swremove man page on HP-UX

Man page or keyword search:  
man Server   10987 pages
apropos Keyword Search (all sections)
Output format
HP-UX logo
[printable version]

swremove(1M)							  swremove(1M)

NAME
       swremove - unconfigure and remove software products

SYNOPSIS
       [XToolkit  Options]  session_file]  software_file]  jobid]  date]  ses‐
	      sion_file]  target_file]	 option=value]	 option_file]	[soft‐
	      ware_selections] target_selections]

   Remarks
	      ·	 supports  an  interactive  user  interface  (GUI) that can be
		 invoked alone or by the command.  See below.

	      ·	 This command supports	operations  on	remote	systems.   See
		 below.

	      ·	 For an overview of all SD commands, see the sd(5) man page by
		 typing on the command line.

DESCRIPTION
       The command removes  software_selections	 from  target_selections  (for
       example,	 root  file  systems).	When removing installed software, also
       unconfigures the software before it is removed.	The  software  is  not
       unconfigured when removed from an alternate root directory since it was
       not configured during installation.  When removing  available  software
       (within a depot), also does not perform the unconfiguration task.

       NOTE  : Selecting a bundle for removal does not always remove all file‐
       sets in that bundle.  If a particular fileset is	 required  by  another
       bundle,	that fileset will not be removed.  For example, if the bundles
       and both use the fileset Debugger.Run and you try to remove the fileset
       Debugger.Run  will not be removed because it is also used by the bundle
       This prevents the removal of one bundle from inadvertently causing  the
       removal of filesets needed by another bundle.

   Remote Operation
       You  can	 enable Software Distributor (SD) to manage software on remote
       systems.	 To let the root user  from  a	central	 SD  controller	 (also
       called  the  central  management server or manager node) perform opera‐
       tions on a remote target (also called the host or agent):

       1)  Set up the root, host, and template Access Control Lists (ACLs)  on
	   the	remote machines to permit root access from the controller sys‐
	   tem.	 To do this, run the following command on each remote system:

	   NOTES:

	   ·  controller is the name of the central management server.

	   ·  If remote system is 11.00, make sure SD patch  PHCO_22526	 or  a
	      superseding patch is installed on remote system before running

	   ·  If  remote  system  is older than 11.00 or for some other reason
	      does not have in place, copy script from an 11.11 or higher sys‐
	      tem to the remote system.

       2)  and have enhanced GUI interfaces for remote operations.  Enable the
	   enhanced GUIs by creating the file on  the  controller.   Use  this
	   command:

       NOTE:  You  can	also set up remote access by using the directly on the
       remote machines to grant root or non-root access to users from the con‐
       troller system.

   Interactive Operation
       supports	 a graphical user interface (GUI) or a terminal user interface
       (in which screen navigation is done with the keyboard and no mouse)  if
       your terminal or display cannot support the GUI.

       To invoke the GUI, type

	      on  the command line (without command-line arguments) or include
	      with any other command-line options when	you  invoke  from  the
	      command line.

       The  command  provides an interactive interface for monitoring software
       jobs.  You can also use it to invoke the or GUIs.

       If you have enabled  SD's  central  management  features,  and  provide
       enhanced GUIs to support operations on remote machines.	See above.

   Removing Patches or Patch Rollback Files
       To  remove patch software, rollback files corresponding to the patch be
       available for rollback.	You must remove the base software modified  by
       the  patch.  (Removing the base software also removes the patches asso‐
       ciated with that software.)

       To commit (make permanent) a patch, use the command's option to	remove
       the   files   saved   for   patch   rollback,   or  use	the  command's
       save_patch_files option to not save them initially.   See  swmodify(1M)
       and swinstall(1M) for more information.

   Control Scripts
       When  removing installed software, the command executes several vendor-
       supplied scripts (if they  exist)  during  the  removal	of  the	 soft‐
       ware_selections.	 The command supports the following scripts:

	      a script executed during the analysis of each
		     target_selection,	it checks to make sure the removal can
		     be attempted.  If this check fails, the software  product
		     will not be removed.

	      a	 script	 executed  immediately	before	the software files are
	      removed.

	      a script executed	 immediately  after  the  software  files  are
	      removed.

	      a script executed during the unconfiguration of each
		     target_selection,	it unconfigures the host for the soft‐
		     ware (and the software for the host).   The  and  scripts
		     are  not intended for unconfiguration tasks.  They are to
		     be used for simple file management needs such as  restor‐
		     ing  files	 moved	during install.	 The script allows the
		     command to unconfigure the hosts on  which	 it  has  been
		     running before removing the software specified.

