[Thr 140532588566272] IcmMpiWatchInsert: MPI watch entry <78184>, number 11
inserted.
[Thr 140532588566272] MPI<78184>bb#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532588566272] MPI<78184>bb#6 GetInbuf -1 255cb0 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532588566272] Thu Apr 11 09:02:40:193 2024
[Thr 140532588566272] IcmMpiWatchRemove: MPI watch entry <78184>, number 11 removed
(wakeup was not sent).
[Thr 140532588566272] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532588566272] BINDUMP of content denied
[Thr 140532588566272] PlugInHandleServData(rqid=9/345661/1): role: Server(1),
status: 3
[Thr 140532588566272] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532588566272] ICT: IctIHttpOpenMessage: 7fd034065240 typ=2
[Thr 140532588566272] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532588566272] HttpParseResponseHeader: Version: 1001
[Thr 140532588566272] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532588566272] HTTP response (raw) [9/345661/1]:
[Thr 140532588566272] HTTP/1.1 403 Forbidden
[Thr 140532588566272] content-type: text/html; charset=utf-8
[Thr 140532588566272] content-length: 857
[Thr 140532588566272] sap-perf-fesrec: 10804.000000
[Thr 140532588566272] content-encoding: gzip
[Thr 140532588566272] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532588566272] DTRACE(9/345661/1): {root-
id=730EFE781C731EEEBDFA2F8BA97C9413}_{conn-id=730EFE781C731EEEBDFA2F8BA97CB413}_1
[Thr 140532588566272] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532588566272] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532588566272] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532588566272] HttpSAPR3Handler: Response from AppServer
[Thr 140532588566272] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532588566272] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532588566272] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532588566272] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd034058580
[Thr 140532588566272] ISC: don't cache response: status code=403
[Thr 140532588566272] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532588566272] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532588566272] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532588566272] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532588566272] HttpModHandler: process 2, header_len 151
[Thr 140532588566272] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532588566272] HttpModHandler: perform the actions: (128)
[Thr 140532588566272] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532588566272] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532588566272] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532588566272] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588566272] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532588566272] Thu Apr 11 09:02:40:193 2024
[Thr 140532588566272] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532588566272] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532588566272] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588566272] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588566272] HttpModHandler: process 3, header_len 0
[Thr 140532588566272] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588566272] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd034058580
[Thr 140532588566272] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588566272] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532588566272] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532588566272] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532588566272] IcmHandleReadFromPartner(id=9/345661): HandleServData
returned: 702
[Thr 140532588566272] BINDUMP of content denied
[Thr 140532588566272] IcmWriteToConn(id=9/345661): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532588566272] ->> SapSSLWriteNB(sssl_hdl=7fd034057d70, buf=7fd050314d20,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532588566272] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532588566272] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532588566272] <<- SapSSLWriteNB(sssl_hdl=7fd034057d70)==SAP_O_K
[Thr 140532588566272] in/out: ... = "buf= 7fd050314d20, written= 1008 of 1008
(all) io=idle"
[Thr 140532588566272] IcmWriteToConn(id=9/345661): wrote data to partner (len =
1008)
[Thr 140532588566272] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532588566272] MPI<78184>bb#7 FreeInbuf#1 0 255cb0 0 -> MPI_OK
[Thr 140532588566272] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532588566272] ICT: IctHttpCloseMessage( 7fd03405d690 ) -> u=0 rc=0
[Thr 140532588566272] ICT: IctHttpCloseMessage( 7fd034065240 ) -> u=0 rc=0
[Thr 140532588566272] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4b0547fc)
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532588566272] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532588566272] CCL[SSL]: Srv-0002B94F: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532588566272] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532588566272] in: sssl_hdl = 7fd034057d70
[Thr 140532588566272] in: ... ni_hdl = 152
[Thr 140532588566272] in: flags = 0
[Thr 140532588566272] in: timeout = 10000
[Thr 140532588566272] MPI<78183>bc#7 Close( bc ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532588566272] MPI<78183>bc#9 Delete( bc ) -> MPI_OK
[Thr 140532588566272] MPI<78183>bc#8 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532588566272] MPI<78184>bb#8 Close( bb ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532588566272] MPI<78184>bb#10 Delete( bb ) -> MPI_OK
[Thr 140532588566272] MPI<78184>bb#9 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532588566272] Thu Apr 11 09:02:40:194 2024
[Thr 140532588566272] NiIShutdownHandle: shutdown -w of hdl 152
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 29 (rq_id 26078289)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 29
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=171), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078289 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078289
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 090000003D460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T36_U26449_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078289, slot 947)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078289)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345661
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078289, slot 947)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=3000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 3000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=3000)
[Thr 140532588566272] SiPeek: hang up occurred in sock 29
[Thr 140532588566272] NiIPeek: peek for hdl 152 failed (r; rc=1)
[Thr 140532588566272] NiIRead: hdl 152 SSLState 0
[Thr 140532588566272] NiIRead: SiRecv failed for hdl 152/sock 29
[Thr 140532588566272] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.199:38224;
L=10.200.50.133:8443)
[Thr 140532588566272] NiICloseHandle: shutdown and close hdl 152/sock 29
[Thr 140532588566272] IcmConnClose: Connection 9/345661 closed
[Thr 140532588566272] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.199 ->
rc=0
[Thr 140532588566272] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532588566272] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
-> 0
[Thr 140532588566272] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=-1 -> 0
[Thr 140532588566272] Thu Apr 11 09:02:40:195 2024
[Thr 140532588566272] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532588566272] REQ TRACE END: 9/345661/1
[Thr 140532588566272] IcmWorkerThread: Thread 4: Waiting for event
[Thr 140532588566272] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Thu Apr 11 09:02:43:196 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: call schedules, last t: 1712818933, next
t: 1712818963, cur t: 1712818963
[Thr 140532577003264] IcmCreateRequest: Append request 360781
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532589094656] IcmWorkerHandleRequest: worker 3 got the semaphore
[Thr 140532589094656] REQUEST:
Type: SCHEDULER Index = 360781
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589094656] IcmGetSchedule: found slot 0
[Thr 140532589094656] IcmAlReportPerfData: Reporting data to CCMS Alerting
Infrastructure
[Thr 140532589094656] IcmConnCheckStoredClientConn: next client timeout check in 6
sec
[Thr 140532589094656] IcmConnInitContext: context initialized
[Thr 140532589094656] IcmGetServicePtr: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 1
[Thr 140532589094656] PlugInHandleAdmMessage: request received:
[Thr 140532589094656] PlugInHandleAdmMessage: opcode: ICM_COM_OP_CACHE_STAT (136),
len: 528, dest_type: 2, subhdlkey: 262145(4/0)
[Thr 140532589094656] HttpISubHandlerItCreate: add reference to table 7fd024010780,
now 2 references, 1 tables used
[Thr 140532589094656] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_ADM_MSG(4), header_l
[Thr 140532589094656] HttpCacheHandler: TASK_ADM_MSG 0 7fd024001ae0 (nil)
[Thr 140532589094656] SCACHE: adm request received:
[Thr 140532589094656] SCACHE: opcode: 136, len: 528, dest_type: 2, dest:
[Thr 140532589094656] MTX_LOCK 3247 7fd024004a70
[Thr 140532589094656] MTX_UNLOCK 3260 7fd024004a70
[Thr 140532589094656] IctCmGetCacheInfo#459363 -> 0
[Thr 140532589094656] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532589094656] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532589094656] HttpSubHandlerItDelete: remove reference to table
7fd024010780, now 1 references, 1 tables used
[Thr 140532589094656] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532589094656] IcmServDecrRefCount: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 0
[Thr 140532589094656] IcmGetSchedule: next schedule in 30 secs
[Thr 140532589094656] IcmWorkerThread: Thread 3: Waiting for event
[Thr 140532589094656] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:02:47:351 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:02:48:201 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331623 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331624 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331625 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331626: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331626 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532577003264] Thu Apr 11 09:02:48:605 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 29 (rq_id 26078369)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 29
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59657
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=172), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078369 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078369
[Thr 140532577003264] -IN-- ca_blk 0 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_PLUGIN_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
18
[Thr 140532577003264] -IN-- session T36_U26451_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 0
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request
(rq_id 26078369, slot 948)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078369)
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 72 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)
[Thr 140532577003264] NiBufIAlloc: malloc NiBufadm, to 0 bytes
[Thr 140532577003264] NiBufDup: ref 1 for buf 7fd00c06b130
[Thr 140532577003264] IcmCreateRequest: Append request 360782
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] NiBufFree: ref 1 for buf 7fd00c06b130
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id
26078369, slot 948)
[Thr 140532577003264] DpRqFreeResources: releasing ca_blk 0 with request rq_id
26078369
[Thr 140532577003264] DpCaRelBlk: released ca_blk 0
[Thr 140532590679808] IcmWorkerHandleRequest: worker 0 got the semaphore
[Thr 140532590679808] REQUEST:
Type: ADMMSG Index = 360782
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] Thu Apr 11 09:02:48:605 2024
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532590679808] MPI<78186>bc#5 GetInbuf -1 255cb0 2440 (1) -> MPI_EOS: End Of
Stream
[Thr 140532590679808] IcmHandleMonitorMessage: called with opcode:
ICM_COM_OP_MON_INFO (100)
[Thr 140532590679808] MPI<78185>bb#4 GetOutbuf 80000 4663e8 65536 (0) ->
7fd050525408 44564480 MPI_OK
[Thr 140532590679808] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532590679808] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532590679808] MPI<78186>bc#6 FreeInbuf#2 0 255cb0 0 -> MPI_OK
[Thr 140532590679808] MPI<78185>bb#5 FlushOutbuf -1 1 1 4663e8 10444 6 ->
7fd0505253e8 MPI_OK
[Thr 140532590679808] IcmWorkerThread: Thread 0: Waiting for event
[Thr 140532590679808] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Thu Apr 11 09:02:53:608 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331627 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331628 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331629 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331630: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331630 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140533415016064] Thu Apr 11 09:02:54:819 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 153 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 153/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 153 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 153 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 153 from 10.200.51.221:24360
[Thr 140533415016064] NiIAccept: hdl 153 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345663/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.221 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360783
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532586452736] IcmWorkerHandleRequest: worker 8 got the semaphore
[Thr 140532586452736] REQ TRACE BEGIN: 9/345663/1
[Thr 140532586452736] REQUEST:
Type: ACCEPT_CONNECTION Index = 360783
[Thr 140532586452736] CONNECTION (id=9/345663):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 153, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.221:24360 ()
status: NOP
connect time: 11.04.2024 09:02:54
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532586452736] Thu Apr 11 09:02:54:820 2024
[Thr 140532586452736] MPI 187: event flag already open:7643 key=16643
[Thr 140532586452736] MPI 187: event flag already open:7642 key=16642
[Thr 140532586452736] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532586452736] MPI<78187>bb#1 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532586452736] MPI<78187>bb#2 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532586452736] MPI 188: event flag already open:7641 key=16641
[Thr 140532586452736] MPI 188: event flag already open:7640 key=16640
[Thr 140532586452736] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532586452736] MPI<78188>bc#1 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532586452736] MPI<78188>bc#2 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532586452736] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532586452736] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532586452736] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532586452736] out: sssl_hdl = 7fd02c042a30
[Thr 140532586452736] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd02c042a30,
cred_hdl=7fd00c064270)
[Thr 140532586452736] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532586452736] ->> SapSSLSetNiHdl(sssl_hdl=7fd02c042a30, ni_hdl=153)
[Thr 140532586452736] SSL NI-hdl 153: local=10.200.50.133:8443
peer=10.200.51.221:24360
[Thr 140532586452736] <<- SapSSLSetNiHdl(sssl_hdl=7fd02c042a30,
ni_hdl=153)==SAP_O_K
[Thr 140532586452736] ->> SapSSLSessionStartNB(sssl_hdl=7fd02c042a30, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532586452736] NiIBlockMode: leave blockmode for hdl 153 FALSE
[Thr 140532586452736] NiIHdlGetStatus: hdl 153/sock 29 ok, data pending (len=1)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532586452736] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532586452736] ClientHello session_id="A0AEDB21 B553EF1B E45F90AB
DAD70563 B343F058 DDAACF13 72B5B5BE AC560F2E"
[Thr 140532586452736] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532586452736] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532586452736] TLS_AES_128_GCM_SHA256
[Thr 140532586452736] TLS_AES_256_GCM_SHA384
[Thr 140532586452736] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532586452736] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532586452736] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532586452736] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532586452736] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532586452736] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532586452736] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532586452736] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532586452736] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586452736] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532586452736] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532586452736] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532586452736] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532586452736] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532586452736] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532586452736] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532586452736] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586452736] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532586452736] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532586452736] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532586452736] [ssl_bytes_to_cipher_suites]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Received TLS Extensions:
[Thr 140532586452736] Id: 43 - supported_versions [RFC8446]
[Thr 140532586452736] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532586452736] Id: 51 - key_share [RFC8446]
[Thr 140532586452736] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532586452736] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532586452736] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532586452736] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532586452736] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532586452736] [ssl_parse_clienthello_tlsext]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Own TLS certificate:
[Thr 140532586452736] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532586452736] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532586452736] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532586452736] [ssl3_output_cert_chain]
[Thr 140532586452736] Thu Apr 11 09:02:54:820 2024
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: CA certificate:
[Thr 140532586452736] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532586452736] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532586452736] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532586452736] [ssl3_output_cert_chain]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Offering 2 certificate type(s) for
client authentication:
[Thr 140532586452736] rsa_sign(1)
[Thr 140532586452736] ecdsa_sign(64)
[Thr 140532586452736] [ssl3_get_req_cert_type]
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532586452736] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532586452736] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532586452736] [ssl_get_encoded_trusted_ca_list]
[Thr 140532586452736] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532586452736] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532586452736] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532586452736] <-- SSL:SiPoll(sock=29, evt=R, slept = 2 ms) Ready
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Received message of type
"Certificate" containing no certificates.
