From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wm1-x32d.google.com (mail-wm1-x32d.google.com [IPv6:2a00:1450:4864:20::32d]) by sourceware.org (Postfix) with ESMTPS id 03F993858D32 for ; Mon, 5 Sep 2022 07:25:53 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 03F993858D32 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=adacore.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=adacore.com Received: by mail-wm1-x32d.google.com with SMTP id d12-20020a05600c34cc00b003a83d20812fso5158513wmq.1 for ; Mon, 05 Sep 2022 00:25:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=adacore.com; s=google; h=content-transfer-encoding:content-disposition:mime-version :message-id:subject:cc:to:from:date:from:to:cc:subject:date; bh=J4CL8YAuYW+oiLnH4VcGihzxlttjJ1JqOKCaNT+vT0k=; b=jIWyAPtgVJQB+VruRImR0UaBx+AJ2j0FD/zlSL1U9EJQ83cL+eVKRM9qDDm01fQDmO IdUFBH0CVo8s1oUzQEovpfGkhqt7ZOqh5tq9GTrwCn11rvVCs8XyeNXdy7AW3jNSy9GR cZT4F/vCx7oWlQZmlXMMRho/Up3tucKt9wh2S2nHoC+LgaRdDaUfBcmRWv6P3uYg5AAl 5c4RhUbsv2eZ2DW9BTkiYG31Iukx5LF6KcWbk2TTmsJDLN+v450MGhMsSOglnjmBcolc 2ejWrTAZesZWFc44lkpyc7emXzcABzBl5TuB8iGbWthDSBR+kTGdZ7N3kiJEQSV8KwHV vMew== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:content-disposition:mime-version :message-id:subject:cc:to:from:date:x-gm-message-state:from:to:cc :subject:date; bh=J4CL8YAuYW+oiLnH4VcGihzxlttjJ1JqOKCaNT+vT0k=; b=bOHA0Ms1rqPbcSy+aiszBx3nMXeQNDDV9lvKXeqOpgSgfbsXbvCv8XyPC3HJaSBTwp N+mqd9d6vgW97KX1mwSQ4oHgB4TKRT+jzWfa02nCHJI/HOfRW3Ud6x8txhyR5gCWm2mM MaRv5ySxogKvujjkHgZQp9g3gh+zXa8/PAbltwZHGG41r45bkQEhdJmeIJflHJiv53YT uA3Dumlg1tmz14QbvLMVeG9Vt5I1J9SOgBurX4zGhFPfqEO1tXnK9nB4k8T4dgKambe8 4Wop3ddROmHcKjhO8dWjnBHX/ASV9sxwy74LZEsmqjSiSDbyUG+zehBp6jcX7D6x43ov yDyg== X-Gm-Message-State: ACgBeo00spm4X+XCy62i+UJpxYSIHXoG5TjPgN8cZAqzbWkFBqyrnw8a ltnXpv4u56JihpdsQtGTwIFH03HxNUeAUg== X-Google-Smtp-Source: AA6agR6NA+rPUNbv50YhUKRwt3Gn7sLTo3QYhRhPsb5E1yx+2CC2VlobXd9GdN3MyMzckfJ5jJLFGg== X-Received: by 2002:a05:600c:ad2:b0:3a5:36ca:ec38 with SMTP id c18-20020a05600c0ad200b003a536caec38mr9246177wmr.21.1662362751385; Mon, 05 Sep 2022 00:25:51 -0700 (PDT) Received: from poulhies-Precision-5550 (static-176-191-105-132.ftth.abo.bbox.fr. [176.191.105.132]) by smtp.gmail.com with ESMTPSA id k1-20020a5d6d41000000b0021db7b0162esm8009538wri.105.2022.09.05.00.25.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 05 Sep 2022 00:25:50 -0700 (PDT) Date: Mon, 5 Sep 2022 09:25:50 +0200 From: Marc =?iso-8859-1?Q?Poulhi=E8s?= To: gcc-patches@gcc.gnu.org Cc: Arnaud Charlet Subject: [Ada] Fix syntax in documentation Message-ID: <20220905072550.GA1174480@poulhies-Precision-5550> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="BXVAT5kNtrzKuDFl" Content-Disposition: inline Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-12.0 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,GIT_PATCH_0,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,TXREP,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: --BXVAT5kNtrzKuDFl Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Leading to a poorly formatted example