   Options
       The supports the following options:

	      XToolKit Options
			     The  command  supports a subset of the standard X
			     Toolkit options to control the appearance of  the
			     GUI.  The supported options are: and See the X(1)
			     manual page for a definition of these options.

	      Operate on a depot rather than installed software.

	      Operates on an alternate root directory, which must be specified
	      in the
			     option.   Note  that  unconfigure scripts are not
			     run when removing software from an alternate root
			     directory.	  (This	 option	 is  not  required for
			     alternate root operations but is  maintained  for
			     backward compatibility.  See the heading in sd(5)
			     for more information.)

	      Runs the command in interactive mode (Graphical User Interface).
			     See  the  and  headings  above   for   additional
			     details.

	      Previews a remove task by running the session through the analy‐
	      sis
			     phase only.

	      Turns on verbose output to stdout.
			     (The log file is not affected  by	this  option.)
			     Verbose output is controlled by the default

	      Save the current options and operands only to the
			     session_file.   You can enter a relative or abso‐
			     lute path with the file name.  The default direc‐
			     tory for session files is Without this option, by
			     default, the session file is saved	 only  in  the
			     default directory

			     You can recall a session file with the option.

	      Read the list of
			     software_selections from software_file instead of
			     (or in addition to) the command line.

	      Executes a previously scheduled job.  This is the syntax used by
	      the
			     daemon to start the job.

	      Schedules a job for the specified date.  You can change the date
			     format by modifying the file

	      Execute	     based  on	the  options and operands saved from a
			     previous session,	as  defined  in	 session_file.
			     You  can  save session information to a file with
			     the option.

	      Read the list of
			     target_selections from target_file instead of (or
			     in addition to) the command line.

	      Set the session
			     option  to	 value	and override the default value
			     (or a value in an alternate option_file specified
			     with the option).	Multiple options can be speci‐
			     fied.

	      Read the session options and behaviors from
			     option_file.

   Operands
       supports two types of operands: followed by These  operands  are	 sepa‐
       rated  by  the  "at"  character.	  This syntax implies that the command
       operates on "software selections at targets".

   Software Selections
       The selections operands consist of

       supports the following syntax for each software_selection:

	      ·	 You can specify selections with the following shell  wildcard
		 and pattern-matching notations:

		 For example, the following expression removes all bundles and
		 products with tags that end with "man":

	      ·	 Bundles and subproducts are recursive.	 Bundles  can  contain
		 other	bundles and subproducts can contain other subproducts.
		 For example:

		 or (using expressions):

	      ·	 The software specification selects all	 products.   Use  this
		 specification with caution.

       The component has the form:

	      ·	 location  applies  only  to  installed software and refers to
		 software installed to a location other than the default prod‐
		 uct directory.

	      ·	 and apply only to filesets.

	      ·	 and  apply only to bundles and products.  They are applied to
		 the leftmost bundle or product in a software specification.

	      ·	 The <op> (relational operator) component can be of the form:

		     or

		 which	performs  individual  comparisons   on	 dot-separated
		 fields.

		 For  example,	chooses all revisions greater than or equal to
		 The system compares each dot-separated field to find matches.
		 Shell patterns are not allowed with these operators.

	      ·	 The  (equals) relational operator lets you specify selections
		 with the shell wildcard and pattern-matching notations:

		 For example, the expression returns any revision  in  version
		 10 or version 11.

	      ·	 All  version components are repeatable within a single speci‐
		 fication (for example, If multiple components are  used,  the
		 selection must match all components.

	      ·	 Fully qualified software specs include the and version compo‐
		 nents even if they contain empty strings.

	      ·	 No space or tab characters are allowed in a  software	selec‐
		 tion.

	      ·	 The software can take the place of the version component.  It
		 has the form:

		     [instance_id]

		 within the context of an exported catalog, where is an	 inte‐
		 ger  that distinguishes versions of products and bundles with
		 the same tag.

   Target Selections
       supports the following syntax for each target_selection:

       A host may be specified by its host  name,  domain  name,  or  Internet
       address.	 If host is specified, the directory must be an absolute path.
       To specify a relative path when no host is specified, the relative path
       must  start  with  or  otherwise, the specified name is considered as a
       host.

   Target Selections with IPv6 Address
       The command also supports specifying the host as an IPv6 address on HP-
       UX Release 11i v3, as shown below.