[Thr 140532586452736] Renouncing client authentication: verification mode: 1
[Thr 140532586452736] [ssl3_decode_client_certificate]
[Thr 140532586452736] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532586452736] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532586452736] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532586452736] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532586452736] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532586452736] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532586452736] No Client Certificate
[Thr 140532586452736] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532586452736] (failed resume) new TLS session_id="C9A5A9BF D98D0418
45A4EC02 E8E81CD5 E7293EC4 BD09232D D18F7A1C 2413E68A
[Thr 140532586452736] SapSSLISessionStartFin(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532586452736] <<- SapSSLSessionStartNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532586452736] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532586452736] ->> SapSSLReadPendingNB(sssl_hdl=7fd02c042a30, &plen=(nil),
&more=(nil), &ios=7fd04ae50c38)
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] IcmReadFromConn(id=9/345663): request new MPI (0/0)
[Thr 140532586452736] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532586452736] MPI<78187>bb#3 GetOutbuf 0 4663e8 65536 (0) -> 7fd050525408
44564480 MPI_OK
[Thr 140532586452736] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532586452736] Thu Apr 11 09:02:54:824 2024
[Thr 140532586452736] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532586452736] ->> SapSSLReadPendingNB(sssl_hdl=7fd02c042a30,
&plen=7fd04ae50b18, &more=7fd04ae50b17, &ios=7fd04ae50b1c)
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] NiIPeek: peek successful for hdl 153 (r)
[Thr 140532586452736] ->> SapSSLReadNB(sssl_hdl=7fd02c042a30, buf=7fd050525458,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532586452736] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532586452736] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532586452736] <<- SapSSLReadNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532586452736] ->> SapSSLReadPendingNB(sssl_hdl=7fd02c042a30,
&plen=7fd04ae50b18, &more=7fd04ae50b17, &ios=7fd04ae50b1c)
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] NiIPeek: peek for hdl 153 timed out (r; 0ms)
[Thr 140532586452736] IcmReadFromConn(id=9/345663): no SSL data available
[Thr 140532586452736] IcmReadFromConn(id=9/345663): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532586452736] BINDUMP of content denied
[Thr 140532586452736] HttpPlugInHandleNetData(rqid=9/345663/1): role: Server(1),
status: 1
[Thr 140532586452736] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532586452736] ICT: IctIHttpOpenMessage: 7fd02c064b40 typ=1
[Thr 140532586452736] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532586452736] HttpParseRequestHeader: no content length set
[Thr 140532586452736] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532586452736] HttpParseRequestHeader: Version: 1001
[Thr 140532586452736] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532586452736] ->> SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30,
&cert=7fd04ae506f0, &cert_len=7fd04ae506ec,
[Thr 140532586452736] &subject_dn=7fd04ae506f8, &issuer_dn=7fd04ae50700,
&csuite_name=7fd04ae50708)
[Thr 140532586452736] <<- SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] out: cert_len = <no cert>
[Thr 140532586452736] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586452736] HTTP request (raw) [9/345663/1]:
[Thr 140532586452736] GET /sap/bc/ping HTTP/1.1
[Thr 140532586452736] host: 10.200.50.133:8443
[Thr 140532586452736] connection: close
[Thr 140532586452736] user-agent: ELB-HealthChecker/2.0
[Thr 140532586452736] accept-encoding: gzip, compressed
[Thr 140532586452736] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532586452736] ->> SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30,
&cert=7fd04ae4f638, &cert_len=7fd04ae4f634,
[Thr 140532586452736] &subject_dn=7fd04ae4f640, &issuer_dn=7fd04ae4f648,
&csuite_name=7fd04ae4f6c8)
[Thr 140532586452736] <<- SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] out: cert_len = <no cert>
[Thr 140532586452736] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586452736] Thu Apr 11 09:02:54:825 2024
[Thr 140532586452736] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532586452736] sap-cancel-on-close not found
[Thr 140532586452736] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532586452736] DpPlgGetVirtHost: no server defined, use default
[Thr 140532586452736] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532586452736] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532586452736] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532586452736] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532586452736] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532586452736] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532586452736] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532586452736] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532586452736] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532586452736] >> start >>
CsiExecute(7fd02401e940,7fd04ae4aa20,12,1,7fd04ae4aa10,7fd04ae4a9f4,0)
[Thr 140532586452736] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532586452736] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532586452736] << end << CsiExecute(CSI_RC==OK)
[Thr 140532586452736] >> start >> CsiFreeInstance((nil))
[Thr 140532586452736] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532586452736] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532586452736] HttpModHandler: process 1, header_len 144
[Thr 140532586452736] ->> SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30,
&cert=7fd04ae4b8a0, &cert_len=7fd04ae4b580,
[Thr 140532586452736] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532586452736] <<- SapSSLGetPeerInfo(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] out: cert_len = <no cert>
[Thr 140532586452736] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532586452736] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586452736] HttpModHandler: perform the actions: (128)
[Thr 140532586452736] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532586452736] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586452736] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532586452736] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532586452736] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532586452736] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532586452736] MTX_LOCK 1760 7fd024005020
[Thr 140532586452736] MTX_UNLOCK 1891 7fd024005020
[Thr 140532586452736] IctCmOpen#357252 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] MTX_LOCK 1760 7fd024004a70
[Thr 140532586452736] Thu Apr 11 09:02:54:825 2024
[Thr 140532586452736] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532586452736] IctCmOpen#459364 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532586452736] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532586452736] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532586452736] MTX_LOCK 1760 7fd024005020
[Thr 140532586452736] MTX_UNLOCK 1891 7fd024005020
[Thr 140532586452736] IctCmOpen#357253 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] MTX_LOCK 1760 7fd024004a70
[Thr 140532586452736] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532586452736] IctCmOpen#459365 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532586452736] HttpCacheHandler: cache miss.
[Thr 140532586452736] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532586452736] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532586452736] ICT: IctLookupPathTable() -> 0
[Thr 140532586452736] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532586452736] DTRACE(9/345663/1): {root-
id=730EFE781C731EEEBDFA30A30A3D1419}_{conn-id=730EFE781C731EEEBDFA30A30A3D3419}_1
[Thr 140532586452736] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532586452736] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532586452736] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532586452736] flush buffer with mpi buffer id 40
[Thr 140532586452736] MPI<78187>bb#4 FlushOutbuf 40 1 0 4663e8 224 6 ->
7fd0505253e8 MPI_OK
[Thr 140532586452736] IcmPlFlushBuf: roll in workprocess
[Thr 140532586452736] IcmConnRollInWP: roll in work process
[Thr 140532586452736] IcmCreateDpRequest: Send request to AppServer
[Thr 140532586452736] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532586452736] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532586452736] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532586452736] DpResourcesOk: logons: act/max/usage = 8/1200/0.666667 %
[Thr 140532586452736] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532586452736] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532586452736] DpResourcesOk: ES: act/max/usage = 2184 MB/10992 MB/19.868996
%
[Thr 140532586452736] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532586452736] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532586452736] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532586452736] DpListRemove: remove elem 22 from tmadm_free_list
[Thr 140532586452736] DpListRemove: 1191 elems in tmadm_free_list
[Thr 140532586452736] DpListInsert: insert elem 22 into tmadm_inuse_list (at begin)
[Thr 140532586452736] DpListInsert: 9 elems in tmadm_inuse_list
[Thr 140532586452736] Thu Apr 11 09:02:54:826 2024
[Thr 140532586452736] DpGetFreeUid: new UID: 26465
[Thr 140532586452736] DpSesLockSessionEntry: lock invalid T22_M0
[Thr 140532586452736] DpSesUnlockSessionEntry: unlocked invalid T22_M0
[Thr 140532586452736] DpInitInternalSession: initialized T22_M0_I0
[Thr 140532586452736] DpITmSlotClear: cleared T22_U26465
[Thr 140532586452736] DpTmSlotAllocate: allocated T22_U26465
[Thr 140532586452736] RqQQueueCreate: Created queue <T22_U26465_M0> in slot 74
(49112) with normal priority
[Thr 140532586452736] DpLogonInit: new logon T22_U26465, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532586452736] IcmSendRq: created T22_U26465_M0
[Thr 140532586452736] DpSesGetWorkerType: return workerType DIA for T22_U26465
[Thr 140532586452736] DpRqSlotAllocate: 1 pending requests
[Thr 140532586452736] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078621, slot 949)
[Thr 140532586452736] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078621) from
ICMAN to local WORKER
[Thr 140532586452736] rq_id 26078621
[Thr 140532586452736] -OUT- ca_blk -1 len 0
[Thr 140532586452736] -OUT- userTrace 3
[Thr 140532586452736] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532586452736] -OUT- mpi rq <78187> mpi resp <78188> prot
2
[Thr 140532586452736] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532586452736] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532586452736] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA30A30A3D1419}_{conn-id=730EFE781C731EEEBDFA30A30A3D3419}_1
[Thr 140532586452736] -OUT- sender address:
[Thr 140532586452736] -OUT- type LOCAL
[Thr 140532586452736] -OUT- agentType ICMAN
[Thr 140532586452736] -OUT- receiver address:
[Thr 140532586452736] -OUT- type LOCAL
[Thr 140532586452736] -OUT- agentType WORKER workerTyp DIA
[Thr 140532586452736] -OUT- session T22_U26465_M0
[Thr 140532586452736] RqQAddRequest: Add request rq_id 26078621 (DIA) to queue
<T22_U26465_M0> in slot 74 at the end
[Thr 140532586452736] Dump of queue <T22_U26465_M0> in slot 74 (1 requests,
port=0):
[Thr 140532586452736] -1 <- 94 (rq_id 26078621, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532586452736] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532586452736] RqQQueueAddToSessionQueue: Added queue <T22_U26465_M0> in
slot 74 to normal priority session queue at the end
[Thr 140532586452736] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532586452736] -1 <- 74 < T22_U26465_M0> -> -1
[Thr 140532586452736] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532586452736] RqQNotifySessionQueue: notify normal priority session queue
of queue <T22_U26465_M0> (DIA) (id=187)
[Thr 140532586452736] Info of W14 (inside function RqQNotifyWorker (end))
[Thr 140532586452736] noOfPendingQueues=>W14-0<
[Thr 140532586452736] noOfWaitForQueues=>W14-2<
[Thr 140532586452736] wait for queue 69 (T38_U26359_M0)
[Thr 140532586452736] wait for queue 19 (W14)
[Thr 140532586452736] lowestPriority: normal priority
[Thr 140532586452736] modCounter=>W14-3782687<
[Thr 140532586452736] RqQNotifyWorker: notify W14 about dispatch queues
(modCounter=>W14-3782687<)
[Thr 140532586452736] RqQSetWorkerState: W14 has state RUNNING (modCounter=>W14-
3782687<)
[Thr 140532586452736] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532586452736] RqQQueueGetNumberOfRequests: Queue <T22_U26465_M0> in slot 74
contains 1 requests of type DIA
[Thr 140532586452736] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078621), queue has 1 requests
[Thr 140532586452736] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078621,
slot 949)
[Thr 140532586452736] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532586452736] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532586452736] IcmHandleNetRead(id=9/345663): read_len: 144, HandleNetData
returned: 4
[Thr 140532586452736] IcmHandleNetRead(id=9/345663): status 1 -> 4
[Thr 140532586452736] ->> SapSSLReadPendingNB(sssl_hdl=7fd02c042a30,
&plen=7fd04ae50c58, &more=7fd04ae50c33, &ios=7fd04ae50c38)
[Thr 140532586452736] <<- SapSSLReadPendingNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532586452736] IcmReadFromPartner(id=9/345663): read with maximum timeout
500
[Thr 140532586452736] IcmMpiWatchInsert: MPI watch entry <78188>, number 11
inserted.