section. Tested on x86_64-pc-linux-gnu, committed on trunk gcc/ada/ * doc/gnat_ugn/gnat_and_program_execution.rst: Fix rest syntax * gnat_ugn.texi: Regenerate. --BXVAT5kNtrzKuDFl Content-Type: text/x-diff; charset=utf-8 Content-Disposition: attachment; filename="patch.diff" Content-Transfer-Encoding: 8bit diff --git a/gcc/ada/doc/gnat_ugn/gnat_and_program_execution.rst b/gcc/ada/doc/gnat_ugn/gnat_and_program_execution.rst --- a/gcc/ada/doc/gnat_ugn/gnat_and_program_execution.rst +++ b/gcc/ada/doc/gnat_ugn/gnat_and_program_execution.rst @@ -844,9 +844,7 @@ assorted runtime routines and the output will vary from platform to platform. It is also possible to use ``GDB`` with these traceback addresses to debug the program. For example, we can break at a given code location, as reported -in the stack traceback: - - :: +in the stack traceback:: $ gdb -nw stb @@ -870,9 +868,8 @@ Executables on recent Windows versions, in other words without using the switch with :switch:`--load` instead of the ``addr2line`` tool. The main difference is that you need to copy the Load Address output in the traceback ahead of the sequence of addresses. And the default mode of ``gnatsymbolize`` is equivalent -to that of ``addr2line`` with the above switches, so none of them is needed: +to that of ``addr2line`` with the above switches, so none of them is needed:: - :: $ gnatmake stb -g -bargs -E $ stb diff --git a/gcc/ada/gnat_ugn.texi b/gcc/ada/gnat_ugn.texi --- a/gcc/ada/gnat_ugn.texi +++ b/gcc/ada/gnat_ugn.texi @@ -19023,15 +19023,12 @@ It is also possible to use @code{GDB} with these traceback addresses to debug the program. For example, we can break at a given code location, as reported in the stack traceback: -@quotation - @example $ gdb -nw stb (gdb) break *0x401373 Breakpoint 1 at 0x401373: file stb.adb, line 5. @end example -@end quotation It is important to note that the stack traceback addresses do not change when debug information is included. This is particularly useful because it makes it @@ -19052,13 +19049,7 @@ is that you need to copy the Load Address output in the traceback ahead of the sequence of addresses. And the default mode of @code{gnatsymbolize} is equivalent to that of @code{addr2line} with the above switches, so none of them is needed: -@quotation - - -@table @asis - -@item :: - +@example $ gnatmake stb -g -bargs -E $ stb @@ -19068,13 +19059,8 @@ Load address: 0x400000 Call stack traceback locations: 0x401373 0x40138b 0x40139c 0x401335 0x4011c4 0x4011f1 0x77e892a4 - -@table @asis - -@item $ gnatsymbolize –load stb 0x400000 0x401373 0x40138b 0x40139c 0x401335 - -0x4011c4 0x4011f1 0x77e892a4 -@end table +$ gnatsymbolize --load stb 0x400000 0x401373 0x40138b 0x40139c 0x401335 + 0x4011c4 0x4011f1 0x77e892a4 0x00401373 Stb.P1 at stb.adb:5 0x0040138B Stb.P2 at stb.adb:10 @@ -19083,8 +19069,7 @@ Call stack traceback locations: 0x004011c4 __tmainCRTStartup at ??? 0x004011f1 mainCRTStartup at ??? 0x77e892a4 ??? at ??? -@end table -@end quotation +@end example @subsubheading Tracebacks From Exception Occurrences --BXVAT5kNtrzKuDFl--