# IBM_PROLOG_BEGIN_TAG # This is an automatically generated prolog. # # # # Licensed Materials - Property of IBM # # Restricted Materials of IBM # # (C) COPYRIGHT International Business Machines Corp. 2005,2019 # All Rights Reserved # # US Government Users Restricted Rights - Use, duplication or # disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # # IBM_PROLOG_END_TAG # Trace templates for component _SEH generated by cugentpl. 0 "%s\n" 1 "" "[HBA2 MPM]: --> Setting the following error data via cu_set_error: <--\n" "%s" 2 "" "[HBA2 MPM]: --> Error data from subroutine %s (from cu_get_error) <--\n" "%s" 3 "" "%s [HBA2 MPM] : Setting security context token expiration time\n" 4 "" "Details: address of token: 0x%08x\n" " context lifetime (as reported by 'ctcas' svc): %d sec\n" " expiration time on context (seconds since epoch): %lld\n" 5 "" "Details: address of token: 0x%016llx\n" " context lifetime (as reported by 'ctcas' svc): %d sec\n" " expiration time on context (seconds since epoch): %lld\n" 6 "" "%s [HBA2 MPM] Failure: Security Context Token has Expired\n" 7 "" "Details: address of token: 0x%08x\n" " current time (seconds since epoch): %lld\n" " expiration time on context: %lld\n" 8 "" "Details: address of token: 0x%016llx\n" " current time (seconds since epoch): %lld\n" " expiration time on context: %lld\n" 9 "" "mpm_start [HBA2 MPM] started\n" 10 "" "mpm_start [HBA2 MPM] parameters: min_stat = addr: 0x%08x [value: 0x%08x]\n" " flags = 0x%08x\n" " sec_tkn = addr: 0x%08x [value: 0x%08x]\n" 11 "" "mpm_start [HBA2 MPM] parameters: min_stat = addr: 0x%016llx [value: 0x%08x]\n" " flags = 0x%08x\n" " sec_tkn = addr: 0x%016llx [value: 0x%016llx]\n" 12 "" "mpm_start [HBA2 MPM] failure at line %d: invalid parameter detected\n" "\t parameter position: %d\n" 13 "" "mpm_start [HBA2 MPM] failure at line %d: memory allocation failure\n" "\t allocation size: %d bytes\n" 14 "" "mpm_start [HBA2 MPM]: Service token allocated\n" 15 "" "mpm_start [HBA2 MPM]: service token [memory location 0x%08x]:\n" " magic: 0x%08x\n" " state: 0x%08x\n" " [remaming fields zeroed out]\n" 16 "" "mpm_start [HBA2 MPM]: service token [memory location 0x%016llx]:\n" " magic: 0x%08x\n" " state: 0x%08x\n" " [remaming fields zeroed out]\n" 17 "" "mpm_start [HBA2 MPM] ended with return value %d\n" 18 "" "mpm_start [HBA2 MPM] parameters: min_stat = addr: 0x%08x [value: 0x%08x]\n" " flags = 0x%08x\n" " sec_tkn = addr: 0x%08x [value: 0x%08x]\n" 19 "" "mpm_start [HBA2 MPM] parameters: min_stat = addr: 0x%016llx [value: 0x%08x]\n" " flags = 0x%08x\n" " sec_tkn = addr: 0x%016llx [value: 0x%016llx]\n" 20 "" "mpm_end [HBA2 MPM] started\n" 21 "" "mpm_end [HBA2 MPM] parameters: min_stat = addr: 0x%08x [value: 0x%08x]\n" " flags = 0x%08x\n" " sec_tkn = addr: 0x%08x\n" 22 "" "mpm_end [HBA2 MPM] parameters: min_stat = addr: 0x%016llx [value: 0x%08x]\n" " flags = 0x%08x\n" " sec_tkn = addr: 0x%016llx\n" 23 "" "mpm_end [HBA2 MPM] failure at line %d: invalid parameter detected\n" "\t parameter position: %d\n" 24 "" "mpm_end [HBA2 MPM] failure at line %d: Bad service token magic number [0x%08x]\n" 25 "" "mpm_end [HBA2 MPM]: Service token released\n" 26 "" "mpm_end [HBA2 MPM]: service token [memory location 0x%08x]:\n" 27 "" "mpm_end [HBA2 MPM]: service token [memory location 0x%016llx]:\n" 28 "" "mpm_end [HBA2 MPM] ended with return value %d\n" 29 "" "mpm_end [HBA2 MPM] parameters: min_stat = addr: 0x%08x [value: 0x%08x]\n" " flags = 0x%08x\n" " sec_tkn = addr: 0x%08x [value: 0x%08x]\n" 30 "" "mpm_end [HBA2 MPM] parameters: min_stat = addr: 0x%016llx [value: 0x%08x]\n" " flags = 0x%08x\n" " sec_tkn = addr: 0x%016llx [value: 0x%016llx]\n" 31 "" "hba2_mpm__free_pac [HBA2 MPM] started\n" 32 "" "hba2_mpm__free_pac [HBA2 MPM] parameters: pac = addr: 0x%08x\n" 33 "" "hba2_mpm__free_pac [HBA2 MPM] parameters: pac = addr: 0x%016llx\n" 34 "" "hba2_mpm__free_pac [HBA2 MPM] failure at line %d: invalid parameter detected\n" "\t parameter position: %d\n" 35 "" "hba2_mpm__free_pac [HBA2 MPM] ended with return value %d\n" 36 "" "hba2_mpm__free_pac [HBA2 MPM] parameters: pac = addr: 0x%08x\n" 37 "" "hba2_mpm__free_pac [HBA2 MPM] parameters: pac = addr: 0x%016llx\n" 38 "" "mpm_init(hba2_mpm__initialize) [HBA2 MPM] started (void parameter ftn)\n" 39 "" "mpm_init(hba2_mpm__initialize) [HBA2 MPM] configuration data marked 'empty'\n" 40 "" "mpm_init(hba2_mpm__initialize) [HBA2 MPM] configuration data marked 'ready'\n" 41 "" "mpm_init(hba2_mpm__initialize) [HBA2 MPM] Attention: Unable to read HBA2\n" "\t identity mapping file. Trusted service names may not be correctly\n" "\t mapped to local operating system identities, but the HBA2 MPM is\n" "\t continuing.\n" 42 "" "mpm_init(hba2_mpm__initialize) [HBA2 MPM] ended (no return value,\n" " (void parameter ftn)\n" 43 "" "hba2_mpm__idm_native_translator [HBA2 MPM] started\n" 44 "" "hba2_mpm__idm_native_translator [HBA2 MPM] parameters:\n" " eq = addr: 0x%08x\n" " netid = addr: 0x%08x\n" " rule = addr: 0x%08x\n" " id = addr: 0x%08x\n" 45 "" "hba2_mpm__idm_native_translator [HBA2 MPM] parameters:\n" " eq = addr: 0x%016llx\n" " netid = addr: 0x%016llx\n" " rule = addr: 0x%016llx\n" " id = addr: 0x%016llx\n" 46 "" "hba2_mpm__idm_native_translator [HBA2 MPM] failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 47 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: Applying map rule to identity\n" "\t Identity: %s\n" "\t Mapping Rule: statei = 0x%x\n" "\t registry type = %s\n" "\t registry name = %s\n" 48 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: Memory allocation failure\n" "\t Line of code: %d\n" "\t Allocation size: %u bytes\n" 49 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: Caching mapping rule\n" 50 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: rule from file:\n" "\t flags = 0x%x\n" "\t lhmap = %s\n" "\t rhmap = %s\n" "\t crindex = %d\n" 51 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: format error in rule from file:\n" "\t flags = 0x%x\n" "\t lhmap = %s\n" "\t rhmap = %s\n" "\t crindex = %d\n" 52 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: Mapping rule cached\n" 53 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: Cached rule details:\n" "\t state = 0x%x\n" "\t rgy_type = %s\n" "\t rgy_name = %s\n" "\t mapping = %s\n" "\t count = %d\n" 54 "" "\t token[%d] = %s\n" 55 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: format error in identity:\n" "\t identity: %s\n" 56 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: Network identity tokens:\n" 57 "" "\t token[%d] = %s\n" 58 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: Successful mapping for keyword\n" "\t %s found\n" 59 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: Mapping keyword '%s' does not\n" "\t provide a mapping for network identifier '%s'\n" "\t [returning code %d to caller]\n" 60 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: Error locating information to\n" "\t process identity mapping keyword '%s' (returning %d to caller)\n" 61 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: Cannot obtain RSCT Node ID for\n" "\t local system!\n" "\t return code from cu_get_node_id(): %d\n" "\t (returning %d to caller)\n" 62 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: Token count mismatch between\n" "\t identity mapping rule (%d tokens) and authenticated identity (%d tokens)\n" "\t (returning %d to caller)\n" 63 "" "hba2_mpm__idm_native_translator [HBA2 MPM]: Mapping rule applies to identity\n" 64 "" "\t identity = %s\n" 65 "" "hba2_mpm__idm_native_translator [HBA2 MPM] ended with return value %d\n" 66 "" "hba2_mpm__idm_native_translator [HBA2 MPM] parameters:\n" " eq = addr: 0x%08x\n" " netid = addr: 0x%08x\n" " rule = addr: 0x%08x\n" " id = addr: 0x%08x\n" 67 "" "hba2_mpm__idm_native_translator [HBA2 MPM] parameters:\n" " eq = addr: 0x%016llx\n" " netid = addr: 0x%016llx\n" " rule = addr: 0x%016llx\n" " id = addr: 0x%016llx\n" 68 "" "hba2_mpm__idm_native_cleanup [HBA2 MPM] started\n" 69 "" "hba2_mpm__idm_native_cleanup [HBA2 MPM] parameters:\n" " rule = addr: 0x%08x\n" " id = addr: 0x%08x\n" 70 "" "hba2_mpm__idm_native_cleanup [HBA2 MPM] parameters:\n" " rule = addr: 0x%016llx\n" " id = addr: 0x%016llx\n" 71 "" "hba2_mpm__idm_native_cleanup [HBA2 MPM] ended (void return value)\n" 72 "" "hba2_mpm__idm_native_cleanup [HBA2 MPM] parameters:\n" " rule = addr: 0x%08x\n" " id = addr: 0x%08x\n" 73 "" "hba2_mpm__idm_native_cleanup [HBA2 MPM] parameters:\n" " rule = addr: 0x%016llx\n" " id = addr: 0x%016llx\n" 74 "" "hba2_mpm__acl_id_expander [HBA2 MPM] started\n" 75 "" "hba2_mpm__idm_native_cleanup [HBA2 MPM] parameters:\n" " netid = addr: 0x%08x\n" " acleid = addr: 0x%08x\n" 76 "" "hba2_mpm__acl_id_expander [HBA2 MPM] parameters:\n" " netid = addr: 0x%016llx\n" " acleid = addr: 0x%016llx\n" 77 "" "hba2_mpm__acl_id_expander [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 78 "" "hba2_mpm__acl_id_expander [HBA2 MPM]: %s identity format invalid at line %d\n" "\t identity valus: %s\n" 79 "" "hba2_mpm__acl_id_expander [HBA2 MPM]: User name portions of identities do\n" "\t not match (returning %d to caller):\n" "\t network identity: %s\n" "\t ACL Entry identity: %s\n" 80 "" "hba2_mpm__acl_id_expander [HBA2 MPM]: Registry name portions of identities do\n" "\t not match (returning %d to caller):\n" "\t network identity: %s\n" "\t ACL Entry identity: %s\n" 81 "" "hba2_mpm__acl_id_expander [HBA2 MPM]: Match on full identities (returning %d):\n" "\t network identity: %s\n" "\t ACL Entry identity: %s\n" 82 "" "hba2_mpm__acl_id_expander [HBA2 MPM]: Match to '*' wildcard (returning 0)\n" "\t ATTENTION: This will match ANYONE, so that better be what you wanted...