[Thr 140532586452736] MPI<78188>bc#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532586452736] Thu Apr 11 09:02:54:842 2024
[Thr 140532586452736] MPI<78188>bc#6 GetInbuf -1 4663e8 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532586452736] IcmMpiWatchRemove: MPI watch entry <78188>, number 11 removed
(wakeup was not sent).
[Thr 140532586452736] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532586452736] BINDUMP of content denied
[Thr 140532586452736] PlugInHandleServData(rqid=9/345663/1): role: Server(1),
status: 3
[Thr 140532586452736] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532586452736] ICT: IctIHttpOpenMessage: 7fd02c077470 typ=2
[Thr 140532586452736] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532586452736] HttpParseResponseHeader: Version: 1001
[Thr 140532586452736] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532586452736] HTTP response (raw) [9/345663/1]:
[Thr 140532586452736] HTTP/1.1 403 Forbidden
[Thr 140532586452736] content-type: text/html; charset=utf-8
[Thr 140532586452736] content-length: 857
[Thr 140532586452736] sap-perf-fesrec: 11110.000000
[Thr 140532586452736] content-encoding: gzip
[Thr 140532586452736] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532586452736] DTRACE(9/345663/1): {root-
id=730EFE781C731EEEBDFA30A30A3D1419}_{conn-id=730EFE781C731EEEBDFA30A30A3D3419}_1
[Thr 140532586452736] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532586452736] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586452736] HttpSAPR3Handler: Response from AppServer
[Thr 140532586452736] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586452736] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532586452736] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd02c075fb0
[Thr 140532586452736] ISC: don't cache response: status code=403
[Thr 140532586452736] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532586452736] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586452736] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] Thu Apr 11 09:02:54:842 2024
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532586452736] HttpModHandler: process 2, header_len 151
[Thr 140532586452736] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532586452736] HttpModHandler: perform the actions: (128)
[Thr 140532586452736] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532586452736] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532586452736] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532586452736] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532586452736] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 94 (rq_id 26078622)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 94
[Thr 140532586452736] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532586452736] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpModHandler: process 3, header_len 0
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd02c075fb0
[Thr 140532586452736] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532586452736] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532586452736] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532586452736] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532586452736] IcmHandleReadFromPartner(id=9/345663): HandleServData
returned: 702
[Thr 140532586452736] BINDUMP of content denied
[Thr 140532586452736] IcmWriteToConn(id=9/345663): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532586452736] ->> SapSSLWriteNB(sssl_hdl=7fd02c042a30, buf=7fd050525458,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532586452736] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532586452736] <<- SapSSLWriteNB(sssl_hdl=7fd02c042a30)==SAP_O_K
[Thr 140532586452736] in/out: ... = "buf= 7fd050525458, written= 1008 of 1008
(all) io=idle"
[Thr 140532586452736] IcmWriteToConn(id=9/345663): wrote data to partner (len =
1008)
[Thr 140532586452736] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532586452736] MPI<78188>bc#7 FreeInbuf#1 0 4663e8 0 -> MPI_OK
[Thr 140532586452736] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532586452736] ICT: IctHttpCloseMessage( 7fd02c064b40 ) -> u=0 rc=0
[Thr 140532586452736] ICT: IctHttpCloseMessage( 7fd02c077470 ) -> u=0 rc=0
[Thr 140532586452736] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4ae507fc)
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532586452736] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532586452736] Thu Apr 11 09:02:54:843 2024
[Thr 140532586452736] CCL[SSL]: Srv-0002B950: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532586452736] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532586452736] in: sssl_hdl = 7fd02c042a30
[Thr 140532586452736] in: ... ni_hdl = 153
[Thr 140532586452736] in: flags = 0
[Thr 140532586452736] in: timeout = 10000
[Thr 140532586452736] MPI<78187>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532586452736] MPI<78187>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532586452736] MPI<78187>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586452736] MPI<78188>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532586452736] MPI<78188>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532586452736] MPI<78188>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532586452736] NiIShutdownHandle: shutdown -w of hdl 153
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59391
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=173), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078622 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078622
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 090000003F460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
14
[Thr 140532577003264] -IN-- session T22_U26465_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078622, slot 950)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078622)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345663
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078622, slot 950)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532586452736] SiPeek: hang up occurred in sock 29
[Thr 140532586452736] NiIPeek: peek for hdl 153 failed (r; rc=1)
[Thr 140532586452736] NiIRead: hdl 153 SSLState 0
[Thr 140532586452736] NiIRead: SiRecv failed for hdl 153/sock 29
[Thr 140532586452736] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.221:24360;
L=10.200.50.133:8443)
[Thr 140532586452736] NiICloseHandle: shutdown and close hdl 153/sock 29
[Thr 140532586452736] IcmConnClose: Connection 9/345663 closed
[Thr 140532586452736] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.221 ->
rc=0
[Thr 140532586452736] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532586452736] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
-> 0
[Thr 140532586452736] Thu Apr 11 09:02:54:844 2024
[Thr 140532586452736] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=-1 -> 0
[Thr 140532586452736] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532586452736] REQ TRACE END: 9/345663/1
[Thr 140532586452736] IcmWorkerThread: Thread 8: Waiting for event
[Thr 140532586452736] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:02:57:355 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:02:59:849 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331631 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331632 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331633 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331634: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331634 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] Thu Apr 11 09:03:04:851 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331635 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331636 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331637 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331638: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331638 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532599072512] Thu Apr 11 09:03:07:365 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:03:09:856 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331639 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=4000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 4000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=4000)
[Thr 140532585395968] MPI<2>0#2331640 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331641 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331642: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331642 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140533415016064] Thu Apr 11 09:03:10:186 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 154 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 154/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 154 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 154 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 154 from 10.200.51.199:56924
[Thr 140533415016064] NiIAccept: hdl 154 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345664/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.199 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360784
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532588037888] IcmWorkerHandleRequest: worker 5 got the semaphore
[Thr 140532588037888] REQ TRACE BEGIN: 9/345664/1
[Thr 140532588037888] REQUEST:
Type: ACCEPT_CONNECTION Index = 360784
[Thr 140532588037888] CONNECTION (id=9/345664):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 154, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.199:56924 ()
status: NOP
connect time: 11.04.2024 09:03:10
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532588037888] Thu Apr 11 09:03:10:186 2024
[Thr 140532588037888] MPI 188: event flag already open:7641 key=16641
[Thr 140532588037888] MPI 188: event flag already open:7640 key=16640
[Thr 140532588037888] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532588037888] MPI<78189>bc#1 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532588037888] MPI<78189>bc#2 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532588037888] MPI 187: event flag already open:7643 key=16643
[Thr 140532588037888] MPI 187: event flag already open:7642 key=16642
[Thr 140532588037888] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532588037888] MPI<7818a>bb#1 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532588037888] MPI<7818a>bb#2 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532588037888] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532588037888] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532588037888] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532588037888] out: sssl_hdl = 7fd020048b80
[Thr 140532588037888] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd020048b80,
cred_hdl=7fd00c064270)
[Thr 140532588037888] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532588037888] ->> SapSSLSetNiHdl(sssl_hdl=7fd020048b80, ni_hdl=154)
[Thr 140532588037888] SSL NI-hdl 154: local=10.200.50.133:8443
peer=10.200.51.199:56924
[Thr 140532588037888] <<- SapSSLSetNiHdl(sssl_hdl=7fd020048b80,
ni_hdl=154)==SAP_O_K
[Thr 140532588037888] ->> SapSSLSessionStartNB(sssl_hdl=7fd020048b80, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532588037888] NiIBlockMode: leave blockmode for hdl 154 FALSE
[Thr 140532588037888] NiIHdlGetStatus: hdl 154/sock 29 ok, data pending (len=1)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532588037888] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532588037888] ClientHello session_id="78F8D380 D9150243 A0D5CF80
93504C9B 174838B2 A3A3F0D5 597373D3 2FC1086D"
[Thr 140532588037888] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532588037888] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532588037888] TLS_AES_128_GCM_SHA256
[Thr 140532588037888] TLS_AES_256_GCM_SHA384
[Thr 140532588037888] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532588037888] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532588037888] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532588037888] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532588037888] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532588037888] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532588037888] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532588037888] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532588037888] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532588037888] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532588037888] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532588037888] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532588037888] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532588037888] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532588037888] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532588037888] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532588037888] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532588037888] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532588037888] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532588037888] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532588037888] [ssl_bytes_to_cipher_suites]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Received TLS Extensions:
[Thr 140532588037888] Id: 43 - supported_versions [RFC8446]
[Thr 140532588037888] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532588037888] Id: 51 - key_share [RFC8446]
[Thr 140532588037888] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532588037888] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532588037888] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532588037888] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532588037888] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532588037888] [ssl_parse_clienthello_tlsext]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Own TLS certificate:
[Thr 140532588037888] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532588037888] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532588037888] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532588037888] [ssl3_output_cert_chain]
[Thr 140532588037888] Thu Apr 11 09:03:10:187 2024
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: CA certificate:
[Thr 140532588037888] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532588037888] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532588037888] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532588037888] [ssl3_output_cert_chain]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Offering 2 certificate type(s) for
client authentication:
[Thr 140532588037888] rsa_sign(1)
[Thr 140532588037888] ecdsa_sign(64)
[Thr 140532588037888] [ssl3_get_req_cert_type]
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532588037888] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532588037888] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532588037888] [ssl_get_encoded_trusted_ca_list]
[Thr 140532588037888] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532588037888] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532588037888] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532588037888] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532588037888] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Received message of type
"Certificate" containing no certificates.
