OS command error=13, Permission denied in File Adapter

Hi All,
I am trying to call the OS commands in File adaper, when i check the Audit log i am getting Error exectuting the command. the same command when i check in OS its working fine.
i have collected the debug log and i can see the message saying
Catching #1#java.io.IOException: java.io.IOException: error=13, Permission denied
     at java.lang.UNIXProcess.<init>(UNIXProcess.java:148)
     at java.lang.ProcessImpl.start(ProcessImpl.java:65)
     at java.lang.ProcessBuilder.start(ProcessBuilder.java:451)
     at java.lang.Runtime.exec(Runtime.java:591)
     at java.lang.Runtime.exec(Runtime.java:429)
     at java.lang.Runtime.exec(Runtime.java:326)
     at com.sap.aii.af.lib.util.system.CommandLauncher.exec(CommandLauncher.java:64)
     at com.sap.aii.adapter.file.util.OSCommand.exec(OSCommand.java:58)
     at com.sap.aii.adapter.file.util.OSCommand.exec(OSCommand.java:33)
     at com.sap.aii.adapter.file.File2XI.processFileList(File2XI.java:991)
     at com.sap.aii.adapter.file.File2XI.invoke(File2XI.java:622)
     at com.sap.aii.af.lib.scheduler.JobBroker$Worker.run(JobBroker.java:500)
     at com.sap.engine.core.thread.impl3.ActionObject.run(ActionObject.java:37)
     at java.security.AccessController.doPrivileged(Native Method)
     at com.sap.engine.core.thread.impl3.SingleThread.execute(SingleThread.java:169)
     at com.sap.engine.core.thread.impl3.SingleThread.run(SingleThread.java:266)
I hope the problem with problem XI communication with OS level, Could you pls suggest me the problem?
Thanks,
Venkat

Hello!
You can see more information about os command using the file adapter in SAP note:
#841704 - XI File & JDBC Adapter: Operating system command
o  The command line of an operating system command run through the
   File and JDBC Adapter is interpreted slightly different compared
   to common operating system shells. E.g. quotes and apostrophes
   are handled differently. If in doubt, check if the command can be
   successfully run through the Java Runtime.exec(...) API. Also
   note that the command is run as user "<sid>adm" (Unix) /
   "SAPService<SID>" (Windows).
   Under Windows, this especially means that you cannot use any
   shell commands interpreted by teh command processor (such as
   "copy", "ren" or "del") using the operating system command.
Best regards,
Franklin

Similar Messages

  • Linux error :13 permission denied.

    Hi ,
    When I am trying to create a database I am getting the following errors.
    ORA - 01501 Create database failed.
    ORA-00200 Control file couldn't be created.
    ORA -00202 Control file :'/disk1/oradata/DEMO/CONTROL1.ctl'
    ORA-27040 skgfrcre: create error, unable to create file.
    Linux error 13: Permission denied.
    Here I could see the directory exists.
    I have changed the permissions to chmod 6751 $ORACLE_HOME/bin/oracle.
    What else could be the possible error am I making?
    Thanks,
    Radhika.

    Hi ,
    When I am trying to create a database (change default password), using sapinst, I am getting the following errors.
    27-OCT-2006 16:16:50 * (CONNECT_DATA=(SID=SSM)(GLOBAL_NAME=SSM.WORLD)(CID=(PROGRAM=sqlplus@spank)(HOST=spank)(USER=ssmadm))) * (ADDRESS=(PROTOCOL=tcp)(HOST=192.168.23.9)(PORT=12960)) * establish * SSM * 12518
    TNS-12518: TNS:listener could not hand off client connection
    TNS-12546: TNS:permission denied
    TNS-12560: TNS:protocol adapter error
    TNS-00516: Permission denied
    Linux Error: 13: Permission denied
    What else could be the possible error am I making?
    Thanks,
    Edoardo Carletti

  • I get this error msg - Permission denied for to webpage get property XPCComponents.classes

    A couple of days ago I started geting the error msg -Permission denied for to <webpage> get property XPCComponents.classes. It happens with every webpage I visit. If I hit the x in the upper righthand corner I can then access the page. This doesn't have in IE. Any ideas how I could fix this and why it started happening?

