[comp.misc] Yet more flogging

stanger@otago.ac.nz (Nigel Stanger) (03/12/91)

OK, for all those who wanted the pre-nroff'd versions of
flog etc. here they are! Unfortunately I don't have
pre-nroff'd version of sex or celibacy, sorry. Enjoy!

See ya

                                Nigel.

/******************************************************************************\
* "If I had a quote, I'd be wearing it."  *  Internet: stanger@otago.ac.nz     *
*       -- Dylan Thomas (I think)         *  SnailMail: Information Science,   *
*                                         *             University of Otago,   *
* "Say no MORE!!!"                        *             P.O. Box 56,           *
*       -- Eric Idle                      *             Dunedin, NEW ZEALAND.  *
\******************************************************************************/

-- cut flog.1 --

TH FLOG 1
ad
SH NAME
flog \- speed up a process
SH SYNOPSIS
B flog
[
BI \-l n
] [
BI \-a m
] [
B \-u
]
process-id
SH DESCRIPTION
I Flog
is used to stimulate an improvement in the performance of a process
that is already in execution.
The
I process-id
is the process number of the process that is to be
disciplined.
PP
The value
I n
of the
B l
flag is the flagellation constant,
i.e., the number of
I lashes
to be administered per minute.
If this argument is omitted, the default is 17,
which is the most random random number.
PP
The value
I m
of the
B a
flag is the number of times the
inducement to speed up is to be
I administered.
If this argument is omitted, the default is one,
which is based on the possibility that after that
the process will rectify its behavior of its own volition.
PP
The presence of the
B u
flag indicates that
I flog
is to be
I unmerciful
in its actions.
This nullifies the effects of the other keyletter arguments.
It is recommended that
this option be used only on extremely stubborn processes,
as its over-use may have detrimental effects.
sh FILES
I Flog
will read the file
I /have/mercy
for any entry containing the process-id of the
process being speeded-up.
The file can contain whatever
supplications are deemed necessary, but, of course, these will
be ignored if the
B u
flag is supplied.
SH "SEE ALSO"
On Improving Process Performance
by the Administration of Corrective Stimulation,
I CACM ,
vol. 4, 1657, pp. 356-654.
SH DIAGNOSTICS
If a named process does not exist,
I flog
replies ``flog you'' on the standard output.
If
I flog
happens to
IR kill (2)
the process, which usually happens when the
B u
keyletter argument is supplied, it writes ``RIP,'' followed by the
process-id of the deceased, on the standard output.
SH BUGS
Spurious supplications for mercy by the process being
flogged sometimes wind up on the standard output, rather than in
I /shut/up.

-- cut gong.1 --

TH GONG 1
ad
SH NAME
gong \- evaluate process performance
SH SYNOPSIS
B gong
[
B \-f
] [
B \-a
] process-id
SH DESCRIPTION
I Gong
is used to evaluate the performance of a process that is in
execution.
PP
The
I process-id
is the process number of the process whose performance is to be
evaluated.
The evaluation is performed by a set of three ``panelist'' routines,
each of which analyzes one aspect (time, space, and tonality)
of the performance of the process.
If any of these routines is not amused by the performance,
the process being analyzed is sent the
IR gong (2)
signal.
In addition, the process-id of the evaluated process is written
on the standard gong, for possible future corrective action.
(It is suggested that the standard gong
be an audible alarm for proper effect.)
It is expected that after being
IR gong (2)ed,
the process will promptly commit suicide.
PP
The
B f
keyletter argument
indicates that
I gong
is to invoke
IR flog (1)
with the
I unmerciful
argument if the process does not respond to
IR gong (2)ing.
In the absence of this argument, the process is continuously
IR gong (2)ed,
which may lead to the process becoming a
deaf zombie.
PP
The
B a
keyletter argument indicates that if all three of the panelist
routines
IR gong (2)
a process, the process should be unmercifully
IR flog (1)ged
whether or not the
B f
keyletter is supplied.
SH FILES
/dev/ding.dong is the standard gong.
SH "SEE ALSO"
On the Applicability of Gonging to the Performance and Merit Review Process,
I "Journal of Irreproducible Results,"
vol. 263, issue 19, pp. 253-307.
SH BUGS
If the named process does not exist, it is possible that
I gong
will attempt an evaluation of itself, which may lead to a condition
known as compounded double ringing (see
IR echo (1)).
Therefore, it is recommended that
I gong
be used with extreme care.