[Thr 140532588037888] Renouncing client authentication: verification mode: 1
[Thr 140532588037888] [ssl3_decode_client_certificate]
[Thr 140532588037888] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532588037888] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532588037888] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532588037888] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532588037888] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532588037888] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532588037888] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532588037888] No Client Certificate
[Thr 140532588037888] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532588037888] (failed resume) new TLS session_id="41DF2CD8 F00BA3A0
8C117CC3 F46F167E B624F1A5 6481E8AA B7FF004D 94F8265B
[Thr 140532588037888] SapSSLISessionStartFin(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532588037888] <<- SapSSLSessionStartNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532588037888] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532588037888] ->> SapSSLReadPendingNB(sssl_hdl=7fd020048b80, &plen=(nil),
&more=(nil), &ios=7fd04afd3c38)
[Thr 140532588037888] <<- SapSSLReadPendingNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588037888] IcmReadFromConn(id=9/345664): request new MPI (0/0)
[Thr 140532588037888] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532588037888] MPI<78189>bc#3 GetOutbuf 0 4663e8 65536 (0) -> 7fd050525408
44564480 MPI_OK
[Thr 140532588037888] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532588037888] Thu Apr 11 09:03:10:190 2024
[Thr 140532588037888] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532588037888] ->> SapSSLReadPendingNB(sssl_hdl=7fd020048b80,
&plen=7fd04afd3b18, &more=7fd04afd3b17, &ios=7fd04afd3b1c)
[Thr 140532588037888] <<- SapSSLReadPendingNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588037888] NiIPeek: peek successful for hdl 154 (r)
[Thr 140532588037888] ->> SapSSLReadNB(sssl_hdl=7fd020048b80, buf=7fd050525458,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532588037888] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532588037888] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532588037888] <<- SapSSLReadNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532588037888] ->> SapSSLReadPendingNB(sssl_hdl=7fd020048b80,
&plen=7fd04afd3b18, &more=7fd04afd3b17, &ios=7fd04afd3b1c)
[Thr 140532588037888] <<- SapSSLReadPendingNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588037888] NiIPeek: peek for hdl 154 timed out (r; 0ms)
[Thr 140532588037888] IcmReadFromConn(id=9/345664): no SSL data available
[Thr 140532588037888] IcmReadFromConn(id=9/345664): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532588037888] BINDUMP of content denied
[Thr 140532588037888] HttpPlugInHandleNetData(rqid=9/345664/1): role: Server(1),
status: 1
[Thr 140532588037888] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532588037888] ICT: IctIHttpOpenMessage: 7fd020065b60 typ=1
[Thr 140532588037888] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532588037888] HttpParseRequestHeader: no content length set
[Thr 140532588037888] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532588037888] HttpParseRequestHeader: Version: 1001
[Thr 140532588037888] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532588037888] ->> SapSSLGetPeerInfo(sssl_hdl=7fd020048b80,
&cert=7fd04afd36f0, &cert_len=7fd04afd36ec,
[Thr 140532588037888] &subject_dn=7fd04afd36f8, &issuer_dn=7fd04afd3700,
&csuite_name=7fd04afd3708)
[Thr 140532588037888] <<- SapSSLGetPeerInfo(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] out: cert_len = <no cert>
[Thr 140532588037888] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532588037888] HTTP request (raw) [9/345664/1]:
[Thr 140532588037888] GET /sap/bc/ping HTTP/1.1
[Thr 140532588037888] host: 10.200.50.133:8443
[Thr 140532588037888] connection: close
[Thr 140532588037888] user-agent: ELB-HealthChecker/2.0
[Thr 140532588037888] accept-encoding: gzip, compressed
[Thr 140532588037888] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532588037888] ->> SapSSLGetPeerInfo(sssl_hdl=7fd020048b80,
&cert=7fd04afd2638, &cert_len=7fd04afd2634,
[Thr 140532588037888] &subject_dn=7fd04afd2640, &issuer_dn=7fd04afd2648,
&csuite_name=7fd04afd26c8)
[Thr 140532588037888] <<- SapSSLGetPeerInfo(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] out: cert_len = <no cert>
[Thr 140532588037888] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532588037888] Thu Apr 11 09:03:10:190 2024
[Thr 140532588037888] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532588037888] sap-cancel-on-close not found
[Thr 140532588037888] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532588037888] DpPlgGetVirtHost: no server defined, use default
[Thr 140532588037888] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532588037888] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532588037888] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532588037888] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532588037888] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532588037888] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532588037888] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532588037888] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532588037888] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532588037888] >> start >>
CsiExecute(7fd02401e940,7fd04afcda20,12,1,7fd04afcda10,7fd04afcd9f4,0)
[Thr 140532588037888] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532588037888] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532588037888] << end << CsiExecute(CSI_RC==OK)
[Thr 140532588037888] >> start >> CsiFreeInstance((nil))
[Thr 140532588037888] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532588037888] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532588037888] HttpModHandler: process 1, header_len 144
[Thr 140532588037888] ->> SapSSLGetPeerInfo(sssl_hdl=7fd020048b80,
&cert=7fd04afce8a0, &cert_len=7fd04afce580,
[Thr 140532588037888] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532588037888] <<- SapSSLGetPeerInfo(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] out: cert_len = <no cert>
[Thr 140532588037888] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532588037888] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532588037888] HttpModHandler: perform the actions: (128)
[Thr 140532588037888] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532588037888] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532588037888] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532588037888] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532588037888] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532588037888] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532588037888] MTX_LOCK 1760 7fd024005020
[Thr 140532588037888] MTX_UNLOCK 1891 7fd024005020
[Thr 140532588037888] IctCmOpen#357254 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588037888] MTX_LOCK 1760 7fd024004a70
[Thr 140532588037888] Thu Apr 11 09:03:10:190 2024
[Thr 140532588037888] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532588037888] IctCmOpen#459366 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588037888] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532588037888] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532588037888] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532588037888] MTX_LOCK 1760 7fd024005020
[Thr 140532588037888] MTX_UNLOCK 1891 7fd024005020
[Thr 140532588037888] IctCmOpen#357255 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588037888] MTX_LOCK 1760 7fd024004a70
[Thr 140532588037888] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532588037888] IctCmOpen#459367 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532588037888] HttpCacheHandler: cache miss.
[Thr 140532588037888] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532588037888] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532588037888] ICT: IctLookupPathTable() -> 0
[Thr 140532588037888] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532588037888] DTRACE(9/345664/1): {root-
id=730EFE781C731EEEBDFA31C81E88D41A}_{conn-id=730EFE781C731EEEBDFA31C81E88F41A}_1
[Thr 140532588037888] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532588037888] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532588037888] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532588037888] flush buffer with mpi buffer id 40
[Thr 140532588037888] MPI<78189>bc#4 FlushOutbuf 40 1 0 4663e8 224 6 ->
7fd0505253e8 MPI_OK
[Thr 140532588037888] IcmPlFlushBuf: roll in workprocess
[Thr 140532588037888] IcmConnRollInWP: roll in work process
[Thr 140532588037888] IcmCreateDpRequest: Send request to AppServer
[Thr 140532588037888] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532588037888] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532588037888] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532588037888] DpResourcesOk: logons: act/max/usage = 8/1200/0.666667 %
[Thr 140532588037888] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532588037888] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532588037888] DpResourcesOk: ES: act/max/usage = 2184 MB/10992 MB/19.868996
%
[Thr 140532588037888] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532588037888] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532588037888] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532588037888] DpListRemove: remove elem 22 from tmadm_free_list
[Thr 140532588037888] DpListRemove: 1191 elems in tmadm_free_list
[Thr 140532588037888] DpListInsert: insert elem 22 into tmadm_inuse_list (at begin)
[Thr 140532588037888] DpListInsert: 9 elems in tmadm_inuse_list
[Thr 140532588037888] Thu Apr 11 09:03:10:191 2024
[Thr 140532588037888] DpGetFreeUid: new UID: 26468
[Thr 140532588037888] DpSesLockSessionEntry: lock T22_U26468_M0
[Thr 140532588037888] DpSesUnlockSessionEntry: unlocked invalid T22_M0
[Thr 140532588037888] DpInitInternalSession: initialized T22_M0_I0
[Thr 140532588037888] RqQQueueDestroy: Destroy queue <T22_U26467_M0> in slot 74
(49116)
[Thr 140532588037888] RqQQueueDestroy: locked session queue mutex for high priority
[Thr 140532588037888] RqQQueueSlotClear: clear slot 74
[Thr 140532588037888] RqQUnlockSessionQueue: unlocked session queue mutex for high
priority
[Thr 140532588037888] DpITmSlotClear: cleared T22_U26468
[Thr 140532588037888] DpTmSlotAllocate: allocated T22_U26468
[Thr 140532588037888] RqQQueueCreate: Created queue <T22_U26468_M0> in slot 74
(49117) with normal priority
[Thr 140532588037888] DpLogonInit: new logon T22_U26468, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532588037888] IcmSendRq: created T22_U26468_M0
[Thr 140532588037888] DpSesGetWorkerType: return workerType DIA for T22_U26468
[Thr 140532588037888] DpRqSlotAllocate: 1 pending requests
[Thr 140532588037888] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078641, slot 951)
[Thr 140532588037888] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078641) from
ICMAN to local WORKER
[Thr 140532588037888] rq_id 26078641
[Thr 140532588037888] -OUT- ca_blk -1 len 0
[Thr 140532588037888] -OUT- userTrace 3
[Thr 140532588037888] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532588037888] -OUT- mpi rq <78189> mpi resp <7818a> prot
2
[Thr 140532588037888] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532588037888] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532588037888] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA31C81E88D41A}_{conn-id=730EFE781C731EEEBDFA31C81E88F41A}_1
[Thr 140532588037888] -OUT- sender address:
[Thr 140532588037888] -OUT- type LOCAL
[Thr 140532588037888] -OUT- agentType ICMAN
[Thr 140532588037888] -OUT- receiver address:
[Thr 140532588037888] -OUT- type LOCAL
[Thr 140532588037888] -OUT- agentType WORKER workerTyp DIA
[Thr 140532588037888] -OUT- session T22_U26468_M0
[Thr 140532588037888] RqQAddRequest: Add request rq_id 26078641 (DIA) to queue
<T22_U26468_M0> in slot 74 at the end
[Thr 140532588037888] Dump of queue <T22_U26468_M0> in slot 74 (1 requests,
port=0):
[Thr 140532588037888] -1 <- 94 (rq_id 26078641, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532588037888] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532588037888] RqQQueueAddToSessionQueue: Added queue <T22_U26468_M0> in
slot 74 to normal priority session queue at the end
[Thr 140532588037888] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532588037888] -1 <- 74 < T22_U26468_M0> -> -1
[Thr 140532588037888] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532588037888] RqQNotifySessionQueue: notify normal priority session queue
of queue <T22_U26468_M0> (DIA) (id=188)
[Thr 140532588037888] Info of W14 (inside function RqQNotifyWorker (end))
[Thr 140532588037888] noOfPendingQueues=>W14-0<
[Thr 140532588037888] noOfWaitForQueues=>W14-2<
[Thr 140532588037888] wait for queue 69 (T38_U26359_M0)
[Thr 140532588037888] wait for queue 19 (W14)
[Thr 140532588037888] lowestPriority: normal priority
[Thr 140532588037888] modCounter=>W14-3782710<
[Thr 140532588037888] RqQNotifyWorker: notify W14 about dispatch queues
(modCounter=>W14-3782710<)
[Thr 140532588037888] RqQSetWorkerState: W14 has state RUNNING (modCounter=>W14-
3782710<)
[Thr 140532588037888] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532588037888] RqQQueueGetNumberOfRequests: Queue <T22_U26468_M0> in slot 74
contains 1 requests of type DIA
[Thr 140532588037888] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078641), queue has 1 requests
[Thr 140532588037888] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078641,
slot 951)
[Thr 140532588037888] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532588037888] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532588037888] IcmHandleNetRead(id=9/345664): read_len: 144, HandleNetData
returned: 4
[Thr 140532588037888] IcmHandleNetRead(id=9/345664): status 1 -> 4
[Thr 140532588037888] ->> SapSSLReadPendingNB(sssl_hdl=7fd020048b80,
&plen=7fd04afd3c58, &more=7fd04afd3c33, &ios=7fd04afd3c38)
[Thr 140532588037888] <<- SapSSLReadPendingNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] Thu Apr 11 09:03:10:191 2024
[Thr 140532588037888] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532588037888] IcmReadFromPartner(id=9/345664): read with maximum timeout
500
[Thr 140532588037888] IcmMpiWatchInsert: MPI watch entry <7818a>, number 11
inserted.
[Thr 140532588037888] MPI<7818a>bb#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532588037888] MPI<7818a>bb#6 GetInbuf -1 4663e8 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532588037888] IcmMpiWatchRemove: MPI watch entry <7818a>, number 11 removed
(wakeup was not sent).
