backupandrestore/backupengine/src/sbedataowner.cpp
changeset 47 63cf70d3ecd8
parent 33 883e91c086aa
child 52 866b4af7ffbe
--- a/backupandrestore/backupengine/src/sbedataowner.cpp	Thu Sep 02 21:21:26 2010 +0300
+++ b/backupandrestore/backupengine/src/sbedataowner.cpp	Fri Sep 17 08:34:51 2010 +0300
@@ -23,9 +23,13 @@
 #include "sbedataowner.h"
 #include "abserver.h"
 #include "sbtypes.h"
-#include "sblog.h"
 #include "sbeparserdefs.h"
 #include "sbepanic.h"
+#include "OstTraceDefinitions.h"
+#include "sbtrace.h"
+#ifdef OST_TRACE_COMPILER_IN_USE
+#include "sbedataownerTraces.h"
+#endif
 
 namespace conn
 	{	
@@ -47,9 +51,11 @@
 	
 	void CleanupRPointerArray(TAny* aPtr)
 		{
+		OstTraceFunctionEntry0( _CONN_CLEANUPRPOINTERARRAY_ENTRY );
 		RPointerArray<CBase>* array = static_cast<RPointerArray<CBase>*>(aPtr);
 		array->ResetAndDestroy();
 		delete array;
+		OstTraceFunctionExit0( _CONN_CLEANUPRPOINTERARRAY_EXIT );
 		}
 	
 	// CSelection //
@@ -64,9 +70,11 @@
 	*/
 	CSelection* CSelection::NewLC(TSelectionType aType, const TDesC& aSelection)
 		{
+		OstTraceFunctionEntry0( CSELECTION_NEWLC_ENTRY );
 		CSelection* self = new (ELeave) CSelection(aType);
 		CleanupStack::PushL(self);
 		self->ConstructL(aSelection);
+		OstTraceFunctionExit0( CSELECTION_NEWLC_EXIT );
 		return self;
 		}
 	
@@ -75,7 +83,9 @@
 	*/
 	CSelection::~CSelection()
 		{
+		OstTraceFunctionEntry0( CSELECTION_CSELECTION_DES_ENTRY );
 		delete iSelection;
+		OstTraceFunctionExit0( CSELECTION_CSELECTION_DES_EXIT );
 		}
 	
 	/**
@@ -83,6 +93,8 @@
 	*/
 	CSelection::CSelection(TSelectionType aType) : iType(aType)
 		{
+		OstTraceFunctionEntry0( CSELECTION_CSELECTION_CONS_ENTRY );
+		OstTraceFunctionExit0( CSELECTION_CSELECTION_CONS_EXIT );
 		}
 		
 	/**
@@ -90,7 +102,9 @@
 	*/
 	void CSelection::ConstructL(const TDesC& aSelection)
 		{
+		OstTraceFunctionEntry0( CSELECTION_CONSTRUCTL_ENTRY );
 		iSelection = aSelection.AllocL();
+		OstTraceFunctionExit0( CSELECTION_CONSTRUCTL_EXIT );
 		}
 	
 	/**
@@ -123,9 +137,11 @@
 	@return a CDataOwner object
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_NEWL_ENTRY );
 		CDataOwner* self = CDataOwner::NewLC(aSID, apDataOwnerManager);
 		CleanupStack::Pop(self);
 
+		OstTraceFunctionExit0( CDATAOWNER_NEWL_EXIT );
 		return self;
 		}
 
@@ -137,11 +153,13 @@
 	@return a CDataOwner object
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_NEWLC_ENTRY );
 		CDataOwner* self = new(ELeave) CDataOwner(aSID, apDataOwnerManager);
 		CleanupStack::PushL(self);
 
 		self->ConstructL();
 		
+		OstTraceFunctionExit0( CDATAOWNER_NEWLC_EXIT );
 		return self;
 		}
 
@@ -156,23 +174,28 @@
 	@param apDataOwnerManager data owner manager to access resources
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_CDATAOWNER_CONS_ENTRY );
+		OstTraceFunctionExit0( CDATAOWNER_CDATAOWNER_CONS_EXIT );
 		}
 		
 	void CDataOwner::ConstructL()
 	/** Symbian 2nd stage constructor */
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_CONSTRUCTL_ENTRY );
 		iRegistrationFiles = new (ELeave) CDesCArrayFlat(KDesCArrayGranularity);
 		iPrivatePath = HBufC::NewL(0);
 		iProxyInformationArray.Reset();
 		iPublicDirStack.Reset();
 		iPublicDirNameStack.Reset();
 		iPublicExcludes.Reset();
+		OstTraceFunctionExit0( CDATAOWNER_CONSTRUCTL_EXIT );
 		}
 
 	CDataOwner::~CDataOwner()
 	/** Standard C++ destructor
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_CDATAOWNER_DES_ENTRY );
 		// Close the RArrays
 		iProxyInformationArray.Close();
 		iStateByDrive.Close();
@@ -199,6 +222,7 @@
 		delete iBufferSnapshotReader;
 		delete iTempSnapshotHolder;
 		delete iRegistrationFiles;
+		OstTraceFunctionExit0( CDATAOWNER_CDATAOWNER_DES_EXIT );
 		}
 
 	void CDataOwner::AddRegistrationFilesL(const TDesC& aFileName)
@@ -209,7 +233,9 @@
 	@param aFileName the filename of the 
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_ADDREGISTRATIONFILESL_ENTRY );
 		iRegistrationFiles->AppendL(aFileName);
+		OstTraceFunctionExit0( CDATAOWNER_ADDREGISTRATIONFILESL_EXIT );
 		}
 		
 	void CDataOwner::StartProcessIfNecessaryL()
@@ -217,6 +243,7 @@
 	Start the active process
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_STARTPROCESSIFNECESSARYL_ENTRY );
 		// Do we need to check that the process is started?
 		if (iActiveInformation.iSupported && iActiveInformation.iActiveDataOwner)
 			{
@@ -233,15 +260,15 @@
 					if (process.SecureId() == iSecureId)
 						{
 						// Process already exists - see if it's previuosly connected and has a current session
-						__LOG1("Process %S already exists - not starting", &processName);
+					    OstTraceExt1(TRACE_NORMAL, CDATAOWNER_STARTPROCESSIFNECESSARYL, "Process %S already exists - not starting", processName);
 						TRAPD(err, iStatus = ipDataOwnerManager->ABServer().SessionReadyStateL(iSecureId));
 						if (err == KErrNone)
 							{
-							__LOG2("Existing session for process %S has status %d", &processName, iStatus);
+						    OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_STARTPROCESSIFNECESSARYL, "Existing session for process %S has status %d", processName, iStatus);
 							} // if
 						else
 							{
-							__LOG1("Existing process %S hasn't yet connected to a session", &processName);
+						    OstTraceExt1(TRACE_NORMAL, DUP2_CDATAOWNER_STARTPROCESSIFNECESSARYL, "Existing process %S hasn't yet connected to a session", processName);
 							iStatus = EDataOwnerNotConnected;//ReadyState only check session state when this status not equal to 'EDataOwnerReadyNoImpl' and 'EDataOwnerReady' 
 							} // else
 						
@@ -262,18 +289,19 @@
 				TInt createErr = process.Create(iActiveInformation.iProcessName, KNullDesC, uidType);
 				if (createErr != KErrNone)
 					{
-					__LOG2("Process %S failed to start(%d)", &iActiveInformation.iProcessName, createErr);
+				    OstTraceExt2(TRACE_NORMAL, DUP3_CDATAOWNER_STARTPROCESSIFNECESSARYL, "Process %S failed to start(%d)", iActiveInformation.iProcessName, createErr);
 					iStatus = EDataOwnerFailed;
 					} // if
 				else
 					{
-					__LOG1("Process %S started.", &iActiveInformation.iProcessName);
+				    OstTraceExt1(TRACE_NORMAL, DUP4_CDATAOWNER_STARTPROCESSIFNECESSARYL, "Process %S started.", iActiveInformation.iProcessName);
 					process.Resume();
 					} // else
 					
 				CleanupStack::PopAndDestroy(&process);
 				} // if
 			} // if
+		OstTraceFunctionExit0( CDATAOWNER_STARTPROCESSIFNECESSARYL_EXIT );
 		}
 		
 
@@ -283,6 +311,7 @@
 	@leave KErrGeneral data owner has no primary registration file
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_PARSEFILESL_ENTRY );
 		if (!iFilesParsed)
 			{
 			TUint count = iRegistrationFiles->Count();
@@ -300,15 +329,15 @@
 
 				// Parse file
 
-				__LOG2("CDataOwner::ParseFilesL() - [0x%08x] - parsing reg file: %S...", iSecureId.iId, &fileName);
+				OstTraceExt2(TRACE_NORMAL, CDATAOWNER_PARSEFILESL, "[0x%08x] - parsing reg file: %S...", iSecureId.iId, fileName);
 				TRAPD(err, ParseFileL(fileName));
 				if	(err == KErrNone)
 					{
-					__LOG1("CDataOwner::ParseFilesL() - [0x%08x] - ...file parsed okay", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_PARSEFILESL, "[0x%08x] - ...file parsed okay", iSecureId.iId);
 					}
 				else
 					{
-					__LOG2("CDataOwner::ParseFilesL() - [0x%08x] - ...*** PARSING FAILED *** - error: %d", iSecureId.iId, err);
+				    OstTraceExt2(TRACE_ERROR, DUP2_CDATAOWNER_PARSEFILESL, "[0x%08x] - ...*** PARSING FAILED *** - error: %d", iSecureId.iId, static_cast<TInt32>(err));
 					User::Leave(err);
 					}
 				
@@ -321,6 +350,7 @@
 			// Check that a primary file was found, as there must be one	
 			if (!foundPrimaryFile)
 				{
+			    OstTrace0(TRACE_ERROR, DUP3_CDATAOWNER_PARSEFILESL, "Leave: KErrGeneral");
 				User::Leave(KErrGeneral);
 				} // if
 			
@@ -331,6 +361,7 @@
 			{
 			iStatus = EDataOwnerReady;
 			}
+ 		OstTraceFunctionExit0( CDATAOWNER_PARSEFILESL_EXIT );
  		}
 		
 	void CDataOwner::GetExpectedDataSizeL(TTransferDataType aTransferType,
@@ -343,12 +374,13 @@
 	@leave KErrNotReady the snapshot has not been set
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_GETEXPECTEDDATASIZEL_ENTRY );
 		aSize = 0;
 		switch (aTransferType)
 			{
 		case EPassiveSnapshotData:
 			{
-			__LOG1("CDataOwner::GetExpectedDataSizeL() - START - EPassiveSnapshotData - aDriveNumber: %c", aDriveNumber + 'A');
+			OstTraceExt1(TRACE_NORMAL, CDATAOWNER_GETEXPECTEDDATASIZEL, "EPassiveSnapshotData - aDriveNumber: %c", aDriveNumber + 'A');
 
             CDesCArray* files = new(ELeave) CDesC16ArrayFlat(KDesCArrayGranularity);
             CleanupStack::PushL(files);
@@ -360,7 +392,7 @@
 			
 			TUint count = files->Count();
 			aSize = count * sizeof(TSnapshot);
-            __LOG2("CDataOwner::GetExpectedDataSizeL() - passive snapshot count: %d, expected size: %d", count, aSize);
+			OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_GETEXPECTEDDATASIZEL, "passive snapshot count: %d, expected size: %d", count, aSize);
 			
 			CleanupStack::PopAndDestroy(files);
 			break;
@@ -368,7 +400,7 @@
 		case EPassiveBaseData:
 		case EPassiveIncrementalData:
 			{
-			__LOG1("CDataOwner::GetExpectedDataSizeL() - START - EPassiveBaseData/EPassiveIncrementalData - aDriveNumber: %c", aDriveNumber + 'A');
+			OstTraceExt1(TRACE_NORMAL, DUP2_CDATAOWNER_GETEXPECTEDDATASIZEL, "EPassiveBaseData/EPassiveIncrementalData - aDriveNumber: %c", aDriveNumber + 'A');
 
             RFileArray files;
 			CleanupClosePushL(files);
@@ -376,7 +408,7 @@
 			// Find all the files
 			if (aTransferType == EPassiveBaseData)
 				{
-	            __LOG("CDataOwner::GetExpectedDataSizeL() - EPassiveBaseData");
+			    OstTrace0(TRACE_NORMAL, DUP3_CDATAOWNER_GETEXPECTEDDATASIZEL, "EPassiveBaseData");
 				BuildFileListL(iPassiveSelections, aDriveNumber, aTransferType, EFalse, NULL, &files, NULL);
 				
 				// Do we need to add the DBMS file?
@@ -384,7 +416,7 @@
 				} // if
 			else
 				{
-	            __LOG("CDataOwner::GetExpectedDataSizeL() - EPassiveIncrementalData");
+			    OstTrace0(TRACE_NORMAL, DUP4_CDATAOWNER_GETEXPECTEDDATASIZEL, "EPassiveIncrementalData");
 
 				// Do we have a snapshot?
 				const TUint count = iSnapshots.Count();
@@ -405,13 +437,13 @@
 			
 			// Calculate the expected data size
 			const TUint count = files.Count();
-	        __LOG1("CDataOwner::GetExpectedDataSizeL() - passive file count: %d", count);
+			OstTrace1(TRACE_NORMAL, DUP5_CDATAOWNER_GETEXPECTEDDATASIZEL, "passive file count: %d", count);
 			aSize = (count * sizeof(TFileFixedHeader));
 			for (TInt x = 0; x < count; x++)
 				{
                 const TEntry& fileEntry = files[x];
                 const TInt fileSize = fileEntry.iSize;
-                __LOG2("CDataOwner::GetExpectedDataSizeL() - passive file: %S, size: %d", &fileEntry.iName, fileSize);
+                OstTraceExt2(TRACE_NORMAL, DUP6_CDATAOWNER_GETEXPECTEDDATASIZEL, "passive file: %S, size: %d", fileEntry.iName, fileSize);
 
 				aSize += fileEntry.iName.Length();
 				aSize += fileSize;
@@ -422,7 +454,7 @@
 		case EActiveBaseData:
 		case EActiveIncrementalData:
 			{
-			__LOG1("CDataOwner::GetExpectedDataSizeL() - START - EActiveBaseData/EActiveIncrementalData - aDriveNumber: %c", aDriveNumber + 'A');
+			OstTraceExt1(TRACE_NORMAL, DUP7_CDATAOWNER_GETEXPECTEDDATASIZEL, "EActiveBaseData/EActiveIncrementalData - aDriveNumber: %c", aDriveNumber + 'A');
 			// Only request expected data size if it's for this data owner, not the proxies
 			if (iActiveInformation.iSupported && iActiveInformation.iActiveDataOwner && (iActiveInformation.iActiveType != EProxyImpOnly))
 				{
@@ -431,21 +463,22 @@
 			else
 				{
 				aSize = 0;
-                __LOG1("CDataOwner::GetExpectedDataSizeL() - ACTIVE BASE - DO 0x%08x is PROXY, so setting size to 0!", iSecureId.iId);
+				OstTrace1(TRACE_NORMAL, DUP8_CDATAOWNER_GETEXPECTEDDATASIZEL, "ACTIVE BASE - DO 0x%08x is PROXY, so setting size to 0!", iSecureId.iId);
 				}
 				
 			} break;
 		case EActiveSnapshotData:
 			{
-			__LOG1("CDataOwner::GetExpectedDataSizeL() - START - EActiveSnapshotData - aDriveNumber: %c", aDriveNumber + 'A');
+			OstTraceExt1(TRACE_NORMAL, DUP9_CDATAOWNER_GETEXPECTEDDATASIZEL, "EActiveSnapshotData - aDriveNumber: %c", aDriveNumber + 'A');
 			aSize = 0;		// ABClient M class doesn't provide retrieval of snapshot data size
 			} break;
 		default:
-			__LOG1("CDataOwner::GetExpectedDataSizeL() - START - ERROR - UNSUPPORTED TYPE! => KErrNotSupported - aDriveNumber: %c", aDriveNumber + 'A');
+		    OstTraceExt1(TRACE_ERROR, DUP10_CDATAOWNER_GETEXPECTEDDATASIZEL, "ERROR - UNSUPPORTED TYPE! => KErrNotSupported - aDriveNumber: %c", aDriveNumber + 'A');
 			User::Leave(KErrNotSupported);
 			} // switch
 
-		__LOG2("CDataOwner::GetExpectedDataSizeL() - END - size is: %d, data owner 0x%08x", aSize, iSecureId.iId);
+		OstTraceExt2(TRACE_NORMAL, DUP11_CDATAOWNER_GETEXPECTEDDATASIZEL, "size is: %d, data owner 0x%08x", static_cast<TUint32>(aSize), iSecureId.iId);
+		OstTraceFunctionExit0( CDATAOWNER_GETEXPECTEDDATASIZEL_EXIT );
 		}
 
 
@@ -457,7 +490,9 @@
 	@param aFiles on return a list of public files
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_GETPUBLICFILELISTL_ENTRY );
 		BuildFileListL(iPublicSelections, aDriveNumber, EPassiveBaseData, ETrue, NULL, &aFiles, NULL);
+		OstTraceFunctionExit0( CDATAOWNER_GETPUBLICFILELISTL_EXIT );
 		}
 		