\n" 83 "" "hba2_mpm__acl_id_expander [HBA2 MPM]: Match on identities based on registry\n" "\t name wildcarding (returning %d):\n" "\t network identity: %s\n" "\t ACL Entry identity: %s\n" 84 "" "hba2_mpm__acl_id_expander [HBA2 MPM]: Match between network identity and\n" "\t ACL Entry identity successful\n" 85 "" "hba2_mpm__acl_id_expander [HBA2 MPM] ended with return value %d\n" 86 "" "hba2_mpm__acl_id_expander [HBA2 MPM] parameters:\n" " netid = addr: 0x%08x\n" " acleid = addr: 0x%08x\n" 87 "" "hba2_mpm__acl_id_expander [HBA2 MPM] parameters:\n" " netid = addr: 0x%016llx\n" " acleid = addr: 0x%016llx\n" 88 "" "%s [HBA2 MPM]: %s identity format incorrect\n" "\t (returning %d to the caller)\n" "\t identity: %s\n" 89 "" "%s [HBA2 MPM]: cannot obtain RSCT Node ID.\n" "\t cu_get_node_id() return value: %d\n" "\t (returning %d to the caller)\n" 90 "" "hba2_mpm__acl_id_matcher [HBA2 MPM] started\n" 91 "" "hba2_mpm__idm_native_cleanup [HBA2 MPM] parameters:\n" " netid = addr: 0x%08x\n" " acleid = addr: 0x%08x\n" 92 "" "hba2_mpm__acl_id_matcher [HBA2 MPM] parameters:\n" " netid = addr: 0x%016llx\n" " acleid = addr: 0x%016llx\n" 93 "" "hba2_mpm__acl_id_matcher [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 94 "" "hba2_mpm__acl_id_matcher [HBA2 MPM]: %s identity format invalid at line %d\n" "\t identity valus: %s\n" 95 "" "hba2_mpm__acl_id_matcher [HBA2 MPM]: User name portions of identities do\n" "\t not match (returning %d to caller):\n" "\t network identity: %s\n" "\t ACL Entry identity: %s\n" 96 "" "hba2_mpm__acl_id_matcher [HBA2 MPM]: Registry name portions of identities do\n" "\t not match (returning %d to caller):\n" "\t network identity: %s\n" "\t ACL Entry identity: %s\n" 97 "" "hba2_mpm__acl_id_matcher [HBA2 MPM]: Match on full identities (returning %d):\n" "\t network identity: %s\n" "\t ACL Entry identity: %s\n" 98 "" "hba2_mpm__acl_id_matcher [HBA2 MPM]: No match between the network identity\n" "\t and the ACL Entry identity - continue scanning ACL (returning %d)\n" "\t network identity: %s\n" "\t ACL Entry identity: %s\n" 99 "" "hba2_mpm__acl_id_matcher [HBA2 MPM]: No match between the network identity\n" "\t and the ACL Entry identity (returning %d)\n" 100 "" "hba2_mpm__acl_id_matcher [HBA2 MPM]: Using a sorted ACL, scan has proceeded\n" "\t beyond the point in the ACL where a match should have been found - stop\n" "\t scanning ACL.\n" "\t network identity: %s\n" "\t ACL Entry identity: %s\n" 101 "" "hba2_mpm__acl_id_matcher [HBA2 MPM]: Match between network identity and\n" "\t ACL Entry identity successful\n" 102 "" "hba2_mpm__acl_id_matcher [HBA2 MPM] ended with return value %d\n" 103 "" "hba2_mpm__acl_id_matcher [HBA2 MPM] parameters:\n" " netid = addr: 0x%08x\n" " acleid = addr: 0x%08x\n" 104 "" "hba2_mpm__acl_id_matcher [HBA2 MPM] parameters:\n" " netid = addr: 0x%016llx\n" " acleid = addr: 0x%016llx\n" 105 "" "mpm_cleanup [HBA2 MPM] started\n" 106 "" "mpm_cleanup [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t flags = 0x%08x\n" "\t sec_tkn = addr: 0x%08x [value: 0x%08x]\n" 107 "" "mpm_cleanup [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t flags = 0x%08x\n" "\t sec_tkn = addr: 0x%016llx [value: 0x%016llx]\n" 108 "" "mpm_cleanup [HBA2 MPM] ended with return value %d\n" 109 "" "mpm_cleanup [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t flags = 0x%08x\n" "\t sec_tkn = addr: 0x%08x [value: 0x%08x]\n" 110 "" "mpm_cleanup [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t flags = 0x%08x\n" "\t sec_tkn = addr: 0x%016llx [value: 0x%016llx]\n" 111 "" "mpm_login_as_user [HBA2 MPM] started\n" 112 "" "mpm_login_as_user [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t id = addr: 0x%08x\n" "\t flags = 0x%08x\n" "\t sec_tkn = addr: 0x%08x [value: 0x%08x]\n" 113 "" "mpm_login_as_user [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t id = addr: 0x%016llx\n" "\t flags = 0x%08x\n" "\t sec_tkn = addr: 0x%016llx [value: 0x%016llx]\n" 114 "" "mpm_login_as_user [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 115 "" "mpm_login_as_user [HBA2 MPM]: Security services token 'magic' incorrect -\n" "\t possible memory corruption or incorrect parameter passed to this routine.\n" "\t magic detected: 0x%08x\n" "\t magic expected: 0x%08x\n" 116 "" "mpm_login_as_user [HBA2 MPM]: Security services token status incorrect -\n" "\t possible memory corruption or incorrect parameter passed to this routine.\n" "\t status detected: 0x%08x\n" 117 "" "mpm_login_as_user [HBA2 MPM]: User identity token appears invalid (line %d) -\n" "\t possible memory corruption or incorrect parameter passed to this routine.\n" 118 "" "mpm_login_as_user [HBA2 MPM]: Cannot obtain user name for user identity\n" "\t user identity used: %u\n" "\t Return code from ct__get_username: %d\n" 119 "" "mpm_login_as_user [HBA2 MPM]: Application requesting login as user for:\n" "\t user identity: %u\n" "\t user name: %s\n" 120 "" "mpm_login_as_user [HBA2 MPM]: ATTENTION: Security servcies token state\n" "\t indicates that the application has already acquired an HBA2\n" "\t mechanism identity - this process will replace the identity\n" "\t previously acquired.\n" "\t security servcies token status field value: 0x%08x\n" 121 "" "mpm_login_as_user [HBA2 MPM]: Memory allocation failure\n" "\t Line of code: %d\n" "\t Allocation size: %u bytes\n" 122 "" "mpm_login_as_user [HBA2 MPM]: Network identity passed in identity buffer \n" "\t is not valid.\n" "\t network identity name: %s\n" 123 "" "mpm_login_as_user [HBA2 MPM]: Network identity passed in identity buffer \n" "\t does not match the operating system user name obtained for the user \n" "\t identity.\n" "\t user identity: %u\n" "\t user name: %s\n" "\t network identity from identity buffer: %s\n" 124 "" "mpm_login_as_user [HBA2 MPM]: Cannot set user identity for the running \n" "\t process to the user identity provided by the application. Must \n" "\t conclude that the application owner does not have sufficient privilege \n" "\t to assume that identity. Rejecting user login attempt.\n" "\t user identity requested: %u\n" "\t 'errno' from setuid: %d\n" 125 "" "mpm_login_as_user [HBA2 MPM]: Application successfully logged in as user\n" 126 "" "mpm_login_as_user [HBA2 MPM]: User identity details:\n" "\t user identity: %u\n" "\t user name: %s\n" 127 "" "mpm_login_as_user [HBA2 MPM] ended with return value %d\n" 128 "" "mpm_login_as_user [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t flags = 0x%08x\n" "\t sec_tkn = addr: 0x%08x [value: 0x%08x]\n" 129 "" "mpm_login_as_user [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t flags = 0x%08x\n" "\t sec_tkn = addr: 0x%016llx [value: 0x%016llx]\n" 130 "" "mpm_login_as_service [HBA2 MPM] started\n" 131 "" "mpm_login_as_service [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t svc_name = addr: 0x%08x [value: %s]\n" "\t sec_tkn = addr: 0x%08x [value: 0x%08x]\n" 132 "" "mpm_login_as_service [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t svc_name = addr: 0x%016llx [value: %s]\n" "\t sec_tkn = addr: 0x%016llx [value: 0x%016llx]\n" 133 "" "mpm_login_as_service [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 134 "" "mpm_login_as_service [HBA2 MPM]: Security services token '%s' incorrect -\n" "\t possible memory corruption or incorrect parameter passed to this routine.\n" "\t detected: 0x%08x\n" "\t expected: 0x%08x\n" 135 "" "mpm_login_as_service [HBA2 MPM]: Cannot obtain local operating system user\n" "\t identity for the specified trusted service.\n" "\t trusted service name: %s\n" "\t Return code from routine: %d\n" 136 "" "mpm_login_as_service [HBA2 MPM]: Application requesting login as service for:\n" "\t trusted service name: %s\n" "\t local operating system user name equivilent: %s\n" 137 "" "mpm_login_as_service [HBA2 MPM]: Memory allocation failure\n" "\t Line of code: %d\n" "\t Allocation size: %u bytes\n" 138 "" "mpm_login_as_service [HBA2 MPM]: Unable to obtain user identity information\n" "\t for trusted service's local operating system user name.\n" "\t local operating system user name: %s\n" "\t error code from getpwnam() routine: %d\n" 139 "" "mpm_login_as_service [HBA2 MPM]: Process requested to login as service using\n" "\t user identity '%u' - process currently running under user identity '%u'.\n" 140 "" "mpm_login_as_service [HBA2 MPM]: Cannot set user identity for the running \n" "\t process to the user identity requested by the trusted service. Must \n" "\t conclude that the application owner does not have sufficient privilege \n" "\t to assume that identity. Rejecting service login attempt.