Tips For Improved Short Dump Analysis in ST22
Tips For Improved Short Dump Analysis in ST22
saptechnicalguru.com/tips-improved-short-dump-analysis-st22/
The tips below assume you have not yet any clue on how the dump is created.
If you know how the dump is created, but cannot analyze from the dump: please read the
blog on the ANST tool: automated notes search tool.
If you have not setup the new SAP support backbone you will get a connection error:
1/8
OSS note 2847665 – OSS RFC Connection
fails, which refers to be backbone
connection. To solve this issue: follow the
instructions from OSS note 2781045 – ANST / ST22 note search “Connection cannot be
established” .
If you get the message “Connection cannot be established”, check also fixes mentioned in
OSS note 2605397 – ST22 – SAP Correction notes – error: “Unable to extablish OSS
connection properly”.
After starting transaction ST22 select menu item Goto / Overview. Fill out the dates and
you now get the overview including the statistics on the occurrences:
2/8
Before raising OSS message to SAP: make sure the call stack does not contain custom Z
code.
RFC_NO_AUTHORITY dump
The RFC_NO_AUTHORITY is special kind of dump and typically looks like this:
First thing to get from the dump is the user ID and the calling system (is it an internal call
or call from different system). And if the user ID is a human user or system user.
Second thing to determine is: is this a valid call or not a valid call?
In case of valid call, look in the dump which authorization is missing and what needs to be
added. If the addition is done: do keep an eye on the dumps, since a new dump might
come for a different new authorization object.
In case of an invalid call, you need to determine how the call was initiated and take action
to avoid the initiation. This is not always a simple job.
3/8
Why is checking this dump important? Complete business flows might be disrupted if this
happens. It is hard to detect for the end users what is going on. It will take them time to
raise an incident and for functional people to determine what is going on. This way a lot of
valuable time can be lost.
What can also happen: people try to connect via RFC methods to read data. This will give
lot of dumps which are hard to follow up.
If you get too many of these dumps and you can’t solve them, you can switch parameter
rfc/signon_error_log to value -1. Then the dumps are no longer there in ST22, but in
stead moved to SM21 system log with less detail. If you need to have the details again,
switch the parameter again (it is dynamic). Background on the parameter
rfc/signon_error_log can be found in OSS note 402639 – Meaningful error message texts
(RFC/Workplace/EBP).
CALL_FUNCTION_SINGLE_LOGIN_REJ dump
Again: first determine if the call is valid or not. If not valid, determine the calling source
(can be hard!).
If it is a valid call, scroll down in the details section for this dump and look for the part
below:
4/8
There are two codes: T-RC code and the L-RC code. Check both the codes. In this case
above the user ID validity was no longer ok.
Why is checking this dump important? Complete business flows might be disrupted if this
happens to system user. If it happens to single user he might get grumpy. It is hard to find
for the end users what is going on. It will take them time to raise an incident and for
functional people to determine what is going on. This way a lot of valuable time can be
lost.
TIME_OUT dumps
If an online query takes longer than the timing set in parameter rdisp/max_wprun_time
a TIME_OUT dump will happen. By default and best practice, this time out parameter is
set to 10 minutes. This is also the case in most system.
5/8
If you scroll down (or click in the left section) to the User and Transaction section, you
can see the ID of the user who caused this and the transaction.
First reaction of the average basis person is: call/mail the user and ask him to run this in
batch mode. This is indeed one of the solutions.
Analyze with the end-user if he can fill out more selection criteria (hence reducing
the time needed to select the data)
Analyze with the end-user if he can run the report in multiple smaller sets
Check if there are known performance OSS notes for the transaction the user is
running (the root cause might simply be an SAP bug)
Check if the database statistics of the tables queried is up to date
In some cases both the selection criteria are ok, and the output of the list in batch
only give a few results: in this case the creation of special index might be the
solution. This can happen in case of check reports that look for business exceptions.
Why is checking this dump important? Users tend to get very frustrated by the system if
they hit this dump. They have to wait 10 minutes and have no result. Sometimes you see
this dump a couple of times in a row. Imagine yourself being the user with a boss
demanding report which crashes after 10 minutes…
This dump typically look like this: a main dump MESSAGE_TYPE_X and calling program
SAPLOLEA.
1. Issue in ABAP code (hit the SAP correction notes button to search for solutions)
2. Issue in local SAP gui installation of the end user
3. Issue in the SAP kernel
6/8
If you see many dumps with the same user ID: this typically points towards an old local
SAP gui installation. Solution is to update the local SAP GUI for that user to the latest
version that is supported in your company.
In rare cases the SAP kernel causes these kind of dumps. These are hard to find and
detect. The only remedy here is to update the kernel at regular intervals.
To find which users use which SAP GUI version: goto transaction SM04 and add the field
SAP GUI version:
From ABAP code: use function module TH_USER_LIST to get list of sessions. The GUI
version is in the field GUIVERSION of output table USRLIST.
For more background on SAP GUI patching read this dedicated blog.
TSV_TNEW_PAGE_ALLOC_FAILED dumps
This type of dumps can have 2 main root causes:
For the second case read OSS note 2180736 – TSV_TNEW_PAGE_ALLOC_FAILED for
and extensive description on what to check and update on basis level.
CALL_FUNCTION_BACK_REJECTED dumps
7/8
These dumps are caused by missing callback positive listing. See OSS note 2981184 –
What to do in case of CALL_FUNCTION_BACK_REJECTED short dump. The solution is
to add the function module to the positive list in RFC. In no way reduce the RFC security
by lowering the RFC callback security parameter rfc/callback_security_method. Read this
blog on how to hack using callback RFC, and why not to lower the security.
Dump clean up
Dumps can be cleaned up with program RSSNAPDL. For more background on this
program see oss note 1995777 – Dump deleted within a short period of time ST22.
8/8