 	
@@ -469,9 +504,11 @@
 	@param aRestoreFileFilter on return the file filter
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_GETRAWPUBLICFILELISTL_ENTRY );
 		// Convert drive number to letter
 		TChar drive;
-		User::LeaveIfError(ipDataOwnerManager->GetRFs().DriveToChar(aDriveNumber, drive));
+		TInt err = ipDataOwnerManager->GetRFs().DriveToChar(aDriveNumber, drive);
+		LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, CDATAOWNER_GETRAWPUBLICFILELISTL, "Leave: %d", err));
 		
 		const TUint count = iPublicSelections.Count();
 		for (TInt x = 0; x < count; x++)
@@ -513,6 +550,7 @@
 					aRestoreFileFilter.AppendL(TRestoreFileFilter(include, filename));
 					} // if
 			} // for x
+		OstTraceFunctionExit0( CDATAOWNER_GETRAWPUBLICFILELISTL_EXIT );
 		}
 		
 	void CDataOwner::ProcessSupplyDataL(TDriveNumber aDriveNumber, TTransferDataType aTransferType, 
@@ -528,19 +566,20 @@
 	@leave KErrCorrupt If commands have been issued that violate the allowed sequence
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_PROCESSSUPPLYDATAL_ENTRY );
 		TBURPartType burType = ipDataOwnerManager->BURType();
-        __LOG2("CDataOwner::ProcessSupplyDataL() - START - drive: %c, aTransferType: %d", aDriveNumber + 'A', aTransferType);
+		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_PROCESSSUPPLYDATAL, "drive: %c, aTransferType: %d", aDriveNumber + 'A', aTransferType);
 		
 
 		switch (aTransferType)
 			{
 			case EPassiveSnapshotData:
 				{
-				__LOG1("CDataOwner::ProcessSupplyDataL() - Supplying passive snapshot data to data owner with SID 0x%08x", iSecureId.iId);
+				OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying passive snapshot data to data owner with SID 0x%08x", iSecureId.iId);
 				// Check that no passive data has been received for a data owner that doesn't support it
 				if (!iPassiveInformation.iSupported)
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Passive restore has been requested but isn't supported");
+				    OstTrace0(TRACE_ERROR, DUP2_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Passive restore has been requested but isn't supported");
 					User::Leave(KErrCorrupt);
 					}
 				
@@ -549,14 +588,14 @@
 					(StateByDriveL(aDriveNumber).iPassiveBaseDataRequested || 
 					 StateByDriveL(aDriveNumber).iPassiveIncDataRequested))
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Snapshot has been supplied after data has been requested");
+				    OstTrace0(TRACE_ERROR, DUP3_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Snapshot has been supplied after data has been requested");
 					User::Leave(KErrCorrupt);
 					}
 					
 				// Check that no snapshot is supplied for a data owner expecting base backup
 				if (iPassiveInformation.iBaseBackupOnly)
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Snapshot data has been supplied for a base data owner");
+				    OstTrace0(TRACE_ERROR, DUP4_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Snapshot data has been supplied for a base data owner");
 					User::Leave(KErrCorrupt);
 					}
 					
@@ -565,7 +604,7 @@
 					&& (StateByDriveL(aDriveNumber).iPassiveBaseDataReceived || 
 					    StateByDriveL(aDriveNumber).iPassiveIncDataReceived))
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Snapshot has been supplied after restore data has been supplied");
+				    OstTrace0(TRACE_ERROR, DUP5_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Snapshot has been supplied after restore data has been supplied");
 					User::Leave(KErrCorrupt);
 					}
   				
@@ -582,45 +621,45 @@
 				{
 				if (aTransferType == EPassiveBaseData)
 					{
-					__LOG1("CDataOwner::ProcessSupplyDataL() - Supplying passive base data to data owner with SID 0x%08x", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP6_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying passive base data to data owner with SID 0x%08x", iSecureId.iId);
 					}
 				else if (aTransferType == EPassiveIncrementalData)
 					{
-					__LOG1("CDataOwner::ProcessSupplyDataL() - Supplying passive inc data to data owner with SID 0x%08x", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP7_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying passive inc data to data owner with SID 0x%08x", iSecureId.iId);
 					}
 				
 				// Check that no passive data has been received for a data owner that doesn't support it
 				if (!iPassiveInformation.iSupported)
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Passive restore data has been supplied but isn't supported");
+				    OstTrace0(TRACE_ERROR, DUP8_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Passive restore data has been supplied but isn't supported");
 					User::Leave(KErrCorrupt);
 					}
 
 				// Check that no incremental data has been received for a SID that doesn't support it
 				if (iPassiveInformation.iBaseBackupOnly && (aTransferType == EPassiveIncrementalData))
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Incremental restore data has been received for a base only data owner");
+				    OstTrace0(TRACE_ERROR, DUP9_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Incremental restore data has been received for a base only data owner");
 					User::Leave(KErrCorrupt);
 					}
 					
 				// Passive Base data should only have been provided once for a SID
 				if ((aTransferType == EPassiveBaseData) && StateByDriveL(aDriveNumber).iPassiveBaseDataReceived)
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Data is being restored more than once to a DO");
+				    OstTrace0(TRACE_ERROR, DUP10_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Data is being restored more than once to a DO");
 					User::Leave(KErrCorrupt);
 					}
 				
 				// A snapshot should already have been supplied if we're incremental
 				if (!StateByDriveL(aDriveNumber).iPassiveSnapshotReceived && (aTransferType == EPassiveIncrementalData))
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Snapshot has not yet been supplied and should have whether we're base or inc");
+				    OstTrace0(TRACE_ERROR, DUP11_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Snapshot has not yet been supplied and should have whether we're base or inc");
 					User::Leave(KErrCorrupt);
 					}
 				
 				// If incremental data is being supplied, then base data must already have been supplied
 				if ((aTransferType == EPassiveIncrementalData) && !StateByDriveL(aDriveNumber).iPassiveBaseDataReceived)
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Incremental data supplied before base data");
+				    OstTrace0(TRACE_ERROR, DUP12_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Incremental data supplied before base data");
 					User::Leave(KErrCorrupt);
 					}
 				
@@ -639,33 +678,33 @@
 				}
 			case EActiveSnapshotData:
 				{
-				__LOG1("CDataOwner::ProcessSupplyDataL() - Supplying active snapshot data to data owner with SID 0x%08x", iSecureId.iId);
+				OstTrace1(TRACE_NORMAL, DUP13_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying active snapshot data to data owner with SID 0x%08x", iSecureId.iId);
 				
 				// Check that no active data has been received for a data owner that doesn't support it
 				if (!iActiveInformation.iSupported)
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Active snapshot data has been supplied for a DO that doesn't support it");
+				    OstTrace0(TRACE_ERROR, DUP14_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Active snapshot data has been supplied for a DO that doesn't support it");
 					User::Leave(KErrCorrupt);
 					}
 
 				// Check that no active data has been received for a data owner that doesn't support it
 				if (!iActiveInformation.iSupportsIncremental)
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Active snapshot data has been supplied for a base only Data Owner");
+				    OstTrace0(TRACE_ERROR, DUP15_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Active snapshot data has been supplied for a base only Data Owner");
 					User::Leave(KErrCorrupt);
 					}
 				
 				// Check that no snapshot is supplied after backup data has been requested during a backup
 				if (((burType == EBURBackupFull) || (burType == EBURBackupPartial)) && StateByDriveL(aDriveNumber).iActiveBaseDataRequested)
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Active snapshot has been supplied after backup data has been requested");
+				    OstTrace0(TRACE_ERROR, DUP16_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Active snapshot has been supplied after backup data has been requested");
 					User::Leave(KErrCorrupt);
 					}
 					
 				// Check that no snapshot data is provided after backup data has been supplied during a restore
 				if (((burType == EBURRestorePartial) || (burType == EBURRestoreFull)) && StateByDriveL(aDriveNumber).iActiveBaseDataReceived)
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Active snapshot data has been supplied after restore data");
+				    OstTrace0(TRACE_ERROR, DUP17_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Active snapshot data has been supplied after restore data");
 					User::Leave(KErrCorrupt);
 					}
 
@@ -682,11 +721,11 @@
 				{
 				if (aTransferType == EActiveBaseData)
 					{
-					__LOG1("CDataOwner::ProcessSupplyDataL() - Supplying active base data to data owner with SID 0x%08x", iSecureId.iId);					
+				    OstTrace1(TRACE_NORMAL, DUP18_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying active base data to data owner with SID 0x%08x", iSecureId.iId);					
 					}
 				else if (aTransferType == EActiveIncrementalData)
 					{
-					__LOG1("CDataOwner::ProcessSupplyDataL() - Supplying active incremental data to data owner with SID 0x%08x", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP19_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying active incremental data to data owner with SID 0x%08x", iSecureId.iId);
 					}
 				
 				const TUint supportedProxyCount = iProxyInformationArray.Count();
@@ -699,14 +738,14 @@
 					TInt proxyCountCheck = 0;
 					UnpackTypeAdvance(proxyCountCheck, aBuffer, offset);
 					StateByDriveL(aDriveNumber).iFirstActiveTransaction = EFalse;
-					__LOG1("CDataOwner::ProcessSupplyDataL() - Proxy Info : Unpacked TotalProxyCount = %d", proxyCountCheck);
+					OstTrace1(TRACE_NORMAL, DUP20_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : Unpacked TotalProxyCount = %d", proxyCountCheck);
 
 					// If the backup stream specifies a different number of proxy's to the registration file,
 					// then we're looking at different reg file versions. This isn't supported as far as proxy's
 					// are concerned
 					if (supportedProxyCount != proxyCountCheck)
 						{
-						__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Number of proxies supported (reg file) differs from backed up data");
+					    OstTrace0(TRACE_ERROR, DUP21_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Number of proxies supported (reg file) differs from backed up data");
 						User::Leave(KErrCorrupt);
 						}
 
@@ -714,7 +753,7 @@
 					if ((!iActiveInformation.iSupported) && (supportedProxyCount == 0))
 						{
 						// No proxies or active data 
-						__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Active data has been received but this DO doesn't support Active/Proxies");
+					    OstTrace0(TRACE_ERROR, DUP22_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Active data has been received but this DO doesn't support Active/Proxies");
 						User::Leave(KErrCorrupt);
 						}
 						
@@ -732,30 +771,31 @@
 						}
 					}
 
-				__LOG1("CDataOwner::ProcessSupplyDataL() - Supplying active base data of size = %D", aBuffer.Length());
+				OstTrace1(TRACE_NORMAL, DUP23_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying active base data of size = %d", aBuffer.Length());
 				
 				// Restore the proxy data first
 				TBool currentBufferConsumed = EFalse;  
 				while ( (iCurrentProxy < supportedProxyCount) && (!currentBufferConsumed))
 					{
-					__LOG2("CDataOwner::ProcessSupplyDataL() - Proxy Info : Unpacking proxy info %d of %d", iCurrentProxy + 1, supportedProxyCount);
+				    OstTraceExt2(TRACE_NORMAL, DUP24_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : Unpacking proxy info %d of %d", iCurrentProxy + 1, supportedProxyCount);
 					
 					// Unpack the proxy's finished flag, len and sid if we are handling the proxy for the first time
 					if ( iProxyInformationArray[iCurrentProxy].iDataSupplied == 0)
 						{						
 						UnpackTypeAdvance(iProxyInformationArray[iCurrentProxy].iOpInProgress, aBuffer, offset);						
-						__LOG1("CDataOwner::ProcessSupplyDataL() - Proxy Info : FinishedFlag = %d", iProxyInformationArray[iCurrentProxy].iOpInProgress);												
+						OstTrace1(TRACE_NORMAL, DUP25_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : FinishedFlag = %d", iProxyInformationArray[iCurrentProxy].iOpInProgress);												
 						UnpackTypeAdvance(iProxyInformationArray[iCurrentProxy].iDataRequested, aBuffer, offset);						
-						__LOG1("CDataOwner::ProcessSupplyDataL() - Proxy Info : ProxyDataStreamLength = %d", iProxyInformationArray[iCurrentProxy].iDataRequested);
+						OstTrace1(TRACE_NORMAL, DUP26_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : ProxyDataStreamLength = %d", iProxyInformationArray[iCurrentProxy].iDataRequested);
 						TSecureId 	proxySecureId;
 						UnpackTypeAdvance(proxySecureId, aBuffer, offset);
 						
 						if ( iProxyInformationArray[iCurrentProxy].iSecureId.iId != proxySecureId.iId )
 							{
+						    OstTrace0(TRACE_ERROR, DUP38_CDATAOWNER_PROCESSSUPPLYDATAL, "Leave: KErrCorrupt");
 							User::Leave(KErrCorrupt);
 							}
 							
-						__LOG1("CDataOwner::ProcessSupplyDataL() - Proxy Info : ProxySID = 0x%08x", proxySecureId.iId);
+						OstTrace1(TRACE_NORMAL, DUP27_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : ProxySID = 0x%08x", proxySecureId.iId);
 						}
 		
 					// Is no more data coming , either from the buffer manager or from the server
@@ -772,6 +812,7 @@
 						// more data was expected but both server and data mgr have finished, then leave
 						if  (proxyFinished && dataLengthRemaining > aBuffer.Length()-offset)
 							{
+						    OstTrace0(TRACE_ERROR, DUP39_CDATAOWNER_PROCESSSUPPLYDATAL, "Leave: KErrCorrupt");
 							User::Leave(KErrCorrupt);
 							}
 							
@@ -788,7 +829,7 @@
 					// Create a pointer to the data of this proxy 
 					TPtrC8 buffer(aBuffer.Mid(offset, currentBufferLen));					
 					iProxyInformationArray[iCurrentProxy].iDataSupplied +=  currentBufferLen;
-					__LOG1("CDataOwner::ProcessSupplyDataL() - iProxyConsumedLength = %D",iProxyInformationArray[iCurrentProxy].iDataSupplied);
+					OstTrace1(TRACE_NORMAL, DUP28_CDATAOWNER_PROCESSSUPPLYDATAL, "iProxyConsumedLength = %d",iProxyInformationArray[iCurrentProxy].iDataSupplied);
 					
 					offset += currentBufferLen;	
 
@@ -797,7 +838,7 @@
 					// If the data to send is the last section, set proxyLastSection with true.
 					if ((iProxyInformationArray[iCurrentProxy].iOpInProgress == (TInt)ETrue) && (iProxyInformationArray[iCurrentProxy].iDataSupplied == iProxyInformationArray[iCurrentProxy].iDataRequested))
 						{
-						__LOG("CDataOwner::ProcessSupplyDataL() - Last Section to Proxy");
+					    OstTrace0(TRACE_NORMAL, DUP29_CDATAOWNER_PROCESSSUPPLYDATAL, "Last Section to Proxy");
 						proxyLastSection = ETrue;
 						}
 					else
@@ -821,21 +862,21 @@
 					// data server or datamanager can supply again.
 					if (!proxyFinished)
 						{
-						__LOG("CDataOwner::ProcessSupplyDataL() - Proxy Info : Multipart send not complete, expecting more proxy data");
+					    OstTrace0(TRACE_NORMAL, DUP30_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : Multipart send not complete, expecting more proxy data");
 						ProxyStateByDriveL(aDriveNumber,iCurrentProxy).iOpInProgress = ETrue;							
 						}
 					else
 						{
-						__LOG("CDataOwner::ProcessSupplyDataL() - Proxy Info : Send complete");
+					    OstTrace0(TRACE_NORMAL, DUP31_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : Send complete");
 						ProxyStateByDriveL(aDriveNumber,iCurrentProxy).iOpInProgress = EFalse;
 						ProxyStateByDriveL(aDriveNumber,iCurrentProxy).iDataSupplied = ETrue;
 	
 						}				
 					
-					__LOG2("CDataOwner::ProcessSupplyDataL() - Check proxyConsumedLength = %D & proxyTotalDataLength = %D",iProxyInformationArray[iCurrentProxy].iDataSupplied,iProxyInformationArray[iCurrentProxy].iDataRequested);
+					OstTraceExt2(TRACE_NORMAL, DUP32_CDATAOWNER_PROCESSSUPPLYDATAL, "Check proxyConsumedLength = %d & proxyTotalDataLength = %d",iProxyInformationArray[iCurrentProxy].iDataSupplied,iProxyInformationArray[iCurrentProxy].iDataRequested);
 					if (iProxyInformationArray[iCurrentProxy].iDataSupplied == iProxyInformationArray[iCurrentProxy].iDataRequested)
 						{
-						__LOG("CDataOwner::ProcessSupplyDataL() - Resetting internal variables");
+					    OstTrace0(TRACE_NORMAL, DUP33_CDATAOWNER_PROCESSSUPPLYDATAL, "Resetting internal variables");
 						// when whole packet from server is read.						
 						iProxyInformationArray[iCurrentProxy].iDataSupplied = 0;
 						iProxyInformationArray[iCurrentProxy].iDataRequested = 0;
@@ -844,7 +885,7 @@
 					// Check 
 					if ( (iProxyInformationArray[iCurrentProxy].iOpInProgress == (TInt)ETrue) && (iProxyInformationArray[iCurrentProxy].iDataSupplied == iProxyInformationArray[iCurrentProxy].iDataRequested) )
 						{
-						__LOG("CDataOwner::ProcessSupplyDataL() - Proxy Finished");
+					    OstTrace0(TRACE_NORMAL, DUP34_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Finished");
 						iCurrentProxy++;
 						}
 						
@@ -853,11 +894,11 @@
 				// Active data can be sent under 2 circumstances, data for a proxy and data for an actual active client				
 				if (iActiveInformation.iSupported && iActiveInformation.iActiveDataOwner && (offset < aBuffer.Size()))
 					{
-					__LOG("CDataOwner::ProcessSupplyDataL() - State iActiveInformation.iSupported");					
+				    OstTrace0(TRACE_NORMAL, DUP35_CDATAOWNER_PROCESSSUPPLYDATAL, "State iActiveInformation.iSupported");					
 					// Active Base data should only have been provided once for a SID
 					if ((aTransferType == EActiveBaseData) && StateByDriveL(aDriveNumber).iActiveBaseDataReceived)
 						{
-						__LOG("CDataOwner::ProcessSupplyDataL() - State Error - Active restore data has been provided more than once for this DO");
+					    OstTrace0(TRACE_ERROR, DUP36_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Active restore data has been provided more than once for this DO");
 						User::Leave(KErrCorrupt);
 						}
 					
