From patchwork Mon Jul 25 07:00:20 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: =?utf-8?q?Martin_Li=C5=A1ka?= X-Patchwork-Id: 154 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:6a10:b5d6:b0:2b9:3548:2db5 with SMTP id v22csp1485785pxt; Mon, 25 Jul 2022 00:00:53 -0700 (PDT) X-Google-Smtp-Source: AGRyM1sot5PxaWwmufxy7gSKGYU2f+Z34AbCO9vSagboKlkd5UQ06I75vmdEMZMv6ywwNxW7Xe3Q X-Received: by 2002:a05:6402:4315:b0:43a:d79e:117c with SMTP id m21-20020a056402431500b0043ad79e117cmr11670650edc.194.1658732452887; Mon, 25 Jul 2022 00:00:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658732452; cv=none; d=google.com; s=arc-20160816; b=EGXT41uTGgJbv9EGUQeWe8tOznWSDpsi7EcEL5KYZZQ1dGUnOHcb47HWxyuNyWoPQ0 ZptyxlQe0XMtZnGuPiyMJn0tAo2jX7wMN7w9kvwoSYeNHdtnOLRNvTxbbT1ArNv8uIbG fL1njlm8ULsPhconLRPlmng0+SORYbjqlzgJfjvoqYE/dO/Iefq4BCWjaAIw4+oRzKYj Tko3zKJoG/HMCMQLXtqlyssEF9Ye87xQJHSBgrBR3mHubwy2iQR3WV7e8OnUfOQ17kax 1YTpPMaLe48I7c7TGAZGedyeIic6+tFjMYqNznxT0mgppXmBr8Em+vtXmOJAEMGI52qr euNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:cc:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :content-language:to:subject:from:user-agent:mime-version:date :message-id:dkim-signature:dkim-signature:dmarc-filter:delivered-to; bh=GlZ5knMm+yAQkR+7yx/p+T3nL7dmgy6lmgswIbU+tSo=; b=kXqerqTj+p+ypsBbB4QRbmtuPPVl+cUohFBTSYp+TmjXHRW+p6+hYXjn7R9NjVHsIW SdE9V9kllkf1BR1NZds4UNm2z6FfOFc5u+H2mT3Dq6XrvfqTUER85N1INfQQnWw75Rj5 Ye43Cg0eTsoRF/A/HW+sGfAvTKAvURieKf2Crt+/5TWVCcLTKPwYcG7s41g+GI4HaG40 dtKi5L75fkHNmNqS/ilq+Zco0OzjueCvXALy90TZ3DEnbSwMlXeKG3wPBIBYqgubo/Vo aNY0RAjLPX1/iJZB69GgcEPz8KUNlldD+3s/xpwRm8KhC7d1zP+XVZw8jtMTgtW1mjxL gPKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@suse.cz header.s=susede2_rsa header.b=T0ffbVLY; dkim=neutral (no key) header.i=@gcc.gnu.org; spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 2620:52:3:1:0:246e:9693:128c as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org" Received: from sourceware.org (server2.sourceware.org. [2620:52:3:1:0:246e:9693:128c]) by mx.google.com with ESMTPS id be28-20020a0564021a3c00b0043a9ac5cfb6si11211218edb.348.2022.07.25.00.00.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 25 Jul 2022 00:00:52 -0700 (PDT) Received-SPF: pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 2620:52:3:1:0:246e:9693:128c as permitted sender) client-ip=2620:52:3:1:0:246e:9693:128c; Authentication-Results: mx.google.com; dkim=fail header.i=@suse.cz header.s=susede2_rsa header.b=T0ffbVLY; dkim=neutral (no key) header.i=@gcc.gnu.org; spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 2620:52:3:1:0:246e:9693:128c as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org" Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id EB3F93840C26 for ; Mon, 25 Jul 2022 07:00:46 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) by sourceware.org (Postfix) with ESMTPS id EA8313858403 for ; Mon, 25 Jul 2022 07:00:22 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org EA8313858403 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=suse.cz Authentication-Results: sourceware.org; spf=fail smtp.mailfrom=suse.cz Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 00F6D33C54; Mon, 25 Jul 2022 07:00:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1658732421; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=GlZ5knMm+yAQkR+7yx/p+T3nL7dmgy6lmgswIbU+tSo=; b=T0ffbVLY32puBq84TGeek87CeSp/ZPBb/lofydLavks4F8ryfw1CTrbb1Bqqabgv1NZv9A oVBcsauxVpltPxEQ5qmZ8lPnAEXn+qdU1bUPuVOr3/3wGWkzVt0sVTJlLD22q1MreXzWEq Q20Ij/fK/IY5NoLRTF8ABwI9e1hm5kk= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1658732421; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=GlZ5knMm+yAQkR+7yx/p+T3nL7dmgy6lmgswIbU+tSo=; b=GcGQoNJlRo4NgNDrI27tJZd+olIVGzbXwiK4NYjzljRyGqi9O0VqGV+Kd1mXKyFKhYZPMx puUGp7oghyIJEWDg== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id DA81713A8D; Mon, 25 Jul 2022 07:00:20 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id 0hg4NIQ/3mKCSQAAMHmgww (envelope-from ); Mon, 25 Jul 2022 07:00:20 +0000 Message-ID: <0bbbacab-5518-8653-4748-5d47c2d03dc0@suse.cz> Date: Mon, 25 Jul 2022 09:00:20 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 From: =?utf-8?q?Martin_Li=C5=A1ka?