aboutsummaryrefslogtreecommitdiff
path: root/gdb/remote.c
diff options
context:
space:
mode:
authorTom Tromey <tom@tromey.com>2022-01-08 16:31:44 -0700
committerTom Tromey <tom@tromey.com>2022-03-29 12:46:24 -0600
commit830df12588cfa80be673e710bee22761752ead11 (patch)
tree184f592abd10c76bd670257b30ba240c6e88b4fb /gdb/remote.c
parent9e4902bfacb49f350cb95e7ee0fe1a8eed33c353 (diff)
downloadbinutils-830df12588cfa80be673e710bee22761752ead11.zip
binutils-830df12588cfa80be673e710bee22761752ead11.tar.gz
binutils-830df12588cfa80be673e710bee22761752ead11.tar.bz2
Remove some uses of printf_unfiltered
A number of spots call printf_unfiltered only because they are in code that should not be interrupted by the pager. However, I believe these cases are all handled by infrun's blanket ban on paging, and so can be converted to the default (_filtered) API. After this patch, I think all the remaining _unfiltered calls are ones that really ought to be. A few -- namely in complete_command -- could be replaced by a scoped assignment to pagination_enabled, but for the remainder, the code seems simple enough like this.
Diffstat (limited to 'gdb/remote.c')
-rw-r--r--gdb/remote.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/gdb/remote.c b/gdb/remote.c
index 219e720..67fd713 100644
--- a/gdb/remote.c
+++ b/gdb/remote.c
@@ -6005,8 +6005,8 @@ remote_target::remote_detach_1 (inferior *inf, int from_tty)
target_mourn_inferior (inferior_ptid);
if (print_inferior_events)
- printf_unfiltered (_("[Inferior %d (%s) detached]\n"),
- inf->num, infpid.c_str ());
+ printf_filtered (_("[Inferior %d (%s) detached]\n"),
+ inf->num, infpid.c_str ());
}
else
{
@@ -9961,7 +9961,7 @@ remote_target::getpkt_or_notif_sane_1 (gdb::char_vector *buf,
{
/* We have tried hard enough, and just can't receive the
packet/notification. Give up. */
- printf_unfiltered (_("Ignoring packet error, continuing...\n"));
+ printf_filtered (_("Ignoring packet error, continuing...\n"));
/* Skip the ack char if we're in no-ack mode. */
if (!rs->noack_mode)
@@ -12312,8 +12312,8 @@ remote_target::remote_hostio_open (inferior *inf, const char *filename,
{
static int warning_issued = 0;
- printf_unfiltered (_("Reading %s from remote target...\n"),
- filename);
+ printf_filtered (_("Reading %s from remote target...\n"),
+ filename);
if (!warning_issued)
{