@@ -893,10 +934,11 @@
 				} break;
 			default:
 				{
-				__LOG("CDataOwner::ProcessSupplyDataL() - State Error - An unsupported transfer type has been supplied");
+				OstTrace0(TRACE_ERROR, DUP37_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - An unsupported transfer type has been supplied");
 				User::Leave(KErrNotSupported);
 				}
 			} // switch
+		OstTraceFunctionExit0( CDATAOWNER_PROCESSSUPPLYDATAL_EXIT );
 		}
 		
 	void CDataOwner::SupplyDataL(TDriveNumber aDriveNumber, TTransferDataType aTransferType, 
@@ -912,12 +954,14 @@
 	@leave KErrCorrupt If commands have been issued that violate the allowed sequence
 	*/
 		{
-		__LOG5("CDataOwner::SupplyDataL() - START - SID: 0x%08x, aDrive: %c, aTransferType: %d, aLastSection: %d, iState: %d", iSecureId.iId, aDriveNumber + 'A', aTransferType, aLastSection, iState.iState);
+		OstTraceFunctionEntry0( CDATAOWNER_SUPPLYDATAL_ENTRY );
+		OstTraceExt5(TRACE_NORMAL, CDATAOWNER_SUPPLYDATAL, "SID: 0x%08x, aDrive: %c, aTransferType: %d, aLastSection: %d, iState: %d", iSecureId.iId, static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TInt32>(aTransferType), static_cast<TInt32>(aLastSection), static_cast<TInt32>(iState.iState));
 		// Check our state
 		if (!((iState.iState == ENone) ||
 		     ((iState.iState == ESupply) && (iState.iDriveNumber == aDriveNumber) && 
 		      (iState.iTransferType == aTransferType))))
 			{
+		    OstTrace0(TRACE_ERROR, DUP2_CDATAOWNER_SUPPLYDATAL, "Leave: KErrNotReady");
 			User::Leave(KErrNotReady);			
 			}
 			
@@ -943,7 +987,7 @@
 			}
 		if (err != KErrNone)
 			{
-			__LOG2("CDataOwner::SupplyDataL() - Data owner 0x%08x, drive %d could not cleanup before restore", iSecureId.iId, aDriveNumber);
+		    OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_SUPPLYDATAL, "Data owner 0x%08x, drive %d could not cleanup before restore", iSecureId.iId, static_cast<TUint32>(aDriveNumber));
 			}
 
 		TRAP(err, ProcessSupplyDataL(aDriveNumber, aTransferType, aBuffer, aLastSection));
@@ -957,14 +1001,15 @@
 			iBufferFileReader = NULL;
 			delete iBufferSnapshotReader;
 			iBufferSnapshotReader = NULL;
+			OstTrace1(TRACE_ERROR, DUP3_CDATAOWNER_SUPPLYDATAL, "Leave: %d", err);
 			User::Leave(err);
 			} // if
 			     
 		if (aLastSection) // If last section reset state
 			{
 			iState.iState = ENone;
-			} // if
-		__LOG("CDataOwner::SupplyDataL() - END");
+			} // if		
+		OstTraceFunctionExit0( CDATAOWNER_SUPPLYDATAL_EXIT );
 		} // SupplyDataL
 		
 		
@@ -974,27 +1019,26 @@
     So that the TRAPD isn't massive, this switch statement has been moved to this function
     */
 		{
-        __LOG4("CDataOwner::ProcessRequestDataL() - START - aDrive: %c, aTransferType: %d, aBuffer.Ptr(): 0x%08x, aBuffer.Length(): %d", aDriveNumber + 'A', aTransferType, aBuffer.Ptr(), aBuffer.Length());
-        //__LOGDATA("CDataOwner::ProcessRequestDataL() - %S", aBuffer.Ptr(), aBuffer.Length() );
+        OstTraceFunctionEntry0( CDATAOWNER_PROCESSREQUESTDATAL_ENTRY );
+        OstTraceExt4(TRACE_NORMAL, CDATAOWNER_PROCESSREQUESTDATAL, "aDrive: %c, aTransferType: %d, aBuffer.Ptr(): 0x%08x, aBuffer.Length(): %d", static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TInt32>(aTransferType), reinterpret_cast<TInt32>(aBuffer.Ptr()), static_cast<TInt32>(aBuffer.Length()));
 
-        //
 		switch (aTransferType)
 			{
 			case EPassiveSnapshotData:
 				{
-				__LOG1("CDataOwner::ProcessRequestDataL() - Requesting passive snapshot data from data owner with SID 0x%08x", iSecureId.iId);
+				OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_PROCESSREQUESTDATAL, "Requesting passive snapshot data from data owner with SID 0x%08x", iSecureId.iId);
 
 				// Check that no passive data has been requested for a data owner that doesn't support it
 				if (!iPassiveInformation.iSupported)
 					{
-					__LOG("CDataOwner::ProcessRequestDataL() - State Error - Passive snapshot data has been requested for a non-passive data owner");
+				    OstTrace0(TRACE_ERROR, DUP2_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Passive snapshot data has been requested for a non-passive data owner");
 					User::Leave(KErrCorrupt);
 					}
 					
 				// Check that snapshot data is only requested once
 				if (StateByDriveL(aDriveNumber).iPassiveSnapshotRequested)
 					{
-					__LOG("CDataOwner::ProcessRequestDataL() - State Error - Passive snapshot data has been requested more than once");
+				    OstTrace0(TRACE_ERROR, DUP3_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Passive snapshot data has been requested more than once");
 					User::Leave(KErrCorrupt);
 					}
 
@@ -1011,24 +1055,24 @@
 				{
 				if (aTransferType == EPassiveBaseData)
 					{
-					__LOG1("CDataOwner::ProcessRequestDataL() - Requesting passive base data from data owner with SID 0x%08x", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP4_CDATAOWNER_PROCESSREQUESTDATAL, "Requesting passive base data from data owner with SID 0x%08x", iSecureId.iId);
 					}
 				else if (aTransferType == EPassiveIncrementalData)
 					{
-					__LOG1("CDataOwner::ProcessRequestDataL() - Requesting passive inc data from data owner with SID 0x%08x", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP5_CDATAOWNER_PROCESSREQUESTDATAL, "Requesting passive inc data from data owner with SID 0x%08x", iSecureId.iId);
 					}
 
 				// Check that no passive data has been requested for a data owner that doesn't support it
 				if (!iPassiveInformation.iSupported)
 					{
-					__LOG("CDataOwner::ProcessRequestDataL() - State Error - Passive backup data has been requested for a non-passive data owner");
+				    OstTrace0(TRACE_ERROR, DUP6_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Passive backup data has been requested for a non-passive data owner");
 					User::Leave(KErrCorrupt);
 					}
 
 				// Check that if this is an incremental backup, complete snapshot data has been received
 				if ((aTransferType == EPassiveIncrementalData) && !StateByDriveL(aDriveNumber).iPassiveSnapshotReceived)
 					{
-					__LOG("CDataOwner::ProcessRequestDataL() - State Error - Incremental data has been requested without a snapshot being supplied");
+				    OstTrace0(TRACE_ERROR, DUP7_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Incremental data has been requested without a snapshot being supplied");
 					User::Leave(KErrCorrupt);
 					}
 				
@@ -1036,14 +1080,14 @@
 				if (((aTransferType == EPassiveBaseData) && StateByDriveL(aDriveNumber).iPassiveBaseDataRequested) ||
 					((aTransferType == EPassiveIncrementalData) && StateByDriveL(aDriveNumber).iPassiveIncDataRequested))
 					{
-					__LOG("CDataOwner::ProcessRequestDataL() - State Error - Passive data has been requested more than once for this data owner");
+				    OstTrace0(TRACE_ERROR, DUP8_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Passive data has been requested more than once for this data owner");
 					User::Leave(KErrCorrupt);
 					}
 				
 				// Check that for base backup, no snapshot data has been supplied
 				if ((aTransferType == EPassiveBaseData) && StateByDriveL(aDriveNumber).iPassiveSnapshotReceived)
 					{
-					__LOG("CDataOwner::ProcessRequestDataL() - State Error - Snapshot data has been received for a base only data owner");
+				    OstTrace0(TRACE_ERROR, DUP9_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Snapshot data has been received for a base only data owner");
 					User::Leave(KErrCorrupt);
 					}
 				
@@ -1051,7 +1095,7 @@
 				if (((aTransferType == EPassiveBaseData) && StateByDriveL(aDriveNumber).iPassiveIncDataRequested) || 
 					((aTransferType == EPassiveIncrementalData) && StateByDriveL(aDriveNumber).iPassiveBaseDataRequested))
 					{
-					__LOG("CDataOwner::ProcessRequestDataL() - State Error - Base and Incremental data have been requested in the same session");
+				    OstTrace0(TRACE_ERROR, DUP10_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Base and Incremental data have been requested in the same session");
 					User::Leave(KErrCorrupt);
 					}
 				
@@ -1070,33 +1114,33 @@
 				}
 			case EActiveSnapshotData:
 				{
-				__LOG1("CDataOwner::ProcessRequestDataL() - Requesting active snapshot data from data owner with SID 0x%08x", iSecureId.iId);
+				OstTrace1(TRACE_NORMAL, DUP11_CDATAOWNER_PROCESSREQUESTDATAL, "Requesting active snapshot data from data owner with SID 0x%08x", iSecureId.iId);
 
 				// Check that active data hasn't been requested for a data owner that doesn't support it
 				if (!iActiveInformation.iSupported)
 					{
-					__LOG("CDataOwner::ProcessRequestDataL() - State Error - Active snapshot data has been requested from a non-active data owner");
+				    OstTrace0(TRACE_ERROR, DUP12_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Active snapshot data has been requested from a non-active data owner");
 					User::Leave(KErrCorrupt);
 					}
 
 				// Check that no active snapshot data has been requested for a base only active data owner
 				if (!iActiveInformation.iSupportsIncremental)
 					{
-					__LOG("CDataOwner::ProcessRequestDataL() - State Error - Active snapshot data has been requested from a base only data owner");
+				    OstTrace0(TRACE_ERROR, DUP13_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Active snapshot data has been requested from a base only data owner");
 					User::Leave(KErrCorrupt);
 					}
 
 				// Check that the Active client has prepared it's data and is ready
 				if (iStatus != EDataOwnerReady)
 					{
-					__LOG("CDataOwner::ProcessRequestDataL() - State Error - Active Snapshot data has been requested from a data owner that isn't ready");
+				    OstTrace0(TRACE_ERROR, DUP14_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Active Snapshot data has been requested from a data owner that isn't ready");
 					User::Leave(KErrNotReady);
 					}
 					
 				// Check that snapshot data is only requested once
 				if (StateByDriveL(aDriveNumber).iActiveSnapshotRequested)
 					{
-					__LOG("CDataOwner::ProcessRequestDataL() - State Error - Active Snapshot data has been requested more than once");
+				    OstTrace0(TRACE_ERROR, DUP15_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Active Snapshot data has been requested more than once");
 					User::Leave(KErrCorrupt);
 					}
 					
@@ -1114,11 +1158,11 @@
 				{
 				if (aTransferType == EActiveBaseData)
 					{
-					__LOG1("CDataOwner::ProcessRequestDataL() - Requesting active base data from data owner with SID 0x%08x", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP16_CDATAOWNER_PROCESSREQUESTDATAL, "Requesting active base data from data owner with SID 0x%08x", iSecureId.iId);
 					}
 				else if (aTransferType == EActiveIncrementalData)
 					{
-					__LOG1("CDataOwner::ProcessRequestDataL() - Requesting active inc data from data owner with SID 0x%08x", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP17_CDATAOWNER_PROCESSREQUESTDATAL, "Requesting active inc data from data owner with SID 0x%08x", iSecureId.iId);
 					}
 
 				TInt supportedProxyCount = iProxyInformationArray.Count();
@@ -1131,17 +1175,16 @@
 					if ((!iActiveInformation.iSupported) && (supportedProxyCount == 0))
 						{
 						// No proxies or active data 
-						__LOG("CDataOwner::ProcessRequestDataL() - State Error - Active data has been requested from a non-active/no proxy data owner");
+					    OstTrace0(TRACE_ERROR, DUP18_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Active data has been requested from a non-active/no proxy data owner");
 						User::Leave(KErrCorrupt);
 						}
 					
 					StateByDriveL(aDriveNumber).iFirstActiveTransaction = EFalse;
 					
 					PackTypeAdvance(supportedProxyCount, aBuffer, offset);
-					__LOG1("CDataOwner::ProcessRequestDataL() - Proxy Info : Packing TotalProxyCount = %d", supportedProxyCount);
+					OstTrace1(TRACE_NORMAL, DUP19_CDATAOWNER_PROCESSREQUESTDATAL, "Proxy Info : Packing TotalProxyCount = %d", supportedProxyCount);
 
-					aBuffer.SetLength(offset);
-			        //__LOGDATA( "CDataOwner::ProcessRequestDataL() - after adding proxy info - %S", aBuffer.Ptr(), aBuffer.Length() );
+					aBuffer.SetLength(offset);			        
 					
 					// Reset proxy state information for this drive
 					for (TInt numProxy=0; numProxy < supportedProxyCount; numProxy++)
@@ -1153,7 +1196,7 @@
 				// Proxy data is always at the beginning of the data block
 				for (TInt index = 0; index < supportedProxyCount; index++)
 					{
-					__LOG2("CDataOwner::ProcessRequestDataL() - Proxy Info : Packing proxy info %d of %d", index + 1, supportedProxyCount);
+				    OstTraceExt2(TRACE_NORMAL, DUP20_CDATAOWNER_PROCESSREQUESTDATAL, "Proxy Info : Packing proxy info %d of %d", index + 1, supportedProxyCount);
 
 					// Request data from each of the data owners that haven't yet been added
 					// If the buffer's overflowed, then let the PC request again
@@ -1194,13 +1237,13 @@
 
 							// Write the proxy protocol block to the active backup data stream
 							PackType(aLastSection, finishedBuf, 0);
-							__LOG1("CDataOwner::ProcessRequestDataL() - Proxy Info : FinishedFlag = %d", aLastSection);
+							OstTrace1(TRACE_NORMAL, DUP21_CDATAOWNER_PROCESSREQUESTDATAL, "Proxy Info : FinishedFlag = %d", aLastSection);
 							
 							PackType(size, lengthBuf, 0);
-							__LOG1("CDataOwner::ProcessRequestDataL() - Proxy Info : ProxyStreamSize= %d", size);
+							OstTrace1(TRACE_NORMAL, DUP22_CDATAOWNER_PROCESSREQUESTDATAL, "Proxy Info : ProxyStreamSize= %d", size);
 
 							PackType(iProxyInformationArray[index].iSecureId, sidBuf, 0);
-							__LOG1("CDataOwner::ProcessRequestDataL() - Proxy Info : ProxySID = 0x%08x", iProxyInformationArray[index].iSecureId.iId);
+							OstTrace1(TRACE_NORMAL, DUP23_CDATAOWNER_PROCESSREQUESTDATAL, "Proxy Info : ProxySID = 0x%08x", iProxyInformationArray[index].iSecureId.iId);
 							
 							// Update the offset and main buffer size
 							offset += size;
@@ -1230,14 +1273,14 @@
 					// Check that if this is a base backup, no snapshot has been provided
 					if ((aTransferType == EActiveBaseData) && StateByDriveL(aDriveNumber).iActiveSnapshotReceived)
 						{
-						__LOG("CDataOwner::ProcessRequestDataL() - State Error - A snapshot has been provided before a request for base data");
+					    OstTrace0(TRACE_ERROR, DUP24_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - A snapshot has been provided before a request for base data");
 						User::Leave(KErrCorrupt);
 						}
 					
 					// Check that if this is an incremental backup that at least one complete snapshot has been sent
 					if ((aTransferType == EActiveIncrementalData) && !StateByDriveL(aDriveNumber).iActiveSnapshotReceived)
 						{
-						__LOG("CDataOwner::ProcessRequestDataL() - State Error - No snapshot has been supplied, yet incremental data has been requested");
+					    OstTrace0(TRACE_ERROR, DUP25_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - No snapshot has been supplied, yet incremental data has been requested");
 						User::Leave(KErrCorrupt);
 						}
 					
@@ -1245,7 +1288,7 @@
 					if (((aTransferType == EActiveBaseData) && StateByDriveL(aDriveNumber).iActiveBaseDataRequested) || 
 						((aTransferType == EActiveIncrementalData) && StateByDriveL(aDriveNumber).iActiveIncDataRequested))
 						{
-						__LOG("CDataOwner::ProcessRequestDataL() - State Error - Active data has been requested more than once (not counting multi-part)");
+					    OstTrace0(TRACE_ERROR, DUP26_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Active data has been requested more than once (not counting multi-part)");
 						User::Leave(KErrCorrupt);
 						}
 						
@@ -1253,7 +1296,7 @@
 					if (((aTransferType == EActiveBaseData) && StateByDriveL(aDriveNumber).iActiveIncDataRequested) || 
 						((aTransferType == EActiveIncrementalData) && StateByDriveL(aDriveNumber).iActiveBaseDataRequested))
 						{
-						__LOG("CDataOwner::ProcessRequestDataL() - State Error - Only active base or incremental data can be requested in the same session");
+					    OstTrace0(TRACE_ERROR, DUP27_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Only active base or incremental data can be requested in the same session");
 						User::Leave(KErrCorrupt);
 						}
 
@@ -1297,18 +1340,19 @@
 				} break;
 			default:
 				{
+				OstTrace0(TRACE_ERROR, DUP29_CDATAOWNER_PROCESSREQUESTDATAL, "Leave: KErrNotSupported");
 				User::Leave(KErrNotSupported);
 				}
 			} // switch
 
