EPICS Home

Experimental Physics and Industrial Control System


 
1994  1995  1996  1997  1998  1999  2000  <20012002  2003  2004  2005  2006  2007  2008  2009  2010  2011  2012  2013  2014  2015  2016  2017  2018  2019  2020  2021  2022  2023  2024  Index 1994  1995  1996  1997  1998  1999  2000  <20012002  2003  2004  2005  2006  2007  2008  2009  2010  2011  2012  2013  2014  2015  2016  2017  2018  2019  2020  2021  2022  2023  2024 
<== Date ==> <== Thread ==>

Subject: Re: process passive task
From: Ned Arnold <[email protected]>
To: [email protected]
Cc: [email protected]
Date: Thu, 1 Feb 2001 14:19:19 -0600 (CST)
 
>   > Here is a little 'hack' that might be of use to you ...
>   > [...]
> 
> Hey, that's neat!
> 
> Flink the sub record to a stringin that points back to the sub's DESC
> field and you can easily run a camonitor to see who is putting values in
> that record ... soft access spying.
> 
> Ralph


No need for the stringin record, the subroutine posts a monitor on the
.DESC field. One can monitor that directly.

One limitation is the 28 character field. In fact, I now see that the
code doesn't even check for an overrun, so if you have a long user name
and long client name, you will probably overwrite memory.  :(

I said it was a hack!

A more thorough and robust solution is left as an exercise for the student.

	Ned 



Replies:
Re: process passive task Ian Smith
Re: process passive task Ian Smith

Navigate by Date:
Prev: Re: process passive task Ralph Lange
Next: Re: process passive task Ian Smith
Index: 1994  1995  1996  1997  1998  1999  2000  <20012002  2003  2004  2005  2006  2007  2008  2009  2010  2011  2012  2013  2014  2015  2016  2017  2018  2019  2020  2021  2022  2023  2024 
Navigate by Thread:
Prev: Re: process passive task Ralph Lange
Next: Re: process passive task Ian Smith
Index: 1994  1995  1996  1997  1998  1999  2000  <20012002  2003  2004  2005  2006  2007  2008  2009  2010  2011  2012  2013  2014  2015  2016  2017  2018  2019  2020  2021  2022  2023  2024