Sponsored Content
Full Discussion: Override
Special Forums IP Networking Override Post 17013 by Mulo on Sunday 10th of March 2002 02:49:56 AM
Old 03-10-2002
Power Override

Hi
My computer of late started misbehaving. Whenever I switch it on
It say Override and then it takes long to boot. Surprising is that it opens excel automatic. What could be that?
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Override protection.....

I am having this problem......when I run this script: print -n "Enter file name to be deleted: " read answer if then rm $name else echo "No such file with the name: $name exists" fi I was trying to test my script for errors, and basically when the user had files with the rights: 400,... (1 Reply)
Discussion started by: Makaveli.2003
1 Replies

2. AIX

date override

When the aix date function is called by a routine, is the date function 'aware' of the name of the routine that is calling it, such that if we had the source code of the date function, we could modify it so that it provides a date to the caller depending upon the identity of the calling routine.... (1 Reply)
Discussion started by: gerry shacter
1 Replies

3. Programming

override the function in C

hi , greetings , I have one doubt reg the C functions . I have a program sample.c , in which i have function name scanf , which reads a a variable and prints the variable inside the function . this scanf is nothing to do with C library function scanf , but i would like to use only user... (1 Reply)
Discussion started by: naren_chella
1 Replies

4. Programming

How to override my profile

I would like to override the default profile which is loaded when the system starts or When I run a program so that profile should get loaded in the settings. Is there any system call to do so. . (0 Replies)
Discussion started by: mobile01
0 Replies

5. Shell Programming and Scripting

override protection 644 (yes/no)?

Hi pls help me out to short out this problem rm PAB113_011.out rm: PAB113_011.out: override protection 644 (yes/no)? n If i give y it remove the file. But i added the rm command as a part of ksh file and i tried to remove the file. Its not removing and the the file prompting as... (9 Replies)
Discussion started by: sri_aue
9 Replies

6. Shell Programming and Scripting

vi question: does :q! override saves using :w ?

story is i accidentally saved when i intended to quit. the 'w' and 'q' is button too close, so i pressed the wrong one. now, i saved changes that i don't remember all over this lengthy script. (1 Reply)
Discussion started by: magiling
1 Replies

7. UNIX for Dummies Questions & Answers

Override options of rm command

How can i override options of rm command ?? and how can i implement my own options when we delete file using rm commad it will not delete file it has to move some folder....plz suggest some solution. (10 Replies)
Discussion started by: arun508.gatike
10 Replies

8. Shell Programming and Scripting

Override Mailx Command

Hello All, I am working on a project where the requirement is override mailx command in such way that, instead of sending mailing to email addresses coded in codes, it should send mails to one common email address at run time. We do not intend to change the email addresses in codes. This... (7 Replies)
Discussion started by: shubh05
7 Replies

9. Shell Programming and Scripting

How to override Classpath?

Hi, When I login to my HP-UX and fire the "set" command I see that the weblogic 9.2 classpath is already set. However, I wish to override the classpath to weblogic version 10.3 I have a script call setWLSEnv.sh that has the desired classpath. Thus, in my unix script i write .... (6 Replies)
Discussion started by: mohtashims
6 Replies

10. Shell Programming and Scripting

Override last line in UNIX

Hello , I have to override the last line of a text file in unix I know one way is to delete and insert however I am looking for a one liner. Could anyone help me to write it? below is the code I have come up with sed '$d' /ParmFiles/test2_parm.dat>/ParmFiles/temp_pra.dat; cat... (1 Reply)
Discussion started by: Pratik4891
1 Replies
RECON(1)							     LAM TOOLS								  RECON(1)