-        __LOG2("CDataOwner::ProcessRequestDataL() - NEAR END - aBuffer.Ptr(): 0x%08x, aBuffer.Length(): %d", aBuffer.Ptr(), aBuffer.Length());
-        //__LOGDATA( "CDataOwner::ProcessRequestDataL() - %S", aBuffer.Ptr(), aBuffer.Length() );
-        __LOG("CDataOwner::ProcessRequestDataL() - END");
+		OstTraceExt2(TRACE_NORMAL, DUP28_CDATAOWNER_PROCESSREQUESTDATAL, "aBuffer.Ptr(): 0x%08x, aBuffer.Length(): %d", reinterpret_cast<TInt32>(aBuffer.Ptr()), static_cast<TInt32>(aBuffer.Length()));
+		OstTraceFunctionExit0( CDATAOWNER_PROCESSREQUESTDATAL_EXIT );
 		}
 		
     void CDataOwner::RequestDataL(TDriveNumber aDriveNumber, TTransferDataType aTransferType, 
     				  			  TPtr8& aBuffer, TBool& aLastSection)
     	{
+    	OstTraceFunctionEntry0( CDATAOWNER_REQUESTDATAL_ENTRY );
     	aLastSection = ETrue;		// Set the last section to be true by default
     	
 		// Check our state
@@ -1316,6 +1360,7 @@
 		     ((iState.iState == ERequest) && (iState.iDriveNumber == aDriveNumber) && 
 		      (iState.iTransferType == aTransferType))))
 			{
+		    OstTrace0(TRACE_ERROR, DUP1_CDATAOWNER_REQUESTDATAL, "Leave: KErrNotReady");
 			User::Leave(KErrNotReady);			
 			}
 			
@@ -1333,12 +1378,13 @@
 		
 		if (err != KErrNone)
 			{
-			__LOG4("CDataOwner::RequestDataL() - drive: %c:, aTransferType: %d, secureId: 0x%08x - ERROR: %d", 'a' + aDriveNumber, aTransferType, iSecureId.iId, err);
+		    OstTraceExt4(TRACE_NORMAL, CDATAOWNER_REQUESTDATAL, "drive: %c:, aTransferType: %d, secureId: 0x%08x - ERROR: %d", static_cast<TInt8>('a' + aDriveNumber), static_cast<TInt32>(aTransferType), static_cast<TInt32>(iSecureId.iId), static_cast<TInt32>(err));
 			iState.iState = ENone;
 			delete iBufferFileWriter;
 			iBufferFileWriter = NULL;
 			delete iBufferSnapshotWriter;
 			iBufferSnapshotWriter = NULL;
+			OstTrace1(TRACE_ERROR, DUP2_CDATAOWNER_REQUESTDATAL, "Leave: %d", err);
 			User::Leave(err);
 			} // if
 		
@@ -1346,12 +1392,14 @@
 			{
 			iState.iState = ENone;
 			} // if
+    	OstTraceFunctionExit0( CDATAOWNER_REQUESTDATAL_EXIT );
     	} // RequestDataL
     	
     void CDataOwner::RestoreCompleteL()
     /** Indicate to the active client that the restore operation has been completed
     */
     	{
+    	OstTraceFunctionEntry0( CDATAOWNER_RESTORECOMPLETEL_ENTRY );
     	// Find all of the drives that this data owner could have stored data on
     	TDriveList driveList;
     	GetDriveListL(driveList);
@@ -1364,6 +1412,7 @@
     			ipDataOwnerManager->ABServer().RestoreCompleteL(iSecureId, static_cast<TDriveNumber>(driveCountIndex));
     			}
     		}
+    	OstTraceFunctionExit0( CDATAOWNER_RESTORECOMPLETEL_EXIT );
     	}
 
 
@@ -1382,6 +1431,7 @@
 	@return The ready state
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_READYSTATE_ENTRY );
 		TDataOwnerStatus status = EDataOwnerReady;
 		TInt proxyIndex = 0;
 		const TUint proxyCount = iProxyInformationArray.Count();
@@ -1445,8 +1495,9 @@
 			}
 		
 		
-		__LOG2("CDataOwner::ReadyState() - Ready status for data owner 0x%08x is %d", iSecureId.iId, static_cast<TInt>(status));
+		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_READYSTATE, "Ready status for data owner 0x%08x is %d", iSecureId.iId, static_cast<TInt32>(status));
 			
+		OstTraceFunctionExit0( CDATAOWNER_READYSTATE_EXIT );
 		return status;
 		}
 		
@@ -1455,12 +1506,14 @@
 	Set upon a ConfirmReadyForBUR IPC call from an active backup client
 	*/
 		{
-		__LOG2("CDataOwner::SetReadyState() - Setting ready state of data owner 0x%08x to %d", iSecureId.iId, static_cast<TInt>(aDataOwnerStatus));
+		OstTraceFunctionEntry0( CDATAOWNER_SETREADYSTATE_ENTRY );
+		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_SETREADYSTATE, "Setting ready state of data owner 0x%08x to %d", iSecureId.iId, static_cast<TInt32>(aDataOwnerStatus));
 		iStatus = aDataOwnerStatus;
 		if (aDataOwnerStatus == EDataOwnerReady && iActiveInformation.iActiveType == EProxyImpOnly)
 			{
 			iStatus = EDataOwnerReadyNoImpl;
 			}
+		OstTraceFunctionExit0( CDATAOWNER_SETREADYSTATE_EXIT );
 		}
 
 	TCommonBURSettings CDataOwner::CommonSettingsL()
@@ -1471,44 +1524,46 @@
 	@leave KErrNotReady if CDataOwner::ParseFilesL() not called
 	*/
 		{
-		__LOG2("CDataOwner::CommonSettingsL() - START - sid: 0x%08x, iFilesParsed: %d", iSecureId.iId, iFilesParsed);
+		OstTraceFunctionEntry0( CDATAOWNER_COMMONSETTINGSL_ENTRY );
+		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_COMMONSETTINGSL, "sid: 0x%08x, iFilesParsed: %d", iSecureId.iId, static_cast<TInt32>(iFilesParsed));
 		if (!iFilesParsed)
 			{
+		    OstTrace0(TRACE_ERROR, DUP6_CDATAOWNER_COMMONSETTINGSL, "Leave: KErrNotReady");
 			User::Leave(KErrNotReady);
 			}
 			
-		__LOG2("CDataOwner::CommonSettingsL() - Active Supported: %d, proxyCount: %d", iActiveInformation.iSupported, iProxyInformationArray.Count());
+		OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_COMMONSETTINGSL, "Active Supported: %d, proxyCount: %d", iActiveInformation.iSupported, iProxyInformationArray.Count());
 		TCommonBURSettings settings = ENoOptions;
 		if (iActiveInformation.iSupported || iProxyInformationArray.Count())
 			{
 			settings |= EActiveBUR;
 			} // if
 
-		__LOG1("CDataOwner::CommonSettingsL() - Passive Supported: %d", iPassiveInformation.iSupported);
+		OstTrace1(TRACE_NORMAL, DUP2_CDATAOWNER_COMMONSETTINGSL, "Passive Supported: %d", iPassiveInformation.iSupported);
 		if (iPassiveInformation.iSupported)
 			{
 			settings |= EPassiveBUR;
 			}
 
-		__LOG1("CDataOwner::CommonSettingsL() - System Supported: %d", iSystemInformation.iSupported);
+		OstTrace1(TRACE_NORMAL, DUP3_CDATAOWNER_COMMONSETTINGSL, "System Supported: %d", iSystemInformation.iSupported);
 		if (iSystemInformation.iSupported)
 			{
 			settings |= EHasSystemFiles;
 			}
 
-		__LOG2("CDataOwner::CommonSettingsL() - SelActive: %d, SelPassive: %d", iActiveInformation.iSupportsSelective, iPassiveInformation.iSupportsSelective);
+		OstTraceExt2(TRACE_NORMAL, DUP4_CDATAOWNER_COMMONSETTINGSL, "SelActive: %d, SelPassive: %d", iActiveInformation.iSupportsSelective, iPassiveInformation.iSupportsSelective);
 		if (iActiveInformation.iSupportsSelective && iPassiveInformation.iSupportsSelective)
 			{
 			settings |= ESupportsSelective;
 			}
 
-		__LOG1("CDataOwner::CommonSettingsL() - Reboot required: %d", iRestoreInformation.iRequiresReboot);
+		OstTrace1(TRACE_NORMAL, DUP5_CDATAOWNER_COMMONSETTINGSL, "Reboot required: %d", iRestoreInformation.iRequiresReboot);
 		if (iRestoreInformation.iRequiresReboot)
 			{
 			settings |= ERequiresReboot;
 			}
 
-		__LOG("CDataOwner::CommonSettingsL() - END");
+		OstTraceFunctionExit0( CDATAOWNER_COMMONSETTINGSL_EXIT );
 		return settings;
 		}
 
@@ -1520,8 +1575,10 @@
 	@leave KErrNotReady if CDataOwner::ParseFilesL() not called
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_PASSIVESETTINGSL_ENTRY );
 		if (!iFilesParsed)
 			{
+		    OstTrace0(TRACE_ERROR, CDATAOWNER_PASSIVESETTINGSL, "Leave: KErrNotReady");
 			User::Leave(KErrNotReady);
 			}
 		
@@ -1543,6 +1600,7 @@
 			} // if
 			
 			
+		OstTraceFunctionExit0( CDATAOWNER_PASSIVESETTINGSL_EXIT );
 		return settings;
 		}
 
@@ -1554,8 +1612,10 @@
 	@leave KErrNotReady if CDataOwner::ParseFilesL() not called
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_ACTIVESETTINGSL_ENTRY );
 		if (!iFilesParsed)
 			{
+		    OstTrace0(TRACE_ERROR, CDATAOWNER_ACTIVESETTINGSL, "Leave: KErrNotReady");
 			User::Leave(KErrNotReady);
 			}
 			
@@ -1572,6 +1632,7 @@
 				} // if
 			} // if
 
+		OstTraceFunctionExit0( CDATAOWNER_ACTIVESETTINGSL_EXIT );
 		return settings;
 		}
 		
@@ -1593,9 +1654,11 @@
 	@leave KErrNotReady if CDataOwner::ParseFilesL() not called
 	*/
 		{
-		__LOG2("CDataOwner::GetDriveListL() - SID: 0x%08x, iFilesParsed: %d", iSecureId.iId, iFilesParsed);
+		OstTraceFunctionEntry0( CDATAOWNER_GETDRIVELISTL_ENTRY );
+		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_GETDRIVELISTL, "SID: 0x%08x, iFilesParsed: %d", iSecureId.iId, static_cast<TInt32>(iFilesParsed));
 		if (!iFilesParsed)
 			{
+		    OstTrace0(TRACE_ERROR, DUP13_CDATAOWNER_GETDRIVELISTL, "Leave: KErrNotReady");
 			User::Leave(KErrNotReady);
 			}
 
@@ -1604,9 +1667,9 @@
 		const TInt error = ipDataOwnerManager->GetRFs().DriveList(existingDrives);
         if  ( error != KErrNone )
             {
-            __LOG1("CDataOwner::GetDriveListL() - couldnt get drive list: %d", error);
+            OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_GETDRIVELISTL, "couldnt get drive list: %d", error);
             }
-        User::LeaveIfError(error);
+        LEAVEIFERROR(error, OstTrace1(TRACE_ERROR, DUP12_CDATAOWNER_GETDRIVELISTL, "Leave: %d", error));
 		
 		// We now no longer return the Z drive, it has been decided that the Z drive will always be the
 		// ROM. Backing up and restoring the ROM drive should not be possible, as what is the point
@@ -1626,7 +1689,7 @@
 		// have to say all drives
 		if ((iActiveInformation.iSupported) || (iDBMSSelections.Count()))
 			{
-            __LOG("CDataOwner::GetDriveListL() - active DO, so using all existing drives");
+		    OstTrace0(TRACE_NORMAL, DUP2_CDATAOWNER_GETDRIVELISTL, "active DO, so using all existing drives");
 			aDriveList = existingDrives;		
 			} // if
 		else
@@ -1640,7 +1703,7 @@
 			
 			// Loop through passive files
 			TInt count = iPassiveSelections.Count();
-            __LOG1("CDataOwner::GetDriveListL() - checking %d passive file entries...", count);
+			OstTrace1(TRACE_NORMAL, DUP3_CDATAOWNER_GETDRIVELISTL, "checking %d passive file entries...", count);
 			for (TInt x = 0; !allDrives &&  x < count; x++)
 				{
                 const TDesC& selection = iPassiveSelections[x]->SelectionName();
@@ -1650,23 +1713,23 @@
 							
 					if (drive == -1)
 						{
-	                    __LOG3("CDataOwner::GetDriveListL() - passive[%2d/%2d] => all drives (no specific drive letter) - fullName: %S", x+1, count, &selection);
+					    OstTraceExt3(TRACE_NORMAL, DUP4_CDATAOWNER_GETDRIVELISTL, "passive[%2d/%2d] => all drives (no specific drive letter) - fullName: %S", x+1, count, selection);
 						allDrives = ETrue;
 						}
 					else if (existingDrives[drive] != 0)
 						{
-	                    __LOG4("CDataOwner::GetDriveListL() - passive[%2d/%2d] => drive: %c, fullName: %S", x+1, count, drive + 'A', &selection);
+					    OstTraceExt4(TRACE_NORMAL, DUP5_CDATAOWNER_GETDRIVELISTL, "passive[%2d/%2d] => drive: %c, fullName: %S", x+1, count, drive + 'A', selection);
 						aDriveList[drive] = ETrue;
 						}
                 	}
 
 				} // for
 
-            __LOG(" ");
+			OstTrace0(TRACE_NORMAL, DUP6_CDATAOWNER_GETDRIVELISTL, " ");
 					
 			// Loop through public files
 			count = iPublicSelections.Count();
-            __LOG1("CDataOwner::GetDriveListL() - checking %d public file entries...", count);
+			OstTrace1(TRACE_NORMAL, DUP7_CDATAOWNER_GETDRIVELISTL, "checking %d public file entries...", count);
 
             for (TInt x = 0; !allDrives &&  (x < count); x++)
 				{
@@ -1677,12 +1740,12 @@
 						
 					if (drive == -1)
 						{
-	                    __LOG3("CDataOwner::GetDriveListL() - public[%2d/%2d] => all drives (no specific drive letter) - fullName: %S", x+1, count, &selection);
+					    OstTraceExt3(TRACE_NORMAL, DUP8_CDATAOWNER_GETDRIVELISTL, "public[%2d/%2d] => all drives (no specific drive letter) - fullName: %S", x+1, count, selection);
 						allDrives = ETrue;
 						}
 					else if (existingDrives[drive] != 0)
 						{
-	                    __LOG4("CDataOwner::GetDriveListL() - public[%2d/%2d] => drive: %c, fullName: %S", x+1, count, drive + 'A', &selection);
+					    OstTraceExt4(TRACE_NORMAL, DUP9_CDATAOWNER_GETDRIVELISTL, "public[%2d/%2d] => drive: %c, fullName: %S", x+1, count, drive + 'A', selection);
 						aDriveList[drive] = ETrue;
 						}
                 	}
@@ -1690,12 +1753,11 @@
 					
 			if (allDrives)
 				{
-                __LOG("CDataOwner::GetDriveListL() - using all drives!");
+			    OstTrace0(TRACE_NORMAL, DUP10_CDATAOWNER_GETDRIVELISTL, "using all drives!");
 				aDriveList = existingDrives;
 				} // if
 			} // else
 
-	#ifdef SBE_LOGGING_ENABLED
 		TBuf<256> drivePrint;
 		//
 		for(TInt i=0; i<KMaxDrives; i++)
@@ -1712,8 +1774,8 @@
 				}
 			}
 
-        __LOG2("CDataOwner::GetDriveListL() - END - SID: 0x%08x, supports drives: %S", iSecureId.iId, &drivePrint);
-	#endif
+		OstTraceExt2(TRACE_NORMAL, DUP11_CDATAOWNER_GETDRIVELISTL, "SID: 0x%08x, supports drives: %S", iSecureId.iId, drivePrint);
+		OstTraceFunctionExit0( CDATAOWNER_GETDRIVELISTL_EXIT );
 		}
 
 	void CDataOwner::SetBackedUpAsPartial(TBool aPartial)
@@ -1741,11 +1803,13 @@
 	@param aFileName the registration file to parse
 	*/
 		{
-		__LOG2("CDataOwner::ParseFileL() - START - aFileName: %S, iPrimaryFile: %d", &aFileName, iPrimaryFile);
+		OstTraceFunctionEntry0( CDATAOWNER_PARSEFILEL_ENTRY );
+		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_PARSEFILEL, "aFileName: %S, iPrimaryFile: %d", aFileName, iPrimaryFile);
 		
 		PrivatePathL(aFileName);
 		// Parse the file
 		ipDataOwnerManager->ParserProxy().ParseL(aFileName, *this);
+		OstTraceFunctionExit0( CDATAOWNER_PARSEFILEL_EXIT );
 		}
 		
 	void CDataOwner::PrivatePathL(const TDesC& aFileName)
@@ -1753,9 +1817,11 @@
 	@param aPath The path to extract the drive from
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_PRIVATEPATHL_ENTRY );
 		delete iPrivatePath;
   		TParsePtrC parse(aFileName);
   		iPrivatePath = parse.Path().AllocL();
+		OstTraceFunctionExit0( CDATAOWNER_PRIVATEPATHL_EXIT );
 		}
 
 	TInt CDataOwner::GetDrive(const TDesC& aPath) const
@@ -1765,6 +1831,7 @@
 	@return A TDriveNumber or -1 if a drive is not specified
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_GETDRIVE_ENTRY );
 		TInt ret = KErrNotFound;
 		
 		if (aPath.Length() > 0)
@@ -1775,6 +1842,7 @@
 				} // if			
 			}
 
+		OstTraceFunctionExit0( CDATAOWNER_GETDRIVE_EXIT );
 		return ret;
 		}
 		
@@ -1798,8 +1866,9 @@
 	@param apFileNames Array of file names to populate
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_BUILDFILELISTL_ENTRY );
 		TInt count = aFileSelection.Count();
-		__LOG4("CDataOwner::BuildFileListL() - START - aDriveNumber: %c, count: %d, aIsPublic: %d, aTransferType: %d", aDriveNumber + 'A', count, aIsPublic, aTransferType);		
+		OstTraceExt4(TRACE_NORMAL, CDATAOWNER_BUILDFILELISTL, "aDriveNumber: %c, count: %d, aIsPublic: %d, aTransferType: %d", static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TInt32>(count), static_cast<TInt32>(aIsPublic), static_cast<TInt32>(aTransferType));
 		// Split selections into include and exclude
 		RArray<TPtrC> include;
 		CleanupClosePushL(include);
@@ -1811,11 +1880,11 @@
 			apSnapshots->Sort(CSnapshot::Compare);
 			}	
 