       If  both the hostname and the path are specified, then the first occur‐
       rence of a slash is treated as the separator.

       The IPv6 address can optionally be enclosed in a pair of square	brack‐
       ets and

EXTERNAL INFLUENCES
   Default Options
       In addition to the standard options, you can change behavior and policy
       options by editing the default values found in:

	      the system-wide default values.

	      the user-specific default values.

       Values must be specified in the defaults file using this syntax:

       The optional prefix denotes one of the SD commands.  Using  the	prefix
       limits  the  change in the default value to that command.  If you leave
       the prefix off, the change applies to all commands.

       You can also override default values from the command line with the  or
       options:

       The  following  section	lists  all  of	the keywords supported by If a
       default value exists, it is listed after the "=".

       The policy options that apply to are:

	      The location for SD logfiles and the default  par‐
	      ent directory for the
			installed software catalog.  The default
			value is for normal SD operations.  When
			SD  operates in nonprivileged mode (that
			is, when the default option is set to

			·  The default value is forced to

			·  The path element is replaced with the
			   name	 of  the invoking user, which SD
			   reads from the system password file.

			·  If you set the value of  this  option
			   to  path, SD replaces with the invok‐
			   ing user's home directory  (from  the
			   system  password  file)  and resolves
			   path relative to that directory.  For
			   example, resolves to the directory in
			   your home directory.

			·  If you set the value of  the	 default
			   option  to a relative path, that path
			   is resolved relative to the value  of
			   this option.

			SD's nonprivileged mode is intended only
			for managing applications that are  spe‐
			cially designed and packaged.  This mode
			cannot be used to manage the HP-UX oper‐
			ating  system  or  patches to it.  For a
			full explanation  of  nonprivileged  SD,
			see the available at the web site.

			See also the and options.

	      Causes  the  target  agent  to  automatically exit
	      after Execute phase, or after
			a failed Analysis phase.  This is forced
			to  when  the  controller  is  using  an
			interactive  user  interface,  or   when
			(preview)  is  used.  This enhances net‐
			work reliability and  performance.   The
			default value of causes the target agent
			to automatically exit when  appropriate.
			When  set  to  the target agent will not
			exit until the controller ends the  ses‐
			sion.

	      Causes a target agent to exit if it has been inac‐
	      tive for the
			specified time.	 This  can  be	used  to
			make  target  agents more quickly detect
			lost network connections since	RPC  can
			take  as long as 130 minutes to detect a
			lost connection.  The recommended  value
			is  the	 longest  period  of  inactivity
			expected in your environment.  For  com‐
			mand line invocation, a value between 10
			minutes and 60 minutes is  suitable.   A
			value  of  60  minutes or more is recom‐
			mended when the GUI will be  used.   The
			default of 10000 is slightly less than 7
			days.

	      Permits the use of single patch  filesets	 without
	      "sibling" filesets.
			In  the	 default  state	 of removal of a
			single	fileset	 from  a   multi-fileset
			patch  automatically  includes any other
			fileset that  are  part	 of  the  patch,
			based  on  the	ancestor filesets of the
			target fileset.	 (This behavior	 applies
			to  filesets  selected	directly  by the
			user  and  to	filesets   automatically
			selected   by  SD  to  resolve	software
			dependencies.)

			When set to SD	allows	a  single  patch
			fileset	 to be removed without including
			the sibling  filesets.	 This  allows  a
			target	to contain a patch that has been
			"split"	 into  its  component  filesets.
			WARNING:  Splitting a patch can create a
			situation in which one fileset in a sib‐
			ling  group would be removed by a patch,
			while the other filesets would not.

	      Normally	set  to	 true.	 Specifies  whether  the
	      removal of a kernel
			fileset	 should	 rebuild  the  kernel or
			not.  If the  kernel  rebuild  succeeds,
			the  system  automatically  reboots.  If
			set to false, the  system  continues  to
			run the current kernel.

			If  the option is set to the option must
			also be set to If the option is	 set  to
			the value of the option does not matter.

	      Prevents	the  removal  of  software  requiring  a
	      reboot from the
			non-interactive interface.   If	 set  to
			then  this  software  can be removed and
			the target system(s) will  be  automati‐
			cally rebooted.

			An  interactive	 session always asks for
			confirmation before software requiring a
			reboot is removed.

			If  the option is set to the option must
			also be set to If the option is	 set  to
			the value of the option does not matter.