    Try the Firefox SafeMode to see how it works there. <br />
    ''A troubleshooting mode, which disables most Add-ons.'' <br />
    ''(If you're not using it, switch to the Default Theme.)''
    * You can open the Firefox 4.0+ SafeMode by holding the '''Shft''' key when you use the Firefox desktop or Start menu shortcut.
    * Or use the Help menu item, click on '''Restart with Add-ons Disabled...''' while Firefox is running. <br />
    ''Don't select anything right now, just use "Continue in SafeMode."''
    ''To exit the Firefox Safe Mode, just close Firefox and wait a few seconds before using the Firefox shortcut (without the Shft key) to open it again.''
    '''''If it is good in the Firefox SafeMode''''', your problem is probably caused by an extension, and you need to figure out which one. <br />
    http://support.mozilla.com/en-US/kb/troubleshooting+extensions+and+themes
    ''When you figure out what is causing that, please let us know. It might help other user's who have that problem.''
    If you look in the Error Console for that '''XPCComponents.classes''' error, there should be a '''Source file: chrome://''' address which might give us information related to which extension is causing that message.
    Firefox button > Web Developer -> Error Console or just use {Ctrl + Shft + J} from the keyboard

  • Find gives permission denied on files when executed from bash script.

    I've written a really basic script just to check what new music was added to my library over the past n days:
    #!/bin/bash
    echo "Check for days?"
    read days
    `find /home/tom/Music/ -iname "*.*" -type f -mtime -$days -print`
    If I run the find from the shell it runs fine but the script always gives this error:
    ./listNewMusic.sh: line 7: /home/MrGone/Music/Smod/SModcast-19.mp3: Permission denied
    Anyone know why?
    Thanks.

    It is because you're running the find command in a sub-shell.  What is returned by the sub-shell is being run by your script.
    Change:
    `find /home/tom/Music/ -iname "*.*" -type f -mtime -$days -print`
    to
    find /home/tom/Music/ -iname "*.*" -type f -mtime -$days -print
    Last edited by steve___ (2010-07-10 12:50:38)

  • SQL 2014 cluster installation on mounting point disks error: Updating permission setting for file

    Dear all,
    I am attempting to install SQL 2014 fail over cluster under a physical windows 2012 R2 server which have mounting point disks.
    At the finish of setup I get the following error message.
    Could you please help me on this?
    Thanks
    The following error has occurred:
    Updating permission setting for file 'E:\Sysdata!System Volume Information\.....................................' failed. The file permission setting were supposed to be set to 'D:P(A;OICI;FA;;;BA)(A;OICI;FA;;;SY)(A;OICI;FA;;;CO)(A;OICI;FA;;;S-1-5-80-3880718306-3832830129-1677859214-2598158968-1052248003)'.
    Click 'Retry' to retry the failed action, or click 'Cancel' to cancel this action and continue setup.
    For help, click: go.microsoft.com/fwlink
    I am using an administrator account which have all security rights (cheched on secpol.msc mmc) needed for installation.

    Hi Marco_Ben_IT,
    Do not install SQL Server to the root directory of a mount point, setup fails when the root of a mounted volume is chosen for the data file directory, we must always specify
    a subdirectory for all files. This has to do with how permissions are granted. If you must put files in the root of the mount point you must manually manage the ACLs/permissions. We need to create a subfolder under the root of the mount point, and install
    there.
    More related information:
    Using Mount Points with SQL Server
    http://blogs.msdn.com/b/cindygross/archive/2011/07/05/using-mount-points-with-sql-server.aspx
    I’m glad to be of help to you!
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • FTP connection error whil,e using flat file adapter error

    while using file adapter in the reciever end for proxy to file
    i am giving  paranters like server IP address and the port , i dont know which port to give by default it is giving me 21 , anyway how to check whether the connection is correct
    and more over
    Message processing failed. Cause: com.sap.aii.af.ra.ms.api.RecoverableException: Error when getting an FTP connection from connection pool: com.sap.aii.af.service.util.concurrent.ResourcePoolException: Unable to create new pooled resource: ConnectException: Connection timed out: connect
    please help me in this thanks

    HI Sridhar ,
    First check wether server started or not and then check you are connecting to FTP server by
    go to run -> cmd and write ping and ipaddress which is used and see whether u r getting reponse from teh FTP server.
    Try to login to the ftp server which you have mentioned in CC using the user name and pwd, to chk whether you have the permissions to login to the server.
    Also the check whether the folder you are trying to access is having permission for delete/read/write.
    Restart the FTP server and try it again.
    Regards
    Sridhar Goli