-        __LOG("CDataOwner::BuildFileListL() - file selection listing...:");
+		OstTrace0(TRACE_NORMAL, DUP1_CDATAOWNER_BUILDFILELISTL, "file selection listing...:");
 		for (TInt x = 0; x < count; x++)
 			{
             const TDesC& selectionName = aFileSelection[x]->SelectionName();
-            __LOG3("CDataOwner::BuildFileListL() - selection[%03d]: %S, type: %d", x, &selectionName, aFileSelection[x]->SelectionType());
+            OstTraceExt3(TRACE_NORMAL, DUP2_CDATAOWNER_BUILDFILELISTL, "selection[%03d]: %S, type: %d", x, selectionName, aFileSelection[x]->SelectionType());
 			if (aFileSelection[x]->SelectionType() == EInclude)
 				{
 				include.AppendL(selectionName);
@@ -1828,17 +1897,18 @@
 			
 		// Loop through all includes
 		count = include.Count();
-        __LOG("CDataOwner::BuildFileListL() - include listing...:");
+		OstTrace0(TRACE_NORMAL, DUP3_CDATAOWNER_BUILDFILELISTL, "include listing...:");
         TFileName* fileName = new(ELeave) TFileName();
         CleanupStack::PushL(fileName);
 		for (TInt x = 0; x < count; x++)
 			{
 			fileName->Zero();
 			TChar drive;
-			User::LeaveIfError(ipDataOwnerManager->GetRFs().DriveToChar(aDriveNumber, drive));
+			TInt err = ipDataOwnerManager->GetRFs().DriveToChar(aDriveNumber, drive);
+			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP14_CDATAOWNER_BUILDFILELISTL, "Leave: %d", err));
 
             const TDesC& includeEntry( include[x] );
-            __LOG2("CDataOwner::BuildFileListL() - entry[%03d] is: %S", x, &includeEntry);
+            OstTraceExt2(TRACE_NORMAL, DUP4_CDATAOWNER_BUILDFILELISTL, "entry[%03d] is: %S", x, includeEntry);
             
             // See if the drive is specified
 			if (includeEntry[0] == KBackSlash()[0])
@@ -1854,7 +1924,7 @@
 				} // else
 
 			
-            __LOG2("CDataOwner::BuildFileListL() - entry[%03d] filename is therefore: %S", x, fileName);
+			OstTraceExt2(TRACE_NORMAL, DUP5_CDATAOWNER_BUILDFILELISTL, "entry[%03d] filename is therefore: %S", x, *fileName);
 			if (fileName->Length() > 0)
 				{
 				
@@ -1864,7 +1934,7 @@
 				    (fileName->MatchF(KDriveAndSlash) != KErrNotFound))
 					{
 					isDrive = ETrue;
-                    __LOG("CDataOwner::BuildFileListL() - filename is a drive");
+					OstTrace0(TRACE_NORMAL, DUP6_CDATAOWNER_BUILDFILELISTL, "filename is a drive");
 					} // if
 					
 				TEntry entry;
@@ -1872,7 +1942,7 @@
 				if (!isDrive)
 					{
 					TInt err = ipDataOwnerManager->GetRFs().Entry(*fileName, entry);
-                    __LOG1("CDataOwner::BuildFileListL() - get entry error: %d", err);
+					OstTrace1(TRACE_NORMAL, DUP7_CDATAOWNER_BUILDFILELISTL, "get entry error: %d", err);
 					entry.iName = *fileName;
 					switch (err)
 						{
@@ -1884,28 +1954,27 @@
 					case KErrBadName:
 						break;
 					default:
+					    OstTrace1(TRACE_ERROR, DUP13_CDATAOWNER_BUILDFILELISTL, "Leave: %d", err);
 						User::Leave(err);
 						} // switch
 					} // if
 					
 				if (isDrive || (isEntry && entry.IsDir()))
 					{
-                    __LOG("CDataOwner::BuildFileListL() - parsing directory...");
+				    OstTrace0(TRACE_NORMAL, DUP8_CDATAOWNER_BUILDFILELISTL, "parsing directory...");
 					ParseDirL(*fileName, exclude, aTransferType, aIsPublic, apSnapshots, apFileEntries, apFileNames);
 
-				#ifdef SBE_LOGGING_ENABLED
                     if  (apFileNames)
                         {
                         const TInt fNameCount = apFileNames->Count();
                         for(TInt k=0; k<fNameCount; k++)
                             {
                             const TDesC& fileName = (*apFileNames)[k];
-                            __LOG2("CDataOwner::BuildFileListL() - directory entry[%03d] %S", k, &fileName);
+                            OstTraceExt2(TRACE_NORMAL, DUP9_CDATAOWNER_BUILDFILELISTL, "directory entry[%03d] %S", k, fileName);
                             }
                         }
 
-                    __LOG("CDataOwner::BuildFileListL() - end of parsing directory");
-				#endif
+                    OstTrace0(TRACE_NORMAL, DUP10_CDATAOWNER_BUILDFILELISTL, "end of parsing directory");
 					} // if
 				else
 					{
@@ -1925,7 +1994,7 @@
 							    newer || 
 							    (err != KErrNone))
 								{
-                                __LOG1("CDataOwner::BuildFileListL() - adding fully verified file: %S", fileName);
+							    OstTraceExt1(TRACE_NORMAL, DUP11_CDATAOWNER_BUILDFILELISTL, "adding fully verified file: %S", *fileName);
 								if (apFileEntries)
 									{
 									// Add to list of files
@@ -1940,7 +2009,7 @@
 							} // if
                         else
                             {
-                            __LOG("CDataOwner::BuildFileListL() - file is excluded!");
+                            OstTrace0(TRACE_NORMAL, DUP12_CDATAOWNER_BUILDFILELISTL, "file is excluded!");
                             }
 						} // if
 					} // else
@@ -1948,8 +2017,8 @@
 			} // for x
 		CleanupStack::PopAndDestroy(fileName);
 		CleanupStack::PopAndDestroy(&exclude);
-		CleanupStack::PopAndDestroy(&include);
-        __LOG("CDataOwner::BuildFileListL() - END");
+		CleanupStack::PopAndDestroy(&include);        
+		OstTraceFunctionExit0( CDATAOWNER_BUILDFILELISTL_EXIT );
 		}
 
 	void CDataOwner::ParseDirL(const TDesC& aDirName, 
@@ -1969,6 +2038,7 @@
 	@param apFileNames Array of filenames to populate
 	*/							   
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_PARSEDIRL_ENTRY );
 		CDir* pFiles = NULL;
 		
 		// This function requires a / on the end otherwise it does not work!
@@ -1983,6 +2053,7 @@
 		TInt err = ipDataOwnerManager->GetRFs().GetDir(*path, KEntryAttMatchMask, ESortNone, pFiles);
 		if ((err != KErrNone) && (err != KErrNotFound)) // Do we need to leave?
 			{
+		    OstTrace1(TRACE_ERROR, CDATAOWNER_PARSEDIRL, "Leave: %d", err);
 			User::Leave(err);
 			} // if
 		
@@ -2068,6 +2139,7 @@
 		CleanupStack::PopAndDestroy(fileName);
 		CleanupStack::PopAndDestroy(pFiles);
 		CleanupStack::PopAndDestroy(path);
+		OstTraceFunctionExit0( CDATAOWNER_PARSEDIRL_EXIT );
 		}
 
 
@@ -2079,12 +2151,14 @@
 	@param aEntry on return the next entry in the list, an empty entry indicates the end of the list has been reached
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_GETNEXTPUBLICFILEL_ENTRY );
 		TInt stackCount;
 		TFileName fileName;
 		TBool endOfList = EFalse;
 		TBool gotEntry = EFalse;
 		TChar drive;
-		User::LeaveIfError(ipDataOwnerManager->GetRFs().DriveToChar(aDriveNumber, drive));
+		TInt err = ipDataOwnerManager->GetRFs().DriveToChar(aDriveNumber, drive);
+		LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP8_CDATAOWNER_GETNEXTPUBLICFILEL, "Leave: %d", err));
 		
 		if (aReset) 
 			{
@@ -2106,7 +2180,7 @@
 			for (TInt x = 0; x < selectionCount; ++x)
 				{
 	            const TDesC& selectionName = iPublicSelections[x]->SelectionName();
-	            __LOG3("CDataOwner::GetNextPublicFileL() - selection[%03d]: %S, type: %d", x, &selectionName, iPublicSelections[x]->SelectionType());
+	            OstTraceExt3(TRACE_NORMAL, CDATAOWNER_GETNEXTPUBLICFILEL, "selection[%03d]: %S, type: %d", x, selectionName, iPublicSelections[x]->SelectionType());
 				if (iPublicSelections[x]->SelectionType() == EExclude)
 					{
 					iPublicExcludes.AppendL(selectionName);
@@ -2160,7 +2234,7 @@
 						
 						} // else
 
-		            __LOG1("CDataOwner::GetNextPublicFileL() - next include entry filename is therefore: %S", &fileName);
+					OstTraceExt1(TRACE_NORMAL, DUP1_CDATAOWNER_GETNEXTPUBLICFILEL, "next include entry filename is therefore: %S", fileName);
 					if (fileName.Length() > 0)
 						{
 						
@@ -2170,14 +2244,14 @@
 						    (fileName.MatchF(KDriveAndSlash) != KErrNotFound))
 							{
 							isDrive = ETrue;
-		                    __LOG("CDataOwner::GetNextPublicFileL() - filename is a drive");
+							OstTrace0(TRACE_NORMAL, DUP2_CDATAOWNER_GETNEXTPUBLICFILEL, "filename is a drive");
 							} // if
 							
 						TBool isEntry = EFalse;
 						if (!isDrive)
 							{
 							TInt err = ipDataOwnerManager->GetRFs().Entry(fileName, aEntry);
-		                    __LOG1("CDataOwner::GetNextPublicFileL() - get entry error: %d", err);
+							OstTrace1(TRACE_NORMAL, DUP3_CDATAOWNER_GETNEXTPUBLICFILEL, "get entry error: %d", err);
 							aEntry.iName = fileName;
 							switch (err)
 								{
@@ -2189,6 +2263,7 @@
 							case KErrBadName:
 								break;
 							default:
+							    OstTrace1(TRACE_ERROR, DUP6_CDATAOWNER_GETNEXTPUBLICFILEL, "Leave: %d", err);
 								User::Leave(err);
 								} // switch
 
@@ -2201,7 +2276,7 @@
 					
 						if (isDrive || (isEntry && aEntry.IsDir()))
 							{
-		                    __LOG("CDataOwner::GetNextPublicFileL() - parsing directory...");
+						    OstTrace0(TRACE_NORMAL, DUP4_CDATAOWNER_GETNEXTPUBLICFILEL, "parsing directory...");
 							RDir dir;
 							dir.Open(ipDataOwnerManager->GetRFs(), fileName, KEntryAttMaskSupported);
 							iPublicDirStack.AppendL(dir);
@@ -2216,7 +2291,7 @@
 								}
 	                        else
 	                            {
-	                            __LOG("CDataOwner::BuildFileListL() - file is excluded!");
+	                            OstTrace0(TRACE_NORMAL, DUP5_CDATAOWNER_GETNEXTPUBLICFILEL, "file is excluded!");
 	                            }
 							} // if
 						} // else if
@@ -2261,7 +2336,8 @@
 						
 						// Open the directory and push it onto the dir stack
 						RDir dir;
-						User::LeaveIfError(dir.Open(ipDataOwnerManager->GetRFs(), fileName, KEntryAttMaskSupported));
+						TInt err = dir.Open(ipDataOwnerManager->GetRFs(), fileName, KEntryAttMaskSupported);
+						LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP10_CDATAOWNER_GETNEXTPUBLICFILEL, "Leave: %d", err));
 						iPublicDirStack.AppendL(dir);
 						iPublicDirNameStack.AppendL(aEntry.iName.AllocL());
 						++stackCount;
@@ -2288,6 +2364,7 @@
 					}
 				else
 					{
+				    OstTrace1(TRACE_ERROR, DUP7_CDATAOWNER_GETNEXTPUBLICFILEL, "Leave: %d", err);
 					User::Leave(err);
 					}
 				} // if (stackCount > 0)
@@ -2298,6 +2375,7 @@
 			// If the end of the list has been reached, make sure that an empty TEntry is returned
 			aEntry = TEntry();
 			}
+		OstTraceFunctionExit0( CDATAOWNER_GETNEXTPUBLICFILEL_EXIT );
 		}
 
 
@@ -2311,6 +2389,7 @@
 	@return ETrue if excluded otherwise EFalse
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_ISEXCLUDED_ENTRY );
 		TBool ret = EFalse;
 		
 		// Check it is not in sys, resource, system or backwards path
@@ -2358,7 +2437,7 @@
 			const TInt count = aExclude.Count();
 			for (TInt x = 0; !ret && x < count; x++)
 				{				
-				__LOG1("file name: %S",&aFileName);
+			    OstTraceExt1(TRACE_NORMAL, CDATAOWNER_ISEXCLUDED, "file name: %S",aFileName);
 				if (aExclude[x][0] == KBackSlash()[0])
 					{
 					// Compare with out drive
@@ -2375,7 +2454,8 @@
 				} // for x
 			} // if
 		
-        __LOG2("CDataOwner::IsExcluded() - END - returns excluded: %d for file: %S", ret, &aFileName);
+		OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_ISEXCLUDED, "returns excluded: %d for file: %S", ret, aFileName);
+		OstTraceFunctionExit0( CDATAOWNER_ISEXCLUDED_EXIT );
 		return ret;
 		}
 		
@@ -2386,25 +2466,26 @@
 	@param aLastSection Is this the last section?
 	*/
 		{
-        __LOG2("CDataOwner::SupplyPassiveSnapshotDataL() - START - aDriveNumber: %c, aLastSection: %d", aDriveNumber + 'A', aLastSection);
+        OstTraceFunctionEntry0( CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL_ENTRY );
+        OstTraceExt2(TRACE_NORMAL, CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "aDriveNumber: %c, aLastSection: %d", aDriveNumber + 'A', aLastSection);
 
 		TInt err = KErrNone;
 		if (iBufferSnapshotReader == NULL)
 			{
-            __LOG("CDataOwner::SupplyPassiveSnapshotDataL() - making temporary snapshot holder..");
+		    OstTrace0(TRACE_NORMAL, DUP1_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "making temporary snapshot holder..");
 			iTempSnapshotHolder = CSnapshotHolder::NewL();
 			iTempSnapshotHolder->iDriveNumber = aDriveNumber;
 			iBufferSnapshotReader = CBufferSnapshotReader::NewL(iTempSnapshotHolder->iSnapshots);
 			
-            __LOG("CDataOwner::SupplyPassiveSnapshotDataL() - trying to unpack snapshots from buffer...");
+			OstTrace0(TRACE_NORMAL, DUP2_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "trying to unpack snapshots from buffer...");
 			TRAP(err, iBufferSnapshotReader->StartL(aBuffer, aLastSection));
-            __LOG1("CDataOwner::SupplyPassiveSnapshotDataL() - unpack result was: %d", err);
+			OstTrace1(TRACE_NORMAL, DUP3_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "unpack result was: %d", err);
 			} // if
 		else
 			{
-            __LOG("CDataOwner::SupplyPassiveSnapshotDataL() - continuing unpack operation...");
+		    OstTrace0(TRACE_NORMAL, DUP4_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "continuing unpack operation...");
 			TRAP(err, iBufferSnapshotReader->ContinueL(aBuffer, aLastSection));
-            __LOG1("CDataOwner::SupplyPassiveSnapshotDataL() - continued unpack operation result was: %d", err);
+			OstTrace1(TRACE_NORMAL, DUP5_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "continued unpack operation result was: %d", err);
 			}
 			
 		if ((err != KErrNone) || aLastSection)
@@ -2414,26 +2495,27 @@
 			
 			if (err == KErrNone)
 				{
-                __LOG("CDataOwner::SupplyPassiveSnapshotDataL() - Snapshots identified ok!");
+			    OstTrace0(TRACE_NORMAL, DUP6_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "Snapshots identified ok!");
 				
 				iSnapshots.AppendL(iTempSnapshotHolder);
 				iTempSnapshotHolder = NULL;
 				} // if
 			else
 				{
-                __LOG1("CDataOwner::SupplyPassiveSnapshotDataL() - END - leaving with error: %d", err);
+			    OstTrace1(TRACE_ERROR, DUP7_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "leaving with error: %d", err);
 				User::Leave(err);
 				} // else
 			} // if
 
-        __LOG("CDataOwner::SupplyPassiveSnapshotDataL() - END");
+		OstTraceFunctionExit0( CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL_EXIT );
 		}
 	
 	void CDataOwner::SupplyPassiveBaseDataL(const TDriveNumber aDriveNumber, TDesC8& aBuffer, TBool aLastSection)
 	/** Handles the supply of passive base data
 	*/
 		{
-		__LOG3("CDataOwner::SupplyPassiveBaseDataL() - START - drive: %c, aLastSection: %d, iBufferFileReader: 0x%08x", aDriveNumber + 'A', aLastSection, iBufferFileReader);
+		OstTraceFunctionEntry0( CDATAOWNER_SUPPLYPASSIVEBASEDATAL_ENTRY );
+		OstTraceExt3(TRACE_NORMAL, CDATAOWNER_SUPPLYPASSIVEBASEDATAL, "drive: %c, aLastSection: %d, iBufferFileReader: 0x%08x", static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TUint32>(aLastSection), reinterpret_cast<TInt32>(iBufferFileReader));
 
