From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.5-pre1 (2020-06-20) on ip-172-31-74-118.ec2.internal X-Spam-Level: X-Spam-Status: No, score=-1.9 required=3.0 tests=BAYES_00 autolearn=ham autolearn_force=no version=3.4.5-pre1 Path: eternal-september.org!reader02.eternal-september.org!feeder.eternal-september.org!aioe.org!.POSTED.2uCIJahv+a4XEBqttj5Vkw.user.gioia.aioe.org!not-for-mail From: "Dmitry A. Kazakov" Newsgroups: comp.lang.ada Subject: Re: is there a version of unix written in Ada Date: Thu, 1 Oct 2020 12:21:46 +0200 Organization: Aioe.org NNTP Server Message-ID: References: <00cd3aaa-d518-43a2-b321-58d6fae70aebo@googlegroups.com> <57eb7a65-51ea-4624-b9dc-9c4dda0fee59n@googlegroups.com> <5f70fd3b$0$13541$426a74cc@news.free.fr> <87wo0d3iac.fsf@nightsong.com> <87sgb02l7b.fsf@nightsong.com> <875z7vyy1u.fsf@nightsong.com> <87wo0bkns3.fsf@nightsong.com> NNTP-Posting-Host: 2uCIJahv+a4XEBqttj5Vkw.user.gioia.aioe.org Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit X-Complaints-To: abuse@aioe.org User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.3.1 X-Notice: Filtered by postfilter v. 0.9.2 Content-Language: en-US Xref: reader02.eternal-september.org comp.lang.ada:60355 List-Id: On 01/10/2020 11:59, J-P. Rosen wrote: > Le 01/10/2020 à 11:28, Dmitry A. Kazakov a écrit : >> BTW, I still do not know to design an Ada-conform tracing/logging >> facility such that you could trace/log from anywhere, protected action >> included, and without knowing statically which protected object is >> involved. >> > Did you have a look at package Debug? > (https://www.adalog.fr/en/components#Debug) Thanks > It features, among others, a trace routine which is guaranteed to not be > potentially blocking. It calls a protected operation on a different protected object, yes, this is non-blocking, and I considered same, but is this legal? Maybe I am wrong, but I have an impression that walking away to another object is not OK. Or is that limited to protected entries only? Another issue is having two different calls: Trace and protected Trace. If one used instead of another, you have a ticking bomb in the production code. I remember that there was a GNAT pragma to catch it, but it was a run-time check, so it just replaced one type of explosive with another. -- Regards, Dmitry A. Kazakov http://www.dmitry-kazakov.de