07/20/87 display_user_messages Syntax as a command: display_user_messages {-control_args} Function: This command displays entries in the user message table. Privileged processes such as the Initializer use this table to send information to user processes regarding operator warnings, inactivity bump warnings, login communication channel information. Control arguments: -brief, -bf prints brief information about selected entries in tabular form. (Default) -exclude_data STR, -exclude STR, -ex STR does not select entries whose interpreted message includes the string STR. -handle HANDLE, -hdl HANDLE selects entries with the given 24-digit, octal HANDLE. -long, -lg prints detailed information about selected entries. -match_data STR, -match STR selects entries whose interpreted message includes the string STR. -message_id MESSAGE_ID, -mid MESSAGE_ID selects the entry with the given 24-digit, octal MESSAGE_ID. -no_octal, -noc does not include an octal dump of the message in the display. (Default) -octal, -oc prints detailed information about selected entries, including an octal dump of the message. -source GROUP_ID, -sc GROUP_ID selects entries sent by a process matching GROUP_ID. In general, the Initializer is the primary source of user messages. See Notes below for the format of GROUP_ID. -source_id PROCESS_ID, -scid PROCESS_ID, -sid PROCESS_ID selects entries sent by the process having the given octal PROCESS_ID. -target GROUP_ID, -tgt GROUP_ID selects entries sent to a process matching GROUP_ID. See Notes below for the format of GROUP_ID. -target_id PROCESS_ID, -tgtid PROCESS_ID, -tid PROCESS_ID, -process_id PROCESS_ID, -pid PROCESS_ID selects entries sent to the process having the given octal PROCESS_ID. Access required: Access to the user_message_admin_ gate is required to use this command. Notes: All entries are displayed if no selection arguments are given. The -source and -target GROUP_ID operand is given in one of the following formats: person_id.project_id.tag person_id.project_id person_id where any of the components can be omitted or given as an asterisk (*) to match all values in that component position. Examples: The following example shows the tabular form of brief output. ! dum SOURCE TARGET MESSAGE Initializer GDixon system message: AS warning Initializer GDixon com channel info The following example shows the itemized format of long output. ! dum -lg -match system Source name: Initializer.SysDaemon.z pid: 003000777777 Target name: GDixon.SysAdmin.a pid: 005000021742 ring: 4 Message handle: 770007700077000770007700 id: 000000115413402132146345 Message time: 1987-06-07 21:56:42.947813 mst Sun Message length: 48 words Message type: system message: AS warning: ******** 06/07/87 2156.7 mst Sun From Operator: The system is shutting down in 10 minutes. ******** ----------------------------------------------------------- Historical Background This edition of the Multics software materials and documentation is provided and donated to Massachusetts Institute of Technology by Group BULL including BULL HN Information Systems Inc. as a contribution to computer science knowledge. This donation is made also to give evidence of the common contributions of Massachusetts Institute of Technology, Bell Laboratories, General Electric, Honeywell Information Systems Inc., Honeywell BULL Inc., Groupe BULL and BULL HN Information Systems Inc. to the development of this operating system. Multics development was initiated by Massachusetts Institute of Technology Project MAC (1963-1970), renamed the MIT Laboratory for Computer Science and Artificial Intelligence in the mid 1970s, under the leadership of Professor Fernando Jose Corbato. Users consider that Multics provided the best software architecture for managing computer hardware properly and for executing programs. Many subsequent operating systems incorporated Multics principles. Multics was distributed in 1975 to 2000 by Group Bull in Europe , and in the U.S. by Bull HN Information Systems Inc., as successor in interest by change in name only to Honeywell Bull Inc. and Honeywell Information Systems Inc. . ----------------------------------------------------------- Permission to use, copy, modify, and distribute these programs and their documentation for any purpose and without fee is hereby granted,provided that the below copyright notice and historical background appear in all copies and that both the copyright notice and historical background and this permission notice appear in supporting documentation, and that the names of MIT, HIS, BULL or BULL HN not be used in advertising or publicity pertaining to distribution of the programs without specific prior written permission. Copyright 1972 by Massachusetts Institute of Technology and Honeywell Information Systems Inc. Copyright 2006 by BULL HN Information Systems Inc. Copyright 2006 by Bull SAS All Rights Reserved