Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

gong(1) [linux man page]

GONG(1) 						      General Commands Manual							   GONG(1)

NAME
gong - evaluate process performance SYNOPSIS
gong [-f] [-a] process-id DESCRIPTION
Gong is used to evaluate the performance of a process that is in execution. The process-id is the process number of the process whose performance is to be evaluated. The evaluation is performed by a set of three ``panelist'' routines, each of which analyzes one aspect (time, space, and tonality) of the performance of the process. If any of these routines is not amused by the performance, the process being analyzed is sent the gong(2) signal. In addition, the process-id of the eval- uated process is written on the standard gong, for possible future corrective action. (It is suggested that the standard gong be an audi- ble alarm for proper effect.) It is expected that after being gong(2)ed, the process will promptly commit suicide. The -f keyletter argument indicates that gong is to invoke flog(1) with the unmerciful argument if the process does not respond to gong(2)ing. In the absence of this argument, the process is continuously gong(2)ed, which may lead to the process becoming a deaf zombie. The -a keyletter argument indicates that if all three of the panelist routines gong(2) a process, the process should be unmercifully flog(1)ged whether or not the -f keyletter is supplied. FILES
/dev/ding.dong is the standard gong. SEE ALSO
On the Applicability of Gonging to the Performance and Merit Review Process, Journal of Irreproducible Results, vol. 263, issue 19, pp. 253-307. BUGS
If the named process does not exist, it is possible that gong will attempt an evaluation of itself, which may lead to a condition known as compounded double ringing (see echo(1)). Therefore, it is recommended that gong be used with extreme care. GONG(1)

Check Out this Related Man Page

val(1)							      General Commands Manual							    val(1)

Name
       val - validate SCCS file

Syntax
       val -
       val [-s] [-rSID] [-mname] [-ytype] files

Description
       The  command  determines  if the specified file is an SCCS file meeting the characteristics specified by the optional argument list.  Argu-
       ments to may appear in any order.  The arguments consist of keyletter arguments that begin with a ``-'' and named files.

       The command has a special argument, ``-,'' which causes reading of the standard input until an end-of-file  condition  is  detected.   Each
       line read is independently processed, as if it were a command line argument list.

       The  command  generates diagnostic messages on the standard output for each command line and file processed and also returns a single 8-bit
       code upon exit as described below.

Options
       The effects of any keyletter argument apply independently to each named file on the command line.  The keyletter arguments are  defined	as
       follows:

	      -  Causes stdin to be read until end of file.

	      -s Suppresses all error messages.

	      -rSID
		 Indicates  specified  delta  version  number.	A check is made to determine if the SID is ambiguous, for example, r1 is ambiguous
		 because it physically does not exist but implies 1.1, 1.2, and so forth, which may exist) or invalid, for example, r1.0 or r1.1.0
		 are  invalid  because neither case can exist as a valid delta number).  If the SID is valid and not ambiguous, a check is made to
		 determine if it actually exists.

	      -mname
		 Compares specified value with the SCCS val.1 keyword.

	      -ytype
		 Compares specified type with SCCS  keyword.

       The 8-bit code returned by is a disjunction of the possible errors.  It can be interpreted as a bit string where set bits  are  interpreted
       (from left to right) as:

	      bit 0 = missing file argument
	      bit 1 = unknown or duplicate keyletter argument
	      bit 2 = corrupted SCCS file
	      bit 3 = can't open file or file not SCCS
	      bit 4 = SID is invalid or ambiguous
	      bit 5 = SID does not exist
	      bit 6 = %Y%, -y mismatch
	      bit 7 = %M%, -m mismatch

       Note that can process two or more files on a given command line and can process multiple command lines when reading the standard input.	In
       these cases, an aggregate code is returned - a logical OR of the codes generated for each command line and file processed.

Restrictions
       The command can process up to 50 files on a single command line.  Any number above 50 produces a core dump.

Diagnostics
       Use for explanations.

See Also
       admin(1), delta(1), get(1), prs(1), sccs(1)
       Guide to the Source Code Control System

																	    val(1)
Man Page