Asri-unix.323 net.unix-wizards utzoo!decvax!ucbvax!menlo70!sri-unix!lauren@UCLA-Security Sun Dec 27 10:50:17 1981 little known Unix commands From: lauren at UCLA-Security (Lauren Weinstein) Many people have been asking: "So exactly what is so all-fired new about Unix Version 3? Is it really worth spending an additional $14.3 million for an update?" Well, perhaps. Here are a couple of little known V.3 commands that recently were brought to my attention. These manual pages recently appeared in my mailbox via the Usenet -- I suggest that interested parties contact Western Electric for more information. --Lauren-- --- FLOG(1) UNIX 3.0 FLOG(1) NAME flog - speed up a process SYNOPSIS flog [ -ln ] [ -am ] [ -u ] process-id DESCRIPTION Flog is used to stimulate an improvement in the performance of a process that is already in execution. The process-id is the process number of the process that is to be disciplined. The value n of the l keyletter argument is the flagellation constant, i.e., the number of lashes to be administered per minute. If this argument is omitted, the default is 17, which is the most random random number. The value m of the a keyletter argument is the number of times the inducement to speed up is to be administered. If this argument is omitted, the default is one, which is based on the possibility that after that the process will rectify its behavior of its own volition. The presence of the u keyletter argument indicates that flog is to be unmerciful in its actions. This nullifies the effects of the other keyletter arguments. It is recommended that this option be used only on extremely stubborn processes, as its over-use may have detrimental effects. FILES Flog will read the file /have/mercy for any entry containing the process-id of the process being speeded-up. The file can contain whatever supplications are deemed necessary, but, of course, these will be totally ignored if the u keyletter argument is supplied. SEE ALSO On Improving Process Performance by the Administration of Corrective Stimulation, CACM , vol. 4, 1657, pp. 356-654. DIAGNOSTICS If a named process does not exist, flog replies ``flog you'' on the standard output. If flog kill(2)s the process, which usually happens when the u keyletter argument is supplied, it writes ``rip,'' followed by the process-id of the deceased, on the standard output. BUGS Spurious supplications for mercy by the process being flogged sometimes wind up on the standard output, rather than in /shut/up. Page 1 (printed 12/15/81) GONG(1) UNIX 3.0 GONG(1) NAME gong - evaluate process performance SYNOPSIS gong [ -f ] [ -a ] process-id DESCRIPTION Gong is used to evaluate the performance of a process that is in execution. The process-id is the process number of the process whose performance is to be evaluated. The evaluation is performed by a set of three ``panelist'' routines, each of which analyzes one aspect (time, space, and tonality) of the performance of the process. If any of these routines is not amused by the performance, the process being analyzed is sent the gong(2) signal. In addition, the process-id of the evaluated process is written on the standard gong, for possible future corrective action. (It is suggested that the standard gong be an audible alarm for proper effect.) It is expected that after being gong(2)ed, the process will promptly commit suicide. The f keyletter argument indicates that gong is to invoke flog(1) with the unmerciful argument if the process does not respond to gong(2)ing. In the absence of this argument, the process is continuously gong(2)ed, which may lead to the process becoming a deaf zombie. The a keyletter argument indicates that if all three of the panelist routines gong(2) a process, the process should be unmercifully flog(1)ged whether or not the f keyletter is supplied. FILES /dev/ding.dong is the standard gong. SEE ALSO On the Applicability of Gonging to the Performance and Merit Review Process, Journal of Irreproducible Results, vol. 263, issue 19, pp. 253-307. BUGS If the named process does not exist, it is possible that gong will attempt an evaluation of itself, which may lead to a condition known as compounded double ringing (see echo(2)). Therefore, it is recommended that gong be used with extreme care. Page 1 (printed 12/15/81) ----------------------------------------------------------------- gopher://quux.org/ conversion by John Goerzen of http://communication.ucsd.edu/A-News/ This Usenet Oldnews Archive article may be copied and distributed freely, provided: 1. There is no money collected for the text(s) of the articles. 2. The following notice remains appended to each copy: The Usenet Oldnews Archive: Compilation Copyright (C) 1981, 1996 Bruce Jones, Henry Spencer, David Wiseman.