summaryrefslogtreecommitdiffstats
path: root/tester/covoar/ExecutableInfo.h
diff options
context:
space:
mode:
authorCillian O'Donnell <cpodonnell8@gmail.com>2018-04-25 21:33:58 +0100
committerChris Johns <chrisj@rtems.org>2018-05-01 09:00:35 +1000
commit3e187baeb9f706b729b2760a51e63a7703a30679 (patch)
treed8a846ebb0ecafeb1318e2fe20a670688f53a1b4 /tester/covoar/ExecutableInfo.h
parentrtemstoolkit: Remove warnings generated on Windows for fall-thru. (diff)
downloadrtems-tools-3e187baeb9f706b729b2760a51e63a7703a30679.tar.bz2
covoar: Add symbol set reader and ELF data parser to covoar.
Add ability to organize symbol sets of libraries in INI file and then read them with covoar and load the symbols directly from the libraries. rtems-tools/../testing: Add configuration files for coverage analysis. A number of covoar options are not required and are defaulted. Co-author: Krzysztof Miesowicz <krzysztof.miesowicz@gmail.com> Co-author: Vijay Kumar Banerjee <vijaykumar9597@gmail.com> Co-author: Chris Johns <chrisj@rtems.org>
Diffstat (limited to 'tester/covoar/ExecutableInfo.h')
-rw-r--r--tester/covoar/ExecutableInfo.h6
1 files changed, 3 insertions, 3 deletions
diff --git a/tester/covoar/ExecutableInfo.h b/tester/covoar/ExecutableInfo.h
index 7242715..20ea9bf 100644
--- a/tester/covoar/ExecutableInfo.h
+++ b/tester/covoar/ExecutableInfo.h
@@ -67,14 +67,14 @@ namespace Coverage {
*
* @return Returns the executable's file name
*/
- std::string getFileName( void ) const;
+ const std::string& getFileName( void ) const;
/*!
* This method returns the library name associated with the executable.
*
* @return Returns the executable's library name
*/
- std::string getLibraryName( void ) const;
+ const std::string& getLibraryName( void ) const;
/*!
* This method returns the load address of the dynamic library
@@ -111,7 +111,7 @@ namespace Coverage {
* This method indicates whether a dynamic library has been
* associated with the executable.
*
- * @return Returns TRUE if
+ * @return Returns TRUE if
*/
bool hasDynamicLibrary( void );