Handle weak_extern in the JIT. This fixes
SingleSource/UnitTests/2007-04-25-weak.c in JIT mode. The test
now passes on systems which are able to produce a correct
reference output to compare with.
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@61674 91177308-0d34-0410-b5e6-96231b3b80d8
diff --git a/lib/ExecutionEngine/JIT/Intercept.cpp b/lib/ExecutionEngine/JIT/Intercept.cpp
index af8b58e..1590925 100644
--- a/lib/ExecutionEngine/JIT/Intercept.cpp
+++ b/lib/ExecutionEngine/JIT/Intercept.cpp
@@ -90,7 +90,8 @@
/// function by using the dynamic loader interface. As such it is only useful
/// for resolving library symbols, not code generated symbols.
///
-void *JIT::getPointerToNamedFunction(const std::string &Name) {
+void *JIT::getPointerToNamedFunction(const std::string &Name,
+ bool AbortOnFailure) {
if (!isSymbolSearchingDisabled()) {
// Check to see if this is one of the functions we want to intercept. Note,
// we cast to intptr_t here to silence a -pedantic warning that complains
@@ -122,9 +123,9 @@
// First try turning $LDBLStub into $LDBL128. If that fails, strip it off.
// This mirrors logic in libSystemStubs.a.
std::string Prefix = std::string(Name.begin(), Name.end()-9);
- if (void *Ptr = getPointerToNamedFunction(Prefix+"$LDBL128"))
+ if (void *Ptr = getPointerToNamedFunction(Prefix+"$LDBL128"), false)
return Ptr;
- if (void *Ptr = getPointerToNamedFunction(Prefix))
+ if (void *Ptr = getPointerToNamedFunction(Prefix), false)
return Ptr;
}
#endif
@@ -135,8 +136,10 @@
if (void *RP = LazyFunctionCreator(Name))
return RP;
- cerr << "ERROR: Program used external function '" << Name
- << "' which could not be resolved!\n";
- abort();
+ if (AbortOnFailure) {
+ cerr << "ERROR: Program used external function '" << Name
+ << "' which could not be resolved!\n";
+ abort();
+ }
return 0;
}