\n" "\t user identity requested: %u\n" "\t 'errno' from seteuid: %d\n" 141 "" "mpm_login_as_service [HBA2 MPM]: Application successfully logged in as a\n" "\t trusted service.\n" 142 "" "mpm_login_as_service [HBA2 MPM]: User identity details:\n" "\t user identity: %u\n" "\t user name: %s\n" 143 "" "mpm_login_as_service [HBA2 MPM] ended with return value %d\n" 144 "" "mpm_login_as_service [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t svc_name = addr: 0x%08x [value: %s]\n" "\t sec_tkn = addr: 0x%08x [value: 0x%08x]\n" 145 "" "mpm_login_as_service [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t svc_name = addr: 0x%016llx [value: %s]\n" "\t sec_tkn = addr: 0x%016llx [value: 0x%016llx]\n" 146 "" "mpm_get_client_id [HBA2 MPM] started\n" 147 "" "mpm_get_client_id [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t len = addr: 0x%08x [value: %d]\n" "\t id = addr: 0x%08x [value follows]\n" 148 "" "mpm_get_client_id [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t len = addr: 0x%016llx [value: %d]\n" "\t id = addr: 0x%016llx [value follows]\n" 149 "" "mpm_get_client_id [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 150 "" "mpm_get_client_id [HBA2 MPM]: security context not marked as 'complete'\n" "\t security context status indicator: 0x%08x\n" "\t mask used to check for complete state: 0x%08x\n" 151 "" "mpm_get_client_id [HBA2 MPM]: caller did not provide a buffer large enough\n" "\t to store the client identity.\n" "\t size of buffer provided (according to parameters): %d bytes\n" "\t size of buffer needed to store identity: %d bytes\n" 152 "" "mpm_get_client_id [HBA2 MPM]: client identity obtained from security context\n" "\t client user identity (UID): %u\n" "\t client network identity: %s\n" "\t contents of identity buffer follows:\n" 153 "" "mpm_get_client_id [HBA2 MPM] ended with return value %d\n" 154 "" "mpm_get_client_id [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t len = addr: 0x%08x [value: %d]\n" "\t id = addr: 0x%08x [value follows]\n" 155 "" "mpm_get_client_id [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t len = addr: 0x%016llx [value: %d]\n" "\t id = addr: 0x%016llx [value follows]\n" 156 "" "mpm_get_client_name [HBA2 MPM] started\n" 157 "" "mpm_get_client_name [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t len = addr: 0x%08x [value: %d]\n" "\t id = addr: 0x%08x [value follows]\n" 158 "" "mpm_get_client_name [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t len = addr: 0x%016llx [value: %d]\n" "\t id = addr: 0x%016llx [value follows]\n" 159 "" "mpm_get_client_name [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 160 "" "mpm_get_client_name [HBA2 MPM]: security context not marked as 'complete'\n" "\t security context status indicator: 0x%08x\n" "\t mask used to check for complete state: 0x%08x\n" 161 "" "mpm_get_client_name [HBA2 MPM]: caller did not provide a buffer large enough\n" "\t to store the client name.\n" "\t size of buffer provided (according to parameters): %d bytes\n" "\t size of buffer needed to store identity: %d bytes\n" 162 "" "mpm_get_client_name [HBA2 MPM]: client name obtained from security context\n" "\t client network identity: %s\n" "\t contents of identity buffer follows:\n" 163 "" "mpm_get_client_name [HBA2 MPM]: client name being obtained from %s\n" "\t context buffer.\n" 164 "" "mpm_get_client_name [HBA2 MPM] ended with return value %d\n" 165 "" "mpm_get_client_name [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t len = addr: 0x%08x [value: %d]\n" "\t id = addr: 0x%08x [value follows]\n" 166 "" "mpm_get_client_name [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t len = addr: 0x%016llx [value: %d]\n" "\t id = addr: 0x%016llx [value follows]\n" 167 "" "mpm_get_mapped_name [HBA2 MPM] started\n" 168 "" "mpm_get_mapped_name [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t len = addr: 0x%08x [value: %d]\n" "\t id = addr: 0x%08x [value follows]\n" 169 "" "mpm_get_mapped_name [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t len = addr: 0x%016llx [value: %d]\n" "\t id = addr: 0x%016llx [value follows]\n" 170 "" "mpm_get_mapped_name [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 171 "" "mpm_get_mapped_name [HBA2 MPM]: security context not marked as 'complete'\n" "\t security context status indicator: 0x%08x\n" "\t mask used to check for complete state: 0x%08x\n" 172 "" "mpm_get_mapped_name [HBA2 MPM]: No mapped identity exists in this context\n" "\t yet - contact IDM library and obtain mapped identity.\n" 173 "" "mpm_get_mapped_name [HBA2 MPM]: caller did not provide a buffer large enough\n" "\t to store the client name.\n" "\t size of buffer provided (according to parameters): %d bytes\n" "\t size of buffer needed to store identity: %d bytes\n" 174 "" "mpm_get_mapped_name [HBA2 MPM]: mapped identity obtained from security context\n" 175 "" "mpm_get_mapped_name [HBA2 MPM]: mapped identity:\n" "\t %s\n" 176 "" "mpm_get_mapped_name [HBA2 MPM]: mapped identity being obtained from %s\n" "\t context buffer.\n" 177 "" "mpm_get_mapped_name [HBA2 MPM] ended with return value %d\n" 178 "" "mpm_get_mapped_name [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t len = addr: 0x%08x [value: %d]\n" "\t id = addr: 0x%08x [value follows]\n" 179 "" "mpm_get_mapped_name [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t len = addr: 0x%016llx [value: %d]\n" "\t id = addr: 0x%016llx [value follows]\n" 180 "" "hba2_mpm__get_mapid_from_idm [HBA2 MPM] started\n" 181 "" "hba2_mpm__get_mapid_from_idm [HBA2 MPM] parameters:\n" "\t ctoken = addr: 0x%08x\n" "\t mapid = addr: 0x%08x\n" 182 "" "hba2_mpm__get_mapid_from_idm [HBA2 MPM] parameters:\n" "\t ctoken = addr: 0x%016llx\n" "\t mapid = addr: 0x%016llx\n" 183 "" "hba2_mpm__get_mapid_from_idm [HBA2 MPM]: Unable to get client name from\n" "\t security context - cannot get a mapped identity from this context.\n" 184 "" "hba2_mpm__get_mapid_from_idm [HBA2 MPM]: IDM library did not locate a \n" "\t identity map:\n" "\t identity string from context token: %s\n" "\t mechanism used to locate mapped identity: %s\n" 185 "" "hba2_mpm__get_mapid_from_idm [HBA2 MPM]: IDM library found a mapped identity:\n" "\t identity string from context token: %s\n" "\t mapped identity located by IDM library: %s\n" "\t mechanism used to locate mapped identity: %s\n" 186 "" "hba2_mpm__get_mapid_from_idm [HBA2 MPM] ended with return value %d\n" 187 "" "hba2_mpm__get_mapid_from_idm [HBA2 MPM] parameters:\n" "\t ctoken = addr: 0x%08x\n" "\t mapid = addr: 0x%08x ['value' field follows]\n" 188 "" "hba2_mpm__get_mapid_from_idm [HBA2 MPM] parameters:\n" "\t ctoken = addr: 0x%016llx\n" "\t mapid = addr: 0x%016llx ['value' field follows]\n" 189 "" "mpm_user_valid [HBA2 MPM] started\n" 190 "" "mpm_user_valid [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t username = addr: 0x%08x [value follows]\n" 191 "" "mpm_user_valid [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t username = addr: 0x%016llx [value follows]\n" 192 "" "mpm_user_valid [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 193 "" "mpm_user_valid [HBA2 MPM]: mapped identity obtained from security context\n" 194 "" "mpm_user_valid [HBA2 MPM]: mapped identity:\n" "\t %s\n" 195 "" "mpm_user_valid [HBA2 MPM]: mapped identity being obtained from %s\n" "\t context buffer.\n" 196 "" "mpm_user_valid [HBA2 MPM]: identity is valid\n" 197 "" "mpm_user_valid [HBA2 MPM]: validated identity: %s\n" 198 "" "mpm_user_valid [HBA2 MPM]: Identity cannot be validated\n" 199 "" "mpm_user_valid [HBA2 MPM]: Details:\n" "\t identity to be validated: %s\n" "\t error code from ruserok(): %d\n" 200 "" "mpm_user_valid [HBA2 MPM] ended with return value %d\n" 201 "" "mpm_user_valid [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t username = addr: 0x%08x [value follows]\n" 202 "" "mpm_user_valid [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t username = addr: 0x%016llx [value follows]\n" 203 "" "mpm_get_ctx_flags [HBA2 MPM] started\n" 204 "" "mpm_get_ctx_flags [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t flags = addr: 0x%08x\n" 205 "" "mpm_get_ctx_flags [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t flags = addr: 0x%016llx\n" 206 "" "mpm_get_ctx_flags [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 207 "" "mpm_get_ctx_flags [HBA2 MPM]: flags being obtained from %s\n" "\t context buffer.\n" 208 "" "mpm_get_ctx_flags [HBA2 MPM] ended with return value %d\n" 209 "" "mpm_get_ctx_flags [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t flags = addr: 0x%08x [value: 0x%08x]\n" 210 "" "mpm_get_ctx_flags [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t flags = addr: 0x%016llx [value: 0x%08x]\n" 211 "" "mpm_get_ctx_lifetime [HBA2 MPM] started\n" 212 "" "mpm_get_ctx_lifetime [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t lifetime = addr: 0x%08x\n" 213 "" "mpm_get_ctx_lifetime [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t lifetime = addr: 0x%016llx\n" 214 "" "mpm_get_ctx_lifetime [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 215 "" "mpm_get_ctx_lifetime [HBA2 MPM]: flags being obtained from %s\n" "\t context buffer.