Bad segvs actually cause a segv now
llvm-svn: 5255
diff --git a/llvm/lib/ExecutionEngine/JIT/Callback.cpp b/llvm/lib/ExecutionEngine/JIT/Callback.cpp
index b843e10..3b40e2e 100644
--- a/llvm/lib/ExecutionEngine/JIT/Callback.cpp
+++ b/llvm/lib/ExecutionEngine/JIT/Callback.cpp
@@ -19,8 +19,15 @@
#ifdef REG_EIP /* this code does not compile on Sparc! */
if (SI->si_code != SEGV_MAPERR || SI->si_addr != 0 ||
ucp->uc_mcontext.gregs[REG_EIP] != 0) {
- std::cerr << "Bad SEGV encountered!\n";
- abort();
+ std::cerr << "Bad SEGV encountered EIP = 0x" << std::hex
+ << ucp->uc_mcontext.gregs[REG_EIP] << " addr = "
+ << SI->si_addr << "!\n";
+
+ struct sigaction SA; // Restore old SEGV handler...
+ SA.sa_handler = SIG_DFL;
+ SA.sa_flags = SA_NOMASK;
+ sigaction(SIGSEGV, &SA, 0);
+ return; // Should core dump now...
}
// The call instruction should have pushed the return value onto the stack...