[Thr 140532588037888] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532588037888] BINDUMP of content denied
[Thr 140532588037888] PlugInHandleServData(rqid=9/345664/1): role: Server(1),
status: 3
[Thr 140532588037888] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532588037888] ICT: IctIHttpOpenMessage: 7fd020078090 typ=2
[Thr 140532588037888] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532588037888] HttpParseResponseHeader: Version: 1001
[Thr 140532588037888] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532588037888] HTTP response (raw) [9/345664/1]:
[Thr 140532588037888] HTTP/1.1 403 Forbidden
[Thr 140532588037888] content-type: text/html; charset=utf-8
[Thr 140532588037888] content-length: 857
[Thr 140532588037888] sap-perf-fesrec: 10742.000000
[Thr 140532588037888] content-encoding: gzip
[Thr 140532588037888] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.199, protocol=HTTPS
[Thr 140532588037888] DTRACE(9/345664/1): {root-
id=730EFE781C731EEEBDFA31C81E88D41A}_{conn-id=730EFE781C731EEEBDFA31C81E88F41A}_1
[Thr 140532588037888] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532588037888] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532588037888] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532588037888] HttpSAPR3Handler: Response from AppServer
[Thr 140532588037888] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532588037888] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532588037888] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532588037888] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd020076bd0
[Thr 140532588037888] ISC: don't cache response: status code=403
[Thr 140532588037888] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532588037888] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532588037888] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532588037888] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532588037888] HttpModHandler: process 2, header_len 151
[Thr 140532588037888] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532588037888] HttpModHandler: perform the actions: (128)
[Thr 140532588037888] Thu Apr 11 09:03:10:207 2024
[Thr 140532588037888] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532588037888] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532588037888] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532588037888] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532588037888] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532588037888] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532588037888] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532588037888] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588037888] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588037888] HttpModHandler: process 3, header_len 0
[Thr 140532588037888] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588037888] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd020076bd0
[Thr 140532588037888] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532588037888] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532588037888] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532588037888] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532588037888] IcmHandleReadFromPartner(id=9/345664): HandleServData
returned: 702
[Thr 140532588037888] BINDUMP of content denied
[Thr 140532588037888] IcmWriteToConn(id=9/345664): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532588037888] ->> SapSSLWriteNB(sssl_hdl=7fd020048b80, buf=7fd050525458,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532588037888] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532588037888] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532588037888] <<- SapSSLWriteNB(sssl_hdl=7fd020048b80)==SAP_O_K
[Thr 140532588037888] in/out: ... = "buf= 7fd050525458, written= 1008 of 1008
(all) io=idle"
[Thr 140532588037888] IcmWriteToConn(id=9/345664): wrote data to partner (len =
1008)
[Thr 140532588037888] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532588037888] MPI<7818a>bb#7 FreeInbuf#1 0 4663e8 0 -> MPI_OK
[Thr 140532588037888] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532588037888] ICT: IctHttpCloseMessage( 7fd020065b60 ) -> u=0 rc=0
[Thr 140532588037888] ICT: IctHttpCloseMessage( 7fd020078090 ) -> u=0 rc=0
[Thr 140532588037888] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4afd37fc)
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532588037888] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532588037888] CCL[SSL]: Srv-0002B951: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532588037888] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532588037888] in: sssl_hdl = 7fd020048b80
[Thr 140532588037888] in: ... ni_hdl = 154
[Thr 140532588037888] in: flags = 0
[Thr 140532588037888] in: timeout = 10000
[Thr 140532588037888] MPI<78189>bc#7 Close( bc ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532588037888] Thu Apr 11 09:03:10:207 2024
[Thr 140532588037888] MPI<78189>bc#9 Delete( bc ) -> MPI_OK
[Thr 140532588037888] MPI<78189>bc#8 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532588037888] MPI<7818a>bb#8 Close( bb ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532588037888] MPI<7818a>bb#10 Delete( bb ) -> MPI_OK
[Thr 140532588037888] MPI<7818a>bb#9 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532588037888] NiIShutdownHandle: shutdown -w of hdl 154
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 94 (rq_id 26078642)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 94
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59391
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=174), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078642 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078642
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 0900000040460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
14
[Thr 140532577003264] -IN-- session T22_U26468_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078642, slot 952)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078642)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345664
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078642, slot 952)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=3000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 3000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=3000)
[Thr 140532588037888] SiPeek: hang up occurred in sock 29
[Thr 140532588037888] NiIPeek: peek for hdl 154 failed (r; rc=1)
[Thr 140532588037888] NiIRead: hdl 154 SSLState 0
[Thr 140532588037888] NiIRead: SiRecv failed for hdl 154/sock 29
[Thr 140532588037888] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.199:56924;
L=10.200.50.133:8443)
[Thr 140532588037888] NiICloseHandle: shutdown and close hdl 154/sock 29
[Thr 140532588037888] Thu Apr 11 09:03:10:208 2024
[Thr 140532588037888] IcmConnClose: Connection 9/345664 closed
[Thr 140532588037888] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.199 ->
rc=0
[Thr 140532588037888] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532588037888] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
-> 0
[Thr 140532588037888] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.199
count=-1 -> 0
[Thr 140532588037888] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532588037888] REQ TRACE END: 9/345664/1
[Thr 140532588037888] IcmWorkerThread: Thread 5: Waiting for event
[Thr 140532588037888] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] Thu Apr 11 09:03:13:211 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: call schedules, last t: 1712818963, next
t: 1712818993, cur t: 1712818993
[Thr 140532577003264] IcmCreateRequest: Append request 360785
[Thr 140532577003264] IcmQueueAppend: queuelen: 1
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532589623040] IcmWorkerHandleRequest: worker 2 got the semaphore
[Thr 140532589623040] REQUEST:
Type: SCHEDULER Index = 360785
[Thr 140532589623040] IcmGetSchedule: found slot 0
[Thr 140532589623040] IcmAlReportPerfData: Reporting data to CCMS Alerting
Infrastructure
[Thr 140532589623040] IcmConnCheckStoredClientConn: next client timeout check in 7
sec
[Thr 140532589623040] IcmConnInitContext: context initialized
[Thr 140532589623040] IcmGetServicePtr: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 1
[Thr 140532589623040] PlugInHandleAdmMessage: request received:
[Thr 140532589623040] PlugInHandleAdmMessage: opcode: ICM_COM_OP_CACHE_STAT (136),
len: 528, dest_type: 2, subhdlkey: 262145(4/0)
[Thr 140532589623040] HttpISubHandlerItCreate: add reference to table 7fd024010780,
now 2 references, 1 tables used
[Thr 140532589623040] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_ADM_MSG(4), header_l
[Thr 140532589623040] HttpCacheHandler: TASK_ADM_MSG 0 7fd024001ae0 (nil)
[Thr 140532589623040] SCACHE: adm request received:
[Thr 140532589623040] SCACHE: opcode: 136, len: 528, dest_type: 2, dest:
[Thr 140532589623040] MTX_LOCK 3247 7fd024004a70
[Thr 140532589623040] MTX_UNLOCK 3260 7fd024004a70
[Thr 140532589623040] IctCmGetCacheInfo#459368 -> 0
[Thr 140532589623040] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532589623040] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532589623040] HttpSubHandlerItDelete: remove reference to table
7fd024010780, now 1 references, 1 tables used
[Thr 140532589623040] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532589623040] IcmServDecrRefCount: vq20app.sap.swissport.aero:8002 - new
serv_ref_count: 0
[Thr 140532589623040] IcmGetSchedule: next schedule in 30 secs
[Thr 140532589623040] IcmWorkerThread: Thread 2: Waiting for event
[Thr 140532589623040] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:03:17:375 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:03:18:215 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331643 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331644 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331645 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331646: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331646 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532577003264] Thu Apr 11 09:03:23:219 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331647 WriteOOB 77
[Thr 140532585395968] MPI<2>0#2331648 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331649 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331650: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331650 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140533415016064] Thu Apr 11 09:03:24:833 2024
[Thr 140533415016064] [0] revt=1 ptr=5579d48d69b8 (sock 27;evt=3)
[Thr 140533415016064] SiSelEPNext: sock 27 selected (pos=5; revt=r--)
[Thr 140533415016064] NiSelIListInsert: add hdl 74 [5] to sel-list (0) of set0
[Thr 140533415016064] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140533415016064] <<< NiSelISelect: End rc = 0
[Thr 140533415016064] MAIN TRACE BEGIN
[Thr 140533415016064] IcmAcceptClient: Connection request from Client received
[Thr 140533415016064] NiIPeekListen: peek successful for hdl 74
[Thr 140533415016064] NiIAccept: hdl 74 accepted connection
[Thr 140533415016064] NiICreateHandle: hdl 155 state NI_INITIAL_CON
[Thr 140533415016064] NiIInitSocket: set default settings for hdl 155/sock 29 (I4;
ST)
[Thr 140533415016064] BufSize: Min 0 Rcv 131072 Snd 332800
[Thr 140533415016064] NiIBlockMode: set blockmode for hdl 155 FALSE
[Thr 140533415016064] NiIAccept: state of hdl 155 NI_ACCEPTED
[Thr 140533415016064] NiIAccept: hdl 74 accepted hdl 155 from 10.200.51.221:61054
[Thr 140533415016064] NiIAccept: hdl 155 took local address 10.200.50.133:8443
[Thr 140533415016064] IcmILookupClientIpTable: 5579d48c1cd0 host=- -> rc=-15
[Thr 140533415016064] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=1 -> 0
[Thr 140533415016064] IcmConnCheckStoredClientConn: check for client conn timeout
[Thr 140533415016064] IcmConnCheckStoredClientConn: next client timeout check in 10
sec
[Thr 140533415016064] IcmConnInitContext: context initialized
[Thr 140533415016064] MAIN TRACE REQ: 9/345666/1
[Thr 140533415016064] IcmServIncrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 1
[Thr 140533415016064] IcmConnIntegrateServer: accepted connection from
10.200.51.221 on service 8443, keep alive timeout: 600, proc
[Thr 140533415016064] IcmCreateRequest: Append request 360786
[Thr 140533415016064] IcmQueueAppend: queuelen: 1
[Thr 140533415016064] MAIN TRACE END
[Thr 140533415016064] >>> NiSelISelect: Start (timeout -1)
[Thr 140533415016064] >>> NiSelISelectInt: Start
[Thr 140533415016064] SiSelEPSelect: start select (timeout=-1)
[Thr 140532590151424] IcmWorkerHandleRequest: worker 1 got the semaphore
[Thr 140532590151424] REQ TRACE BEGIN: 9/345666/1
[Thr 140532590151424] REQUEST:
Type: ACCEPT_CONNECTION Index = 360786
[Thr 140532590151424] CONNECTION (id=9/345666):
used: 1, type: default, role: Server(1), stateful: 0
NI_HDL: 155, protocol: HTTPS(2)
local host: 10.200.50.133:8443 ()
remote host: 10.200.51.221:61054 ()
status: NOP
connect time: 11.04.2024 09:03:24
MPI request: <0> MPI response: <0> MPI next: <0>
request_buf_size: 0 response_buf_size: 0
request_buf_used: 0 response_buf_used: 0
request_buf_offset: 0 response_buf_offset: 0
[Thr 140532590151424] Thu Apr 11 09:03:24:833 2024
[Thr 140532590151424] MPI 187: event flag already open:7643 key=16643
[Thr 140532590151424] MPI 187: event flag already open:7642 key=16642
[Thr 140532590151424] MPI:187 create pipe 7fd0500d5be0 1
[Thr 140532590151424] MPI<7818b>bb#1 Open( ANONYMOUS 187 1 ) -> 187
[Thr 140532590151424] MPI<7818b>bb#2 Open( ANONYMOUS 187 0 ) -> 187
[Thr 140532590151424] MPI 188: event flag already open:7641 key=16641
[Thr 140532590151424] MPI 188: event flag already open:7640 key=16640
[Thr 140532590151424] MPI:188 create pipe 7fd0500d5dd0 1
[Thr 140532590151424] MPI<7818c>bc#1 Open( ANONYMOUS 188 0 ) -> 188
[Thr 140532590151424] MPI<7818c>bc#2 Open( ANONYMOUS 188 1 ) -> 188
[Thr 140532590151424] ->> SapSSLSessionInit(&sssl_hdl=7fd04f96e990, role=2
(SERVER), auth_type=1 (ASK_CLIENT_CERT))
[Thr 140532590151424] <<- SapSSLSessionInit()==SAP_O_K
[Thr 140532590151424] in: args = "role=2 (SERVER), auth_type=1
(ASK_CLIENT_CERT)"
[Thr 140532590151424] out: sssl_hdl = 7fd028013a10
[Thr 140532590151424] ->> SapSSLSetSessionCredHdl(sssl_hdl=7fd028013a10,
cred_hdl=7fd00c064270)
[Thr 140532590151424] <<- SapSSLSetSessionCredHdl(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in: ... = "cred_hdl=7fd00c064270
(cred_name=/usr/sap/Q20/D02/sec/SAPSSLS.pse)"
[Thr 140532590151424] ->> SapSSLSetNiHdl(sssl_hdl=7fd028013a10, ni_hdl=155)
[Thr 140532590151424] SSL NI-hdl 155: local=10.200.50.133:8443
peer=10.200.51.221:61054
[Thr 140532590151424] <<- SapSSLSetNiHdl(sssl_hdl=7fd028013a10,
ni_hdl=155)==SAP_O_K
[Thr 140532590151424] ->> SapSSLSessionStartNB(sssl_hdl=7fd028013a10, flags=0x0000,
timeout=500, &IOstat=7fd04f96e99c)
[Thr 140532590151424] NiIBlockMode: leave blockmode for hdl 155 FALSE
[Thr 140532590151424] NiIHdlGetStatus: hdl 155/sock 29 ok, data pending (len=1)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=243, max=256)
[Thr 140532590151424] (3,1) ClientHello client_version=3,3 (TLSv1.2) (len=250)
[Thr 140532590151424] ClientHello session_id="82ABE6F0 BA40C76D 7C0E4BC7
D427B6A0 B0435036 D2BFE12A C55BFF0A 46F482E0"
[Thr 140532590151424] ClientHello TLSext
supported_versions(43)="TLSv1.3,TLSv1.2,TLSv1.1,TLSv1.0"
[Thr 140532590151424] ClientHello with TLS extensions but *without*
TLSextSNI
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ########## New TLS connection (H_SSL)
created from Ctx-0002321E ########## [sec_SSL_CT
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ClientHello: version: 3.3 (TLSv1.2)
[ssl3_parse_client_hello]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ClientHello: Client offers 22 cipher
suite(s) and SCSV(s):
[Thr 140532590151424] TLS_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_AES_256_GCM_SHA384
[Thr 140532590151424] Unknown ID: (0x13, 0x03), decimal (19, 3)
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[Thr 140532590151424] TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[Thr 140532590151424] TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[Thr 140532590151424] TLS_RSA_WITH_AES_128_GCM_SHA256
[Thr 140532590151424] TLS_RSA_WITH_AES_128_CBC_SHA256
[Thr 140532590151424] TLS_RSA_WITH_AES_128_CBC_SHA
[Thr 140532590151424] TLS_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] TLS_RSA_WITH_AES_256_CBC_SHA256
[Thr 140532590151424] TLS_RSA_WITH_AES_256_CBC_SHA
[Thr 140532590151424] Signaling Cipher Suite Value: secure_renegotiation
(RFC5746)
[Thr 140532590151424] [ssl_bytes_to_cipher_suites]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Received TLS Extensions:
[Thr 140532590151424] Id: 43 - supported_versions [RFC8446]
[Thr 140532590151424] Id: 10 - elliptic_curves [RFC4492]
[Thr 140532590151424] Id: 51 - key_share [RFC8446]
[Thr 140532590151424] Id: 13 - signature_algorithms [RFC5246]
[Thr 140532590151424] Id: 35 - SessionTicket TLS [RFC4507]
[Thr 140532590151424] Id: 11 - ec_point_formats [RFC4492]
[Thr 140532590151424] Id: 45 - psk_key_exchange_modes [RFC8446]
[Thr 140532590151424] Id: 23 - extended_master_secret [RFC7627]
[Thr 140532590151424] [ssl_parse_clienthello_tlsext]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ClientHello: Client requested for
session resumption [ssl3_check_session_resumability]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Client session not found in cache.