\n" 216 "" "mpm_get_ctx_lifetime [HBA2 MPM]: truncating remaining lifetime to fit into\n" "\t 32-bit signed data value.\n" 217 "" "mpm_get_ctx_lifetime [HBA2 MPM]: Remaining lifetime for context (a value of\n" "\t -1 means 'does not expire'): %d seconds\n" 218 "" "mpm_get_ctx_lifetime [HBA2 MPM] ended with return value %d\n" 219 "" "mpm_get_ctx_lifetime [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t lifetime = addr: 0x%08x [value: 0x%08x]\n" 220 "" "mpm_get_ctx_lifetime [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t lifetime = addr: 0x%016llx [value: 0x%08x]\n" 221 "" "mpm_set_ctx_attribute [HBA2 MPM] started\n" 222 "" "mpm_set_ctx_attribute [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x\n" "\t svc_token = addr: 0x%08x\n" "\t attribute = 0x%08x\n" "\t data = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" 223 "" "mpm_set_ctx_attribute [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx\n" "\t svc_token = addr: 0x%016llx\n" "\t attribute = 0x%08x\n" "\t data = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" 224 "" "mpm_set_ctx_attribute [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 225 "" "mpm_set_ctx_attribute [HBA2 MPM]: Security services token 'magic' incorrect -\n" "\t possible memory corruption or incorrect parameter passed to this routine.\n" "\t magic detected: 0x%08x\n" "\t magic expected: 0x%08x\n" 226 "" "mpm_set_ctx_attribute [HBA2 MPM]: Security services token state incorrect -\n" "\t security services token may not be ready for this operation. Also,\n" "\t possible memory corruption or incorrect parameter passed to this routine.\n" "\t state value: 0x%08x\n" "\t state mask checked: 0x%08x\n" 227 "" "mpm_set_ctx_attribute [HBA2 MPM] ended with return value %d\n" 228 "" "mpm_set_ctx_attribute [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t svc_token = addr: 0x%08x\n" "\t attribute = 0x%08x\n" "\t data = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" 229 "" "mpm_set_ctx_attribute [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t svc_token = addr: 0x%016llx\n" "\t attribute = 0x%08x\n" "\t data = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" 230 "" "mpm_renew_identity [HBA2 MPM] started\n" 231 "" "mpm_renew_identity [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x\n" "\t svc_token = addr: 0x%08x\n" "\t lifetime = addr: 0x%08x\n" 232 "" "mpm_renew_identity [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx\n" "\t svc_token = addr: 0x%016llx\n" "\t lifetime = 0x%016llx\n" 233 "" "mpm_renew_identity [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 234 "" "mpm_renew_identity [HBA2 MPM]: Security services token 'magic' incorrect -\n" "\t possible memory corruption or incorrect parameter passed to this routine.\n" "\t magic detected: 0x%08x\n" "\t magic expected: 0x%08x\n" 235 "" "mpm_renew_identity [HBA2 MPM]: Security services token state incorrect -\n" "\t security services token may not be ready for this operation. Also,\n" "\t possible memory corruption or incorrect parameter passed to this routine.\n" "\t state value: 0x%08x\n" "\t state mask checked: 0x%08x\n" 236 "" "mpm_renew_identity [HBA2 MPM] ended with return value %d\n" 237 "" "mpm_renew_identity [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t svc_token = addr: 0x%08x\n" "\t lifetime = addr: 0x%08x [value: %d]\n" 238 "" "mpm_renew_identity [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t svc_token = addr: 0x%016llx\n" "\t lifetime = addr: 0x%016llx [value: %d]\n" 239 "" "mpm_release_identity [HBA2 MPM] started\n" 240 "" "mpm_release_identity [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t buffer = addr: 0x%08x\n" 241 "" "mpm_release_identity [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t buffer = addr: 0x%016llx\n" 242 "" "mpm_release_identity [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 243 "" "mpm_release_identity [HBA2 MPM] ended with return value %d\n" 244 "" "mpm_release_identity [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t buffer = addr: 0x%08x\n" 245 "" "mpm_release_identity [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t buffer = addr: 0x%016llx\n" 246 "" "mpm_release_buffer [HBA2 MPM] started\n" 247 "" "mpm_release_buffer [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x\n" "\t buffer = addr: 0x%08x\n" 248 "" "mpm_release_buffer [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx\n" "\t buffer = addr: 0x%016llx\n" 249 "" "mpm_release_buffer [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 250 "" "mpm_release_buffer [HBA2 MPM] ended with return value %d\n" 251 "" "mpm_release_buffer [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t buffer = addr: 0x%08x\n" 252 "" "mpm_release_buffer [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t buffer = addr: 0x%016llx\n" 253 "" "hba2_mpm__unpack_prepped_data [HBA2 MPM] started\n" 254 "" "hba2_mpm__unpack_prepped_data [HBA2 MPM] parameters:\n" "\t inbuf = addr: 0x%08x\n" "\t outbuf = addr: 0x%08x\n" "\t preptype = addr: 0x%08x\n" 255 "" "hba2_mpm__unpack_prepped_data [HBA2 MPM] parameters:\n" "\t inbuf = addr: 0x%016llx\n" "\t outbuf = addr: 0x%016llx\n" "\t preptype = addr: 0x%016llx\n" 256 "" "hba2_mpm__unpack_prepped_data [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 257 "" "hba2_mpm__unpack_prepped_data [HBA2 MPM]: Memory allocation failure\n" "\t Line of code: %d\n" "\t Allocation size: %u bytes\n" 258 "" "hba2_mpm__unpack_prepped_data [HBA2 MPM]: ta buffer to process is not in the\n" "\t correct format.\n" "\t what was being checked: %s\n" "\t Line of code: %d\n" 259 "" "hba2_mpm__unpack_prepped_data [HBA2 MPM] ended with return value %d\n" 260 "" "hba2_mpm__unpack_prepped_data [HBA2 MPM] parameters:\n" "\t inbuf = addr: 0x%08x\n" "\t outbuf = addr: 0x%08x\n" "\t preptype = addr: 0x%08x [value: 0x%08x]\n" 261 "" "hba2_mpm__unpack_prepped_data [HBA2 MPM] parameters:\n" "\t inbuf = addr: 0x%016llx\n" "\t outbuf = addr: 0x%016llx\n" "\t preptype = addr: 0x%016llx [value: 0x%08x]\n" 262 "" "hba2_mpm__pack_prepped_data [HBA2 MPM] started\n" 263 "" "hba2_mpm__pack_prepped_data [HBA2 MPM] parameters:\n" "\t inbuf = addr: 0x%08x\n" "\t preptype = 0x%08x\n" "\t outbuf = addr: 0x%08x\n" 264 "" "hba2_mpm__pack_prepped_data [HBA2 MPM] parameters:\n" "\t inbuf = addr: 0x%016llx\n" "\t preptype = 0x%08x\n" "\t outbuf = addr: 0x%016llx\n" 265 "" "hba2_mpm__pack_prepped_data [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 266 "" "hba2_mpm__pack_prepped_data [HBA2 MPM]: Memory allocation failure\n" "\t Line of code: %d\n" "\t Allocation size: %u bytes\n" 267 "" "hba2_mpm__pack_prepped_data [HBA2 MPM] ended with return value %d\n" 268 "" "hba2_mpm__pack_prepped_data [HBA2 MPM] parameters:\n" "\t inbuf = addr: 0x%08x\n" "\t preptype = 0x%08x\n" "\t outbuf = addr: 0x%08x\n" 269 "" "hba2_mpm__pack_prepped_data [HBA2 MPM] parameters:\n" "\t inbuf = addr: 0x%016llx\n" "\t preptype = 0x%08x\n" "\t outbuf = addr: 0x%016llx\n" 270 "" "mpm_prepare_data [HBA2 MPM] started\n" 271 "" "mpm_prepare_data [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" "\t preptype = 0x%08x\n" "\t inbuf = addr: 0x%08x\n" "\t outbuf = addr: 0x%08x\n" 272 "" "mpm_prepare_data [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" "\t preptype = 0x%08x\n" "\t inbuf = addr: 0x%016llx\n" "\t outbuf = addr: 0x%016llx\n" 273 "" "mpm_prepare_data [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 274 "" "mpm_prepare_data [HBA2 MPM]: context token state not valid for preparing\n" "\t data for secured transfer.\n" "\t context state detected: 0x%08x\n" "\t expected state mask: 0x%08x\n" 275 "" "mpm_prepare_data [HBA2 MPM]: Requesting data integrity protection\n" 276 "" "mpm_prepare_data [HBA2 MPM]: Requesting data privacy protection\n" 277 "" "mpm_prepare_data [HBA2 MPM]: Requested data protection is not supported by\n" "\t this security context.\n" "\t requested data protection (mask value): 0x%08x\n" "\t protections offered by this context (mask value): 0x%08x\n" 278 "" "mpm_prepare_data [HBA2 MPM]: Requested data protection failed\n" "\t sec_sign_message or sec_encrypt_message return code: %d\n" 279 "" "mpm_prepare_data [HBA2 MPM]: Data protected for transfer\n" 280 "" "mpm_prepare_data [HBA2 MPM] ended with return value %d\n" 281 "" "mpm_prepare_data [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t preptype = 0x%08x\n" "\t inbuf = addr: 0x%08x\n" "\t outbuf = addr: 0x%08x\n" 282 "" "mpm_prepare_data [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t preptype = 0x%08x\n" "\t inbuf = addr: 0x%016llx\n" "\t outbuf = addr: 0x%016llx\n" 283 "" "mpm_process_data [HBA2 MPM] started\n" 284 "" "mpm_process_data [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" "\t inbuf = addr: 0x%08x\n" "\t outbuf = addr: 0x%08x\n" 285 "" "mpm_process_data [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" "\t inbuf = addr: 0x%016llx\n" "\t outbuf = addr: 0x%016llx\n" 286 "" "mpm_process_data [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 287 "" "mpm_process_data [HBA2 MPM]: context token state not valid for preparing\n" "\t data for secured transfer.