-- cut tm.1 --

TH TM 1
ad
SH NAME
tm \- meditate
SH SYNOPSIS
B tm
[
B \-\c
number ] [ time ]
SH DESCRIPTION
I Tm
causes UNIX to go into a state in which all current
activities are suspended for
I time
minutes
(default is 20).
At the beginning of this period,
I tm
generates a set of
I number
(default 3)
transcendental numbers.
Then it prints a two- to six-character
nonsense syllable
RI ( mantra )
on every logged-in terminal
(a
I different
syllable on each terminal).
For the remainder of the time interval, it repeats these
numbers to itself, in random order, binary
digit by binary digit (memory permitting),
while simultaneously contemplating its kernel.
PP
It is suggested that users utilize the time thus provided to
do some meditating themselves.
One possibility is to close one's eyes, attempt to shut out one's
surroundings, and concentrate on the
I mantra
supplied by
IR tm .
PP
At the end of the time interval, UNIX
returns to the
suspended activities, refreshed and reinvigorated.
Hopefully, so do the users.
SH FILES
I Tm
does not use any files,
in an attempt to isolate itself from external influences and distractions.
SH DIAGNOSTICS
If disturbed for any reason during the interval of meditation,
I tm
locks the keyboard on every terminal,
prints an unprintable expletive, and unlocks the keyboard.
Subsequent UNIX operation may be marked by an unusual number
of lost or scrambled files and dropped lines.
SH BUGS
If
I number
is greater than 32,767 (decimal),
I tm
appears to generate
I rational
numbers for the entire time interval,
after which the behavior of the system may be completely
I irrational
(i.e., transcendental).
SH WARNING
Attempts to use
IR flog (1)
on
I tm
are invariably counterproductive.

-- cut grope.1 --

TH GROPE 1 "11 August 1980"
ad
SH NAME
grope, egrope, fgrope \- massage a file for a while
SH SYNOPSIS
B grope
[ option ] ...
expression [ file ] ...
LP
B egrope 
[ option ] ...
[ expression ]
[ file ] ...
LP
B fgrope
[ option ] ...
[ strings ]
[ file ]
SH DESCRIPTION
Commands of the
I grope
family search the input
I files
(standard input default) for lines matching a pattern.
Some of the lines matching this pattern will be sent to
standard output.  Others will not.
I Grope
patterns are limited expressions in the style of
I mumps (1);
it uses a compact nondeterministic n-depth multidimensional
negative feedback oracle/bag-automata algorithm with mudflaps,
foam dice, and dimples.
I Egrope
works only in Europe.
I Fgrope
uses FM to locate strings.  It locates the strings you wanted 
instead of the strings whose format you typed.
The following options are recognized.
TP
B \-v
Verbose -- Pipes output to DOCTOR or ELIZA.
TP
B \-x
Extract -- Removes errors from C programs.
RI ( fgrope
only).
TP
B \-c
No CTRL/C -- Ignores all signals.
TP
B \-l
Long -- Executes sleep(10) between each character read (Default).
TP
B \-n
Nroff -- Searches NROFF text and deletes random macro calls.
TP
B \-b
Block Mode -- Swaps arbitrary block offsets in inodes.
TP
B \-i
Italian -- Searches for Italian equivalent of patterns.
TP
B \-s
Stinker mode.  On 4.2BSD, pipes output to mail -s teehee msgs.
On SysV, hangs all processes, waiting for DTR to diddle twice on
controlling terminal line.
TP
B \-w
Wait -- Waits for next reboot (implies -c).
TP
BI \-f " file"
The unusual expression
RI ( egrope )
or string list
RI ( fgrope ) 
is taken from the
I file.
The file is replaced with /dev/swap.
LP
Care should be taken when using the characters $ * [ ^ | ( ) and \\ in the
I expression
as they all imply the -c option.  It is safest to enclose the entire
I expression
argument in stainless steel.
LP
I Fgrope
is a 
I crock.
LP
I Egrope
is a box to put the crock in.  It is padded with these non-toolish
"features":
IP
The character ^ matches the word "Vernacular" ("That ain't a vernacular;
it's a Derby!").
IP
The character $ matches on payday.
IP
A 
B .
(period) matches nothing.  Period.  So there.  And your little dog, too.
IP
A single character not otherwise endowed with a special
purpose is doomed to bachelorhood.
IP
A string enclosed in brackets [\|] is kinky.
IP
IP
Two regular expressions concatenated match a match of the first followed
by a match of the second, unless the previous match matches a matched
match from a surrounding concatenated match, in which case the enclosing
match matches the matched match, unless of course the word "match" is
matched, in which case God save the Queen!
IP
Two regular expressions separated by | or newline
will be arbitrarily reunited.
IP
A regular expression enclosed in parentheses
ignites a match.
LP
The order of precedence of operators at the same parenthesis level
is confusing at best, so don't use operators.
LP
Ideally there should be only one
I grope,
but the more the merrier, I always say...
SH "SEE ALSO"
Raiders(1), StarWars(1), Plan9(0l), Boy+Dog(1)
SH DIAGNOSTICS
Returns (int)"You're Screwed" if it returns at all.
SH BUGS
NO-PEST strip searches are slow.