         TInt err = KErrNone;
 		if (iBufferFileReader == NULL)
@@ -2451,16 +2533,16 @@
 			{
             if  ( err != KErrNone )
                 {
-                __LOG1("CDataOwner::SupplyPassiveBaseDataL() - ERROR - error: %d", err);
+                OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_SUPPLYPASSIVEBASEDATAL, "error: %d", err);
                 }
 	
             delete iBufferFileReader;
 			iBufferFileReader = NULL;
 			
-			User::LeaveIfError(err);
+			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP2_CDATAOWNER_SUPPLYPASSIVEBASEDATAL, "Leave: %d", err));
 			} // if
 
-        __LOG("CDataOwner::SupplyPassiveBaseDataL() - END");
+		OstTraceFunctionExit0( CDATAOWNER_SUPPLYPASSIVEBASEDATAL_EXIT );
 		}
 		
 	void CDataOwner::RequestPassiveSnapshotDataL(TDriveNumber aDriveNumber, TPtr8& aBuffer, 
@@ -2472,7 +2554,8 @@
 	@param aLastSection On return set to true if finished.
 	*/													 
 		{
-        __LOG3("CDataOwner::RequestPassiveSnapshotDataL() - START - aDriveNumber: %c, owner: 0x%08x, bufferLen: %d", aDriveNumber + 'A', iSecureId.iId, aBuffer.Length() );
+        OstTraceFunctionEntry0( CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL_ENTRY );
+        OstTraceExt3(TRACE_NORMAL, CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL, "aDriveNumber: %c, owner: 0x%08x, bufferLen: %d", static_cast<TInt8>(aDriveNumber + 'A'), iSecureId.iId, static_cast<TInt32>(aBuffer.Length()));
 
 		if (iBufferSnapshotWriter == NULL)
 			{
@@ -2490,7 +2573,7 @@
 			const TInt count = fileinfos.Count();
 			if (count > 0)
 				{
-                __LOG1("CDataOwner::SupplyPassiveBaseDataL() - got %d entries...", count);
+			    OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL, "got %d entries...", count);
 
 				// Create a tempory snapshot holder
 				RSnapshots* tempSnapshots = new(ELeave) RSnapshots();
@@ -2501,7 +2584,7 @@
 					{
 					const TDesC& fileName = (*filenames)[x];
 					CSnapshot* snapshot = CSnapshot::NewLC(fileinfos[x].iModified.Int64(), fileName);
-					__LOG3("CDataOwner::RequestPassiveSnapshotDataL() - snapshot[%2d/%2d] = %S", x+1, count, &fileName);
+					OstTraceExt3(TRACE_NORMAL, DUP2_CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL, "snapshot[%2d/%2d] = %S", x+1, count, fileName);
 					tempSnapshots->AppendL(snapshot);
 					CleanupStack::Pop(snapshot);
 					} // for x
@@ -2510,7 +2593,7 @@
 				iBufferSnapshotWriter = CBufferSnapshotWriter::NewL(tempSnapshots);
 				CleanupStack::Pop(tempSnapshots);
 				
-                __LOG("CDataOwner::RequestPassiveSnapshotDataL() - writing snapshots to buffer...");
+				OstTrace0(TRACE_NORMAL, DUP3_CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL, "writing snapshots to buffer...");
 				iBufferSnapshotWriter->StartL(aBuffer, aLastSection);
 				if (aLastSection)
 					{
@@ -2538,7 +2621,8 @@
 				} // if
 			} // else
 
-        __LOG2("CDataOwner::RequestPassiveSnapshotDataL() - END - aLastSection: %d, bufferLen: %d", aLastSection, aBuffer.Length());
+		OstTraceExt2(TRACE_NORMAL, DUP4_CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL, "aLastSection: %d, bufferLen: %d", aLastSection, aBuffer.Length());
+		OstTraceFunctionExit0( CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL_EXIT );
 		} // RequestPassiveSnapShotDataL
 		
 	void CDataOwner::RequestPassiveDataL(TTransferDataType aTransferType, 
@@ -2551,7 +2635,8 @@
 	@param aLastSection On return set to true if finished.
 	*/
 		{
-        __LOG4("CDataOwner::RequestPassiveDataL() - START - aDrive: %c, aTransferType: %d, iSecureId: 0x%08x, iBufferFileWriter: 0x%08x", aDriveNumber + 'A', aTransferType, iSecureId.iId, iBufferFileWriter);
+        OstTraceFunctionEntry0( CDATAOWNER_REQUESTPASSIVEDATAL_ENTRY );
+        OstTraceExt4(TRACE_NORMAL, CDATAOWNER_REQUESTPASSIVEDATAL, "aDrive: %c, aTransferType: %d, iSecureId: 0x%08x, iBufferFileWriter: 0x%08x", static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TInt32>(aTransferType), iSecureId.iId, reinterpret_cast<TInt32>(iBufferFileWriter));
 
         // Build the list of files
 		if (iBufferFileWriter == NULL)
@@ -2561,7 +2646,7 @@
 
 			if (aTransferType == EPassiveBaseData)
 				{
-                __LOG("CDataOwner::RequestPassiveDataL() - EPassiveBaseData...");
+			    OstTrace0(TRACE_NORMAL, DUP1_CDATAOWNER_REQUESTPASSIVEDATAL, "EPassiveBaseData...");
 				BuildFileListL(iPassiveSelections, aDriveNumber, aTransferType, EFalse, NULL, NULL, filenames);
 				
 				// Add the DBMS file
@@ -2587,7 +2672,7 @@
 				} // else
 
 
-            __LOG1("CDataOwner::RequestPassiveDataL() - Got %d files...", filenames->Count());
+			OstTrace1(TRACE_NORMAL, DUP2_CDATAOWNER_REQUESTPASSIVEDATAL, "Got %d files...", filenames->Count());
 			if (filenames->Count() > 0)
 				{
 				// Create a file writer
@@ -2618,7 +2703,7 @@
 				} // if
 			} // else
 		
-        __LOG("CDataOwner::RequestPassiveDataL() - END");
+		OstTraceFunctionExit0( CDATAOWNER_REQUESTPASSIVEDATAL_EXIT );
 		}
 		
 	void CDataOwner::IsNewerL(const TDesC& aFileName, const TEntry& aFile, const RSnapshots* aSnapshots, TBool& aNewer)
@@ -2632,10 +2717,11 @@
 	@leave KErrNotFound if aFile does not exist in aFiles.
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_ISNEWERL_ENTRY );
 		CSnapshot* snapshot = CSnapshot::NewLC(TTime().Int64(), aFileName);
 		TInt res = aSnapshots->Find(snapshot, CSnapshot::Match);
 		CleanupStack::PopAndDestroy(snapshot);
-		User::LeaveIfError(res);
+		LEAVEIFERROR(res, OstTrace1(TRACE_ERROR, CDATAOWNER_ISNEWERL, "Leave: %d", res));
 		if (aFile.iModified.Int64() > (*aSnapshots)[res]->Modified())
 			{
 			aNewer = ETrue;
@@ -2644,6 +2730,7 @@
 			{
 			aNewer = EFalse;
 			}
+		OstTraceFunctionExit0( CDATAOWNER_ISNEWERL_EXIT );
 		}
 	
 	RSnapshots* CDataOwner::FindSnapshot(TDriveNumber aDriveNumber)
@@ -2653,8 +2740,9 @@
 	@return The snapshot or NULL
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_FINDSNAPSHOT_ENTRY );
 		const TInt count = iSnapshots.Count();
-		__LOG3("CDataOwner::FindSnapshot() - START - aDriveNumber: %c, count: %d, iSecureId: 0x%08x", aDriveNumber + 'A', count, iSecureId.iId);
+		OstTraceExt3(TRACE_NORMAL, CDATAOWNER_FINDSNAPSHOT, "aDriveNumber: %c, count: %d, iSecureId: 0x%08x", static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TInt32>(count), iSecureId.iId);
 
         RSnapshots* pRet = NULL;
 		
@@ -2662,16 +2750,14 @@
 			{
             CSnapshotHolder* snapshotHolder = iSnapshots[x];
 
-		#ifdef SBE_LOGGING_ENABLED            
             const TInt entryCount = snapshotHolder->iSnapshots.Count();
-            __LOG4("CDataOwner::FindSnapshot() - snapshot[%02d] - drive: %c, entry Count: %d, addr: 0x%08x", x, snapshotHolder->iDriveNumber + 'A', entryCount, &snapshotHolder->iSnapshots);
+            OstTraceExt4(TRACE_NORMAL, DUP1_CDATAOWNER_FINDSNAPSHOT, "snapshot[%02d] - drive: %c, entry Count: %d, addr: 0x%08x", static_cast<TInt32>(x), static_cast<TInt8>(snapshotHolder->iDriveNumber + 'A'), static_cast<TInt32>(entryCount), reinterpret_cast<TUint32>(&snapshotHolder->iSnapshots));
 
             for(TInt i=0; i<entryCount; i++)
                 {
                 const TDesC& snapshot = snapshotHolder->iSnapshots[i]->FileName();
-                __LOG2("CDataOwner::FindSnapshot() -     file[%04d]: %S", i+1, &snapshot);
+                OstTraceExt2(TRACE_NORMAL, DUP2_CDATAOWNER_FINDSNAPSHOT, "file[%04d]: %S", i+1, snapshot);
                 }
-		#endif
 
 			if (snapshotHolder->iDriveNumber == aDriveNumber)
 				{
@@ -2679,7 +2765,8 @@
 				} // if
 			} // for x
 			
-		__LOG1("CDataOwner::FindSnapshot() - END - ret: 0x%08x", pRet);
+		OstTrace1(TRACE_NORMAL, DUP3_CDATAOWNER_FINDSNAPSHOT, "ret: 0x%08x", pRet);
+		OstTraceFunctionExit0( CDATAOWNER_FINDSNAPSHOT_EXIT );
 		return pRet;
 		}
 		
@@ -2689,6 +2776,7 @@
 	*/
 	TDataOwnerStateByDrive& CDataOwner::StateByDriveL(TDriveNumber& aDrive)
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_STATEBYDRIVEL_ENTRY );
 		TBool found = EFalse;
 		const TInt count = iStateByDrive.Count();
 		TInt index = 0;
@@ -2709,9 +2797,11 @@
 		// We must have found, otherwise error	
 		if (!found)
 			{
+		    OstTrace0(TRACE_ERROR, CDATAOWNER_STATEBYDRIVEL, "Leave: KErrNotFound");
 			User::Leave(KErrNotFound);
 			}
 			
+		OstTraceFunctionExit0( CDATAOWNER_STATEBYDRIVEL_EXIT );
 		return iStateByDrive[index];
 		}
 
@@ -2722,6 +2812,7 @@
 	*/
 	TProxyStateByDrive& CDataOwner::ProxyStateByDriveL(TDriveNumber& aDrive, TInt aProxy)
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_PROXYSTATEBYDRIVEL_ENTRY );
 		TBool found = EFalse;
 		const TInt count = iProxyStateByDrive.Count();
 		TInt index = 0;
@@ -2747,6 +2838,7 @@
 			index = count;
 			}
 			
+		OstTraceFunctionExit0( CDATAOWNER_PROXYSTATEBYDRIVEL_EXIT );
 		return iProxyStateByDrive[index];
 		}
 
@@ -2757,11 +2849,12 @@
 	*/
 	void CDataOwner::BuildDriveStateArrayL()
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_BUILDDRIVESTATEARRAYL_ENTRY );
 		TDriveList driveList;
 		driveList.SetMax();
 		
 		TRAPD(err, GetDriveListL(driveList));
-        __LOG2("CDataOwner::BuildDriveStateArrayL() - START - SID: 0x%08x, error: %d", iSecureId.iId, err);
+		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_BUILDDRIVESTATEARRAYL, "SID: 0x%08x, error: %d", iSecureId.iId, static_cast<TInt32>(err));
 		
 		if (err == KErrNone)
 			{
@@ -2776,8 +2869,9 @@
 			}
 		else
 			{
-			__LOG1("CDataOwner::BuildDriveStateArrayL() - Warning! error ocurred whilst getting the drivelist from data owner %08x", iSecureId.iId);
+		    OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_BUILDDRIVESTATEARRAYL, "Warning! error ocurred whilst getting the drivelist from data owner %08x", iSecureId.iId);
 			}
+		OstTraceFunctionExit0( CDATAOWNER_BUILDDRIVESTATEARRAYL_EXIT );
 		}
 		
 		
@@ -2786,14 +2880,16 @@
 	*/
 	void CDataOwner::AddDBMSFilesL(TDriveNumber aDriveNumber, CDesCArray* apFileNames, RFileArray* apEntries)
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_ADDDBMSFILESL_ENTRY );
 		const TInt count = iDBMSSelections.Count();
-		__LOG3("CDataOwner::AddDBMSFilesL() - START - aDriveNumber: %c, owner: 0x%08x, count: %d", aDriveNumber + 'A', iSecureId.iId, count);
+		OstTraceExt3(TRACE_NORMAL, CDATAOWNER_ADDDBMSFILESL, "aDriveNumber: %c, owner: 0x%08x, count: %d", static_cast<TInt8>(aDriveNumber + 'A'), iSecureId.iId, static_cast<TInt32>(count));
 
         if (count > 0)
 			{
 			// Get DB connection
 			RDbs dbs;
-			User::LeaveIfError(dbs.Connect());
+			TInt err = dbs.Connect();
+			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP10_CDATAOWNER_ADDDBMSFILESL, "Leave: %d", err));
 			CleanupClosePushL(dbs);
 			
 			for (TInt x = 0; x < count; x++)
@@ -2807,13 +2903,13 @@
 					{
 					CleanupStack::PushL(pFilenames);
 					
-		        	__LOG1("CDataOwner::AddDBMSFilesL() - getting backup paths for owner returned error: %d", err);
+					OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_ADDDBMSFILESL, "getting backup paths for owner returned error: %d", err);
 		        	
 					const TInt count = pFilenames->Count();
 					for (TInt x = 0; x < count; x++)
 						{
                         const TDesC& pFileName = (*pFilenames)[x];
-	                	__LOG3("CDataOwner::AddDBMSFilesL() - file[%3d/%3d] = %S", x + 1, count, &pFileName);
+                        OstTraceExt3(TRACE_NORMAL, DUP2_CDATAOWNER_ADDDBMSFILESL, "file[%3d/%3d] = %S", x + 1, count, pFileName);
 
 						TInt drive = -1;
 						TInt driveerr = RFs::CharToDrive( pFileName[0], drive);
@@ -2821,28 +2917,28 @@
 							{ 
 							if (apFileNames)
 								{
-	                	        __LOG1("CDataOwner::AddDBMSFilesL() - adding validated filename: %S", &pFileName);
+							    OstTraceExt1(TRACE_NORMAL, DUP3_CDATAOWNER_ADDDBMSFILESL, "adding validated filename: %S", pFileName);
 								apFileNames->AppendL( pFileName );
 								}
 							if (apEntries)
 								{
 								TEntry entry;
 								TInt entryError = ipDataOwnerManager->GetRFs().Entry( pFileName, entry);
-	                	        __LOG2("CDataOwner::AddDBMSFilesL() - drive entry result for file \'%S\' is: %d", &pFileName, entryError);
+								OstTraceExt2(TRACE_NORMAL, DUP4_CDATAOWNER_ADDDBMSFILESL, "drive entry result for file \'%S\' is: %d", pFileName, entryError);
 								if (entryError == KErrNone)
 									{
-	                	            __LOG1("CDataOwner::AddDBMSFilesL() - adding validated entry: %S", &pFileName);
+								    OstTraceExt1(TRACE_NORMAL, DUP5_CDATAOWNER_ADDDBMSFILESL, "adding validated entry: %S", pFileName);
 									apEntries->AppendL(entry);
 									} // if
 								else if (entryError != KErrNotFound)
 									{
-									__LOG2("CDataOwner::AddDBMSFilesL() - Could not get entry for 0x%08x, error: %d", iSecureId.iId, entryError);
+								    OstTraceExt2(TRACE_NORMAL, DUP6_CDATAOWNER_ADDDBMSFILESL, "Could not get entry for 0x%08x, error: %d", iSecureId.iId, static_cast<TInt32>(entryError));
 									} // else if
 								} // if
 							} // if
 						else
     						{
-							__LOG("CDataOwner::AddDBMSFilesL() - File is not applicable for this drive => file ignored");
+						    OstTrace0(TRACE_NORMAL, DUP7_CDATAOWNER_ADDDBMSFILESL, "File is not applicable for this drive => file ignored");
     						}
 						} // for x
 					
@@ -2851,7 +2947,7 @@
 					}
 				else
 					{
-					__LOG2("CDataOwner::AddDBMSFilesL() - RDbs error %d SID: 0x%08x", err, iSecureId.iId);
+				    OstTraceExt2(TRACE_NORMAL, DUP8_CDATAOWNER_ADDDBMSFILESL, "RDbs error %d SID: 0x%08x", static_cast<TInt32>(err), iSecureId.iId);
 					} // else
 				} // for x
 			
@@ -2859,7 +2955,8 @@
 			CleanupStack::PopAndDestroy(&dbs);	
 			} // if
 		
-        __LOG2("CDataOwner::AddDBMSFilesL() - END - aDriveNumber: %c, owner: 0x%08x", aDriveNumber + 'A', iSecureId.iId);
+        OstTraceExt2(TRACE_NORMAL, DUP9_CDATAOWNER_ADDDBMSFILESL, "aDriveNumber: %c, owner: 0x%08x", static_cast<TInt8>(aDriveNumber + 'A'), iSecureId.iId);
+		OstTraceFunctionExit0( CDATAOWNER_ADDDBMSFILESL_EXIT );
 		} // AddDBMSFiles
 		
 	/** Disables system data
@@ -2875,6 +2972,7 @@
 	@return error if Append failes
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_ADDPROXYTOLIST_ENTRY );
 		TInt count = iProxyInformationArray.Count();
 		TBool found = EFalse;
 		