Performing full handshake. [ssl3_check_session_resu
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Sending ServerHello version 3.3.
(TLSv1.2) [ssl3_send_server_hello]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ServerHello: Negotiated protocol
version : 3.3. [ssl3_send_server_hello]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ServerHello: Negotiated cipher suite
is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ssl3_se
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Sending own certificate
[ssl3_output_cert_chain]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Own TLS certificate:
[Thr 140532590151424] Subject:
CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP Web AS, O=SAP Trust Com
[Thr 140532590151424] Issuer: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532590151424] Serial Number:
30:00:10:C6:57:5B:8C:71:2C:97:81:B5:FC:00:03:00:10:C6:57
[Thr 140532590151424] [ssl3_output_cert_chain]
[Thr 140532590151424] Thu Apr 11 09:03:24:834 2024
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: CA certificate:
[Thr 140532590151424] Subject: CN=SubordinateCA-
Production, DC=corp, DC=ads, DC=swissport, DC=aero
[Thr 140532590151424] Issuer: CN=RootCA-Production,
DC=ads, DC=swissport, DC=aero
[Thr 140532590151424] Serial Number:
16:00:00:00:33:CF:1E:05:11:A8:03:22:E1:00:00:00:00:00:33
[Thr 140532590151424] [ssl3_output_cert_chain]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ServerKeyExchange: algorithm = kECDHE
[ssl3_encode_server_key_exchange]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: In Server Key Exchange requesting
curve: P-256 (23) [tls_encode_ServerECDHParams]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Requesting for client authentication.
[ssl3_send_certificate_request]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Offering 2 certificate type(s) for
client authentication:
[Thr 140532590151424] rsa_sign(1)
[Thr 140532590151424] ecdsa_sign(64)
[Thr 140532590151424] [ssl3_get_req_cert_type]
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Offering 2 trusted CA(s) for client
authentication:
[Thr 140532590151424] CA <0>: CN=*.sap.swissport.aero, OU=I0020727570, OU=SAP
Web AS, O=SAP Trust Community, C=DE
[Thr 140532590151424] CA <1>: CN=RootCA-Production, DC=ads, DC=swissport,
DC=aero
[Thr 140532590151424] [ssl_get_encoded_trusted_ca_list]
[Thr 140532590151424] SSL:SSL_read(netin= 259) hs, processed= 259
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=4839 of 4839)
[Thr 140532590151424] SSL:SiRecv(sock= 29)==13 (SI_ETIMEOUT) (in=0, max=16)
[Thr 140532590151424] --> SSL:SiPoll(sock=29, evt=R, timeout= 500 ms)
[Thr 140532590151424] <-- SSL:SiPoll(sock=29, evt=R, slept = 1 ms) Ready
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Received message of type
"Certificate" containing no certificates.
[Thr 140532590151424] Renouncing client authentication: verification mode: 1
[Thr 140532590151424] [ssl3_decode_client_certificate]
[Thr 140532590151424] SSL:SSL_read(netin= 12) hs, processed= 12 (remain=4)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=64, max=64)
[Thr 140532590151424] SSL:SSL_read(netin= 75) hs, processed= 75 (remain=9)
[Thr 140532590151424] SSL:SSL_read(netin= 6) ccs, processed= 6 (remain=3)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=26, max=32)
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ########## TLSv1.2 connection with
anonymous client established ########## [ssl3_accep
[Thr 140532590151424] SSL:SSL_read(netin= 45) hs, processed= 45
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=51 of 51)
[Thr 140532590151424] Server-configured Ciphersuites:
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[Thr 140532590151424] Client-offered Ciphersuites:
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_GCM
[Thr 140532590151424] No Client Certificate
[Thr 140532590151424] New session (TLSv1.2,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{c0,2f})
[Thr 140532590151424] (failed resume) new TLS session_id="D30642DE F14CA763
8292BDEC C1FD0755 E4EBEC35 C5192E9B BC15D04A 9F331DCC
[Thr 140532590151424] SapSSLISessionStartFin(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: status = "new SSL
session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, NO client cert"
[Thr 140532590151424] <<- SapSSLSessionStartNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "fl=00000000, timeout=500, io=idle"
[Thr 140532590151424] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd028013a10, &plen=(nil),
&more=(nil), &ios=7fd04b1d7c38)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] IcmReadFromConn(id=9/345666): request new MPI (0/0)
[Thr 140532590151424] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved):
0/1522/1903)
[Thr 140532590151424] MPI<7818b>bb#3 GetOutbuf 0 4663e8 65536 (0) -> 7fd050525408
44564480 MPI_OK
[Thr 140532590151424] IcmMpiGetOutbuf: Set MPI Header with type 1 at 7fd050525408,
len=80
[Thr 140532590151424] Thu Apr 11 09:03:24:837 2024
[Thr 140532590151424] IcmMpiSetHeaderData: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd028013a10,
&plen=7fd04b1d7b18, &more=7fd04b1d7b17, &ios=7fd04b1d7b1c)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] NiIPeek: peek successful for hdl 155 (r)
[Thr 140532590151424] ->> SapSSLReadNB(sssl_hdl=7fd028013a10, buf=7fd050525458,
buf_max=65455, flags=0x0000, timeout=500, &bMoreData
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=16, max=16)
[Thr 140532590151424] SSL:SiRecv(sock= 29)== 0 (SI_OK) (in=157, max=176)
[Thr 140532590151424] SSL:SSL_read(reclen= 173) data, out= 144
[Thr 140532590151424] <<- SapSSLReadNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "fl=0x00, max=65455, got=144, more=N, io=idle"
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd028013a10,
&plen=7fd04b1d7b18, &more=7fd04b1d7b17, &ios=7fd04b1d7b1c)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] NiIPeek: peek for hdl 155 timed out (r; 0ms)
[Thr 140532590151424] IcmReadFromConn(id=9/345666): no SSL data available
[Thr 140532590151424] IcmReadFromConn(id=9/345666): read 144 bytes, 1 readops
(timeout 0)
[Thr 140532590151424] BINDUMP of content denied
[Thr 140532590151424] HttpPlugInHandleNetData(rqid=9/345666/1): role: Server(1),
status: 1
[Thr 140532590151424] content-length: 0/0, buf_len: 144, buf_offset: 0,
buf_status: 0
[Thr 140532590151424] ICT: IctIHttpOpenMessage: 7fd02803ad80 typ=1
[Thr 140532590151424] IctCheckIfValidHostname: Check [10.200.50.133:8443] len 18
[Thr 140532590151424] HttpParseRequestHeader: no content length set
[Thr 140532590151424] HttpParseRequestHeader: no transfer-encoding set
[Thr 140532590151424] HttpParseRequestHeader: Version: 1001
[Thr 140532590151424] HttpParseRequestHeader: Keep-Alive: 0
[Thr 140532590151424] ->> SapSSLGetPeerInfo(sssl_hdl=7fd028013a10,
&cert=7fd04b1d76f0, &cert_len=7fd04b1d76ec,
[Thr 140532590151424] &subject_dn=7fd04b1d76f8, &issuer_dn=7fd04b1d7700,
&csuite_name=7fd04b1d7708)
[Thr 140532590151424] <<- SapSSLGetPeerInfo(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] out: cert_len = <no cert>
[Thr 140532590151424] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532590151424] HTTP request (raw) [9/345666/1]:
[Thr 140532590151424] GET /sap/bc/ping HTTP/1.1
[Thr 140532590151424] host: 10.200.50.133:8443
[Thr 140532590151424] connection: close
[Thr 140532590151424] user-agent: ELB-HealthChecker/2.0
[Thr 140532590151424] accept-encoding: gzip, compressed
[Thr 140532590151424] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532590151424] ->> SapSSLGetPeerInfo(sssl_hdl=7fd028013a10,
&cert=7fd04b1d6638, &cert_len=7fd04b1d6634,
[Thr 140532590151424] &subject_dn=7fd04b1d6640, &issuer_dn=7fd04b1d6648,
&csuite_name=7fd04b1d66c8)
[Thr 140532590151424] <<- SapSSLGetPeerInfo(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] out: cert_len = <no cert>
[Thr 140532590151424] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532590151424] Thu Apr 11 09:03:24:838 2024
[Thr 140532590151424] HttpCheckUserAgent: Function call IcmRegExec(expr=ELB-
HealthChecker/2.0) failed with rc=1
[Thr 140532590151424] sap-cancel-on-close not found
[Thr 140532590151424] DpPlgGetVirtHost: search virt host for 2/10.200.50.133/8443
[Thr 140532590151424] DpPlgGetVirtHost: no server defined, use default
[Thr 140532590151424] HttpGetVirtHost: use virt_host_idx 0 for 10.200.50.133:8443
[Thr 140532590151424] HttpSrvHdlRequest: method: 1; path: /sap/bc/ping
[Thr 140532590151424] Handler 0: HttpAuthHandler matches url: /sap/bc/ping
[Thr 140532590151424] Handler 1: HttpModHandler matches url: /sap/bc/ping
[Thr 140532590151424] Handler 2: HttpCacheHandler matches url: /sap/bc/ping
[Thr 140532590151424] Handler 6: HttpSAPR3Handler matches url: /sap/bc/ping
[Thr 140532590151424] HttpSubHandlerMatch: add reference to table 7fd024010780, now
2 references, 1 tables used
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_REQUEST(1), header_le
[Thr 140532590151424] >> start >> CsiGetInstance(7fd02401bd50)
[Thr 140532590151424] << end << CsiGetInstance(7fd02401bd50) returned
inst=7fd02401e940
[Thr 140532590151424] >> start >>
CsiExecute(7fd02401e940,7fd04b1d1a20,12,1,7fd04b1d1a10,7fd04b1d19f4,0)
[Thr 140532590151424] >>
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) >>
[Thr 140532590151424] <<
VsaScan(7fd02401ea30,7fd0240012b0,7fd02401e9d0,7fd02401d630,NULL) = 0 <<
[Thr 140532590151424] << end << CsiExecute(CSI_RC==OK)
[Thr 140532590151424] >> start >> CsiFreeInstance((nil))
[Thr 140532590151424] << end << CsiFreeInstance(CSI_RC==OK)
[Thr 140532590151424] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_REQUEST(1), header_len
[Thr 140532590151424] HttpModHandler: process 1, header_len 144
[Thr 140532590151424] ->> SapSSLGetPeerInfo(sssl_hdl=7fd028013a10,
&cert=7fd04b1d28a0, &cert_len=7fd04b1d2580,
[Thr 140532590151424] &subject_dn=(nil), &issuer_dn=(nil), &csuite_name=(nil))
[Thr 140532590151424] <<- SapSSLGetPeerInfo(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] out: cert_len = <no cert>
[Thr 140532590151424] out: csuite_name =
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[Thr 140532590151424] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532590151424] HttpModHandler: perform the actions: (128)
[Thr 140532590151424] HttpModWriteTraceInfo: Request not rewritten
[Thr 140532590151424] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532590151424] HttpCacheHandler: TASK_REQUEST 144 7fd024001ae0 (nil)
[Thr 140532590151424] ISC: Cache Lookup. 1. try: browser independent.
[Thr 140532590151424] ISC: hashed querystr = 9e6a '&*&'
[Thr 140532590151424] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&A6E90000&' (33) rc=0
[Thr 140532590151424] MTX_LOCK 1760 7fd024005020
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024005020
[Thr 140532590151424] IctCmOpen#357256 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] MTX_LOCK 1760 7fd024004a70
[Thr 140532590151424] Thu Apr 11 09:03:24:838 2024
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532590151424] IctCmOpen#459369 R '/sap/bc/ping&&&GZ=1&000&A6E90000&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] ISC: Cache Lookup. 2. try: browser specific key.
