Handle weak_extern in the JIT. This fixes
SingleSource/UnitTests/2007-04-25-weak.c in JIT mode. The test
now passes on systems which are able to produce a correct
reference output to compare with.


git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@61674 91177308-0d34-0410-b5e6-96231b3b80d8
diff --git a/lib/ExecutionEngine/JIT/Intercept.cpp b/lib/ExecutionEngine/JIT/Intercept.cpp
index af8b58e..1590925 100644
--- a/lib/ExecutionEngine/JIT/Intercept.cpp
+++ b/lib/ExecutionEngine/JIT/Intercept.cpp
@@ -90,7 +90,8 @@
 /// function by using the dynamic loader interface.  As such it is only useful
 /// for resolving library symbols, not code generated symbols.
 ///
-void *JIT::getPointerToNamedFunction(const std::string &Name) {
+void *JIT::getPointerToNamedFunction(const std::string &Name,
+                                     bool AbortOnFailure) {
   if (!isSymbolSearchingDisabled()) {
     // Check to see if this is one of the functions we want to intercept.  Note,
     // we cast to intptr_t here to silence a -pedantic warning that complains
@@ -122,9 +123,9 @@
       // First try turning $LDBLStub into $LDBL128. If that fails, strip it off.
       // This mirrors logic in libSystemStubs.a.
       std::string Prefix = std::string(Name.begin(), Name.end()-9);
-      if (void *Ptr = getPointerToNamedFunction(Prefix+"$LDBL128"))
+      if (void *Ptr = getPointerToNamedFunction(Prefix+"$LDBL128"), false)
         return Ptr;
-      if (void *Ptr = getPointerToNamedFunction(Prefix))
+      if (void *Ptr = getPointerToNamedFunction(Prefix), false)
         return Ptr;
     }
 #endif
@@ -135,8 +136,10 @@
     if (void *RP = LazyFunctionCreator(Name))
       return RP;
 
-  cerr << "ERROR: Program used external function '" << Name
-       << "' which could not be resolved!\n";
-  abort();
+  if (AbortOnFailure) {
+    cerr << "ERROR: Program used external function '" << Name
+         << "' which could not be resolved!\n";
+    abort();
+  }
   return 0;
 }