@@ -2891,8 +2989,9 @@
 		if (!found)
 			{
 			err = iProxyInformationArray.Append(aProxy);
-			__LOG2("Data owner(0x%08x): Adding Proxy(0x%08x) to the list", iSecureId.iId,aProxy.iSecureId.iId);
+			OstTraceExt2(TRACE_NORMAL, CDATAOWNER_ADDPROXYTOLIST, "Data owner(0x%08x): Adding Proxy(0x%08x) to the list", iSecureId.iId,aProxy.iSecureId.iId);
 			}
+		OstTraceFunctionExit0( CDATAOWNER_ADDPROXYTOLIST_EXIT );
 		return err;
 		}	
 		
@@ -2901,10 +3000,11 @@
 	@param aDriveNumber drive to clear
 	*/
 		{
+        OstTraceFunctionEntry0( CDATAOWNER_CLEANUPBEFORERESTOREL_ENTRY );
         const TBool passiveDeleteBeforeRestore = iPassiveInformation.iDeleteBeforeRestore;
         const TBool driveAlreadyCleaned = StateByDriveL(aDriveNumber).iDeleteBeforeRestorePerformed;
 
-        __LOG4("CDataOwner::CleanupBeforeRestoreL() - START - aDriveNumber: %c, owner: 0x%08x, passiveDeleteBeforeRestore: %d, driveAlreadyCleaned: %d", aDriveNumber + 'A', iSecureId.iId, passiveDeleteBeforeRestore, driveAlreadyCleaned);
+        OstTraceExt4(TRACE_NORMAL, CDATAOWNER_CLEANUPBEFORERESTOREL, "aDriveNumber: %c, owner: 0x%08x, passiveDeleteBeforeRestore: %d, driveAlreadyCleaned: %d", static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TInt32>(iSecureId.iId), static_cast<TInt32>(passiveDeleteBeforeRestore), static_cast<TInt32>(driveAlreadyCleaned));
 
         if  ( passiveDeleteBeforeRestore && !driveAlreadyCleaned )
 			{
@@ -2938,7 +3038,7 @@
 				{
 				const TDesC& fileName = (*toDelete)[x];
 
-	            __LOG3("CDataOwner::CleanupBeforeRestoreL() - checking file[%2d/%2d] for match = %S", x + 1, count, &fileName);
+				OstTraceExt3(TRACE_NORMAL, DUP1_CDATAOWNER_CLEANUPBEFORERESTOREL, "checking file[%2d/%2d] for match = %S", x + 1, count, fileName);
 
                 // Check it is not a backup registration file
 				if  ( fileName.MatchF(KBackupRegistrationFile) == KErrNotFound )
@@ -2952,8 +3052,8 @@
 						{
 						  deleteError = ipDataOwnerManager->GetRFs().Delete( fileName );
 						}
-					__LOG2("CDataOwner::CleanupBeforeRestoreL() - trying to deleting file %S (error was: %d)", &fileName, deleteError);
-					User::LeaveIfError(deleteError);
+                    OstTraceExt2(TRACE_NORMAL, DUP2_CDATAOWNER_CLEANUPBEFORERESTOREL, "trying to deleting file %S (error was: %d)", fileName, deleteError);
+					LEAVEIFERROR(deleteError, OstTrace1(TRACE_ERROR, DUP4_CDATAOWNER_CLEANUPBEFORERESTOREL, "Leave: %d", deleteError));
 					} // if
 				} // for
 			
@@ -2965,7 +3065,8 @@
 			CleanupStack::PopAndDestroy(selections);
 			} // if
 
-        __LOG2("CDataOwner::CleanupBeforeRestoreL() - END - aDriveNumber: %c, owner: 0x%08x", aDriveNumber + 'A', iSecureId.iId);
+        OstTraceExt2(TRACE_NORMAL, DUP3_CDATAOWNER_CLEANUPBEFORERESTOREL, "aDriveNumber: %c, owner: 0x%08x", static_cast<TInt8>(aDriveNumber + 'A'), iSecureId.iId);
+		OstTraceFunctionExit0( CDATAOWNER_CLEANUPBEFORERESTOREL_EXIT );
 		} 
 	/**
 	Check if the file is in the include list
@@ -2975,7 +3076,8 @@
 	*/
 	TBool CDataOwner::ValidFileL(const TDesC& aFileName)
 		{
-        __LOG2("CDataOwner::ValidFileL() - START - owner: 0x%08x, aFileName: %S", iSecureId.iId, &aFileName);
+        OstTraceFunctionEntry0( CDATAOWNER_VALIDFILEL_ENTRY );
+        OstTraceExt2(TRACE_NORMAL, CDATAOWNER_VALIDFILEL, "owner: 0x%08x, aFileName: %S", iSecureId.iId, aFileName);
 
         TInt include = EFalse;
 		
@@ -2984,18 +3086,18 @@
 			{
 			const TDesC& selectionName = iPassiveSelections[i]->SelectionName();
 			TInt match = aFileName.FindF(selectionName);
-            __LOG5("CDataOwner::ValidFileL() - match result against file[%3d/%3d], selectionType: %d, matchResult: %d, name: %S", i+1, count, iPassiveSelections[i]->SelectionType(), match, &selectionName);
+			OstTraceExt5(TRACE_NORMAL, DUP1_CDATAOWNER_VALIDFILEL, "match result against file[%3d/%3d], selectionType: %d, matchResult: %d, name: %S", i+1, count, iPassiveSelections[i]->SelectionType(), match, selectionName);
             
             if (match >= 0)
 				{
 				if (iPassiveSelections[i]->SelectionType() == EInclude)
 					{
-                    __LOG("CDataOwner::ValidFileL() - file included");
+				    OstTrace0(TRACE_NORMAL, DUP2_CDATAOWNER_VALIDFILEL, "file included");
 					include = ETrue;
 					}
 				else
 					{
-                    __LOG("CDataOwner::ValidFileL() - file excluded");
+				    OstTrace0(TRACE_NORMAL, DUP3_CDATAOWNER_VALIDFILEL, "file excluded");
 					include = EFalse;
 					break;	
 					} // else if
@@ -3007,25 +3109,26 @@
         const TInt dbmsSelectionCount = iDBMSSelections.Count();
 		if (dbmsSelectionCount && !include)
 			{
-            __LOG1("CDataOwner::ValidFileL() - checking against %d DBMS files...", dbmsSelectionCount);
+		    OstTrace1(TRACE_NORMAL, DUP4_CDATAOWNER_VALIDFILEL, "checking against %d DBMS files...", dbmsSelectionCount);
 
             for (TInt j = 0; j < dbmsSelectionCount; j++)
 				{
                 const TDesC& pDbmsFileName =  iDBMSSelections[j].Name();
                 const TInt matchResult = aFileName.FindF( pDbmsFileName );
 
-                __LOG4("CDataOwner::ValidFileL() - checking against DBMS file[%2d/%2d] with result: %d (%S)...", j+1, dbmsSelectionCount, matchResult, &pDbmsFileName);
+                OstTraceExt4(TRACE_NORMAL, DUP5_CDATAOWNER_VALIDFILEL, "checking against DBMS file[%2d/%2d] with result: %d (%S)...", j+1, dbmsSelectionCount, matchResult, pDbmsFileName);
 
                 if  ( matchResult )
 					{
-                    __LOG("CDataOwner::ValidFileL() - DBMS file included");
+                    OstTrace0(TRACE_NORMAL, DUP6_CDATAOWNER_VALIDFILEL, "DBMS file included");
 					include = ETrue;
 					break;
 					} // if
 				}//for
 			} // if
 		
-        __LOG1("CDataOwner::ValidFileL() - END - valid file result is: %d", include);
+		OstTrace1(TRACE_NORMAL, DUP7_CDATAOWNER_VALIDFILEL, "valid file result is: %d", include);
+		OstTraceFunctionExit0( CDATAOWNER_VALIDFILEL_EXIT );
 		return include;
 		}
 		
@@ -3039,23 +3142,27 @@
 	/** MContentHandler::OnStartDocumentL()
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_ONSTARTDOCUMENTL_ENTRY );
 		if (aErrorCode != KErrNone)
 			{
-			__LOG1("CDataOwner::OnStartDocumentL() - error = %d", aErrorCode);
+		    OstTrace1(TRACE_ERROR, CDATAOWNER_ONSTARTDOCUMENTL, "error = %d", aErrorCode);
 			User::Leave(aErrorCode);
 			}
+		OstTraceFunctionExit0( CDATAOWNER_ONSTARTDOCUMENTL_EXIT );
 		}
 		
 	void CDataOwner::OnEndDocumentL(TInt aErrorCode)
 	/** MContentHandler::OnEndDocumentL()
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_ONENDDOCUMENTL_ENTRY );
 		if (aErrorCode != KErrNone)
 			{
 			// just to satifsy UREL compiler
 			(void) aErrorCode;
-			__LOG1("CDataOwner::OnEndDocumentL() - error = %d", aErrorCode);
+			OstTrace1(TRACE_NORMAL, CDATAOWNER_ONENDDOCUMENTL, "error = %d", aErrorCode);
 			}
+		OstTraceFunctionExit0( CDATAOWNER_ONENDDOCUMENTL_EXIT );
 		}
 		
 	void CDataOwner::OnStartElementL(const RTagInfo& aElement, 
@@ -3066,12 +3173,14 @@
 	@leave KErrUnknown an unknown element
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_ONSTARTELEMENTL_ENTRY );
 		if (aErrorCode != KErrNone)
 			{
-			__LOG1("CDataOwner::OnStartElementL() - error = %d", aErrorCode);
-			User::LeaveIfError(aErrorCode);
+		    OstTrace1(TRACE_NORMAL, CDATAOWNER_ONSTARTELEMENTL, "error = %d", aErrorCode);
+			LEAVEIFERROR(aErrorCode, OstTrace1(TRACE_ERROR, DUP2_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", aErrorCode));
 			}
 		
+		TInt err;
 		TBool unknownElement = EFalse;
 		const TDesC8& localName = aElement.LocalName().DesC();
 		if (localName == KIncludeFile) 
@@ -3092,24 +3201,29 @@
 			}
 		else if (!localName.CompareF(KDBMSBackup))
 			{
-			User::LeaveIfError(HandleDBMSBackupL(aAttributes));
+		    err = HandleDBMSBackupL(aAttributes);
+			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP3_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
 			}
 		else if (!localName.CompareF(KSystemBackup))
 			{
-			User::LeaveIfError(HandleSystemBackup(aAttributes));
+		    err = HandleSystemBackup(aAttributes);
+			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP4_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
 			}
 		else if (!localName.CompareF(KProxyDataManager))
 			{
-			User::LeaveIfError(HandleProxyDataManager(aAttributes));
+		    err = HandleProxyDataManager(aAttributes);
+			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP5_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
 			}
 		else if (!localName.CompareF(KCenrepBackup))
 			{
-			User::LeaveIfError(HandleCenrepBackup(aAttributes));
+		    err = HandleCenrepBackup(aAttributes);
+			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP6_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
 			}
 		else if (!localName.CompareF(KPublicBackup))
 			{
 			iCurrentElement = EPublic;
-			User::LeaveIfError(HandlePublicBackup(aAttributes));
+			err = HandlePublicBackup(aAttributes);
+			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP7_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
 			}
 		else if (!localName.CompareF(KPassiveBackup))
 			{
@@ -3117,7 +3231,8 @@
 			// Only allow passive to be switched on in primary files
 			if (iPrimaryFile)
 				{
-				User::LeaveIfError(HandlePassiveBackup(aAttributes));
+			    err = HandlePassiveBackup(aAttributes);
+				LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP8_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
 				}
 			}
 		else if (iPrimaryFile) 
@@ -3125,11 +3240,13 @@
 			// These remaining elements are only allowed in primary files
 			if (!localName.CompareF(KActiveBackup))
 				{
-				User::LeaveIfError(HandleActiveBackupL(aAttributes));
+			    err = HandleActiveBackupL(aAttributes);
+				LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP9_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
 				}
 			else if (!localName.CompareF(KRestore))
 				{
-				User::LeaveIfError(HandleRestore(aAttributes));
+			    err = HandleRestore(aAttributes);
+				LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP10_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
 				}
 			else 
 				{
@@ -3143,8 +3260,9 @@
 			
 		if (unknownElement)
 			{
-			__LOG1("CDataOwner::OnStartElementL() - Unknown element while parsing 0x%08x", iSecureId.iId);
+		    OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_ONSTARTELEMENTL, "Unknown element while parsing 0x%08x", iSecureId.iId);
 			}
+		OstTraceFunctionExit0( CDATAOWNER_ONSTARTELEMENTL_EXIT );
 		}
 
 	
@@ -3152,9 +3270,10 @@
 	/** MContentHandler::OnEndElementL()
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_ONENDELEMENTL_ENTRY );
 		if (aErrorCode != KErrNone)
 			{
-			__LOG1("CDataOwner::OnEndElementL() - error = %d", aErrorCode);
+		    OstTrace1(TRACE_ERROR, CDATAOWNER_ONENDELEMENTL, "error = %d", aErrorCode);
 			User::Leave(aErrorCode);
 			}
 		
@@ -3167,6 +3286,7 @@
 			{
 			iCurrentElement = ENoElement;
 			} // else if
+		OstTraceFunctionExit0( CDATAOWNER_ONENDELEMENTL_EXIT );
 		}
 
 	void CDataOwner::OnContentL(const TDesC8& /*aBytes*/, TInt /*aErrorCode*/)
@@ -3220,8 +3340,10 @@
 	@leave aErrorCode
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_ONERROR_ENTRY );
 		(void)aErrorCode;
-		__LOG1("CDataOwner::OnError() - error = %d", aErrorCode);
+		OstTrace1(TRACE_NORMAL, CDATAOWNER_ONERROR, "error = %d", aErrorCode);
+		OstTraceFunctionExit0( CDATAOWNER_ONERROR_EXIT );
 		}
 
 	TAny* CDataOwner::GetExtendedInterface(const TInt32 /*aUid*/)
@@ -3239,15 +3361,17 @@
 	@return KErrUnknown unknown version
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_HANDLEBACKUPREGISTRATIONL_ENTRY );
 		if (aAttributes.Count() == 1)
 			{
 			// Check the version is correct.
 			if (aAttributes[0].Value().DesC() != KVersion()) // Only version we know about
 				{
-				__LOG1("CDataOwner::HandleBackupRegistrationL() - Unknown version at SID(0x%08x)", iSecureId.iId);
+			    OstTrace1(TRACE_ERROR, CDATAOWNER_HANDLEBACKUPREGISTRATIONL, "Unknown version at SID(0x%08x)", iSecureId.iId);
 				User::Leave(KErrNotSupported);
 				} // else
 			} // if
+		OstTraceFunctionExit0( CDATAOWNER_HANDLEBACKUPREGISTRATIONL_EXIT );
 		}
 
 
@@ -3258,6 +3382,7 @@
 	@return KErrNone
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_HANDLEPASSIVEBACKUP_ENTRY );
 		iPassiveInformation.iSupported = ETrue;
 		
 		// Loop through reading out attribute values
@@ -3270,19 +3395,19 @@
 				{
                 const TBool supportsSelective = ( aAttributes[x].Value().DesC().CompareF(KYes) == 0 );
 				iPassiveInformation.iSupportsSelective = supportsSelective;
-				__LOG2("CDataOwner::HandlePassiveBackup(0x%08x) - iPassiveInformation.iSupportsSelective: %d", iSecureId.iId, supportsSelective);
+				OstTraceExt2(TRACE_NORMAL, DUP3_CDATAOWNER_HANDLEPASSIVEBACKUP, "(0x%08x) - iPassiveInformation.iSupportsSelective: %d", iSecureId.iId, static_cast<TInt32>(supportsSelective));
                 } // if
 			else if ( localName.CompareF(KDeleteBeforeRestore) == 0 )
 				{
 				// AW This logic looks somewhat strange.
 				if (!aAttributes[x].Value().DesC().CompareF(KYes))
 					{
-				    __LOG1("CDataOwner::HandlePassiveBackup(0x%08x) - iPassiveInformation.iDeleteBeforeRestore: ETrue", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_HANDLEPASSIVEBACKUP, "(0x%08x) - iPassiveInformation.iDeleteBeforeRestore: ETrue", iSecureId.iId);
 					iPassiveInformation.iDeleteBeforeRestore |= ETrue;
 					} // if
 				else
 					{
-				    __LOG1("CDataOwner::HandlePassiveBackup(0x%08x) - iPassiveInformation.iDeleteBeforeRestore: EFalse", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP2_CDATAOWNER_HANDLEPASSIVEBACKUP, "(0x%08x) - iPassiveInformation.iDeleteBeforeRestore: EFalse", iSecureId.iId);
 					iPassiveInformation.iDeleteBeforeRestore |= EFalse;
 					} // else
 				} // else if
@@ -3290,14 +3415,15 @@
 				{
                 const TBool baseBackupOnly = ( aAttributes[x].Value().DesC().CompareF(KYes) == 0 );
 				iPassiveInformation.iBaseBackupOnly = baseBackupOnly;
-				__LOG2("CDataOwner::HandlePassiveBackup(0x%08x) - iPassiveInformation.iBaseBackupOnly: %d", iSecureId.iId, baseBackupOnly);
+				OstTraceExt2(TRACE_NORMAL, DUP4_CDATAOWNER_HANDLEPASSIVEBACKUP, "(0x%08x) - iPassiveInformation.iBaseBackupOnly: %d", iSecureId.iId, static_cast<TInt32>(baseBackupOnly));
 				} // else if
 			else
 				{
-				__LOG1("CDataOwner::HandlePassiveBackup() - Unknown element while parsing 0x%08x", iSecureId.iId);
+			    OstTrace1(TRACE_NORMAL, DUP5_CDATAOWNER_HANDLEPASSIVEBACKUP, "Unknown element while parsing 0x%08x", iSecureId.iId);
 				} // else
 			} // for x
 		
+		OstTraceFunctionExit0( CDATAOWNER_HANDLEPASSIVEBACKUP_EXIT );
 		return KErrNone;
 		}
 