= Subject: [PATCH] docs: remove recently added trailing whitespaces To: gcc-patches@gcc.gnu.org Content-Language: en-US X-Spam-Status: No, score=-12.0 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, GIT_PATCH_0, SPF_HELO_NONE, SPF_SOFTFAIL, TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: mirimmad@outlook.com Errors-To: gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org Sender: "Gcc-patches" X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-LABELS: =?utf-8?b?IlxcSW1wb3J0YW50Ig==?= X-GMAIL-THRID: =?utf-8?q?1739307040737147814?= X-GMAIL-MSGID: =?utf-8?q?1739307040737147814?= Pushed as obvious. Martin gcc/ChangeLog: * doc/extend.texi: Remove trailing whitespaces. * doc/invoke.texi: Likewise. --- gcc/doc/extend.texi | 12 ++++++------ gcc/doc/invoke.texi | 10 +++++----- 2 files changed, 11 insertions(+), 11 deletions(-) diff --git a/gcc/doc/extend.texi b/gcc/doc/extend.texi index 71897b84a1b..7fe7f8817cd 100644 --- a/gcc/doc/extend.texi +++ b/gcc/doc/extend.texi @@ -3007,15 +3007,15 @@ produced by @command{gold}. For other linkers that cannot generate resolution file, explicit @code{externally_visible} attributes are still necessary. -@item fd_arg +@item fd_arg @itemx fd_arg (@var{N}) @cindex @code{fd_arg} function attribute -The @code{fd_arg} attribute may be applied to a function that takes an open +The @code{fd_arg} attribute may be applied to a function that takes an open file descriptor at referenced argument @var{N}. It indicates that the passed filedescriptor must not have been closed. -Therefore, when the analyzer is enabled with @option{-fanalyzer}, the -analyzer may emit a @option{-Wanalyzer-fd-use-after-close} diagnostic +Therefore, when the analyzer is enabled with @option{-fanalyzer}, the +analyzer may emit a @option{-Wanalyzer-fd-use-after-close} diagnostic if it detects a code path in which a function with this attribute is called with a closed file descriptor. @@ -3040,8 +3040,8 @@ attribute is called on a file descriptor opened with @code{O_WRONLY}. @itemx fd_arg_write (@var{N}) @cindex @code{fd_arg_write} function attribute The @code{fd_arg_write} is identical to @code{fd_arg_read} except that the -analyzer may emit a @option{-Wanalyzer-access-mode-mismatch} diagnostic if -it detects a code path in which a function with this attribute is called on a +analyzer may emit a @option{-Wanalyzer-access-mode-mismatch} diagnostic if +it detects a code path in which a function with this attribute is called on a file descriptor opened with @code{O_RDONLY}. @item flatten diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index b1a9f50bfc7..9a3f2d14c5a 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -9847,7 +9847,7 @@ This warning requires @option{-fanalyzer}, which enables it; use @option{-Wno-analyzer-fd-access-mode-mismatch} to disable it. -This diagnostic warns for paths through code in which a +This diagnostic warns for paths through code in which a @code{read} on a write-only file descriptor is attempted, or vice versa. This diagnostic also warns for code paths in a which a function with attribute @@ -9863,7 +9863,7 @@ This warning requires @option{-fanalyzer}, which enables it; use @option{-Wno-analyzer-fd-double-close} to disable it. -This diagnostic warns for paths through code in which a +This diagnostic warns for paths through code in which a file descriptor can be closed more than once. @item -Wno-analyzer-fd-leak @@ -9873,7 +9873,7 @@ This warning requires @option{-fanalyzer}, which enables it; use @option{-Wno-analyzer-fd-leak} to disable it. -This diagnostic warns for paths through code in which an +This diagnostic warns for paths through code in which an open file descriptor is leaked. @item -Wno-analyzer-fd-use-after-close @@ -9883,7 +9883,7 @@ This warning requires @option{-fanalyzer}, which enables it; use @option{-Wno-analyzer-fd-use-after-close} to disable it. -This diagnostic warns for paths through code in which a +This diagnostic warns for paths through code in which a read or write is called on a closed file descriptor. This diagnostic also warns for paths through code in which @@ -9898,7 +9898,7 @@ This warning requires @option{-fanalyzer}, which enables it; use @option{-Wno-analyzer-fd-use-without-check} to disable it. -This diagnostic warns for paths through code in which a +This diagnostic warns for paths through code in which a file descriptor is used without being checked for validity. This diagnostic also warns for paths through code in which