little known Unix commands

utzoo!decvax!ucbvax!menlo70!sri-unix!lauren at UCLA-Security utzoo!decvax!ucbvax!menlo70!sri-unix!lauren at UCLA-Security
Sun Dec 27 10:50:17 AEST 1981


From: lauren at UCLA-Security (Lauren Weinstein)
Many people have been asking: "So exactly what is so all-fired new
about Unix Version 3?  Is it really worth spending an additional
$14.3 million for an update?"  Well, perhaps.  Here are a couple of
little known V.3 commands that recently were brought to my attention.
These manual pages recently appeared in my mailbox via the Usenet -- I
suggest that interested parties contact Western Electric for more
information.

--Lauren--

---



     FLOG(1)                     UNIX 3.0                     FLOG(1)



     NAME
          flog - speed up a process

     SYNOPSIS
          flog [ -ln ] [ -am ] [ -u ] process-id

     DESCRIPTION
          Flog is used to stimulate an improvement in the performance
          of a process that is already in execution.

          The process-id is the process number of the process that is
          to be disciplined.

          The value n of the l keyletter argument is the flagellation
          constant, i.e., the number of lashes to be administered per
          minute.  If this argument is omitted, the default is 17,
          which is the most random random number.

          The value m of the a keyletter argument is the number of
          times the inducement to speed up is to be administered. If
          this argument is omitted, the default is one, which is based
          on the possibility that after that the process will rectify
          its behavior of its own volition.

          The presence of the u keyletter argument indicates that flog
          is to be unmerciful in its actions.  This nullifies the
          effects of the other keyletter arguments.  It is recommended
          that this option be used only on extremely stubborn
          processes, as its over-use may have detrimental effects.

     FILES
          Flog will read the file /have/mercy for any entry containing
          the process-id of the process being speeded-up.  The file
          can contain whatever supplications are deemed necessary,
          but, of course, these will be totally ignored if the u
          keyletter argument is supplied.

     SEE ALSO
          On Improving Process Performance by the Administration of
          Corrective Stimulation, CACM , vol. 4, 1657, pp. 356-654.

     DIAGNOSTICS
          If a named process does not exist, flog replies ``flog you''
          on the standard output.  If flog kill(2)s the process, which
          usually happens when the u keyletter argument is supplied,
          it writes ``rip,'' followed by the process-id of the
          deceased, on the standard output.

     BUGS
          Spurious supplications for mercy by the process being
          flogged sometimes wind up on the standard output, rather
          than in /shut/up.



     Page 1                                         (printed 12/15/81)







     GONG(1)                       UNIX 3.0                      GONG(1)



     NAME
          gong - evaluate process performance

     SYNOPSIS
          gong [ -f ] [ -a ] process-id

     DESCRIPTION
          Gong is used to evaluate the performance of a process that
          is in execution.

          The process-id is the process number of the process whose
          performance is to be evaluated.

          The evaluation is performed by a set of three ``panelist''
          routines, each of which analyzes one aspect (time, space,
          and tonality) of the performance of the process.  If any of
          these routines is not amused by the performance, the process
          being analyzed is sent the gong(2) signal.  In addition, the
          process-id of the evaluated process is written on the
          standard gong, for possible future corrective action.  (It
          is suggested that the standard gong be an audible alarm for
          proper effect.) It is expected that after being gong(2)ed,
          the process will promptly commit suicide.

          The f keyletter argument indicates that gong is to invoke
          flog(1) with the unmerciful argument if the process does not
          respond to gong(2)ing.  In the absence of this argument, the
          process is continuously gong(2)ed, which may lead to the
          process becoming a deaf zombie.

          The a keyletter argument indicates that if all three of the
          panelist routines gong(2) a process, the process should be
          unmercifully flog(1)ged whether or not the f keyletter is
          supplied.

     FILES
          /dev/ding.dong is the standard gong.

     SEE ALSO
          On the Applicability of Gonging to the Performance and Merit
          Review Process, Journal of Irreproducible Results, vol. 263,
          issue 19, pp. 253-307.

     BUGS
          If the named process does not exist, it is possible that
          gong will attempt an evaluation of itself, which may lead to
          a condition known as compounded double ringing (see
          echo(2)).  Therefore, it is recommended that gong be used
          with extreme care.






     Page 1                                         (printed 12/15/81)



More information about the Comp.unix.wizards mailing list