NAME
recon - Check if LAM can be started. SYNOPSIS
recon [-a] [-b] [-d] [-h] [-v] [-nn] [-np] [-ssi key value] [bhost] OPTIONS
-a Report all host errors. -b Assume local and remote shell are the same. This means that only one remote shell invocation is used to each node. If -b is not used, two remote shell invocations are used to each node. -d Turn on debugging. -h Print the command help menu. -ssi key value Send arguments to various SSI modules. See the "SSI" section, below. -v Be verbose. -nn Don't add "-n" to the remote agent command line -np Do not force the execution of $HOME/.profile on remote hosts DESCRIPTION
In order for LAM to be started on a remote UNIX machine, several requirements have to be fulfilled: 1) The machine must be reachable via the network. 2) The user must be able to remotely execute on the machine with the default remote shell program that was chosen when LAM was config- ured. This is usually rsh(1), but any remote shell program is acceptable (such as ssh(1), etc.). Note that remote host permission must be configured such that the remote shell program will not ask for a password when a command is invoked on remote host. 3) The remote user's shell must have a search path that will locate LAM executables. 4) The remote shell's startup file must not print anything to standard error when invoked non-interactively. If any of these requirements is not met for any machine declared in bhost, LAM will not be able to start. By running recon first, the user will be able to quickly identify and correct problems in the setup that would inhibit LAM from starting. The local machine where recon is invoked must be one of the machines specified in bhost. The bhost file is a LAM boot schema written in the host file syntax. See bhost(5). Instead of the command line, a boot schema can be specified in the LAMBHOST environment variable. Otherwise a default file, bhost.def, is used. LAM seaches for bhost first in the local directory and then in the installation directory under etc/. recon tests each machine defined in bhost by attempting to execute on it the tkill(1) command using its "pretend" option (no action is taken). This test, if successful, indicates that all the requirements listed above are met, and thus LAM can be started on the machine. If the attempt is successful, the next machine is checked. In case the attempt fails, a descriptive error message is displayed and recon stops unless the -a option is used, in which case recon continues checking the remaining machines. If recon takes a long time to finish successfully, this will be a good indication to the user that the LAM system to be started has slow communication links or heavily loaded machines, and it might be preferable to exclude or replace some of the machines in the system. SSI (System Services Interface) The -ssi switch allows the passing of parameters to various SSI modules. LAM's SSI modules are described in detail in lamssi(7). SSI mod- ules have direct impact on MPI programs because they allow tunable parameters to be set at run time (such as which boot device driver to use, what parameters to pass to that driver, etc.). The -ssi switch takes two arguments: key and value. The key argument generally specifies which SSI module will receive the value. For example, the key "boot" is used to select which RPI to be used for starting processes on remote nodes. The value argument is the value that is passed. For example: recon -ssi boot tm Tells LAM to use the "tm" boot module for native launching in PBSPro / OpenPBS environments (the tm boot module does not require a boot schema). recon -ssi boot rsh -ssi rsh_agent "ssh -x" boot_file Tells LAM to use the "rsh" boot module, and tells the rsh module to use "ssh -x" as the specific agent to launch executables on remote nodes. And so on. LAM's boot SSI modules are described in lamssi_boot(7). This page should be consulted for specific actions that are taken by, and how to tweak the run-time behavior of each boot module. The -ssi switch can be used multiple times to specify different key and/or value arguments. If the same key is specified more than once, the values are concatenated with a comma (",") separating them. Note that the -ssi switch is simply a shortcut for setting environment variables. The same effect may be accomplished by setting corre- sponding environment variables before running lamboot. The form of the environment variables that LAM sets are: LAM_MPI_SSI_key=value. Note that the -ssi switch overrides any previously set environment variables. Also note that unknown key arguments are still set as envi- ronment variable -- they are not checked (by lamwipe) for correctness. Illegal or incorrect value arguments may or may not be reported -- it depends on the specific SSI module. Remote Executable Invocation All tweakable aspects of launching executables on remote nodes during recon are discussed in lamssi(7) and lamssi_boot(7). Topics include (but are not limited to): discovery of remote shell, run-time overrides of the agent use to launch remote executables (e.g., rsh and ssh), etc. FILES
laminstalldir/etc/lam-bhost.def default boot schema file, where "laminstalldir" is the directory where LAM/MPI was installed. EXAMPLES
recon -v mynodes Check if LAM can be started on all the UNIX machines described in the boot schema mynodes. Report about important steps as they are done. recon -v -a Check if LAM can be started on all the UNIX machines described in the default boot schema. Report about important steps as they are done. Check all the machines; do not stop after the first error message. SEE ALSO
rsh(1), tkill(1), bhost(5), lamboot(1), lamwipe(1), lam-helpfile(5), lamssi(7), lamssi_boot(7) LAM 7.1.4 July, 2007 RECON(1)
All times are GMT -4. The time now is 11:37 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy