From 5bebd807a3390391fb53a98631e158dbfb754ed9 Mon Sep 17 00:00:00 2001 From: Chris Lattner Date: Mon, 13 Jan 2003 01:00:02 +0000 Subject: Bad segvs actually cause a segv now llvm-svn: 5255 --- llvm/lib/ExecutionEngine/JIT/Callback.cpp | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) (limited to 'llvm/lib/ExecutionEngine/JIT/Callback.cpp') diff --git a/llvm/lib/ExecutionEngine/JIT/Callback.cpp b/llvm/lib/ExecutionEngine/JIT/Callback.cpp index b843e106895..3b40e2ebe1d 100644 --- a/llvm/lib/ExecutionEngine/JIT/Callback.cpp +++ b/llvm/lib/ExecutionEngine/JIT/Callback.cpp @@ -19,8 +19,15 @@ static void TrapHandler(int TN, siginfo_t *SI, ucontext_t *ucp) { #ifdef REG_EIP /* this code does not compile on Sparc! */ if (SI->si_code != SEGV_MAPERR || SI->si_addr != 0 || ucp->uc_mcontext.gregs[REG_EIP] != 0) { - std::cerr << "Bad SEGV encountered!\n"; - abort(); + std::cerr << "Bad SEGV encountered EIP = 0x" << std::hex + << ucp->uc_mcontext.gregs[REG_EIP] << " addr = " + << SI->si_addr << "!\n"; + + struct sigaction SA; // Restore old SEGV handler... + SA.sa_handler = SIG_DFL; + SA.sa_flags = SA_NOMASK; + sigaction(SIGSEGV, &SA, 0); + return; // Should core dump now... } // The call instruction should have pushed the return value onto the stack... -- cgit v1.2.3