  • Mapping Error - Dump source message to file adapter comm channel

    Hi
    Does anyone know of a way to dump the source message to a file adapter comm channel if - and only if - the message fails during mapping. For example, we receive a message from a trading partner that lacks an element that is mandatory during the mapping. When the mapping fails, the source message is sent - as is - to a file adapter comm channel.
    I don't need anything more than the source message i.e. no need for any errors etc... to be included.
    The kicker.. I would like to do this without using BPM if at all possible.
    Any ideas greatly appreciated. Thx, Duncan

    Hey Ram,
    Go to Integration Directory and open the Receiver Determination for your scenario.
    Check the configured receiver services. They are in a table-like area in the middle of the screen.
    In this table of configured receiver services for that particular Sender Service/Interface, you should have the system that normally receives that message (your ERP or any other application system) and the service that contains the receiver file comm channel that will receive the message in case of error.
    Check help.sap.com for help on condition editor on receiver determinations.
    Now, the issue. You can only check whether a field exists, you can't check whether it doesn't exist (There's only a "EXIST" operator, and no negative operator). Thus, you can only do the following: always send messages to File, but you can avoid messages that dont have field from being sent to App System. Yeah, that sucks...
    But don't fear, young padawan! There is a possible workaround. =D
    In your message mapping, do the following for that particular field:
    If field exists (check with Exist and IF standard functions) just bypass the field. Else, map the field with an impossible value (like string "$CREATED$"). Then, in your receiver determination, you will do the following conditions:
    for App System: If field =/= $CREATED$
    for File Receiver: If field = $CREATED$
    Now, if the field doesnt exist, it will have value $CREATED$, thus the message will be sent to File and not to App System. If the field exists, the message will be sent to App and not to File.
    Try that out.
    Regards,
    Henrique.

  • Continous mDNSPlatformTCPConnect ("Permission denied") errors. What does this mean? What should I do to resolve this?

    MB Air (1.8GHz); MacOS 10.9.2
    In the System Log I see frequent and, at times, continuous (up to several per second) entries like the following:
    4/16/14 9:00:13.936 AM mDNSResponder[73]: ERROR: mDNSPlatformTCPConnect - connect failed: socket 63: Error 13 (Permission denied) length 16
    While I can't point to any specific system issues that result from this, I do have the following (perhaps related, perhaps unrelated) problems:
    1. Over time, memory pressure gradually increases until, every few days, I need to re-boot. I'm not accustomed to having to perform "maintenance boots" under MacOS. (For example, my Mac Mini, also running Mavericks, runs for weeks/months without needing to re-boot; it's my household media server, running iTunes but that's about it.) Feels like a memory leak to me.
    2. TimeMachine is unpredictable for me. When I have TimeMachine enabled, it will do incremental backups for up to a day or so, then the machine ends up in what looks like a run loop, with apps (such as Mail) in a "not responding" state. Can't reliably force-quit those apps at that time - pretty much have to hard-boot the machine and restart. (Note that I'm using a QNAP NAS disk array; has worked fine in the past, pre Mavericks; I'm running latest/greatest NAS firmware.)
    At any rate, any insights regarding the DNS error (what it means; what triggers it; whether I should care; if so, what I should do to quell it; etc.) deeply appreciated.
    Doug Engfer

    May I ask why you want me to remove the AV software?
    Because it's the likely cause of your problem, and even if it isn't, it's worse than useless.
    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to your computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
       For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent. or Usenet, or on a website that also distributes pirated music or movies.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, your browser, or anything else.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    High-priced commercial software such as Photoshop is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Anything online that you would expect to pay for is "free."
    Unexpected events
    You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. Research has shown that most successful attacks are "zero-day"—that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    Most importantly, a false sense of security makes you more vulnerable.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize by the file name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need any software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's seldom a reason to use recognition software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may be useful if an ill-informed network administrator says you must run some kind of "anti-virus" application.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining Bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • TNS-12546: TNS:permission denied  TNS-12560: TNS:protocol adapter error

    Dear Sir,
    Please some can help. I have in stall in Ubuntu Oracle 10 g 64 bit
    While running the listener.ora this gives following error
    please help
    TNS-12546: TNS:permission denied
    TNS-12560: TNS:protocol adapter error
    TNS-00516: Permission denied
    Linux Error: 13: Permission denied
    thanks regards
    sanat

    user591475 wrote:
    Dear Sir,
    Please some can help. I have in stall in Ubuntu Oracle 10 g 64 bit
    While running the listener.ora this gives following error
    please help
    TNS-12546: TNS:permission denied
    TNS-12560: TNS:protocol adapter error
    TNS-00516: Permission denied
    Linux Error: 13: Permission denied
    thanks regards
    sanatcopy the following commands, and paste them into a shell prompt:
    ifconfig
    env|grep ORA|sort
    cat $ORACLE_HOME/network/admin/sqlnet.oracopy the entire session and paste back to your next post.

