diff options
author | Tom Tromey <tom@tromey.com> | 2022-01-08 16:31:44 -0700 |
---|---|---|
committer | Tom Tromey <tom@tromey.com> | 2022-03-29 12:46:24 -0600 |
commit | 830df12588cfa80be673e710bee22761752ead11 (patch) | |
tree | 184f592abd10c76bd670257b30ba240c6e88b4fb /gdb/remote.c | |
parent | 9e4902bfacb49f350cb95e7ee0fe1a8eed33c353 (diff) | |
download | binutils-830df12588cfa80be673e710bee22761752ead11.zip binutils-830df12588cfa80be673e710bee22761752ead11.tar.gz binutils-830df12588cfa80be673e710bee22761752ead11.tar.bz2 |
Remove some uses of printf_unfiltered
A number of spots call printf_unfiltered only because they are in code
that should not be interrupted by the pager. However, I believe these
cases are all handled by infrun's blanket ban on paging, and so can be
converted to the default (_filtered) API.
After this patch, I think all the remaining _unfiltered calls are ones
that really ought to be. A few -- namely in complete_command -- could
be replaced by a scoped assignment to pagination_enabled, but for the
remainder, the code seems simple enough like this.
Diffstat (limited to 'gdb/remote.c')
-rw-r--r-- | gdb/remote.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/gdb/remote.c b/gdb/remote.c index 219e720..67fd713 100644 --- a/gdb/remote.c +++ b/gdb/remote.c @@ -6005,8 +6005,8 @@ remote_target::remote_detach_1 (inferior *inf, int from_tty) target_mourn_inferior (inferior_ptid); if (print_inferior_events) - printf_unfiltered (_("[Inferior %d (%s) detached]\n"), - inf->num, infpid.c_str ()); + printf_filtered (_("[Inferior %d (%s) detached]\n"), + inf->num, infpid.c_str ()); } else { @@ -9961,7 +9961,7 @@ remote_target::getpkt_or_notif_sane_1 (gdb::char_vector *buf, { /* We have tried hard enough, and just can't receive the packet/notification. Give up. */ - printf_unfiltered (_("Ignoring packet error, continuing...\n")); + printf_filtered (_("Ignoring packet error, continuing...\n")); /* Skip the ack char if we're in no-ack mode. */ if (!rs->noack_mode) @@ -12312,8 +12312,8 @@ remote_target::remote_hostio_open (inferior *inf, const char *filename, { static int warning_issued = 0; - printf_unfiltered (_("Reading %s from remote target...\n"), - filename); + printf_filtered (_("Reading %s from remote target...\n"), + filename); if (!warning_issued) { |