	      Controls	automatic  job	removal.   If the job is
	      automatically removed,
			job  information  (job	status	or  con‐
			troller/agent	log   files)  cannot  be
			queried with

	      Automatically selects all software that depends on
	      the specified
			software.   When set to and any software
			that  other  software  depends	 on   is
			selected   for	 removal,  automatically
			selects that other software.  If set  to
			automatic  selections  are  not	 made to
			resolve requisites.

	      If	bundles	  that	 have	the    is_sticky
			attribute  set	to will be automatically
			removed when the last of its contents is
			removed.  If the sticky bundles will not
			be automatically removed.

	      Determines whether SD commands  create  compressed
	      INDEX and INFO
			catalog	 files	when  writing  to target
			depots or roots.  The  default	of  does
			not  create  compressed files.	When set
			to  SD	creates	 compressed  and  uncom‐
			pressed	 INDEX and INFO files.	The com‐
			pressed files are named and  and  reside
			in  the	 same  directories as the uncom‐
			pressed files.

			Compressed files can enhance performance
			on  slower  networks,  although they may
			increase  disk	space  usage  due  to  a
			larger	Installed  Products Database and
			depot catalog.	SD controllers and  tar‐
			get  agents  for  HP-UX 11.01 and higher
			automatically load the compressed  INDEX
			and  INFO  files  from	the source agent
			when:

			·  The source agent supports  this  fea‐
			   ture.

			·  or exist on the source depot.

			·  or are not older than the correspond‐
			   ing uncompressed INDEX or INFO files.

			The uncompressed INDEX or INFO	file  is
			accessed  by  the  source  agent  if any
			problem occurs when accessing, transfer‐
			ring, or uncompressing the or file.

	      Specifies	 the  location	of  a depot for the con‐
	      troller to access to
			resolve selections.  Setting this option
			can  reduce  network traffic between the
			controller and the target.  Use the tar‐
			get  selection	syntax	to  specify  the
			location:

			This  option  has  no  effect  on  which
			sources	 the  target uses and is ignored
			when  used  with  the  Interactive  User
			Interface.

	      Defines the default location of the target depot.

	      Requires that all dependencies specified by the
			software_selections  be	 resolved at the
			target_selections.  For	 if  a	selected
			fileset	 has  dependents (that is, other
			software depends  on  the  fileset)  and
			they are not selected, do not remove the
			selected filesets.  If set to  dependen‐
			cies  will  still  be  checked,	 but not
			enforced.

	      Controls	the  handling  of  errors  generated  by
	      scripts.	If
			and a script returns an error, the oper‐
			ation halts.  An error	message	 appears
			reporting   that   the	execution  phase
			failed.	  If  all  script   errors   are
			treated	 as  warnings,	and  attempts to
			continue operation.  A	warning	 message
			appears	 reporting  that  the  execution
			succeeded.  The message wording	 identi‐
			fies whether the failure occurred in the
			configure/unconfigure, checkremove, pre‐
			remove, or postremove phases.

	      Controls the behavior of
			command by checking the available.

			If  set	 to  command  proceeds if one or
			more software selections are available.

			If set to the command proceeds	only  if
			all  the  software selections are avail‐
			able.

	      Defines the directory  path  where  the  Installed
	      Products Database (IPD)
			is  stored.   This information describes
			installed  software.   When  set  to  an
			absolute  path,	 this option defines the
			location of the IPD.  When  this  option
			contains  a  relative  path, the SD con‐
			troller appends the value to  the  value
			specified by the option to determine the
			path to the IPD.  For  alternate  roots,
			this  path  is	resolved relative to the
			location of the	 alternate  root.   This
			option does not affect where software is
			installed, only the IPD location.

			This  option  permits  the  simultaneous
			installation  and  removal  of	multiple
			software applications by multiple  users
			or  multiple processes, with each appli‐
			cation or group of applications using  a
			different IPD.

			Caution: use a specific to manage a spe‐
			cific application.  SD does not	 support
			multiple descriptions of the same appli‐
			cation in multiple IPDs.

			See also the and options, which	 control
			SD's  nonprivileged mode.  (This mode is
			intended only for managing  applications
			that  are  specially  designed and pack‐
			aged.  This mode cannot be used to  man‐
			age   the   HP-UX  operating  system  or
			patches to it.	For a  full  explanation
			of  nonprivileged  SD, see the available
			at the web site.)

	      Specifies an ASCII string giving a title to a job.
	      It is displayed
			along  with  the job ID to provide addi‐
			tional identifying information	about  a
			job when is invoked.

