From 61253a9c93f30e6d6e9007ff9e6fa496eaca89ad Mon Sep 17 00:00:00 2001 From: Chris Lattner Date: Mon, 13 Jan 2003 01:00:02 +0000 Subject: [PATCH] Bad segvs actually cause a segv now git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@5255 91177308-0d34-0410-b5e6-96231b3b80d8 --- lib/ExecutionEngine/JIT/Callback.cpp | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/lib/ExecutionEngine/JIT/Callback.cpp b/lib/ExecutionEngine/JIT/Callback.cpp index b843e106895..3b40e2ebe1d 100644 --- a/lib/ExecutionEngine/JIT/Callback.cpp +++ b/lib/ExecutionEngine/JIT/Callback.cpp @@ -19,8 +19,15 @@ static void TrapHandler(int TN, siginfo_t *SI, ucontext_t *ucp) { #ifdef REG_EIP /* this code does not compile on Sparc! */ if (SI->si_code != SEGV_MAPERR || SI->si_addr != 0 || ucp->uc_mcontext.gregs[REG_EIP] != 0) { - std::cerr << "Bad SEGV encountered!\n"; - abort(); + std::cerr << "Bad SEGV encountered EIP = 0x" << std::hex + << ucp->uc_mcontext.gregs[REG_EIP] << " addr = " + << SI->si_addr << "!\n"; + + struct sigaction SA; // Restore old SEGV handler... + SA.sa_handler = SIG_DFL; + SA.sa_flags = SA_NOMASK; + sigaction(SIGSEGV, &SA, 0); + return; // Should core dump now... } // The call instruction should have pushed the return value onto the stack...