summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRafael Espindola <rafael.espindola@gmail.com>2013-06-14 15:12:13 +0000
committerRafael Espindola <rafael.espindola@gmail.com>2013-06-14 15:12:13 +0000
commitc65aba032ebd4899687d75d542e0d2a39e286936 (patch)
tree60acc5858508a08102a492c4f040c878cc28ad68
parentd86dd4a29d8cdfcbae03dedaa5ee24c6c02f4839 (diff)
downloadllvm-c65aba032ebd4899687d75d542e0d2a39e286936.tar.gz
llvm-c65aba032ebd4899687d75d542e0d2a39e286936.tar.bz2
llvm-c65aba032ebd4899687d75d542e0d2a39e286936.tar.xz
Move PrependMainExecutablePath next to its only user.
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@183980 91177308-0d34-0410-b5e6-96231b3b80d8
-rw-r--r--include/llvm/Support/SystemUtils.h10
-rw-r--r--lib/Support/SystemUtils.cpp23
-rw-r--r--tools/bugpoint/ToolRunner.cpp22
3 files changed, 22 insertions, 33 deletions
diff --git a/include/llvm/Support/SystemUtils.h b/include/llvm/Support/SystemUtils.h
index 399aee51eb..d2d08b2342 100644
--- a/include/llvm/Support/SystemUtils.h
+++ b/include/llvm/Support/SystemUtils.h
@@ -19,7 +19,6 @@
namespace llvm {
class raw_ostream;
- namespace sys { class Path; }
/// Determine if the raw_ostream provided is connected to a terminal. If so,
/// generate a warning message to errs() advising against display of bitcode
@@ -30,15 +29,6 @@ bool CheckBitcodeOutputToConsole(
bool print_warning = true ///< Control whether warnings are printed
);
-/// PrependMainExecutablePath - Prepend the path to the program being executed
-/// to \p ExeName, given the value of argv[0] and the address of main()
-/// itself. This allows us to find another LLVM tool if it is built in the same
-/// directory. An empty string is returned on error; note that this function
-/// just mainpulates the path and doesn't check for executability.
-/// @brief Find a named executable.
-sys::Path PrependMainExecutablePath(const std::string &ExeName,
- const char *Argv0, void *MainAddr);
-
} // End llvm namespace
#endif
diff --git a/lib/Support/SystemUtils.cpp b/lib/Support/SystemUtils.cpp
index b13b57114b..2036364dc5 100644
--- a/lib/Support/SystemUtils.cpp
+++ b/lib/Support/SystemUtils.cpp
@@ -13,7 +13,6 @@
//===----------------------------------------------------------------------===//
#include "llvm/Support/SystemUtils.h"
-#include "llvm/Support/PathV1.h"
#include "llvm/Support/Process.h"
#include "llvm/Support/Program.h"
#include "llvm/Support/raw_ostream.h"
@@ -32,25 +31,3 @@ bool llvm::CheckBitcodeOutputToConsole(raw_ostream &stream_to_check,
}
return false;
}
-
-/// PrependMainExecutablePath - Prepend the path to the program being executed
-/// to \p ExeName, given the value of argv[0] and the address of main()
-/// itself. This allows us to find another LLVM tool if it is built in the same
-/// directory. An empty string is returned on error; note that this function
-/// just mainpulates the path and doesn't check for executability.
-/// @brief Find a named executable.
-sys::Path llvm::PrependMainExecutablePath(const std::string &ExeName,
- const char *Argv0, void *MainAddr) {
- // Check the directory that the calling program is in. We can do
- // this if ProgramPath contains at least one / character, indicating that it
- // is a relative path to the executable itself.
- sys::Path Result = sys::Path::GetMainExecutable(Argv0, MainAddr);
- Result.eraseComponent();
-
- if (!Result.isEmpty()) {
- Result.appendComponent(ExeName);
- Result.appendSuffix(sys::Path::GetEXESuffix());
- }
-
- return Result;
-}
diff --git a/tools/bugpoint/ToolRunner.cpp b/tools/bugpoint/ToolRunner.cpp
index 0fea9788a6..a79248d3f7 100644
--- a/tools/bugpoint/ToolRunner.cpp
+++ b/tools/bugpoint/ToolRunner.cpp
@@ -230,6 +230,28 @@ int LLI::ExecuteProgram(const std::string &Bitcode,
void AbstractInterpreter::anchor() { }
+/// Prepend the path to the program being executed
+/// to \p ExeName, given the value of argv[0] and the address of main()
+/// itself. This allows us to find another LLVM tool if it is built in the same
+/// directory. An empty string is returned on error; note that this function
+/// just mainpulates the path and doesn't check for executability.
+/// @brief Find a named executable.
+static sys::Path PrependMainExecutablePath(const std::string &ExeName,
+ const char *Argv0, void *MainAddr) {
+ // Check the directory that the calling program is in. We can do
+ // this if ProgramPath contains at least one / character, indicating that it
+ // is a relative path to the executable itself.
+ sys::Path Result = sys::Path::GetMainExecutable(Argv0, MainAddr);
+ Result.eraseComponent();
+
+ if (!Result.isEmpty()) {
+ Result.appendComponent(ExeName);
+ Result.appendSuffix(sys::Path::GetEXESuffix());
+ }
+
+ return Result;
+}
+
// LLI create method - Try to find the LLI executable
AbstractInterpreter *AbstractInterpreter::createLLI(const char *Argv0,
std::string &Message,