[Thr 140532590151424] ISC: hashed querystr = ee26eb68 '&ELB-HealthChecker/2.0&'
[Thr 140532590151424] HttpCacheMakeObjectKey() ->
'/sap/bc/ping&&&GZ=1&000&86BE62EE&' (33) rc=0
[Thr 140532590151424] MTX_LOCK 1760 7fd024005020
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024005020
[Thr 140532590151424] IctCmOpen#357257 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] MTX_LOCK 1760 7fd024004a70
[Thr 140532590151424] MTX_UNLOCK 1891 7fd024004a70
[Thr 140532590151424] IctCmOpen#459370 R '/sap/bc/ping&&&GZ=1&000&86BE62EE&'.-1
(- ???) 0 0 -> (nil) -1 rc=20
[Thr 140532590151424] HttpCacheHandler: cache miss.
[Thr 140532590151424] HttpSubHandlerItDeactivate: handler 2: HttpCacheHandler
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_REQUEST(1), header_l
[Thr 140532590151424] HttpSAPR3Handler: url_tab_init: 1, force_dest: 0
[Thr 140532590151424] ICT: IctLookupPathTable() -> 0
[Thr 140532590151424] HttpSAPR3Handler: Call SAP AppServer for URI: /
[Thr 140532590151424] DTRACE(9/345666/1): {root-
id=730EFE781C731EEEBDFA32DF7FB7541B}_{conn-id=730EFE781C731EEEBDFA32DF7FB7741B}_1
[Thr 140532590151424] IcmPlTriggerPrepFunc: Trigger preparation server (invalid T-
1_U65535_M0)
[Thr 140532590151424] IcmPlFlushBuf: Flushing 144 Bytes, buf_status: 6
[Thr 140532590151424] IcmMpiSetHeaderDataSub: Set MPI Header with type 1 at
7fd050525408, len=80
[Thr 140532590151424] flush buffer with mpi buffer id 40
[Thr 140532590151424] MPI<7818b>bb#4 FlushOutbuf 40 1 0 4663e8 224 6 ->
7fd0505253e8 MPI_OK
[Thr 140532590151424] IcmPlFlushBuf: roll in workprocess
[Thr 140532590151424] IcmConnRollInWP: roll in work process
[Thr 140532590151424] IcmCreateDpRequest: Send request to AppServer
[Thr 140532590151424] DpResourcesOk: selected resources =
CA_BLOCKS,REQUEST_QUEUE,LOGONS,MPI_BLOCKS,?,?, limit = 99.000000 %
[Thr 140532590151424] DpResourcesOk: ca blocks: act/max/usage = 1/6000/0.016667 %
[Thr 140532590151424] DpResourcesOk: request queue: act/max/usage =
1/14000/0.007143 %
[Thr 140532590151424] DpResourcesOk: logons: act/max/usage = 8/1200/0.666667 %
[Thr 140532590151424] DpResourcesOk: MPI pipes: act/max/usage = 3/4010/0.074813 %
[Thr 140532590151424] DpResourcesOk: MPI blocks: act/max/usage = 1/2718/0.036792 %
[Thr 140532590151424] DpResourcesOk: ES: act/max/usage = 2184 MB/10992 MB/19.868996
%
[Thr 140532590151424] DpResourcesOk: EG: act/max/usage = 1608 MB/2104 MB/9.818182 %
[Thr 140532590151424] DpCheckPluginSessionUsage: check for plugin 2: 1200/90
against 0 used
[Thr 140532590151424] DpLogon: new normal logon with type/subType/workerType/prio
DP_LOGON_PLUGIN/DP_LOGON_HTTP_NORMAL/DIA/-
[Thr 140532590151424] DpListRemove: remove elem 22 from tmadm_free_list
[Thr 140532590151424] DpListRemove: 1191 elems in tmadm_free_list
[Thr 140532590151424] DpListInsert: insert elem 22 into tmadm_inuse_list (at begin)
[Thr 140532590151424] DpListInsert: 9 elems in tmadm_inuse_list
[Thr 140532590151424] Thu Apr 11 09:03:24:839 2024
[Thr 140532590151424] DpGetFreeUid: new UID: 26471
[Thr 140532590151424] DpSesLockSessionEntry: lock invalid T22_M0
[Thr 140532590151424] DpSesUnlockSessionEntry: unlocked invalid T22_M0
[Thr 140532590151424] DpInitInternalSession: initialized T22_M0_I0
[Thr 140532590151424] DpITmSlotClear: cleared T22_U26471
[Thr 140532590151424] DpTmSlotAllocate: allocated T22_U26471
[Thr 140532590151424] RqQQueueCreate: Created queue <T22_U26471_M0> in slot 74
(49123) with normal priority
[Thr 140532590151424] DpLogonInit: new logon T22_U26471, type=DP_LOGON_PLUGIN,
state=DP_LOGON_STATE_LOGGED_ON, priority=normal prior
[Thr 140532590151424] IcmSendRq: created T22_U26471_M0
[Thr 140532590151424] DpSesGetWorkerType: return workerType DIA for T22_U26471
[Thr 140532590151424] DpRqSlotAllocate: 1 pending requests
[Thr 140532590151424] DpRqCreate: creating REQ_HANDLER_PLUGIN request (rq_id
26078666, slot 953)
[Thr 140532590151424] DpRqSendRequest: REQ_HANDLER_PLUGIN (rq_id 26078666) from
ICMAN to local WORKER
[Thr 140532590151424] rq_id 26078666
[Thr 140532590151424] -OUT- ca_blk -1 len 0
[Thr 140532590151424] -OUT- userTrace 3
[Thr 140532590151424] -OUT- sDataLen 120 sData
310030002E003200300030002E00350031002E00
[Thr 140532590151424] -OUT- mpi rq <7818b> mpi resp <7818c> prot
2
[Thr 140532590151424] -OUT- icm_opc DP_ICM_OC_SERVER_PLUGIN_REQUEST
[Thr 140532590151424] -OUT- reqHdlId REQ_HANDLER_PLUGIN
[Thr 140532590151424] -OUT- dtrace {root-
id=730EFE781C731EEEBDFA32DF7FB7541B}_{conn-id=730EFE781C731EEEBDFA32DF7FB7741B}_1
[Thr 140532590151424] -OUT- sender address:
[Thr 140532590151424] -OUT- type LOCAL
[Thr 140532590151424] -OUT- agentType ICMAN
[Thr 140532590151424] -OUT- receiver address:
[Thr 140532590151424] -OUT- type LOCAL
[Thr 140532590151424] -OUT- agentType WORKER workerTyp DIA
[Thr 140532590151424] -OUT- session T22_U26471_M0
[Thr 140532590151424] RqQAddRequest: Add request rq_id 26078666 (DIA) to queue
<T22_U26471_M0> in slot 74 at the end
[Thr 140532590151424] Dump of queue <T22_U26471_M0> in slot 74 (1 requests,
port=0):
[Thr 140532590151424] -1 <- 94 (rq_id 26078666, DIA,
REQ_HANDLER_PLUGIN) -> -1
[Thr 140532590151424] RqQAddRequest: locked session queue mutex for normal priority
[Thr 140532590151424] RqQQueueAddToSessionQueue: Added queue <T22_U26471_M0> in
slot 74 to normal priority session queue at the end
[Thr 140532590151424] Session queue dump (normal priority, 1 elements, peak 5):
[Thr 140532590151424] -1 <- 74 < T22_U26471_M0> -> -1
[Thr 140532590151424] RqQUnlockSessionQueue: unlocked session queue mutex for
normal priority
[Thr 140532590151424] RqQNotifySessionQueue: notify normal priority session queue
of queue <T22_U26471_M0> (DIA) (id=189)
[Thr 140532590151424] Info of W14 (inside function RqQNotifyWorker (end))
[Thr 140532590151424] noOfPendingQueues=>W14-0<
[Thr 140532590151424] noOfWaitForQueues=>W14-2<
[Thr 140532590151424] wait for queue 69 (T38_U26359_M0)
[Thr 140532590151424] wait for queue 19 (W14)
[Thr 140532590151424] lowestPriority: normal priority
[Thr 140532590151424] modCounter=>W14-3782730<
[Thr 140532590151424] RqQNotifyWorker: notify W14 about dispatch queues
(modCounter=>W14-3782730<)
[Thr 140532590151424] RqQSetWorkerState: W14 has state RUNNING (modCounter=>W14-
3782730<)
[Thr 140532590151424] RqQNotifyWaitingWorker: 1 normal priority requests pending
for DP_WORKER_DIAWP, notified worker
[Thr 140532590151424] RqQQueueGetNumberOfRequests: Queue <T22_U26471_M0> in slot 74
contains 1 requests of type DIA
[Thr 140532590151424] DpRqPutIntoQueue: put request into DIA queue (workerType 1,
prio LOW, rq_id 26078666), queue has 1 requests
[Thr 140532590151424] DpRqFree: freeing REQ_HANDLER_PLUGIN request (rq_id 26078666,
slot 953)
[Thr 140532590151424] HttpSrvHdlRequest: Subhandler rc=704
[Thr 140532590151424] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
[Thr 140532590151424] IcmHandleNetRead(id=9/345666): read_len: 144, HandleNetData
returned: 4
[Thr 140532590151424] IcmHandleNetRead(id=9/345666): status 1 -> 4
[Thr 140532590151424] ->> SapSSLReadPendingNB(sssl_hdl=7fd028013a10,
&plen=7fd04b1d7c58, &more=7fd04b1d7c33, &ios=7fd04b1d7c38)
[Thr 140532590151424] <<- SapSSLReadPendingNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "pendlen=0, more=N, io=idle"
[Thr 140532590151424] IcmReadFromPartner(id=9/345666): read with maximum timeout
500
[Thr 140532590151424] IcmMpiWatchInsert: MPI watch entry <7818c>, number 11
inserted.
[Thr 140532590151424] MPI<7818c>bc#3: GetInbuf: waiting for new buffer 0 0
[Thr 140532590151424] Thu Apr 11 09:03:24:855 2024
[Thr 140532590151424] MPI<7818c>bc#6 GetInbuf -1 4663e8 1088 (1) -> MPI_EOS: End Of
Stream
[Thr 140532590151424] IcmMpiWatchRemove: MPI watch entry <7818c>, number 11 removed
(wakeup was not sent).