  • Can't get Oracle to start - Permission Denied Error

    Hello -
    I am receiving the following error:
    SQL*Plus: Release 10.2.0.3.0 - Production on Wed Oct 10 09:51:27 2007
    Copyright (c) 1982, 2006, Oracle. All Rights Reserved.
    SQL> conn / as sysdba
    Connected to an idle instance.
    SQL> startup;
    ORA-27123: unable to attach to shared memory segment
    SVR4 Error: 13: Permission denied
    Thanks in advance!
    Mike

    Refer Note:115753.1- UNIX: Resolving the ORA-27123 error from Metalink.

  • TNS-12546: TNS:permission denied in Oracle 10g  windows XP

    Hi I have windows xp installed in my pc. After installing 1og, th.e TNS listener service is not starting automatically.
    While starting the service manually from command prompt I am getting the following error.
    LSNRCTL for 32-bit Windows: Version 10.2.0.1.0 - Production on 16-MAY-2009 11:01
    :44
    Copyright (c) 1991, 2005, Oracle. All rights reserved.
    Starting tnslsnr: please wait...
    TNSLSNR for 32-bit Windows: Version 10.2.0.1.0 - Production
    System parameter file is G:\oracle\product\10.2.0\db_1\network\admin\listener.or
    a
    Log messages written to G:\oracle\product\10.2.0\db_1\network\log\listener.log
    Listening on: (DESCRIPTION=(ADDRESS=(PROTOCOL=ipc)(PIPENAME=\\.\pipe\EXTPROC1ipc
    Error listening on: (DESCRIPTION=(ADDRESS=(PROTOCOL=TCP)(HOST=localhost)(PORT=15
    21)))
    TNS-12546: TNS:permission denied
    TNS-12560: TNS:protocol adapter error
    TNS-00516: Permission denied
    32-bit Windows Error: 13: Permission denied
    Listener failed to start. See the error message(s) above...
    However the problem is when i connect to the internet and then try to start the listener it starts up and everything works fine after that even after disconnecting from the net. Please help me in solving this. Thank you
    Edited by: [email protected] on May 15, 2009 11:24 PM

    YOU need to verify the host name or the ip address for your pc
    1 you said when connect to the internet is working cause when you create the database the lsnrctl get the internet ip address
    2 you can create new lsnrctl with new ip address and i will work

  • SAP ROUTE PERMISSION DENIED

    Hi Experts,
    When i try to logon SAPNET from T/Code OSS1 its througing error as
    "sapsrv2a: route permission denied(12.34.23.5 to oss1 sapdp01)
    Location SAPoruter 37.15 on sapserv2a
    Component  NI
    Release 640
    Version 37
    Return Code -93
    Counter 5
    Kindly suggest any solution for this problem
    Thanks in Advance,
    Ramamurthy