	      Controls the handling of corequisites in determin‐
	      ing the order in
			which filesets are loaded.

			If promotes the corequisite of a prereq‐
			uisite to prerequisite.	 If corequisites
			are not used in determining load order.

	      Adds numeric identification numbers at the  begin‐
	      ning of SD logfile
			messages:
			(default) No identifiers are attached to
			messages.
			Adds identifiers to ERROR messages only.
			Adds identifiers to  ERROR  and	 WARNING
			messages.
			Adds  identifiers to ERROR, WARNING, and
			NOTE messages.
			Adds  identifiers  to  ERROR,	WARNING,
			NOTE, and certain other
			   informational messages.

	      Controls	the  amount of detail written to the log
	      file.  When set
			to this option adds detailed task infor‐
			mation	 (such	 as  options  specified,
			progress statements, and additional sum‐
			mary information) to the log file.  This
			information is in addition to log infor‐
			mation controlled by the option.

			See the option and the sd(5) manual page
			for more information.

	      This is the default command log file for
			the command.

	      Controls the log level for the  events  logged  to
	      the command logfile, the
			target	agent  logfile,	 and  the source
			agent logfile.	This information  is  in
			addition to the detail controlled by the
			option.

			provides no information to the logfile.
			enables	 verbose  logging  to  the   log
			files.
			enables	 very verbose logging to the log
			files.

			See the option and the sd(5) manual page
			for more information.

	      Controls	the  time in minutes to cache and re-use
	      the results of hostname
			or IP  address	resolution  lookups.   A
			value  of  0  disables	the  facility to
			cache and re-use  lookup  results.   The
			maximum	 value allowed is 10080 minutes,
			which is one week.

			A value of:
			disables the lookup caching mechanism.
			is the maximum value allowed.

	      By default, the
			command attempts to automatically  mount
			all  filesystems  in  the  file	 at  the
			beginning  of  the  analysis  phase,  to
			ensure	that  all listed filesystems are
			mounted before proceeding.  This  policy
			helps  to ensure that files which may be
			on mounted filesystems are available  to
			be removed.

			If  set	 to  the  mount operation is not
			attempted, and no check of  the	 current
			mounts is performed.

	      Defines  the polling interval used by the Interac‐
	      tive UI of the controller.  It
			specifies how often  each  target  agent
			will be polled to obtain status informa‐
			tion about  the	 task  being  performed.
			When  operating	 across	 wide-area  net‐
			works,	the  polling  interval	can   be
			increased to reduce network overhead.

	      Controls	whether a depot is removed once the last
	      product/bundle has been
			removed.  If the depot is  removed,  the
			depot's	 and directory structure are not
			removed by default.  If the  and  direc‐
			tory  should be removed, the option must
			also be set to Useful to set to false if
			you  want  to retain existing depot ACLs
			for subsequent depot reuse.

	      Controls whether a depot's
			file and directory are also removed when
			the  depot  itself  is removed.	 The and
			directory will be removed if this option
			is  set	 to the option is set to and the
			last  product/bundle  has  been	 removed
			from the depot.

	      This  option  controls  the  exit code returned by
	      SD's controller commands.
			This option is	applicable  only  for  a
			single	target	operation,  and	 ignored
			when multiple targets are used.

			When set to the default value  of  swre‐
			move returns:

			0  If  there  were  no	errors,	 with or
			   without warnings.

			1  If there were errors.

			When set to swremove returns :

			0  If there  were  no  warnings	 and  no
			   errors.

			1  If there were errors.

			2  If there were warnings but no errors.

	      Defines  the  protocol sequence(s) and endpoint(s)
	      on which the daemon
			listens and the other  commands	 contact
			the daemon.  If the connection fails for
			one  protocol  sequence,  the  next   is
			attempted.  SD supports both the tcp and
			udp protocol sequence on most platforms.

			See the sd(5) manual page (type for more
			information.

	      Relative	length	of  the	 communications timeout.
	      This is a value in the
			range from 0 to 9 and is interpreted  by
			the  DCE RPC.  Higher values mean longer
			times; you may need a higher value for a
			slow or busy network.  Lower values give
			faster recognition on attempts	to  con‐
			tact  hosts  that are not up or not run‐
			ning Each value is  approximately  twice
			as long as the preceding value.	 A value
			of 5 is about 30 seconds for the  proto‐
			col  sequence.	This option may not have
			any noticeable	impact	when  using  the
			protocol sequence.

	      This  option  controls  SD's  nonprivileged  mode.
	      This option is ignored
			(treated as true) when the invoking user
			is super-user.

