[Info-vax] Howto can I call the undocumented "set watch/class=dir" in an own program and fetch the output in my program?

Arne Vajhøj arne at vajhoej.dk
Fri Sep 22 08:11:54 EDT 2023


On 9/22/2023 3:08 AM, Eberhard Heuser wrote:
> for my project a need the information, what file operation (i.e.
> crea/dir or remove file) is been issued from an interactive terminal
> process. I've seen that the "undocumented" dcl-command "set watch"
> just broadcasts this information to the terminal I need. I did look
> into the source and found that this program only modifies a system
> parameter called PIO$GW_DFPROT and CLASS_FLAGS[x], where x =
> XQP$_MAJOR_FUNC, XQP$_CNTRL_FUNC, XQP$_ATTRIBUTE,XQP$_DIR_OPS,
> XQP$_DUMP, XQP$_QUOTA or XQP$_PROTECTION are accessed. It is unclear
> for me if it is possible to get access to these infos in an own
> written program. So I'm thankful for any ideas where to look at.

WIthout having seen any VMS source or know anything specific,
then it sounds like a program that:
* flip the bits that will triggers those unso messages to be sent
* trap all unso messages
would work.

The second part does not even require privs.

Arne





More information about the Info-vax mailing list