    HI
    I have this error too if I try to logon to sapnet with OSS1 transaction.
    you must logon to sapnet trought internet explorer http://service.sap.com
    Note 33135 - Guidelines for OSS1
    Note Language:       Version: 15     Validity: valid since 30.06.2006     
    PDF     Download Corrections     Compare Versions     SSCR
         Go to SAP Note:  Display     
    Content:  Summary  |  Header Data  |  Releases  |  Related Notes
    Summary
    Symptom
    You are using transaction OSS1 to establish a remote connection.
    Other terms
    OSS1, RFC connections to SAPNet - R/3 Frontend, SAPOSS, OSS_RFC, SAProuter
    Reason and Prerequisites
    Remote connection to SAP, R/3 system
    Solution
    On April 03, 2006, SAPNet - R/3 Frontend was deactivated as a user interface. SAPNet - R/3 Frontend, which was introduced in 1995 as SAP's Online Service System (OSS), was SAP's first and, for a long time, its only support system, which customers worldwide accessed using transaction OSS1.
    Today, the SAProuter connection via transaction OSS1 continues to be used for the following RFC connections:
    - Transfer of EarlyWatch Alert data
    - Exchange of data using the SAP Notes Assistant
    To install and configure this transaction, proceed exactly as follows:
      1. Making the technical settings for OSS1
    You must configure transaction OSS1 before you can use it. Choose "Parameter" from the menu bar (-> Techn. Settings) and choose "Change".
    The technical settings for transaction OSS1 are set by default to Walldorf (sapserv3) with the IP address 147.204.2.5. If this address does not correspond with the entry in your host file, choose the sapserv3 IP address that is valid for you by choosing the menu option "SAPRouter at SAP -> Walldorf".
    Furthermore, enter your local SAPRouter information in the "SAPRouter 1" fields. Now save the settings.
    After making these changes, the screen for the technical settings should be as follows:
    Router data for the logon to SAPNet - R/3 Frontend
    -Customer SAPRouters----
    -SAPRouter 1----    -SAPRouter 2----
    Name         my_saprouter
    Name
    IP Address   x.x.x.x
    IP Address
    Instanc No.  99
    Instance No.
    -SAPRouter and OSS Message Server at SAP----
    -SAPRouter at SAP----    -OSS Message Server----
    Name          sapservX
    Name          oss001
    IP Address    x.x.x.x
    DB Name       O01
    Instance No.  99
    Instance No.  01
    NOTE:
    Replace sapservX with the following values:
    sapserv1 (194.117.106.129) connection via Internet VPN
    sapserv2 (194.39.131.34)  connection via Internet SNC
    sapserv3 (147.204.2.5)    for customers with connection to Germany
    sapserv4 (204.79.199.2)    for customers in America
    sapserv5 (194.39.138.2)    for customers with connection to Japan
    sapserv6 (194.39.139.16)  for customers in Australia and New Zealand
    sapserv7 (194.39.134.35)   for customers in Asia
    Choose "Start Logon to SAPNet - R/3 Frontend". If the system issues message S1 452, there are errors in the operating system configuration. In this case, see appendix A.
    When you install an access authorization file "saprouttab", you should ensure that all of your front ends and R/3 servers can establish a connection to sapserv3, service sapdp99. Appendix E contains examples of saprouttabs. For more information on the SAPRouter, refer to the SAPRouter documentation (Note 30289).
    Try it again until the dialog box "Please select a group" appears. If the dialog box "Please select a group" is displayed, the configuration for transaction OSS1 is correct. You can then proceed with the next section.
    NOTE:
    When you try to log on to SAPNet - R/3 Frontend, the system issues an error message indicating that you are no longer allowed to log on to SAPNet - R/3 Frontend.
      2. Further questions?
    As soon as you have carried out the steps described above, transaction OSS1 should connect you to the most efficient SAPNet - R/3 Frontend application server.
    If you have further questions or problems, the file entitled "OSS1. TroubleShooting" contains additional information. If you have a problem that you cannot solve, contact our hotline: 0180/5 34 34 3-3.
    Appendix A
    If message S1 452 appears when you try to log on to SAPNet - R/3
    Frontend with transaction OSS1, there is an incorrect setting somewhere (either in the technical settings for OSS1 or at operating system level).
    To find out why the connection to the message server was unsuccessful, choose Tools (Case, Test ( Developer trace (transaction ST11). The trace contains an entry for dev_lg. This file contains the error log. The LOCATION line, if available, contains the host on which the error occurred. The problem description is found in the ERROR line. If you cannot find the entry dev_lg, check whether the program "lgtst" exists (see appendix B).
    Examples of the contents of dev_lg:
    ERROR       partner not reached (host abc.def.gh.i, service sapdp99)
    TIME        Thu Aug 10 09:17:57 1995
    RELEASE    21J
    COMPONENT   NI (network interface)
    VERSION    15
    RC          -10
    MODULE      niuxi.c
    LINE        773
    DETAIL      NiPConnect
    SYSTEM CALL connect
    ERRNO      239
    ERRNO TEXT  Connection refused
    COUNTER    1
    Here, the system could not reach the SAPRouter. For example, no SAProuter could be found under service 99 (port 3299) on the host with the IP address abc.def.gh.i. The SAPRouter process does not work or the IP address was not configured correctly in OSS1.
    ERROR      service 'sapdp99' unknown
    TIME        Thu Aug 10 09:22:00 1995
    RELEASE    30A
    COMPONENT   NI (network interface)
    VERSION    17
    RC          -3
    MODULE      niuxi.c
    LINE        404
    DETAIL      NiPServToNo
    SYSTEM CALL getservbyname
    COUNTER    1
    This message indicates that the service sapdp99 was not entered in /etc/services. Add the entry in /etc/services. This must be available on all R/3 servers and front ends.
    LOCATION    SapRouter on abc.def.gh.i
    ERROR      route permission denied (XXXXXXXX to sapservX, sapdp99)
    TIME        Thu Aug 10 09:37:44 1995
    RELEASE    30A
    COMPONENT   NI (network interface)
    VERSION    17
    RC          -94
    MODULE      nixxrout.c
    LINE        1426
    COUNTER    1
    The file saprouttab, which contains the valid connections, is not correct. The SAPRouter on the host abc.def.gh.i does not set up the connection to sapservX. Check the SAPRouter file saprouttab. This should contain every R/3 server and frontend (see also appendix E).
    LOCATION    SapRouter on abc.def.gh.i
    ERROR      internal error
    TIME        Thu Aug 10 10:50:18 1995
    RELEASE    21J
    COMPONENT   NI (network interface)
    VERSION    15
    RC          -93
    MODULE      niuxi.c
    LINE        773
    DETAIL      NiPConnect