			When  set  to the default value of true,
			SD operations  are  performed  normally,
			with  permissions  for operations either
			granted to a local super-user or set  by
			SD  ACLs.  (See swacl(1M) for details on
			ACLs.)

			When set to false and the invoking  user
			is local and is not super-user, nonpriv‐
			ileged mode is invoked:

			·  Permissions for operations are  based
			   on  the  user's  file  system permis‐
			   sions.

			·  SD ACLs are ignored.

			·  Files created by SD have the uid  and
			   gid	of  the	 invoking  user, and the
			   mode of created files is set	 accord‐
			   ing to the invoking user's umask.

			SD's nonprivileged mode is intended only
			for managing applications that are  spe‐
			cially designed and packaged.  This mode
			cannot be used to manage the HP-UX oper‐
			ating  system  or  patches to it.  For a
			full explanation  of  nonprivileged  SD,
			see the available at the web site.

			See also the and options.

	      Controls	whether	 or  not control scripts are run
	      during a remove session.
			(See  above  for  the  list  of	 control
			scripts	 typically  run	 during	 Control
			scripts provide important  cleanup  when
			software  is  removed.	 Setting this to
			false may result in some manual	 cleanup
			being required.

	      Defines the default
			software_selections.   There  is no sup‐
			plied default.	If there  is  more  than
			one  software  selection,  they	 must be
			separated by spaces.

	      Indicates the software view  to  be  used	 by  the
	      Interactive UI of the
			controller.   It can be set to or a bun‐
			dle category tag  to  indicate	to  show
			only bundles of that category.

	      Defines the default
			target_selections.  There is no supplied
			default (see above).  If there	is  more
			than  one target selection, they must be
			separated by spaces.

	      Controls the verbosity of the output (stdout).   A
	      value of:
			disables  output  to stdout.  (Error and
			warning messages
			    are always written to stderr).
			enables verbose messaging to stdout.

	      Prevents the removal of files from a remote  (NFS)
	      file system.  When
			set to files on a remote file system are
			not removed.

			If set to and if the superuser has write
			permission  on	the  remote file system,
			the remote files are removed.

   Session File
       Each invocation of defines a task session.   The	 command
       automatically saves options, source information, software
       selections, and target selections before the  task  actu‐
       ally  commences.	  This	lets  you re-execute the command
       even if the session ends before	the  task  is  complete.
       You can also save session information from interactive or
       command-line sessions.

       Session information is saved to the  file  This	file  is
       overwritten  by each invocation of the command.	The file
       uses the same syntax as the defaults files.

       From an interactive session, you can save session  infor‐
       mation into a file at any time by selecting the Save Ses‐
       sion or Save Session As option from the File menu.

       From a command-line session, you can save session  infor‐
       mation by executing the command with the option.	 You can
       specify an absolute path for a session file.  If	 you  do
       not specify a directory, the default location is

       To  re-execute  a  saved session from an interactive ses‐
       sion, use the Recall Session option from the File menu.

       To re-execute a session from a command-line, specify  the
       session file as the argument for the option.

       When  you  re-execute  a	 session file, the values in the
       session file take precedence over values	 in  the  system
       defaults	 file.	 Likewise,  any command-line options and
       parameters take precedence over the values in the session
       file.

   Software and Target Lists
       The  command  supports software and target selection from
       separate input files.

       You can specify software and target selection lists  with
       the and options.	 Software and targets specified in these
       files are selected for operation instead of (or in  addi‐
       tion  to) files listed in the command line.  (See the and
       options for more information.)

       Additionally, the  interactive  user  interface	reads  a
       default	list  of hosts on which to operate.  The list is
       stored in:

	      the system-wide default list of hosts

	      the user-specific default list of hosts

       For each interactive  command,  target  hosts  containing
       roots  or  depots are specified in separate lists respec‐
       tively.)	 The list of hosts are enclosed	 in  braces  and
       separated  by  white space (blank, tab and newline).  For
       example:

   Environment Variables
       The environment variables that affect the command are:

	      Determines the language in which messages are dis‐
	      played.
			   If  is not specified or is set to the
			   empty string, a default value  of  is
			   used.   See	the  lang(5) man page by
			   typing for more information.

			   NOTE: The language in  which	 the  SD
			   agent  and  daemon  log  messages are
			   displayed is set by the  system  con‐
			   figuration variable script, For exam‐
			   ple, must be set to or  to  make  the
			   agent and daemon log messages display
			   in Japanese.