\n" "\t context state detected: 0x%08x\n" "\t expected state mask: 0x%08x\n" 288 "" "mpm_process_data [HBA2 MPM]: Packet protected via data integrity\n" 289 "" "mpm_process_data [HBA2 MPM]: Packet protected via data privacy\n" 290 "" "mpm_process_data [HBA2 MPM]: Packet usiong data protection unkown to this\n" "\t security mechanism (protection mask value of 0x%08x)\n" 291 "" "mpm_process_data [HBA2 MPM]: Data protection used in the packet is not\n" "\t supported by this security context.\n" "\t data protection used (mask value): 0x%08x\n" "\t protections offered by this context (mask value): 0x%08x\n" 292 "" "mpm_process_data [HBA2 MPM]: Unable to process the protected data using the\n" "\t libct_mss routines.\n" "\t sec_verify_message or sec_decrypt_message return code: %d\n" 293 "" "mpm_process_data [HBA2 MPM]: Protected data successfully processed.\n" 294 "" "mpm_process_data [HBA2 MPM] ended with return value %d\n" 295 "" "mpm_process_data [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t inbuf = addr: 0x%08x\n" "\t outbuf = addr: 0x%08x\n" 296 "" "mpm_process_data [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t inbuf = addr: 0x%016llx\n" "\t outbuf = addr: 0x%016llx\n" 297 "" "mpm_sign_data_v [HBA2 MPM] started\n" 298 "" "mpm_sign_data_v [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" "\t count = 0x%d\n" "\t vector = addr: 0x%08x\n" "\t signture = addr: 0x%08x\n" 299 "" "mpm_sign_data_v [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" "\t count = 0x%d\n" "\t vector = addr: 0x%016llx\n" "\t signture = addr: 0x%016llx\n" 300 "" "mpm_sign_data_v [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 301 "" "mpm_sign_data_v [HBA2 MPM]: context token state not valid for preparing\n" "\t data for secured transfer.\n" "\t context state detected: 0x%08x\n" "\t expected state mask: 0x%08x\n" 302 "" "mpm_sign_data_v [HBA2 MPM]: Requested data protection is not supported by\n" "\t this security context.\n" "\t requested data protection (mask value): 0x%08x\n" "\t protections offered by this context (mask value): 0x%08x\n" 303 "" "mpm_sign_data_v [HBA2 MPM]: Memory allocation failure\n" "\t Line of code: %d\n" "\t Allocation size: %u bytes\n" 304 "" "mpm_sign_data_v [HBA2 MPM]: Vectoral signature generation failed.\n" "\t sec_sign_message_v return code: %d\n" 305 "" "mpm_sign_data_v [HBA2 MPM]: Vectoral signature generated\n" 306 "" "mpm_sign_data_v [HBA2 MPM] ended with return value %d\n" 307 "" "mpm_sign_data_v [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t count = 0x%d\n" "\t vector = addr: 0x%08x\n" "\t signture = addr: 0x%08x\n" 308 "" "mpm_sign_data_v [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t count = 0x%d\n" "\t vector = addr: 0x%016llx\n" "\t signture = addr: 0x%016llx\n" 309 "" "mpm_verify_data_v [HBA2 MPM] started\n" 310 "" "mpm_verify_data_v [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" "\t signture = addr: 0x%08x\n" "\t count = 0x%d\n" "\t vector = addr: 0x%08x\n" 311 "" "mpm_verify_data_v [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" "\t signture = addr: 0x%016llx\n" "\t count = 0x%d\n" "\t vector = addr: 0x%016llx\n" 312 "" "mpm_verify_data_v [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 313 "" "mpm_verify_data_v [HBA2 MPM]: context token state not valid for processing\n" "\t secured data.\n" "\t context state detected: 0x%08x\n" "\t expected state mask: 0x%08x\n" 314 "" "mpm_verify_data_v [HBA2 MPM]: Requested data protection is not supported by\n" "\t this security context.\n" "\t requested data protection (mask value): 0x%08x\n" "\t protections offered by this context (mask value): 0x%08x\n" 315 "" "mpm_verify_data_v [HBA2 MPM]: Memory allocation failure\n" "\t Line of code: %d\n" "\t Allocation size: %u bytes\n" 316 "" "mpm_verify_data_v [HBA2 MPM]: The protection used on the vectoral signature\n" "\t is not supported by this routine.\n" "\t protection detected (mask value): 0x%08x\n" "\t protection supported (mask value): 0x%08x\n" 317 "" "mpm_verify_data_v [HBA2 MPM]: Vectoral signature verification failed.\n" "\t sec_verify_message_v return code: %d\n" 318 "" "mpm_verify_data_v [HBA2 MPM]: Vectoral signature verified\n" 319 "" "mpm_verify_data_v [HBA2 MPM] ended with return value %d\n" 320 "" "mpm_verify_data_v [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" "\t signture = addr: 0x%08x\n" "\t count = 0x%d\n" "\t vector = addr: 0x%08x\n" 321 "" "mpm_verify_data_v [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" "\t signture = addr: 0x%016llx\n" "\t count = 0x%d\n" "\t vector = addr: 0x%016llx\n" 322 "" "mpm_create_id_context [HBA2 MPM] started\n" 323 "" "mpm_create_id_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x\n" "\t flags = 0x%08x\n" "\t inbuf = addr: 0x%08x\n" "\t id_token = addr: 0x%08x\n" 324 "" "mpm_create_id_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx\n" "\t flags = 0x%08x\n" "\t inbuf = addr: 0x%016llx\n" "\t id_token = addr: 0x%016llx\n" 325 "" "mpm_create_id_context [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 326 "" "mpm_create_id_context [HBA2 MPM]: Attempting to create an identity context\n" "\t token from %s.\n" 327 "" "mpm_create_id_context [HBA2 MPM] ended with return value %d\n" 328 "" "mpm_create_id_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t flags = 0x%08x\n" "\t inbuf = addr: 0x%08x\n" "\t id_token = addr: 0x%08x\n" 329 "" "mpm_create_id_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t flags = 0x%08x\n" "\t inbuf = addr: 0x%016llx\n" "\t id_token = addr: 0x%016llx\n" 330 "" "hba2_mpm__idctx_from_secctx [HBA2 MPM]: context token state not valid for \n" "\t processing secured data.\n" "\t context state detected: 0x%08x\n" "\t expected state mask: 0x%08x or 0x%08x\n" 331 "" "hba2_mpm__idctx_from_secctx [HBA2 MPM]: Memory allocation failure\n" "\t Line of code: %d\n" "\t Allocation size: %u bytes\n" 332 "" "hba2_mpm__idctx_from_secctx [HBA2 MPM]: Identity context successfully created\n" 333 "" "hba2_mpm__idctx_from_secctx [HBA2 MPM]: Identity context details: \n" "\t address: 0x%08x\n" "\t network identity: %s\n" 334 "" "hba2_mpm__idctx_from_secctx [HBA2 MPM]: Identity context details: \n" "\t address: 0x%016llx\n" "\t network identity: %s\n" 335 "" "hba2_mpm__idctx_from_netid [HBA2 MPM]: Memory allocation failure\n" "\t Line of code: %d\n" "\t Allocation size: %u bytes\n" 336 "" "hba2_mpm__idctx_from_netid [HBA2 MPM]: Identity context successfully created\n" 337 "" "hba2_mpm__idctx_from_netid [HBA2 MPM]: Identity context details: \n" "\t address: 0x%08x\n" "\t network identity: %s\n" 338 "" "hba2_mpm__idctx_from_netid [HBA2 MPM]: Identity context details: \n" "\t address: 0x%016llx\n" "\t network identity: %s\n" 339 "" "mpm_end_context [HBA2 MPM] started\n" 340 "" "mpm_end_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" 341 "" "mpm_end_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" 342 "" "mpm_end_context [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 343 "" "mpm_end_context [HBA2 MPM]: security context token 'magic' bad. The \n" "\t application may have provided a bad pointer, or the security context\n" "\t token data may be corrupted.\n" "\t 'magic' seen: 0x%08x\n" "\t acceptable 'magic' values: 0x%08x or 0x%08x\n" 344 "" "[HBA2 MPM]: ---------- HBA2 Security Context Ended ----------\n" 345 "" " | context was with: %s\n" " ---------- HBA2 Security Context Ended ----------\n" 346 "" "mpm_end_context [HBA2 MPM]: Released %s token\n" 347 "" "mpm_end_context [HBA2 MPM]: %s token details:\n" "\t address: 0x%08x\n" 348 "" "mpm_end_context [HBA2 MPM]: %s token details:\n" "\t address: 0x%016llx\n" 349 "" "mpm_end_context [HBA2 MPM] ended with return value %d\n" 350 "" "mpm_end_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t ctoken = addr: 0x%08x\n" 351 "" "mpm_end_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t ctoken = addr: 0x%016llx\n" 352 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM] started\n" 353 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM] parameters:\n" "\t req_obj = addr: 0x%08x\n" "\t authid = addr: 0x%08x\n" "\t skey = addr: 0x%08x\n" "\t lifet = addr: 0x%08x\n" "\t ccd = addr: 0x%08x\n" 354 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM] parameters:\n" "\t req_obj = addr: 0x%016llx\n" "\t authid = addr: 0x%016llx\n" "\t skey = addr: 0x%016llx\n" "\t lifet = addr: 0x%016llx\n" "\t ccd = addr: 0x%016llx\n" 355 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 356 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM] failure at line %d: memory allocation failure\n" "\t allocation size: %d bytes\n" 357 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: Sending request for service to 'ctcas'\n" "\t service on local system via UDS socket interface.\n" 358 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: Response to request received from 'ctcas'\n" "\t service on local system via UDS socket interface.