    SYSTEM CALL connect
    ERRNO      242
    ERRNO TEXT  No route to host
    COUNTER    1
    This error message indicates that the host abc.def.gh.i cannot process the IP address of the next host configured in OSS1. If the SAPRouter error message appears and the next host is sapservX, check the address for sapservX. OSS1 is delivered with the default settings sapserv3 and IP address 147.204.2.5. Customers in the U.S.A. are normally connected to sapserv4, IP address 204.79.199.2. If required, change the technical settings of OSS1 accordingly.
    ERROR      internal error
    TIME        Thu Nov 23 00:11:20 1995
    RELEASE    21J
    COMPONENT   NI (network interface)
    VERSION    15
    RC          -1
    COUNTER    1
    This message shows that the instance number entered does not agree with at least one of the technical settings for the SAPRouter defined in OSS1. The default for the instance number of the SAPRouter is 99. Under no circumstances should you enter the instance number of your R/3 system for the SAPRouter. You need to specify instance number 99 for sapservX. Otherwise, it is not possible to log on to SAPNet - R/3 Frontend.
    LOCATION    SapRouter on sapservX
    ERROR       route permission denied (XXXXXX to oss002, sapmsO01)
    TIME        Mon Nov 27 19:25:54 1995
    RELEASE    30A
    COMPONENT   NI (network interface)
    VERSION    15
    RC          -94
    MODULE      nixxrout.c
    LINE        1390
    COUNTER    1
    An incorrect server was entered as message server 001, in this example, the server oss002. The message server for O01 is oss001. Change the technical settings for transaction OSS1 accordingly.
    Appendix B (for Windows NT only)
    Change to the directory "\usr\sap\<SID>\SYS\exe\run" and search for the program "lgtst.exe". If you cannot find it, or if the length of this file is not exactly 640216 bytes, import the program "lgtst.exe" from sapservX via ftp:
    > ftp sapservX
    Connected to sapservX.
    220 sapservX FTP server (Version 1.7.194.2 Wed Sep  8 17:23:04 GMT 1993) ready.
    Name: ftp
    331 Guest login ok, send ident as password.
    Password: <Your_customer_number>
    ftp> cd dist/permanent/OSS1/lgtst.exe
    250 CWD command successful.
    ftp> binary
    200 Type set to I.
    ftp> get lgtst.exe
    150 Opening BINARY mode data connection for lgtst.exe (640216 bytes).
    226 Transfer complete.
    640216 bytes received.
    ftp> bye
    Copy this file into the aforementioned directory.
    Appendix C
    The messages from transaction OSS1 (error messages and information) are given in the following list. Each message is described briefly.
    |No.| Message Text
    |450| Maintain technical settings first.
    |452| Unable to connect to SAPNet - R/3 Frontend message server.
    |454| E: Unable to start SAPGUI.
    |455| SAPGUI was started.
    |456| Specify a server name.
    |457| Specify an IP address.
    |458| Specify an instance number.
    |459| Specify a database name.
    |460| No authorization to log on to SAPNet - R/3 Frontend.
    |461| No authorization to maintain technical settings.
    |462| E: RFC destination could not be generated
    Number 450: Maintain technical settings first
    You can only log on to SAPNet - R/3 Frontend if the technical settings
    are maintained. The technical settings determine the network path from the customer R/3 system to the online service system.
    Number 452: Unable to connect to SAPNet - R/3 Frontend message server.
    This message appears if the connection to the SAPNet - R/3 Frontend message server was not possible (system name O01, server oss001). There can be different reasons for this (see appendix A).
    Number 454: E: Unable to start SAPGUI.
    Transaction OSS1 could start the SAPGUI (not SAPTEMU), either because the program does not exist in the path given, or because the execute permission is not set correctly. Check whether the SAPGUI exists; SAPTEMU alone is not sufficient.
    Number 455: SAPGUI was started.
    This is not an error message. It merely informs you that an additional SAPGUI was started to establish a connection to SAPNet - R/3 Frontend.
    Number 456: Specify a server name.
    The server name was omitted from the technical settings.
    Number 457: Specify an IP address.
    The IP address was omitted from the technical settings.
    Number 458: Specify an instance number.
    The instance number was omitted from the technical settings.
    Number 459: Specify a database name.
    The database name for the Online Service System (001) was omitted from the technical settings.
    Number 460: No authorization to log on to Online Service System
    You do not have authorization to call transaction OSS1. Up to Release 2.2F: The authorization S_TSKH_ADM is checked for value 1. After Release 2.2F: For transaction OSS1, there are two special authorization profiles (see appendix D).
    Number 461: No authorization to maintain technical settings.
    You do not have the authorization to maintain the technical settings (see appendix D).
    Number 462: E: RFC destination could not be generated.
    In Releases 2.2, you can ignore this message. When saving the technical settings, an attempt is made to generate the RFC destination SAPOSS. The length of an RFC destination is limited in 2.2, and the maximum length was exceeded by the parameters of the technical settings.
    Appendix D
    As of Release 2.2F, there are two different authorization profiles for transaction OSS1: S_OSS1_START and S_OSS1_ADMIN.
    S_OSS1_START authorizes you to call transaction OSS1 and to log on to the Online Service System. In addition, S_OSS1_ADMIN contains the
    authorization to maintain the technical settings for the transaction.
    The technical settings of OSS1 must be made at least once. Therefore, add S_OSS1_ADMIN to your user profile, log off, and then log on again afterwards.
    Appendix E
    Prerequisites:
    (A TCP/IP connection can be established between the SAProuter on
    the customer system and the SAProuter on sapserv3 in Walldorf.
    (The SAProuter process must be started on the server that is registered
    with SAP:
    saprouter -r -R saprouttab &
    Example of the "saprouttab" file with minimum configuration:
    saprouttab - Example
    Allows connections from the entire customer network to sapservX
    and therefore to the Online Service System via SAProuter port 3299.
    P      *      sapservX    sapdp99         *
    Allows connections from sapserv3 to the entire customer network,
    for example for EarlyWatch or First Level Support.
    P   sapservX      *          *            *
    Header Data
    Release Status:     Released for Customer
    Released on:     30.06.2006  09:13:57
    Priority:     Correction with high priority
    Category:     Consulting
    Primary Component:     XX-SER-NET Network connection
    Antonio.
    Edited by: Antonio Voce on May 22, 2008 5:07 PM