[Thr 140532590151424] IcmReadFromPartner: IcmMpiGetInbuf returned rc=MPI_EOS: End
Of Stream/6, wakeup not sent
[Thr 140532590151424] BINDUMP of content denied
[Thr 140532590151424] PlugInHandleServData(rqid=9/345666/1): role: Server(1),
status: 3
[Thr 140532590151424] content-length: 0/-1, buf_len: 1008, buf_offset: 0,
buf_status: 6
[Thr 140532590151424] ICT: IctIHttpOpenMessage: 7fd028064a10 typ=2
[Thr 140532590151424] HttpParseResponseHeader: no transfer-encoding set
[Thr 140532590151424] HttpParseResponseHeader: Version: 1001
[Thr 140532590151424] HttpParseResponseHeader: Keep-Alive: 1
[Thr 140532590151424] HTTP response (raw) [9/345666/1]:
[Thr 140532590151424] HTTP/1.1 403 Forbidden
[Thr 140532590151424] content-type: text/html; charset=utf-8
[Thr 140532590151424] content-length: 857
[Thr 140532590151424] sap-perf-fesrec: 10793.000000
[Thr 140532590151424] content-encoding: gzip
[Thr 140532590151424] Connection Info: role=Server,
local=vq20app.sap.swissport.aero:8443, peer=10.200.51.221, protocol=HTTPS
[Thr 140532590151424] DTRACE(9/345666/1): {root-
id=730EFE781C731EEEBDFA32DF7FB7541B}_{conn-id=730EFE781C731EEEBDFA32DF7FB7741B}_1
[Thr 140532590151424] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
[Thr 140532590151424] HttpSrvHdlResponse: flags: 1052677, handle_resp: 0
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532590151424] HttpSAPR3Handler: Response from AppServer
[Thr 140532590151424] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532590151424] HttpSubHandlerItActivate: handler 2: HttpCacheHandler
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_RESPONSE(2), header_
[Thr 140532590151424] HttpCacheHandler: TASK_RESPONSE 151 7fd024001ae0 7fd028028480
[Thr 140532590151424] ISC: don't cache response: status code=403
[Thr 140532590151424] ICC: don't cache response. scc=0 status=403 len=0 meth=1
[Thr 140532590151424] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532590151424] HttpSubHandlerItActivate: handler 1: HttpModHandler
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_RESPONSE(2), header_le
[Thr 140532590151424] HttpModHandler: process 2, header_len 151
[Thr 140532590151424] HttpModGetDefRules: determined the defactions: (128)
[Thr 140532590151424] HttpModHandler: perform the actions: (128)
[Thr 140532590151424] HttpModWriteTraceInfo: Response not rewritten
[Thr 140532590151424] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
[Thr 140532590151424] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
[Thr 140532590151424] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
[Thr 140532590151424] Thu Apr 11 09:03:24:855 2024
[Thr 140532590151424] HttpSubHandlerCall: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_RESPONSE(2), header_l
[Thr 140532590151424] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0, blocks
used: 1
[Thr 140532590151424] IcmNetBufWrapBuf: allocated netbuf: 5579d4928ac0
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpAuthHandler
(7fd02401ba60/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpModHandler
(7fd024007fb0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpModHandler: process 3, header_len 0
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpCacheHandler
(7fd024001ae0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpCacheHandler: TASK_CLOSE 0 7fd024001ae0 7fd028028480
[Thr 140532590151424] HttpSubHandlerClose: Call Handler: HttpSAPR3Handler
(7fd02404d4d0/7fd024010780), task=TASK_CLOSE(3)
[Thr 140532590151424] HttpSubHandlerClose: remove reference to table 7fd024010780,
now 1 references, 1 tables used
[Thr 140532590151424] PlugInHandleServData: HttpSrvHdlResponse returned: 702
[Thr 140532590151424] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
[Thr 140532590151424] IcmHandleReadFromPartner(id=9/345666): HandleServData
returned: 702
[Thr 140532590151424] BINDUMP of content denied
[Thr 140532590151424] IcmWriteToConn(id=9/345666): prepared to write data to
partner (len = 1008, timeout = 2000)
[Thr 140532590151424] ->> SapSSLWriteNB(sssl_hdl=7fd028013a10, buf=7fd050525458,
len=1008, flags=0x0000, timeout=2000, &IOstate=7fd0
[Thr 140532590151424] SSL:SSL_write(len=1008) net=1037 (out=1008 of 1008,
prev=0)
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=1037 of 1037)
[Thr 140532590151424] <<- SapSSLWriteNB(sssl_hdl=7fd028013a10)==SAP_O_K
[Thr 140532590151424] in/out: ... = "buf= 7fd050525458, written= 1008 of 1008
(all) io=idle"
[Thr 140532590151424] IcmWriteToConn(id=9/345666): wrote data to partner (len =
1008)
[Thr 140532590151424] IcmNetBufFree: free netbuf: 5579d4928ac0 out of 1 used
[Thr 140532590151424] MPI<7818c>bc#7 FreeInbuf#1 0 4663e8 0 -> MPI_OK
[Thr 140532590151424] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
[Thr 140532590151424] ICT: IctHttpCloseMessage( 7fd02803ad80 ) -> u=0 rc=0
[Thr 140532590151424] ICT: IctHttpCloseMessage( 7fd028064a10 ) -> u=0 rc=0
[Thr 140532590151424] ->>
SapSSLSessionDoneNB(&sssl_hdl=7fd04f96e990,flags=0x0000,timeout=10000,&IOstate=7fd0
4b1d77fc)
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: Sending alert of level WARNING: close
notify [ssl3_send_alert]
[Thr 140532590151424] SSL:SiSend(sock= 29)== 0 (SI_OK) (out=31 of 31)
[Thr 140532590151424] CCL[SSL]: Srv-0002B952: ########## SSL connection cleaned up
and destroyed. ########## [SSL_free]
[Thr 140532590151424] <<- SapSSLSessionDoneNB()==SAP_O_K
[Thr 140532590151424] in: sssl_hdl = 7fd028013a10
[Thr 140532590151424] in: ... ni_hdl = 155
[Thr 140532590151424] in: flags = 0
[Thr 140532590151424] in: timeout = 10000
[Thr 140532590151424] MPI<7818b>bb#7 Close( bb ) opt=4 del=0( 1 0 ) wakeup=0->
MPI_OK
[Thr 140532590151424] MPI<7818b>bb#9 Delete( bb ) -> MPI_OK
[Thr 140532590151424] MPI<7818b>bb#8 Close( bb ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532590151424] MPI<7818c>bc#8 Close( bc ) opt=4 del=0( 0 1 ) wakeup=0->
MPI_OK
[Thr 140532590151424] MPI<7818c>bc#10 Delete( bc ) -> MPI_OK
[Thr 140532590151424] Thu Apr 11 09:03:24:855 2024
[Thr 140532590151424] MPI<7818c>bc#9 Close( bc ) opt=4 del=1( 0 0 ) wakeup=0->
MPI_OK
[Thr 140532590151424] NiIShutdownHandle: shutdown -w of hdl 155
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 94 (rq_id 26078667)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 94
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:59391
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=175), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078667 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078667
[Thr 140532577003264] -IN-- ca_blk -1 len 0
[Thr 140532577003264] -IN-- userTrace 3
[Thr 140532577003264] -IN-- sDataLen 8 sData 0900000042460500
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_HTTP_RESP_SEND
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
14
[Thr 140532577003264] -IN-- session T22_U26471_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_HTTP_RESP_SEND
request (rq_id 26078667, slot 954)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078667)
[Thr 140532577003264] IcmWatchDogThread: ICMESENDDATA for ICM connection 9/345666
[Thr 140532577003264] DpRqFree: freeing REQ_HANDLER_HTTP_RESP_SEND request (rq_id
26078667, slot 954)
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532590151424] SiPeek: hang up occurred in sock 29
[Thr 140532590151424] NiIPeek: peek for hdl 155 failed (r; rc=1)
[Thr 140532590151424] NiIRead: hdl 155 SSLState 0
[Thr 140532590151424] NiIRead: SiRecv failed for hdl 155/sock 29
[Thr 140532590151424] (SI_ECONN_BROKEN/0; I4; ST; P=10.200.51.221:61054;
L=10.200.50.133:8443)
[Thr 140532590151424] NiICloseHandle: shutdown and close hdl 155/sock 29
[Thr 140532590151424] IcmConnClose: Connection 9/345666 closed
[Thr 140532590151424] IcmILookupClientIpTable: 5579d48c1cd0 host=10.200.51.221 ->
rc=0
[Thr 140532590151424] IcmIRemoveClientIpTableEntry: 5579d48c1cd0 5579d4966880 -> 0
[Thr 140532590151424] IcmRemovClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
-> 0
[Thr 140532590151424] Thu Apr 11 09:03:24:856 2024
[Thr 140532590151424] IcmUpdateClientIpTableEntry: 5579d48c1cd0 phost=10.200.51.221
count=-1 -> 0
[Thr 140532590151424] IcmServDecrRefCount: vq20app.sap.swissport.aero:8443 - new
serv_ref_count: 0
[Thr 140532590151424] REQ TRACE END: 9/345666/1
[Thr 140532590151424] IcmWorkerThread: Thread 1: Waiting for event
[Thr 140532590151424] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532599072512] Thu Apr 11 09:03:27:385 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:03:29:859 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331651 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331652 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331653 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331654: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331654 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532577003264] Thu Apr 11 09:03:34:864 2024
[Thr 140532577003264] <<< NiSelISelectInt: End 0 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] IcmWatchDogThread: Wakeup Workers waiting for MPI
[Thr 140532577003264] IcmMpiWatchWakeUp: watchdog wakeup performed, wakeup sent cnt
0, new watch entry cnt 0
[Thr 140532577003264] IcmWatchDogThread: Wakeup MPI Watchdog
[Thr 140532577003264] MPI<2>0#2331655 WriteOOB 77
[Thr 140532577003264] IcmWatchDogThread: check ni handles (timeout=5000)
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 0 requests of type NOWP
[Thr 140532577003264] WATCHDOG TRACE END
[Thr 140532577003264] >>> NiSelISelect: Start (timeout 5000)
[Thr 140532577003264] >>> NiSelISelectInt: Start
[Thr 140532577003264] SiSelEPSelect: start select (timeout=5000)
[Thr 140532585395968] MPI<2>0#2331656 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-
of-band message
[Thr 140532585395968] MpiSelSelect( 0 -1 ) -> MPI_OK
[Thr 140532585395968] MPI WATCHDOG TRACE BEGIN
[Thr 140532585395968] IcmMpiWatchDogThread: Wakeup OOB received
[Thr 140532585395968] MPI<2>0#2331657 ReadOOB 77 -> MPI_OK
[Thr 140532585395968] IcmMpiWatchDogThread: call MpiSelSelect
[Thr 140532585395968] MPI WATCHDOG TRACE END
[Thr 140532585395968] MPI<2>0#2331658: GetInbuf: check avail. buffers 0 0
[Thr 140532585395968] MPI<2>0#2331658 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource
busy
[Thr 140532585395968] MpiSelect: 0 waiting for events
[Thr 140532599072512] Thu Apr 11 09:03:37:386 2024
[Thr 140532599072512] SiSelEPSelect: of 1 sockets 0 selected
[Thr 140532599072512] IcmProxyWatchDog: check sockets (timeout=10000)
[Thr 140532599072512] SiSelEPSelect: start select (timeout=10000)
[Thr 140532577003264] Thu Apr 11 09:03:39:560 2024
[Thr 140532577003264] [0] revt=1 ptr=7fd00c000c68 (sock 21;evt=3)
[Thr 140532577003264] SiSelEPNext: sock 21 selected (pos=1; revt=r--)
[Thr 140532577003264] NiSelIListInsert: add hdl 49 [1] to sel-list (0) of set1
[Thr 140532577003264] <<< NiSelISelectInt: End 1 handles selected (0 buffered)
[Thr 140532577003264] <<< NiSelISelect: End rc = 0
[Thr 140532577003264] WATCHDOG TRACE BEGIN
[Thr 140532577003264] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2
contains 1 requests of type NOWP
[Thr 140532577003264] DpRqFreePendingRequests: freed 0 pending request
[Thr 140532577003264] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot
2 (timeout=0)
[Thr 140532577003264] RqQRequestFree: Free request in slot 94 (rq_id 26078683)
[Thr 140532577003264] RqQRequestSlotClear: clear slot 94
[Thr 140532577003264] NiHLGetHostName: found address 127.0.0.1 in cache (valid-
address/name)
[Thr 140532577003264] NiHLGetHostName: retrying to get hostname for '127.0.0.1'
[Thr 140532577003264] NiDgHdlRecvFrom: hdl 49 received 1 bytes from 127.0.0.1:26046
[Thr 140532577003264] RqQQueueGetRequest: Eat one selectable handle wakeup
(id=176), 1. receive
[Thr 140532577003264] RqQQueueGetRequest: Eat selectable handle wakeup for queue
<IcmanQueue> in slot 2
[Thr 140532577003264] RqQQueueGetRequest: Request rq_id 26078683 found in queue
<IcmanQueue> in slot 2
[Thr 140532577003264] rq_id 26078683
[Thr 140532577003264] -IN-- ca_blk 1 len 6200
[Thr 140532577003264] -IN-- reqHdlId REQ_HANDLER_ICMAN_OPCODE_RESP
[Thr 140532577003264] -IN-- sender address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType WORKER workerTyp DIA workerNum
17
[Thr 140532577003264] -IN-- session T31_U25632_M0
[Thr 140532577003264] -IN-- receiver address:
[Thr 140532577003264] -IN-- type LOCAL
[Thr 140532577003264] -IN-- agentType ICMAN
[Thr 140532577003264] DpCaBecomeOwnerOfBlk: become owner of ca_blk 1
[Thr 140532577003264] DpRqSlotAllocate: 1 pending requests
[Thr 140532577003264] DpRqCopyAndMoveData: copying REQ_HANDLER_ICMAN_OPCODE_RESP
request (rq_id 26078683, slot 955)
[Thr 140532577003264] IcmHandleRequest: handle request from icman request queue
(rq_id 26078683)
[Thr 140532577003264] IcmHandleRequest: change parameter >rdisp/TRACE=>1<
[Thr 140532577003264] NiBufIAlloc: malloc REQUEST, to 334 bytes
[Thr 140532577003264] IcmHandleAdmMsg: op: ICM_COM_OP_SET_PARAM(11)
[Thr 140532577003264] IcmHandleAdmMsg: set param rdisp/TRACE -> 1
[Thr 140532577003264] HttpSetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] H2SetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] SmtpSetParam: (rdisp/TRACE = 1) ignored
[Thr 140532577003264] IcmSetTrcLevel: Switch trace level to: 1
[Thr 140532577003264] *
[Thr 140532577003264] * SWITCH TRC-LEVEL to 1
[Thr 140532577003264] *
[Thr 140532577003264] eppSetTraceLevel: changing trace level to 1

You might also like