\n" 359 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: failure to send or receive data between\n" "\t the 'ctcas' servcie and the current process. Check trace output for\n" "\t the local 'ctcas' service for any additional information.\n" "\t cas_send_request_uds_bind() return value: %d\n" 360 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: failure to unmarshal response from\n" "\t 'ctcas' service on the local system.\n" "\t hba_unmarshal_reply() return code: %d\n" 361 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: The 'ctcas' service on the local system\n" "\t reported a failure in servicing the request from this process.\n" "\t return code from 'ctcas': %d\n" "\t eror message from 'ctcas': %s\n" 362 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: 'ctcas' service responded with %d\n" 363 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: Attention: 'ctcas' did not provide any\n" "\t credentials in repsonse to the request. This may be an acceptable\n" "\t result in some cases (the calling procedure must decide)\n" 364 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: 'ctcas' provided an authenticated\n" "\t identity.\n" 365 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: Context control data buffer (CCDB) for\n" "\t the current process obtained form 'ctcas' service.\n" 366 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: CCDB details:\n" "\t addr: 0x%08x\n" "\t credential content follows:\n" 367 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: CCDB details:\n" "\t addr: 0x%016llx\n" "\t credential content follows:\n" 368 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: Attention: 'ctcas' did not provide a\n" "\t session key in response to the request. This is not a failure. As a\n" "\t result, data protection (signing and encrypting) cannot be provided by\n" "\t this security context.\n" 369 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM]: Session key for the security context\n" "\t obtained from 'ctcas'.\n" 370 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM] ended with return value %d\n" 371 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM] parameters:\n" "\t req_obj = addr: 0x%08x\n" "\t authid = addr: 0x%08x\n" "\t skey = addr: 0x%08x\n" "\t lifet = addr: 0x%08x [value: %d sec]\n" "\t ccd = addr: 0x%08x\n" 372 "" "hba2_mpm_req_ctcasd_svc [HBA2 MPM] parameters:\n" "\t req_obj = addr: 0x%016llx\n" "\t authid = addr: 0x%016llx\n" "\t skey = addr: 0x%016llx\n" "\t lifet = addr: 0x%016llx [value: %d sec]\n" "\t ccd = addr: 0x%016llx\n" 373 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM] started\n" 374 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM] parameters:\n" "\t flags = 0x%08x\n" "\t svc_req = 0x%08x\n" "\t msg_type = 0x%08x\n" "\t ccd = addr: 0x%08x\n" "\t trg_nid = addr: 0x%08x\n" "\t trg_host = addr: 0x%08x\n" "\t cas_obj = addr: 0x%08x\n" 375 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM] parameters:\n" "\t flags = 0x%08x\n" "\t svc_req = 0x%08x\n" "\t msg_type = 0x%08x\n" "\t ccd = addr: 0x%016llx\n" "\t trg_nid = addr: 0x%016llx\n" "\t trg_host = addr: 0x%016llx\n" "\t cas_obj = addr: 0x%016llx\n" 376 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 377 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM]: Attempting to acquire a context control\n" "\t data buffer (CCDB) from the 'ctcas' service on local system.\n" 378 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM]: Attempting to verify a context control\n" "\t data buffer (CCDB) from another application, and obtain a response CCDB\n" "\t to that application from the 'ctcas' service on the local system.\n" 379 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM]: CCDB details:\n" "\t address: 0x%08x\n" "\t credential content follows:\n" 380 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM]: CCDB details:\n" "\t address: 0x%08x\n" "\t credential content follows:\n" 381 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM]: Attempting to verify a context control\n" "\t data buffer (CCDB) from another application through the 'ctcas' service\n" "\t on the local system.\n" 382 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM]: CCDB details:\n" "\t address: 0x%08x\n" "\t credential content follows:\n" 383 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM]: CCDB details:\n" "\t address: 0x%08x\n" "\t credential content follows:\n" 384 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM]: Failure marshalling data for the\n" "\t 'ctcas' service request.\n" "\t hba_marshal_request() return code: %d\n" 385 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM]: request buffer for 'ctcas' created\n" 386 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM]: request buffer details:\n" "\t addr: 0x%08x\n" "\t contents of buffer follows:\n" 387 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM]: request buffer details:\n" "\t addr: 0x%016llx\n" "\t contents of buffer follows:\n" 388 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM] ended with return value %d\n" 389 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM] parameters:\n" "\t flags = 0x%08x\n" "\t svc_req = 0x%08x\n" "\t msg_type = 0x%08x\n" "\t ccd = addr: 0x%08x\n" "\t trg_nid = addr: 0x%08x\n" "\t trg_host = addr: 0x%08x\n" "\t cas_obj = addr: 0x%08x\n" 390 "" "hba2_mpm__get_ctcasd_req [HBA2 MPM] parameters:\n" "\t flags = 0x%08x\n" "\t svc_req = 0x%08x\n" "\t msg_type = 0x%08x\n" "\t ccd = addr: 0x%016llx\n" "\t trg_nid = addr: 0x%016llx\n" "\t trg_host = addr: 0x%016llx\n" "\t cas_obj = addr: 0x%016llx\n" 391 "" "hba2_mpm__get_requestor_creds [HBA2 MPM] started\n" 392 "" "hba2_mpm__get_requestor_creds [HBA2 MPM] parameters:\n" "\t flags = 0x%08x\n" "\t trg_nid = addr: 0x%08x\n" "\t trg_host = addr: 0x%08x\n" "\t ccd = addr: 0x%08x\n" "\t ctx = addr: 0x%08x\n" 393 "" "hba2_mpm__get_requestor_creds [HBA2 MPM] parameters:\n" "\t flags = 0x%08x\n" "\t trg_nid = addr: 0x%016llx\n" "\t trg_host = addr: 0x%016llx\n" "\t ccd = addr: 0x%016llx\n" "\t ctx = addr: 0x%016llx\n" 394 "" "hba2_mpm__get_requestor_creds [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 395 "" "hba2_mpm__get_requestor_creds [HBA2 MPM]: Failure - the local 'ctcas'\n" "\t servce did not provide credentials for this process. Cannot\n" "\t start a security context with this failure.\n" 396 "" "hba2_mpm__get_requestor_creds [HBA2 MPM]: Requestor context control data\n" "\t buffer (CCDB) obtained for the current process.\n" 397 "" "hba2_mpm__get_requestor_creds [HBA2 MPM]: CCDB details:\n" "\t addr: 0x%08x\n" "\t credential buffer contents follow:\n" 398 "" "hba2_mpm__get_requestor_creds [HBA2 MPM]: CCDB details:\n" "\t addr: 0x%016llx\n" "\t credential buffer contents follow:\n" 399 "" "hba2_mpm__get_requestor_creds [HBA2 MPM] ended with return value %d\n" 400 "" "hba2_mpm__get_requestor_creds [HBA2 MPM] parameters:\n" "\t flags = 0x%08x\n" "\t trg_nid = addr: 0x%08x\n" "\t trg_host = addr: 0x%08x\n" "\t ccd = addr: 0x%08x\n" "\t ctx = addr: 0x%08x\n" 401 "" "hba2_mpm__get_requestor_creds [HBA2 MPM] parameters:\n" "\t flags = 0x%08x\n" "\t trg_nid = addr: 0x%016llx\n" "\t trg_host = addr: 0x%016llx\n" "\t ccd = addr: 0x%016llx\n" "\t ctx = addr: 0x%016llx\n" 402 "" "mpm_start_sec_context [HBA2 MPM] started\n" 403 "" "mpm_start_sec_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x\n" "\t sec_token = addr: 0x%08x\n" "\t trg_nid = addr: 0x%08x\n" "\t trg_host = addr: 0x%08x\n" "\t flags = 0x%08x\n" "\t ctoken = addr: 0x%08x\n" "\t c_ccd = addr: 0x%08x\n" 404 "" "mpm_start_sec_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx\n" "\t sec_token = addr: 0x%016llx\n" "\t trg_nid = addr: 0x%016llx\n" "\t trg_host = addr: 0x%016llx\n" "\t flags = 0x%08x\n" "\t ctoken = addr: 0x%016llx\n" "\t c_ccd = addr: 0x%016llx\n" 405 "" "mpm_start_sec_context [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 406 "" "mpm_start_sec_context [HBA2 MPM]: Attempting to start a security context\n" "\t with: service name: %s\n" "\t service host: %s\n" "\t flags: 0x%08x\n" 407 "" "mpm_start_sec_context [HBA2 MPM]: SEC_F_NO_RESOLVE was not requested - \n" "\t target host originally specified as: %s\n" "\t target host name resolved to: %s\n" 408 "" "mpm_start_sec_context [HBA2 MPM]: security SERVICES token 'magic' bad. The \n" "\t application may have provided a bad pointer, or the security services\n" "\t token data may be corrupted.\n" "\t 'magic' seen: 0x%08x\n" "\t acceptable 'magic' value: 0x%08x\n" 409 "" "mpm_start_sec_context [HBA2 MPM]: security SERVICES token state bad. The \n" "\t application may have provided a bad pointer, or the security services\n" "\t token data may be corrupted, or the application may have ignored a\n" "\t failure in mpm_start/mpm_init.\n" "\t state seen: 0x%08x\n" "\t state mask value checked: 0x%08x\n" 410 "" "mpm_start_sec_context [HBA2 MPM]: security CONTEXT token 'magic' bad. The \n" "\t application may have provided a bad pointer, or the security context\n" "\t token data may be corrupted.