  • Permission denied in sap router

    Hello everybody,
    I have installed the SAPROUTER.
    when our remote user login by SAPSTRING 114.240.174.28 then user can login without any problem
    but when the user used the  /H/114.240.174.28/H/192.168.0.170/S/3299/H/
    then they can not able to login, get error
    router permission denied 115.240.50.30 to 192.168.0.170, 3299
    I have check the saposs RFC from sap its work fine.
    In my SAP routtab file I maintain the entries as follows
    KT "p:CN=sapserv2, OU=SAProuter, O=SAP, C=DE" 194.39.131.34 *
    KP "p:CN=sapserv2, OU=SAProuter, O=SAP, C=DE" 192.168.0.180 3200
    KP "p:CN=sapserv2, OU=SAProuter, O=SAP, C=DE" 192.168.0.185 3200
    KP "p:CN=sapserv2, OU=SAProuter, O=SAP, C=DE" 192.168.0.186 3200
    KP "p:CN=sapserv2, OU=SAProuter, O=SAP, C=DE" 192.168.0.180 *
    KP "p:CN=sapserv2, OU=SAProuter, O=SAP, C=DE" 192.168.0.185 *
    KP "p:CN=sapserv2, OU=SAProuter, O=SAP, C=DE" 192.168.0.186 *
    P * 194.39.131.34 3299
    P * * *
    Please suggest where is wrong.
    Thanks
    Ganesh

    HI,
    Our remote user can access with the    /H/external_IP_of_saprouter/H/internal_IP_of_saprouter/H/  this string
    but now they are not able to access by using above said string , when they tired to access they got message
    like
    router permission denied 115.240.50.30 to 192.168.0.170, 3299
    actually, in saprouttab I mention P * * * .
    Thanks
    Ganesh

