From patchwork Tue Oct 10 14:53:05 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Marchi X-Patchwork-Id: 77423 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id C3D963857717 for ; Tue, 10 Oct 2023 14:53:26 +0000 (GMT) X-Original-To: gdb-patches@sourceware.org Delivered-To: gdb-patches@sourceware.org Received: from simark.ca (simark.ca [158.69.221.121]) by sourceware.org (Postfix) with ESMTPS id E266A3856DE7 for ; Tue, 10 Oct 2023 14:53:09 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org E266A3856DE7 Authentication-Results: sourceware.org; dmarc=fail (p=none dis=none) header.from=efficios.com Authentication-Results: sourceware.org; spf=fail smtp.mailfrom=efficios.com Received: from smarchi-efficios.internal.efficios.com (192-222-143-198.qc.cable.ebox.net [192.222.143.198]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (prime256v1) server-digest SHA256) (No client certificate requested) by simark.ca (Postfix) with ESMTPSA id 29C891E091; Tue, 10 Oct 2023 10:53:08 -0400 (EDT) From: Simon Marchi To: gdb-patches@sourceware.org Cc: Simon Marchi Subject: [pushed] gdb: remove trailing whitespaces in remote.c Date: Tue, 10 Oct 2023 10:53:05 -0400 Message-ID: <20231010145308.72690-1-simon.marchi@efficios.com> X-Mailer: git-send-email 2.42.0 MIME-Version: 1.0 X-Spam-Status: No, score=-3497.0 required=5.0 tests=BAYES_00, GIT_PATCH_0, KAM_DMARC_NONE, KAM_DMARC_STATUS, SPF_HELO_PASS, SPF_SOFTFAIL, TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gdb-patches@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gdb-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gdb-patches-bounces+patchwork=sourceware.org@sourceware.org Change-Id: I88d136b6b5a0a54d1c8a9f8a0068762a5456a29a --- gdb/remote.c | 19 +++++++++---------- 1 file changed, 9 insertions(+), 10 deletions(-) base-commit: d6bfbb5256e33c356e85dfa5de7d3eaa20714ddd diff --git a/gdb/remote.c b/gdb/remote.c index ffe42e4253d0..0897c68d8a91 100644 --- a/gdb/remote.c +++ b/gdb/remote.c @@ -1340,7 +1340,7 @@ static const registry::key> /* The variable registered as the control variable used by the remote exec-file commands. While the remote exec-file setting is - per-program-space, the set/show machinery uses this as the + per-program-space, the set/show machinery uses this as the location of the remote exec-file value. */ static std::string remote_exec_file_var; @@ -8578,8 +8578,7 @@ remote_target::fetch_register_using_p (struct regcache *regcache, return 0; case PACKET_ERROR: error (_("Could not fetch register \"%s\"; remote failure reply '%s'"), - gdbarch_register_name (regcache->arch (), - reg->regnum), + gdbarch_register_name (regcache->arch (), reg->regnum), buf); } @@ -8925,7 +8924,7 @@ remote_target::store_registers_using_G (const struct regcache *regcache) putpkt (rs->buf); getpkt (&rs->buf); if (packet_check_result (rs->buf) == PACKET_ERROR) - error (_("Could not write registers; remote failure reply '%s'"), + error (_("Could not write registers; remote failure reply '%s'"), rs->buf.data ()); } @@ -11241,20 +11240,20 @@ remote_target::remote_write_qxfer (const char *object_name, int i, buf_len; ULONGEST n; struct remote_state *rs = get_remote_state (); - int max_size = get_memory_write_packet_size (); + int max_size = get_memory_write_packet_size (); if (m_features.packet_support (which_packet) == PACKET_DISABLE) return TARGET_XFER_E_IO; /* Insert header. */ - i = snprintf (rs->buf.data (), max_size, + i = snprintf (rs->buf.data (), max_size, "qXfer:%s:write:%s:%s:", object_name, annex ? annex : "", phex_nz (offset, sizeof offset)); max_size -= (i + 1); /* Escape as much data as fits into rs->buf. */ - buf_len = remote_escape_output + buf_len = remote_escape_output (writebuf, len, 1, (gdb_byte *) rs->buf.data () + i, &max_size, max_size); if (putpkt_binary (rs->buf.data (), i + buf_len) < 0 @@ -11611,7 +11610,7 @@ remote_target::search_memory (CORE_ADDR start_addr, ULONGEST search_space_len, set_general_process (); /* Insert header. */ - i = snprintf (rs->buf.data (), max_size, + i = snprintf (rs->buf.data (), max_size, "qSearch:memory:%s;%s;", phex_nz (start_addr, addr_size), phex_nz (search_space_len, sizeof (search_space_len))); @@ -11693,7 +11692,7 @@ remote_target::rcmd (const char *command, struct ui_file *outbuf) QUIT; /* Allow user to bail out with ^C. */ rs->buf[0] = '\0'; if (getpkt (&rs->buf) == -1) - { + { /* Timeout. Continue to (try to) read responses. This is better than stopping with an error, assuming the stub is still executing the (long) monitor command. @@ -15034,7 +15033,7 @@ remote_new_objfile (struct objfile *objfile) data structures representing them. We don't want to create real tracepoints yet, we don't want to mess up the user's existing collection. */ - + int remote_target::upload_tracepoints (struct uploaded_tp **utpp) {