@@ -3309,15 +3435,17 @@
 	@return KErrNone
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_HANDLEPUBLICBACKUP_ENTRY );
 		iPublicInformation.iSupported = ETrue;
 		
 		if (aAttributes.Count() > 0)
 			{
             const TBool deleteBeforeRestore = ( aAttributes[0].Value().DesC().CompareF(KYes) == 0 );
 			iPublicInformation.iDeleteBeforeRestore = deleteBeforeRestore;
-			__LOG2("CDataOwner::HandlePublicBackup(0x%08x) - iPublicInformation.iDeleteBeforeRestore: %d", iSecureId.iId, deleteBeforeRestore);
+			OstTraceExt2(TRACE_NORMAL, CDATAOWNER_HANDLEPUBLICBACKUP, "(0x%08x) - iPublicInformation.iDeleteBeforeRestore: %d", iSecureId.iId, static_cast<TInt32>(deleteBeforeRestore));
 			} // if
 		
+		OstTraceFunctionExit0( CDATAOWNER_HANDLEPUBLICBACKUP_EXIT );
 		return KErrNone;
 		}
 
@@ -3328,9 +3456,11 @@
 	@return KErrNone
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_HANDLESYSTEMBACKUP_ENTRY );
 		iSystemInformation.iSupported = ETrue;
-		__LOG2("CDataOwner::HandleSystemBackup(0x%08x) - iSystemInformation.iSupported: %d", iSecureId.iId, iSystemInformation.iSupported);
+		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_HANDLESYSTEMBACKUP, "(0x%08x) - iSystemInformation.iSupported: %d", iSecureId.iId, static_cast<TInt32>(iSystemInformation.iSupported));
 
+		OstTraceFunctionExit0( CDATAOWNER_HANDLESYSTEMBACKUP_EXIT );
 		return KErrNone;	
 		}
 
@@ -3342,6 +3472,7 @@
 	@return KErrNone
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_HANDLECENREPBACKUP_ENTRY );
 		TInt err = KErrNone;
 		TProxyInformation proxyInformation;
 		
@@ -3361,7 +3492,8 @@
 				
 			}
 		
-		__LOG2("CDataOwner::HandleCenrepBackup(0x%08x) - proxy creation error: %d", iSecureId.iId, err);
+		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_HANDLECENREPBACKUP, "(0x%08x) - proxy creation error: %d", iSecureId.iId, static_cast<TInt32>(err));
+		OstTraceFunctionExit0( CDATAOWNER_HANDLECENREPBACKUP_EXIT );
 		return err;
 		}
 
@@ -3372,6 +3504,7 @@
 	@return KErrNone
 	*/
 		{	
+		OstTraceFunctionEntry0( CDATAOWNER_HANDLEPROXYDATAMANAGER_ENTRY );
 		TInt err = KErrNone;
 		
 		TProxyInformation proxyInformation;
@@ -3390,7 +3523,7 @@
 				{
 				if (hexString.Length() < (result + KHexLeader().Size()))
 					{
-					__LOG1("CDataOwner::HandleProxyDataManager() - The Hex number has incorrect number of digits", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, CDATAOWNER_HANDLEPROXYDATAMANAGER, "The Hex number has incorrect number of digits for 0x%08x", iSecureId.iId);
 					}
 				// Strip off the preceeding upper case hex leader characters
 				strippedSID.Set(hexString.Mid(result + KHexLeader().Size()));
@@ -3418,15 +3551,16 @@
 						}
 					}
         		
-                __LOG3("CDataOwner::HandleProxyDataManager(0x%08x) - proxy creation error: %d for proxySid: 0x%08x", iSecureId.iId, err, proxyInformation.iSecureId.iId);
+				OstTraceExt3(TRACE_NORMAL, DUP1_CDATAOWNER_HANDLEPROXYDATAMANAGER, "(0x%08x) - proxy creation error: %d for proxySid: 0x%08x", iSecureId.iId, static_cast<TInt32>(err), proxyInformation.iSecureId.iId);
 				}
 			else 
 				{
-				__LOG1("CDataOwner::HandleProxyDataManager() - Not a Hex Number specified in reg_file of 0x%08x)", iSecureId.iId);
+			    OstTrace1(TRACE_NORMAL, DUP2_CDATAOWNER_HANDLEPROXYDATAMANAGER, "Not a Hex Number specified in reg_file of 0x%08x)", iSecureId.iId);
 				err = KErrNone;		// We shouldn't return an error unless Append has errored (OOM etc.)
 				}
 			} // else it's corrupt - don't error, just ignore this attribute
 		
+		OstTraceFunctionExit0( CDATAOWNER_HANDLEPROXYDATAMANAGER_EXIT );
 		return err;
 		}
 
@@ -3437,6 +3571,7 @@
 	@return KErrNone
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_HANDLEDBMSBACKUPL_ENTRY );
 		iPassiveInformation.iSupported = ETrue;
 		
 		const TInt count = aAttributes.Count();
@@ -3447,7 +3582,7 @@
 				{
 				if (!localName.CompareF(KDatabase))
 					{
-					__LOG1("CDataOwner::HandleDBMSBackup(0x%08x) - Still using deprecated 'database' attribute", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, CDATAOWNER_HANDLEDBMSBACKUPL, "(0x%08x) - Still using deprecated 'database' attribute", iSecureId.iId);
 					}
 				else if (!localName.CompareF(KPolicy))
 					{
@@ -3472,7 +3607,7 @@
 						// Add to list of Uid's
 						if (toAdd)
 							{
-        					__LOG2("CDataOwner::HandleDBMSBackup(0x%08x) - adding database with policy uid: 0x%08x", iSecureId.iId, temp);
+						    OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_HANDLEDBMSBACKUPL, "(0x%08x) - adding database with policy uid: 0x%08x", iSecureId.iId, temp);
 							TUid tempUID;
 							tempUID.iUid = temp;
 							TRAP_IGNORE(iDBMSSelections.AppendL(tempUID));
@@ -3480,16 +3615,17 @@
 						} // if
 					else
 						{
-						__LOG1("CDataOwner::HandleDBMSBackup(0x%08x) - Error converting policy number", iSecureId.iId);
+					    OstTrace1(TRACE_NORMAL, DUP2_CDATAOWNER_HANDLEDBMSBACKUPL, "(0x%08x) - Error converting policy number", iSecureId.iId);
 						} // else
 					} // else if
 				} // if
 			else
 				{
-				__LOG1("CDataOwner::HandleDBMSBackup(0x%08x) - Incorrect use of attributes", iSecureId.iId);
+			    OstTrace1(TRACE_NORMAL, DUP3_CDATAOWNER_HANDLEDBMSBACKUPL, "(0x%08x) - Incorrect use of attributes", iSecureId.iId);
 				}
 			} // for x
 			
+		OstTraceFunctionExit0( CDATAOWNER_HANDLEDBMSBACKUPL_EXIT );
 		return KErrNone;
 	}
 
@@ -3500,6 +3636,7 @@
 	@return KErrNone
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_HANDLEACTIVEBACKUPL_ENTRY );
 		iActiveInformation.iSupported = ETrue;
 		iActiveInformation.iActiveDataOwner = ETrue;
 		iStatus = EDataOwnerNotConnected;
@@ -3513,43 +3650,43 @@
 				if (KErrNone != ipDataOwnerManager->ParserProxy().ConvertToUnicodeL(iActiveInformation.iProcessName, aAttributes[x].Value().DesC()))
 					{
 					iActiveInformation.iSupported = EFalse;
-					__LOG1("CDataOwner::HandleActiveBackup(0x%08x) - Error converting process name", iSecureId.iId);
+					OstTrace1(TRACE_NORMAL, CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - Error converting process name", iSecureId.iId);
 					}
 				}
 			else if (!localName.CompareF(KRequiresDelay))
 				{
                 const TBool required = ( aAttributes[x].Value().DesC().CompareF(KYes) == 0 );
 				iActiveInformation.iRequiresDelayToPrepareData = required;
-				__LOG2("CDataOwner::HandleActiveBackup(0x%08x) - iActiveInformation.iRequiresDelayToPrepareData: %d", iSecureId.iId, required);
+				OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - iActiveInformation.iRequiresDelayToPrepareData: %d", iSecureId.iId, static_cast<TInt32>(required));
 				} // else if
 			else if (!localName.CompareF(KSupportsSelective))
 				{
                 const TBool required = ( aAttributes[x].Value().DesC().CompareF(KYes) == 0 );
 				iActiveInformation.iSupportsSelective = required;
-				__LOG2("CDataOwner::HandleActiveBackup(0x%08x) - iActiveInformation.iSupportsSelective: %d", iSecureId.iId, required);
+				OstTraceExt2(TRACE_NORMAL, DUP2_CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - iActiveInformation.iSupportsSelective: %d", iSecureId.iId, static_cast<TInt32>(required));
 				} // else if
 			else if (!localName.CompareF(KSupportsInc))
 				{
                 const TBool required = ( aAttributes[x].Value().DesC().CompareF(KYes) == 0 );
 				iActiveInformation.iSupportsIncremental = required;
-				__LOG2("CDataOwner::HandleActiveBackup(0x%08x) - iActiveInformation.iSupportsIncremental: %d", iSecureId.iId, required);
+				OstTraceExt2(TRACE_NORMAL, DUP3_CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - iActiveInformation.iSupportsIncremental: %d", iSecureId.iId, static_cast<TInt32>(required));
 				} // else if
 			else if (!localName.CompareF(KActiveType))
 				{
 				const TDesC8& value = aAttributes[x].Value().DesC();
 				if (!value.CompareF(KActiveOnly))
 					{
-    				__LOG1("CDataOwner::HandleActiveBackup(0x%08x) - iActiveInformation.iActiveType: EActiveOnly", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP4_CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - iActiveInformation.iActiveType: EActiveOnly", iSecureId.iId);
 					iActiveInformation.iActiveType = EActiveOnly;
 					}
 				else if (!value.CompareF(KActiveAndProxy))
 					{
-    				__LOG1("CDataOwner::HandleActiveBackup(0x%08x) - iActiveInformation.iActiveType: EActiveAndProxyImpl", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP5_CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - iActiveInformation.iActiveType: EActiveAndProxyImpl", iSecureId.iId);
 					iActiveInformation.iActiveType = EActiveAndProxyImpl;
 					}
 				else if (!value.CompareF(KProxyOnly))
 					{
-    				__LOG1("CDataOwner::HandleActiveBackup(0x%08x) - iActiveInformation.iActiveType: EProxyImpOnly", iSecureId.iId);
+				    OstTrace1(TRACE_NORMAL, DUP6_CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - iActiveInformation.iActiveType: EProxyImpOnly", iSecureId.iId);
 					iActiveInformation.iActiveType = EProxyImpOnly;
 					}
 				}
@@ -3566,6 +3703,7 @@
 				}
 			} // for x
 		
+		OstTraceFunctionExit0( CDATAOWNER_HANDLEACTIVEBACKUPL_EXIT );
 		return KErrNone;
 		}
 
@@ -3577,6 +3715,7 @@
 	@return KErrNone
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_HANDLERESTORE_ENTRY );
 		iRestoreInformation.iSupported = ETrue;
 		
 		if (aAttributes.Count() == 1)
@@ -3585,10 +3724,11 @@
 				{
                 const TBool required = ( aAttributes[0].Value().DesC().CompareF(KYes) == 0 );
 				iRestoreInformation.iRequiresReboot = required;
-				__LOG2("CDataOwner::HandleRestore(0x%08x) - iRestoreInformation.iRequiresReboot: %d", iSecureId.iId, required);
+				OstTraceExt2(TRACE_NORMAL, CDATAOWNER_HANDLERESTORE, "(0x%08x) - iRestoreInformation.iRequiresReboot: %d", iSecureId.iId, static_cast<TInt32>(required));
 				} // if
 			} // if
 		
+		OstTraceFunctionExit0( CDATAOWNER_HANDLERESTORE_EXIT );
 		return KErrNone;
 		}
 
@@ -3603,18 +3743,20 @@
 	@param aDir The element was found in an <include_dir/> element?
 	*/
 		{
+		OstTraceFunctionEntry0( CDATAOWNER_HANDLEPATHL_ENTRY );
 		// Check we dont have a NULL string
 		if (aAttributes[0].Value().DesC().Length() > 0)
 			{
 			TFileName filename;
 			if (KErrNone != ipDataOwnerManager->ParserProxy().ConvertToUnicodeL(filename, aAttributes[0].Value().DesC()))
 				{
-				__LOG1("CDataOwner::HandlePathL(0x%08x) - EPassive - Could not convert filename", iSecureId.iId);
+			    OstTrace1(TRACE_NORMAL, CDATAOWNER_HANDLEPATHL, "(0x%08x) - EPassive - Could not convert filename", iSecureId.iId);
+				OstTraceFunctionExit0( CDATAOWNER_HANDLEPATHL_EXIT );
 				return;
 				}
 			else
 				{
-				__LOG3("CDataOwner::HandlePathL(0x%08x) - path in the registration file is: %S [type: %d]", iSecureId.iId, &filename, aType);
+			    OstTraceExt3(TRACE_NORMAL, DUP1_CDATAOWNER_HANDLEPATHL, "(0x%08x) - path in the registration file is: %S [type: %d]", iSecureId.iId, filename, static_cast<TInt32>(aType));
 				}
 				
 			// If it is a directory is do we add a trailing backslash,
@@ -3638,7 +3780,8 @@
 						if (offset != KErrNotFound)
 							{
 							// someone other absoulute path
-							__LOG2("CDataOwner::HandlePathL(0x%08x) - Path is not recognised by the data owner : %S", iSecureId.iId, &filename);
+						    OstTraceExt2(TRACE_NORMAL, DUP2_CDATAOWNER_HANDLEPATHL, "(0x%08x) - Path is not recognised by the data owner : %S", iSecureId.iId, filename);
+							OstTraceFunctionExit0( DUP1_CDATAOWNER_HANDLEPATHL_EXIT );
 							return;
 							}
 						else
@@ -3661,7 +3804,7 @@
 					CSelection* selection = CSelection::NewLC(aType, selectionName);
 					iPassiveSelections.AppendL(selection);
 					CleanupStack::Pop(selection);
-					__LOG3("CDataOwner::HandlePathL(0x%08x) - Added selection: %S [type: %d]", iSecureId.iId, &selectionName, aType);
+					OstTraceExt3(TRACE_NORMAL, DUP3_CDATAOWNER_HANDLEPATHL, "(0x%08x) - Added selection: %S [type: %d]", iSecureId.iId, selectionName, static_cast<TInt32>(aType));
 					break;
 					}
 			case EPublic:
@@ -3672,11 +3815,12 @@
 						CSelection* selection = CSelection::NewLC(aType, filename);
 						iPublicSelections.AppendL(selection);
 						CleanupStack::Pop(selection);
-						__LOG3("CDataOwner::HandlePathL(0x%08x) - Added selection: %S [type: %d]", iSecureId.iId, &filename, aType);
+						OstTraceExt3(TRACE_NORMAL, DUP4_CDATAOWNER_HANDLEPATHL, "(0x%08x) - Added selection: %S [type: %d]", iSecureId.iId, filename, static_cast<TInt32>(aType));
 						}
 					else
 						{
-						__LOG3("CDataOwner::HandlePathL(0x%08x) - Not an Absolute Path: %S [type: %d]", iSecureId.iId, &filename, aType);
+					    OstTraceExt3(TRACE_NORMAL, DUP5_CDATAOWNER_HANDLEPATHL, "(0x%08x) - Not an Absolute Path: %S [type: %d]", iSecureId.iId, filename, static_cast<TInt32>(aType));
+						OstTraceFunctionExit0( DUP2_CDATAOWNER_HANDLEPATHL_EXIT );
 						return;
 						}
 					break;
@@ -3685,8 +3829,9 @@
 			} // if
 		else
 			{
-			__LOG1("CDataOwner::HandlePathL(0x%08x) - Path attribute error", iSecureId.iId);
+		    OstTrace1(TRACE_NORMAL, DUP6_CDATAOWNER_HANDLEPATHL, "(0x%08x) - Path attribute error", iSecureId.iId);
 			} // else
+		OstTraceFunctionExit0( DUP3_CDATAOWNER_HANDLEPATHL_EXIT );
 		}
 		
 		
@@ -3696,9 +3841,11 @@
 	@return a CSnapshotHolder object
 	*/
 		{
+		OstTraceFunctionEntry0( CSNAPSHOTHOLDER_NEWL_ENTRY );
 		CSnapshotHolder* self = NewLC();
 		CleanupStack::Pop(self);
 		
+		OstTraceFunctionExit0( CSNAPSHOTHOLDER_NEWL_EXIT );
 		return self;
 		}
 
@@ -3708,9 +3855,11 @@
 	@return a CSnapshotHolder object
 	*/
 		{
+		OstTraceFunctionEntry0( CSNAPSHOTHOLDER_NEWLC_ENTRY );
 		CSnapshotHolder* self = new(ELeave) CSnapshotHolder();
 		CleanupStack::PushL(self);
 		
+		OstTraceFunctionExit0( CSNAPSHOTHOLDER_NEWLC_EXIT );
 		return self;
 		}
 		
@@ -3718,13 +3867,17 @@
 	/** Default C++ Constructor
 	*/
 		{
+		OstTraceFunctionEntry0( CSNAPSHOTHOLDER_CSNAPSHOTHOLDER_CONS_ENTRY );
+		OstTraceFunctionExit0( CSNAPSHOTHOLDER_CSNAPSHOTHOLDER_CONS_EXIT );
 		}
 		
 	CSnapshotHolder::~CSnapshotHolder()
 	/** Default C++ Constructor
 	*/
 		{
+		OstTraceFunctionEntry0( CSNAPSHOTHOLDER_CSNAPSHOTHOLDER_DES_ENTRY );
 		iSnapshots.ResetAndDestroy();
+		OstTraceFunctionExit0( CSNAPSHOTHOLDER_CSNAPSHOTHOLDER_DES_EXIT );
 		}