  • TNS-12546 TNS:permission denied

    I get the following error msgs when starting the listener with
    the "lsnrctl start" command.
    Connecting to (ADDRESS=(PROTOCOL=IPC)(KEY=Fhm))
    TNS-12546: TNS:permission denied
    TNS-12560: TNS:protocol adapter error
    TNS-00516: Permission denied
    Linux Error: 13: Permission denied
    Connecting to ADDRESS=(PROTOCOL=TCP)(Host=localhost)(Port=1521))
    STATUS of the LISTENER
    I'm using RH 5.2 and Oracle8.0.5 standard.
    Does anyone know what what it needs to be done to correct the
    problem?
    Thanks
    null

    I had this problem too.
    There is a patch script which apparently corrects this problem
    and others, at <a
    href=http://technet.oracle.com/>http://technet.oracle.com/</a>.
    I have not run it yet as I need a spare hour to check out
    exactly what the script will do.
    I changed the owner and permitions on tnslsnr, as described
    below, and that worked for me too.
    Derek Stevenson (guest) wrote:
    : This is a great, great tip. With a default install, the owner
    : on tnslsnr is set incorrectly (to root, not to oracle), and
    you
    : keep getting the permission denied problems. Once the owner
    is
    : set correctly, though, the sqlplus user/passwd@dbname test
    works
    : just fine.
    : Someone should publish this in the install directions!!!
    : --Derek
    : Harvey Berenberg (guest) wrote:
    : : Andre Maasikas (guest) wrote:
    : : : Jan Pfeiffer (guest) wrote:
    : : : : Harvey Berenberg (guest) wrote:
    : : : : : I get the following error msgs when starting the
    : listener
    : : : : : I'm using RH 5.2 and Oracle8.0.5 standard.
    : : : : : Does anyone know what what it needs to be done to
    : correct
    : : the
    : : : : : problem?
    : : : : : Thanks
    : : : : Check your permissions on the tnslsnr (suid - bit)
    : : : I don't think the listener needs to be setuid, probably the
    : : : owner is wrong, (root? I'v seen it sometimes) it should be
    : the
    : : : the owner/group of the oracle sofware owner.
    : : I resolved the problem by changing permissions on the
    tnslsnr
    : to:
    : : -rwxr-x--x 1 oracle dba 3636562 May 26 15:14
    : tnslsnr
    : : and on the directory $ORACLE_HOME/network/log to:
    : : drwxrwxr-x 2 oracle dba 1024 May 17 16:55
    : log
    : : and on listener.log to:
    : : -rw-rw-r-- 1 root dba 14291 May 26 17:19
    : : listener.log
    : : Thanks for the hints.
    null

  • Mirrored Folder - Permission denied

    When trying to upload a file to a mirrored folder, we get the error message "permission denied".
    We use teaming 2.1 on SLES 11 SP1.
    The mirrored folder is a file based one. (not WebDav)
    This folder is a directory on the teaming server itself.
    any ideas ?

    Are you adding documents to the (mirrored) folder from the Teaming UI via a web-browser? If so, have you checked to make sure you have the access rights to add documents to the mirrored folder? During setup of mirrored folders, did you specify a list of users groups who have access to the folder?
    -- Khurram

Maybe you are looking for

  • Standard Report or Transaction for Outstanding Purchased Materials?

    Hello, Is there a report or transaction that could be used to see a list of all pending purchased material requirements with requirement date? So, pending Purchase Requisitions and Purchase Orders with a required delivery date?  We want to create sho

  • A film I downloaded is no longer available in iTunes Store

    A film I have purchased from the iTunes Store is no longer listed when i do a search (top right hand of iTunes application.  For the avoidance of doubt the podcast associated with the film does come up so I am sure I am typing the name correctly) and

  • How do you import photos from iphone5 to pc (windows 7) without duplicating

    Every time I plug my iphone 5 into the laptop (using windows 7) the easiest way is to right click on the portable device (iphone icon) and import to my pictures, BUT every time I do this it wants to import ALL photos and videos. Is there a simple way

  • JDBC Exception in OIM adapter

    I have added a new adapter and added a java resource in adapter in which i am using Oracle JDBC connection to get some data from the Database.. that was working fine i was able to get data from the database, but after some time it start giving me exc

  • Regarding work flow object

    Hi, Is there any standard workflow object available in R/3 to directly update sales order in CRM from PM Work Order or any other means to directly contact with CRM sales order from PM Work Order. Regards, Ravi G