	      Determines the locale to be used to  override  any
	      values for locale
			   categories  specified by the settings
			   of  or  any	 environment   variables
			   beginning with

	      Determines  the  interpretation  of  sequences  of
	      bytes of text data as
			   characters (for example, single  ver‐
			   sus	multibyte  characters  in values
			   for vendor-defined attributes).

	      Determines the language in which	messages  should
	      be written.

	      Determines the format of dates
			   (create_date	 and mod_date) when dis‐
			   played by Used by all utilities  when
			   displaying dates and times in and

	      Determines  the  time zone for use when displaying
	      dates and times.

       Environment variables that affect scripts are:

	      Holds the path to the Installed Products	Database
	      (IPD), relative to
			   the path in the environment variable.
			   Note that you can specify a path  for
			   the IPD using the default option.

	      Defines  the current directory of the script being
	      executed, either
			   a temporary catalog directory,  or  a
			   directory  within  in  the  Installed
			   Products Database (IPD).  This  vari‐
			   able	 tells	scripts where other con‐
			   trol scripts	 for  the  software  are
			   located (for example, subscripts).

	      Holds  the tag name of the control_file being exe‐
	      cuted.  When packaging
			   software, you can define  a	physical
			   name and path for a control file in a
			   depot.  This lets you define the con‐
			   trol_file  with a name other than its
			   tag and lets you use multiple control
			   file definitions to point to the same
			   file.  A control_file can  query  the
			   variable  to	 determine  which tag is
			   being executed.

	      Defines the location of  the  product,  which  may
	      have been changed from
			   the	default product directory.  When
			   combined with the this variable tells
			   scripts  where  the product files are
			   located.

	      A		   variable which defines a minimum  set
			   of  commands	 available  for use in a
			   control script (for example,

	      Defines the root directory in which the session is
	      operating, either
			   or an alternate root directory.  This
			   variable tells  control  scripts  the
			   root	 directory in which the products
			   are installed.   A  script  must  use
			   this	 directory  as	a  prefix  to to
			   locate the product's installed files.
			   The configure script is only run when
			   is

	      Contains the pathname of	a  file	 containing  the
	      value of every option
			   for	a  particular command, including
			   software and target selections.  This
			   lets	 scripts  retrieve  any	 command
			   options and	values	other  than  the
			   ones	 provided  explicitly  by  other
			   environment variables.  For	example,
			   when	 the  file pointed to by is made
			   available to a  request  script,  the
			   targets  option  contains  a	 list of
			   software_collection_specs   for   all
			   targets  specified  for  the command.
			   When the file pointed to by	is  made
			   available  to other scripts, the tar‐
			   gets option contains the single soft‐
			   ware_collection_spec	 for the targets
			   on which the	 script	 is  being  exe‐
			   cuted.

	      This  variable  contains the fully qualified soft‐
	      ware specification of
			   the current product or fileset.   The
			   software   specification  allows  the
			   product or  fileset	to  be	uniquely
			   identified.

       Additional  environment variables that affect scripts for
       are:

	      This variable and the
			   variable are exported  with	a  value
			   that	 forces	 "classic"  behavior  of
			   instead of behavior.	 For HP-UX 10.30
			   and	later versions, this variable is
			   set to "1".

	      Indicates whether a kernel build is scheduled  for
	      the current
			   install/remove   session.	A  value
			   indicates that  the	selected  kernel
			   fileset  is	scheduled  for	a kernel
			   build  and  that   changes	to   are
			   required.   A  null	value  indicates
			   that a kernel build is not  scheduled
			   and that changes to are not required.

			   The	value of this variable is always
			   equal to the value of

	      Indicates whether a  reboot  is  scheduled  for  a
	      fileset selected for
			   removal.   Because  all  HP-UX kernel
			   filesets are	 also  reboot  filesets,
			   the value of this variables is always
			   equal to the value of

	      A value of   indicates the SD command was	 invoked
			   during  an  Operating  System update.
			   This variable is set by the command.

	      This variable, along with the
			   variable, is exported  with	a  value
			   that	 forces	 "classic"  behavior  of
			   instead of behavior.	 For  the  10.30
			   or later release of HP-UX, this vari‐
			   able is cleared.

   Signals
       The command catches  the	 signals  SIGQUIT,  SIGINT,  and
       SIGUSR1.	  If  these  signals  are  received, the command
       prints a message, sends a Remote Procedure Call (RPC)  to
       the agents to wrap up after completion, and then exits.