\n" "\t 'magic' seen: 0x%08x\n" "\t acceptable 'magic' value: 0x%08x\n" 411 "" "mpm_start_sec_context [HBA2 MPM]: security CONTEXT token state bad. The \n" "\t application may have provided a bad pointer, or the security context\n" "\t token data may be corrupted.\n" "\t state seen: 0x%08x\n" "\t state mask value checked: 0x%08x\n" 412 "" "mpm_start_sec_context [HBA2 MPM]: target host is %s\n" 413 "" "mpm_start_sec_context [HBA2 MPM]: Failure - SEC_F_NO_RESOLVE flag is not\n" "\t supported for host name type of target hosts. SEC_F_NO_RESOLVE is\n" "\t supported only when the target host is specified as an IPv4 or IPv6\n" "\t address.\n" "\t target host indicated by the caller: %s\n" 414 "" "mpm_start_sec_context [HBA2 MPM]: Failure - Cannot resolve intended target\n" "\t host %s.\n" "\t return code from cu_gethostbyname/cu_gethostbyaddr: %d\n" 415 "" "mpm_start_sec_context [HBA2 MPM]: Network identity for intended target\n" "\t service: %s\n" 416 "" "mpm_start_sec_context [HBA2 MPM]: Memory allocation failure\n" "\t Line of code: %d\n" "\t Allocation size: %u bytes\n" 417 "" "[HBA2 MPM]: ---------- Requesting HBA2 Security Context ----------\n" 418 "" " | current application is requesting a service from a provider\n" " | service provider: %s\n" " | security context status flags: 0x%08x\n" " ---------- Requesting HBA2 Security Context ----------\n" 419 "" "mpm_start_sec_context [HBA2 MPM]: Context control data buffer (CCDB)\n" "\t obtained for current process\n" 420 "" "mpm_start_sec_context [HBA2 MPM]: CCDB details:\n" "\t intended for: %s\n" "\t addr: 0x%08x\n" "\t CCDB information follows:\n" 421 "" "mpm_start_sec_context [HBA2 MPM]: CCDB details:\n" "\t intended for: %s\n" "\t addr: 0x%016llx\n" "\t CCDB information follows:\n" 422 "" "mpm_start_sec_context [HBA2 MPM] ended with return value %d\n" 423 "" "mpm_start_sec_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: %d]\n" "\t sec_token = addr: 0x%08x\n" "\t trg_nid = addr: 0x%08x\n" "\t trg_host = addr: 0x%08x\n" "\t flags = 0x%08x\n" "\t ctoken = addr: 0x%08x\n" "\t c_ccd = addr: 0x%08x\n" 424 "" "mpm_start_sec_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: %d]\n" "\t sec_token = addr: 0x%016llx\n" "\t trg_nid = addr: 0x%016llx\n" "\t trg_host = addr: 0x%016llx\n" "\t flags = 0x%08x\n" "\t ctoken = addr: 0x%016llx\n" "\t c_ccd = addr: 0x%016llx\n" 425 "" "hba2_mpm__auth_creds [HBA2 MPM] started\n" 426 "" "hba2_mpm__auth_creds [HBA2 MPM] parameters:\n" "\t flags = 0x%08x\n" "\t a_ccd = addr: 0x%08x\n" "\t r_ccd = addr: 0x%08x\n" "\t ctx = addr: 0x%08x\n" 427 "" "hba2_mpm__auth_creds [HBA2 MPM] parameters:\n" "\t flags = 0x%016llx\n" "\t a_ccd = addr: 0x%016llx\n" "\t r_ccd = addr: 0x%016llx\n" "\t ctx = addr: 0x%016llx\n" 428 "" "hba2_mpm__auth_creds [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 429 "" "hba2_mpm__auth_creds [HBA2 MPM]: Context control data buffer (CCDB) is\n" "\t signed - signature will be verified in a later check.\n" 430 "" "hba2_mpm__auth_creds [HBA2 MPM]: Context control data buffer (CCDB) is\n" "\t not signed\n" 431 "" "hba2_mpm__auth_creds [HBA2 MPM]: Signature on context control data buffer\n" "\t (CCDB) is NOT VALID - forcing the other part to be UNAUTHENTICATED.\n" 432 "" "hba2_mpm__auth_creds [HBA2 MPM]: Signature on context control data buffer\n" "\t is valid.\n" 433 "" "hba2_mpm__auth_creds [HBA2 MPM]: Service request type: %s\n" 434 "" "hba2_mpm__auth_creds [HBA2 MPM]: 'ctcas' service response SEC_S_HOST_ERR\n" "\t [unable to locate entry for client host in the trusted host list].\n" "\t Converting to SEC_S_UNAUTHENTICATED [client is not authentic].\n" 435 "" "hba2_mpm__auth_creds [HBA2 MPM]: Attention: 'ctcas' service response\n" "\t SEC_S_SUCCESS, but no authenticated identity was provided by the\n" "\t 'ctcas' service. Forcing client to be considered not authentic\n" "\t and converting status to SEC_S_UNAUTHENTICATED [client is not\n" "\t authentic].\n" 436 "" "hba2_mpm__auth_creds [HBA2 MPM]: 'ctcas' service considers client to be\n" "\t authentic.\n" "\t authenticated identity: %s\n" 437 "" "hba2_mpm__auth_creds [HBA2 MPM]: 'ctcas' requires more information to\n" "\t authenticate the client.\n" 438 "" "hba2_mpm__auth_creds [HBA2 MPM]: 'ctcas' provided a response CCDB as part\n" "\t of the request, but the caller is not expecting one and provided no\n" "\t address to pass it back. Treating as an internal error and ending.\n" 439 "" "hba2_mpm__auth_creds [HBA2 MPM]: 'ctcas' service provided a response CCDB:\n" "\t addr: 0x%08x\n" "\t length: %d bytes\n" 440 "" "hba2_mpm__auth_creds [HBA2 MPM]: 'ctcas' service provided a response CCDB:\n" "\t addr: 0x%016llx\n" "\t length: %d bytes\n" 441 "" "hba2_mpm__auth_creds [HBA2 MPM]: 'ctcas' did not provide a session key\n" "\t and no session key previously existed for this security context.\n" "\t Setting SEC_S_KEY_ERR and ending.\n" 442 "" "hba2_mpm__auth_creds [HBA2 MPM]: Cannot unmarshall session key provided by\n" "\t the 'ctcas' service. Treating as an authentication failure and ending.\n" "\t sec_unmarshal_typed_key() return code: %d\n" 443 "" "hba2_mpm__auth_creds [HBA2 MPM]: Service provider is unable to support data\n" "\t privacy in this security context. Data privacy service is not\n" "\t available for this context.\n" 444 "" "hba2_mpm__auth_creds [HBA2 MPM]: This security context cannot support data\n" "\t privacy (encryption) services.\n" 445 "" "hba2_mpm__auth_creds [HBA2 MPM]: Session key obtained from 'ctcas' service.\n" "\t Context token status (code 0x%08x) set to indicate session key\n" "\t available.\n" 446 "" "hba2_mpm__auth_creds [HBA2 MPM]: Session key obtained from 'ctcas' service,\n" "\t but the security context already contains a session key according to\n" "\t the context status (code: 0x%08x). Treating as a failure and ending.\n" 447 "" "hba2_mpm__auth_creds [HBA2 MPM] ended with return value %d\n" 448 "" "hba2_mpm__auth_creds [HBA2 MPM] parameters:\n" "\t flags = 0x%08x\n" "\t a_ccd = addr: 0x%08x\n" "\t r_ccd = addr: 0x%08x\n" "\t ctx = addr: 0x%08x\n" 449 "" "hba2_mpm__auth_creds [HBA2 MPM] parameters:\n" "\t flags = 0x%016llx\n" "\t a_ccd = addr: 0x%016llx\n" "\t r_ccd = addr: 0x%016llx\n" "\t ctx = addr: 0x%016llx\n" 450 "" "HBA2_MPM_M_CREATE_CRED_BUFFER [HBA2 MPM]: Memory allocation failure\n" "\t Allocation size: %u bytes\n" "\t Subroutine name: %s\n" 451 "" "HBA2_MPM_M_CREATE_CRED_BUFFER [HBA2 MPM]: Signed CCDB 'wrapper' using the\n" "\t session key available in the security context.\n" 452 "" "mpm_receive_sec_context [HBA2 MPM] started\n" 453 "" "mpm_receive_sec_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x\n" "\t sec_token = addr: 0x%08x\n" "\t c_ccd = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" "\t s_ccd = addr: 0x%08x\n" "\t deleg = addr: 0x%08x\n" 454 "" "mpm_receive_sec_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx\n" "\t sec_token = addr: 0x%016llx\n" "\t c_ccd = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" "\t s_ccd = addr: 0x%016llx\n" "\t deleg = addr: 0x%016llx\n" 455 "" "mpm_receive_sec_context [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 456 "" "mpm_receive_sec_context [HBA2 MPM]: Security services token 'magic' incorrect\n" "\t expected 'magic': 0x%08x\n" "\t detected: 0x%08x\n" 457 "" "mpm_receive_sec_context [HBA2 MPM]: Security services token status incorrect\n" "\t expected status: 0x%08x\n" "\t detected: 0x%08x\n" 458 "" "mpm_receive_sec_context [HBA2 MPM]: Security context token 'magic' incorrect\n" "\t expected 'magic': 0x%08x\n" "\t detected: 0x%08x\n" 459 "" "mpm_receive_sec_context [HBA2 MPM]: Security context token status incorrect\n" "\t expected status flag: 0x%08x or 0x%08x\n" "\t detected flags: 0x%08x\n" 460 "" "mpm_receive_sec_context [HBA2 MPM]: Security context token status is in\n" "\t'complete' state prior to processing the receive function - not valid.\n" "\t 'complete' status flag: 0x%08x\n" "\t detected flags: 0x%08x\n" 461 "" "mpm_receive_sec_context [HBA2 MPM]: Context control data buffer (CCDB) \n" "\t received from client application - 'magic' incorrect\n" "\t expected 'magic': 0x%04x\n" "\t detected: 0x%04x\n" 462 "" "mpm_receive_sec_context [HBA2 MPM]: Setting 'mutual authentication' flag\n" "\t in 'ctcas' subservice request buffer\n" 463 "" "mpm_receive_sec_context [HBA2 MPM]: Setting 'simple authentication' flag\n" "\t in 'ctcas' subservice request buffer\n" 464 "" "mpm_receive_sec_context [HBA2 MPM]: Setting 'use RSCT Node ID' flag\n" "\t in 'ctcas' subservice request buffer - request that authenticated\n" "\t identity uses RSCT Node ID in place of host name or IP address\n" 465 "" "mpm_receive_sec_context [HBA2 MPM]: Request flags to 'ctcas': 0x%08x\n" "mpm_receive_sec_context [HBA2 MPM]: Sending request to 'ctcas' subservice.