summaryrefslogtreecommitdiffstats
path: root/llvm/lib/Support/SystemUtils.cpp
diff options
context:
space:
mode:
authorMikhail Glushenkov <foldr@codedgers.com>2010-11-03 16:14:16 +0000
committerMikhail Glushenkov <foldr@codedgers.com>2010-11-03 16:14:16 +0000
commitb8211b80bc53699674645172f0af82a72dcbdc41 (patch)
treee415a297796797d6b5acff67d96c4d817a2d096c /llvm/lib/Support/SystemUtils.cpp
parent189c6c687ced08ff933098ea5a005c9b6e345064 (diff)
downloadbcm5719-llvm-b8211b80bc53699674645172f0af82a72dcbdc41.tar.gz
bcm5719-llvm-b8211b80bc53699674645172f0af82a72dcbdc41.zip
Rename FindExecutable to PrependMainExecutablePath.
Makes it more clear that it is just a path manipulation function. llvm-svn: 118174
Diffstat (limited to 'llvm/lib/Support/SystemUtils.cpp')
-rw-r--r--llvm/lib/Support/SystemUtils.cpp15
1 files changed, 8 insertions, 7 deletions
diff --git a/llvm/lib/Support/SystemUtils.cpp b/llvm/lib/Support/SystemUtils.cpp
index ff076637ab5..9646d75bd2e 100644
--- a/llvm/lib/Support/SystemUtils.cpp
+++ b/llvm/lib/Support/SystemUtils.cpp
@@ -32,13 +32,14 @@ bool llvm::CheckBitcodeOutputToConsole(raw_ostream &stream_to_check,
return false;
}
-/// FindExecutable - Find a named executable, given the value of argv[0] of the
-/// program being executed and the address of main itself. This allows us to
-/// find another LLVM tool if it is built in the same directory. An empty string
-/// is returned on error.
-#undef FindExecutable // needed on windows :(
-sys::Path llvm::FindExecutable(const std::string &ExeName,
- const char *Argv0, void *MainAddr) {
+/// PrependMainExecutablePath - Prepend the path to the program being executed
+/// to \p ExeName, given the value of argv[0] and the address of main()
+/// itself. This allows us to find another LLVM tool if it is built in the same
+/// directory. An empty string is returned on error; note that this function
+/// just mainpulates the path and doesn't check for executability.
+/// @brief Find a named executable.
+sys::Path llvm::PrependMainExecutablePath(const std::string &ExeName,
+ const char *Argv0, void *MainAddr) {
// Check the directory that the calling program is in. We can do
// this if ProgramPath contains at least one / character, indicating that it
// is a relative path to the executable itself.
OpenPOWER on IntegriCloud