       The  agent ignores SIGHUP, SIGINT, and SIGQUIT.	It imme‐
       diately	exits  gracefully   after   receiving	SIGTERM,
       SIGUSR1, or SIGUSR2.  Killing the agent may leave corrupt
       software on the system, and thus should only be	done  if
       absolutely  necessary.	Note  that when an SD command is
       killed, the agent does not terminate until completing the
       task in progress.

       The  daemon ignores SIGHUP, SIGINT and SIGQUIT.	It imme‐
       diately exits  gracefully  after	 receiving  SIGTERM  and
       SIGUSR2.	  After	 receiving SIGUSR1, it waits for comple‐
       tion of a copy or remove	 from  a  depot	 session  before
       exiting,	 so that it can register or unregister depots if
       necessary.  Requests to start new  sessions  are	 refused
       during this wait.

       Each  agent will complete the removal task (if the execu‐
       tion phase has already started) before it wraps up.  This
       avoids leaving software in a corrupt state.

   Terminal Support
       For in-depth information about terminal support refer to:

	      ·	 The
	      ·	 Start	the  GUI  or  TUI, select the menu, then
		 select the option to access the

RETURN VALUES
       An interactive session always returns 0.	 A  non-interac‐
       tive session returns:

	      The software_selections were successfully removed.
	      The remove operation failed on
		  all target_selections.
	      The remove operation failed on
		  some target_selections.

DIAGNOSTICS
       The command writes to stdout, stderr, and to specific log
       files.

   Standard Output
       An interactive session does not write to stdout.	 A  non-
       interactive   session  writes  messages	for  significant
       events.	These include:

	      ·	 a begin and end session message,
	      ·	 selection, analysis, and  execution  task  mes‐
		 sages for each target_selection.

   Standard Error
       An  interactive session does not write to stderr.  A non-
       interactive session writes messages for all  WARNING  and
       ERROR conditions to stderr.

   Logging
       Both interactive and non-interactive sessions log summary
       events at the host where the command was	 invoked.   They
       log  detailed  events to the logfile associated with each
       target_selection.

       Command Log
	      A non-interactive	 session  logs	all  stdout  and
	      stderr  messages	to  the the logfile Similar mes‐
	      sages are logged	by an interactive session.   The
	      user  can specify a different logfile by modifying
	      the option.

       Target Log
	      A process performs the actual remove operation  at
	      each  target_selection.	When  removing installed
	      software, the logs messages to  the  file	 beneath
	      the  root	 directory  (for example,for example,for
	      example,for example, or an alternate  root  direc‐
	      tory).  When removing available software (within a
	      depot), the logs messages to the file  swagent.log
	      beneath the depot directory (for example,

       You  can	 view  command and target log files using the or
       command.

   swagentd Disabled
       If the daemon has been disabled on the host,  it	 can  be
       enabled by the host's system administrator by setting the
       entry in to and executing

EXAMPLES
       Preview the remove of the C and Pascal products installed
       at the local host:

       Remove  the  C  and  Pascal  products from several remote
       hosts:

       Remove a particular version of HP Omniback:

       Remove the entire contents of a local depot:

       Remove the entire contents of  a	 local	depot  from  the
       directory depot while in the directory

FILES
       Contains the user-specific default values for some or all
       SD
	       options.	 If this file does not exist,  SD  looks
	       for user-specific defaults in

       Contains	 the user-specific default list of hosts to man‐
       age.

       Contains session files automatically saved by the SD com‐
       mands, or
	       explicitly saved by the user.

       Contains the master list of current SD options with their
       default values.

       The directory which contains all of the configurable
	       and non-configurable data for SD.  This directory
	       is also the default location of log files.

       Contains	 the  active system-wide default values for some
       or all SD options.

       Contains the system-wide default list of hosts to manage.

       Contains the set of date/time templates used when  sched‐
       uling jobs.

       The  Installed  Products Database (IPD), a catalog of all
       products
	       installed on a system.

       The default location of a target software depot.

AUTHOR
       was developed by the Hewlett-Packard Company.

SEE ALSO
       install-sd(1M),	 swacl(1M),   swagentd(1M),   swask(1M),
       swconfig(1M),   swcopy(1M),   swinstall(1M),   swjob(1M),
       swlist(1M),   swmodify(1M),   swpackage(1M),   swreg(1M),
       swverify(1M), sd(4), swpackage(4), sd(5).

       available at

       SD customer web site at

								  swremove(1M)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net