\n" 466 "" "mpm_receive_sec_context [HBA2 MPM]: 'ctcas' subservice has authenticated\n" "\t the prospective client application identity\n" 467 "" "mpm_receive_sec_context [HBA2 MPM]: Created response CCDB back to client\n" "\t application from information provided by the 'ctcas' subservice\n" 468 "" "mpm_receive_sec_context [HBA2 MPM]: Clearing these status flags in the\n" "\t security context token: %s\n" 469 "" "mpm_receive_sec_context [HBA2 MPM]: Setting these status flags in the\n" "\t security context token: %s\n" 470 "" "mpm_receive_sec_context [HBA2 MPM]: Security context token status now 0x%08x\n" 471 "" "[HBA2 MPM]: ---------- HBA2 Security Context Established ----------\n" 472 "" " | current application is acting as a service provider\n" " | client identity: %s\n" " ---------- HBA2 Security Context Established ----------\n" 473 "" "mpm_receive_sec_context [HBA2 MPM]: Response CCDB obtained for current\n" "\t process\n" 474 "" "mpm_receive_sec_context [HBA2 MPM]: CCDB details:\n" "\t addr: 0x%08x\n" "\t credential information follows:\n" 475 "" "mpm_receive_sec_context [HBA2 MPM]: CCDB details:\n" "\t addr: 0x%016llx\n" "\t credential information follows:\n" 476 "" "[HBA2 MPM]: ===== %s Authentication of Client Application =====\n" 477 "" " | client application identity: %s\n" " | date and time: %s\n" " | (see trace entry timestamp for more precise time)\n" " ===== %s Authentication of Client Application =====\n" 478 "" "mpm_receive_sec_context [HBA2 MPM] ended with return value %d\n" 479 "" "mpm_receive_sec_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t sec_token = addr: 0x%08x\n" "\t c_ccd = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" "\t s_ccd = addr: 0x%08x\n" "\t deleg = addr: 0x%08x [value:0x%08x]\n" 480 "" "mpm_receive_sec_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t sec_token = addr: 0x%016llx\n" "\t c_ccd = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" "\t s_ccd = addr: 0x%016llx\n" "\t deleg = addr: 0x%016llx [value:0x%08x]\n" 481 "" "mpm_complete_sec_context [HBA2 MPM] started\n" 482 "" "mpm_complete_sec_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x\n" "\t s_ccd = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" "\t c_ccd = addr: 0x%08x\n" 483 "" "mpm_complete_sec_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx\n" "\t s_ccd = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" "\t c_ccd = addr: 0x%016llx\n" 484 "" "mpm_complete_sec_context [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 485 "" "mpm_complete_sec_context [HBA2 MPM]: Security context token 'magic' incorrect\n" "\t expected 'magic': 0x%08x\n" "\t detected: 0x%08x\n" 486 "" "mpm_complete_sec_context [HBA2 MPM]: Security context token status not as\n" "\t expected.\n" "\t expected 'magic' indicator: 0x%08x\n or 0x%08x" "\t detected 'magic' value: 0x%08x\n" 487 "" "mpm_complete_sec_context [HBA2 MPM]: Security context token status indicates\n" "\t 'mutual authentication' requested - need to verify identity of responding\n" "\t service and verify responder is the intended target service.\n" 488 "" "mpm_complete_sec_context [HBA2 MPM]: Security context token status indicates\n" "\t 'simple authentication' requested - although underlying subroutines will\n" "\t attempt to authenticate the responding service, the application does not\n" "\t care who responds, so the identity of the responding service will be\n" "\t ignored.\n" 489 "" "mpm_complete_sec_context [HBA2 MPM]: Ignoring authenticted identity of the\n" "\t responding service (because client application did not care about the\n" "\t authenticity of the target service).\n" 490 "" "mpm_complete_sec_context [HBA2 MPM]: Context control data buffer (CCDB)\n" "\t from service application format error - 'magic' not as expected\n" "\t expected 'magic': 0x%08x\n" "\t detected: 0x%08x\n" 491 "" "mpm_complete_sec_context [HBA2 MPM]: 'mutual authentication' flag\n" "\t detected in existing security context\n" 492 "" "mpm_complete_sec_context [HBA2 MPM]: 'simple authentication' flag\n" "\t detected in existing security context\n" 493 "" "mpm_complete_sec_context [HBA2 MPM]: 'use RSCT Node ID' flag\n" "\t detected in existing security context\n" 494 "" "mpm_complete_sec_context [HBA2 MPM]: Request flags for 'ctcas': 0x%08x\n" 495 "" "mpm_complete_sec_context [HBA2 MPM]: Clearing these status flags in the\n" "\t security context token: %s\n" 496 "" "mpm_complete_sec_context [HBA2 MPM]: Setting these status flags in the\n" "\t security context token: %s\n" 497 "" "mpm_complete_sec_context [HBA2 MPM]: Security context token status now 0x%08x\n" 498 "" "[HBA2 MPM]: ---------- HBA2 Security Context Established ----------\n" 499 "" " | current application is acting as a service requestor\n" " | service provider: %s\n" " | service provider identity %s been verified (per appl. request)\n" " ---------- HBA2 Security Context Established ----------\n" 500 "" "[HBA2 MPM]: ===== %s Authentication of Service Application =====\n" 501 "" " | service application identity: %s\n" " | date and time: %s\n" " | (see trace entry timestamp for more precise time)\n" " ===== %s Authentication of Service Application =====\n" 502 "" "mpm_complete_sec_context [HBA2 MPM] ended with return value %d\n" 503 "" "mpm_complete_sec_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%08x [value: 0x%08x]\n" "\t s_ccd = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" "\t c_ccd = addr: 0x%08x\n" 504 "" "mpm_complete_sec_context [HBA2 MPM] parameters:\n" "\t min_stat = addr: 0x%016llx [value: 0x%08x]\n" "\t s_ccd = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" "\t c_ccd = addr: 0x%016llx\n" 505 "" "hba2_mpm__comp_authid_to_intended [HBA2 MPM] started\n" 506 "" "hba2_mpm__comp_authid_to_intended [HBA2 MPM] parameters:\n" "\t ctx = addr: 0x%08x\n" 507 "" "hba2_mpm__comp_authid_to_intended [HBA2 MPM] parameters:\n" "\t ctx = addr: 0x%016llx\n" 508 "" "hba2_mpm__comp_authid_to_intended [HBA2 MPM]: ensuring the intended target\n" "\t service application identity matches the identity of the responding\n" "\t service application [already authenticated by 'ctcas' service]:\n" "\t authenticated identity of responder: %s\n" "\t identity of intended target service: %s\n" 509 "" "hba2_mpm__comp_authid_to_intended [HBA2 MPM]: Identity not in acceptable\n" "\t format - expecting @ format for identity.\n" "\t identity being processed: %s\n" "\t identity value: %s\n" 510 "" "hba2_mpm__comp_authid_to_intended [HBA2 MPM]: Authenticated idetity of\n" "\t responding service application does not match identity of the\n" "\t intended target service [%s portion mismatch] -\n" "\t forcing SEC_S_AUTHENT_ERR condition\n" 511 "" "hba2_mpm__comp_authid_to_intended [HBA2 MPM]: Authenticated identity of\n" "\t responding service application matches identity of the intended\n" "\t target service - OK\n" 512 "" "hba2_mpm__comp_authid_to_intended [HBA2 MPM]: Details:\n" "\t authenticated identity of responder: %s\n" "\t identity of intended target service: %s\n" 513 "" "hba2_mpm__comp_authid_to_intended [HBA2 MPM] ended with return value %d\n" 514 "" "hba2_mpm__comp_authid_to_intended [HBA2 MPM] parameters:\n" "\t ctx = addr: 0x%08x\n" 515 "" "hba2_mpm__comp_authid_to_intended [HBA2 MPM] parameters:\n" "\t ctx = addr: 0x%016llx\n" 516 "" "hba2_mpm__alloc_secctx_token [HBA2 MPM] started\n" 517 "" "hba2_mpm__alloc_secctx_token [HBA2 MPM] parameters:\n" "\t svc_token = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" 518 "" "hba2_mpm__alloc_secctx_token [HBA2 MPM] parameters:\n" "\t svc_token = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" 519 "" "hba2_mpm__alloc_secctx_token [HBA2 MPM]: failure at line %d:\n" "\t invalid parameter detected\n" "\t parameter position: %d\n" 520 "" "hba2_mpm__alloc_secctx_token [HBA2 MPM]: Security context token allocated\n" "\t addr: 0x%08x\n" 521 "" "hba2_mpm__alloc_secctx_token [HBA2 MPM]: Security context token allocated\n" "\t addr: 0x%016llx\n" 522 "" "hba2_mpm__alloc_secctx_token [HBA2 MPM]: Security context token status\n" "\t set to '%s' state.\n" 523 "" "hba2_mpm__alloc_secctx_token [HBA2 MPM] ended with return value %d\n" 524 "" "hba2_mpm__alloc_secctx_token [HBA2 MPM] parameters:\n" "\t svc_token = addr: 0x%08x\n" "\t ctoken = addr: 0x%08x\n" 525 "" "hba2_mpm__alloc_secctx_token [HBA2 MPM] parameters:\n" "\t svc_token = addr: 0x%016llx\n" "\t ctoken = addr: 0x%016llx\n" 526 "" "hba2_mpm__release_secctx_token [HBA2 MPM] started\n" 527 "" "hba2_mpm__release_secctx_token [HBA2 MPM] parameters:\n" "\t ctoken = addr: 0x%08x\n" 528 "" "hba2_mpm__release_secctx_token [HBA2 MPM] parameters:\n" "\t ctoken = addr: 0x%016llx\n" 529 "" "hba2_mpm__release_secctx_token [HBA2 MPM]: Bad 'magic' detected in token,\n" "\t not sure of the proper way to free this memory area! Returning to\n" "\t caller.\n" "\t 'magic' codes expected: 0x%08x or 0x%08x\n" "\t 'magic' code detected: 0x%08x\n" 530 "" "hba2_mpm__release_secctx_token [HBA2 MPM]: %s token released\n" "\t addr: 0x%08x\n" 531 "" "hba2_mpm__release_secctx_token [HBA2 MPM]: %s token released\n" "\t addr: 0x%016llx\n" 532 "" "hba2_mpm__release_secctx_token [HBA2 MPM] ended [void function, no return\n" "\t value]\n" 533 "" "hba2_mpm__release_secctx_token [HBA2 MPM] parameters:\n" "\t ctoken = addr: 0x%08x\n" 534 "" "hba2_mpm__release_secctx_token [HBA2 MPM] parameters:\n" "\t ctoken = addr: 0x%016llx\n"