Bad segvs actually cause a segv now
authorChris Lattner <sabre@nondot.org>
Mon, 13 Jan 2003 01:00:02 +0000 (01:00 +0000)
committerChris Lattner <sabre@nondot.org>
Mon, 13 Jan 2003 01:00:02 +0000 (01:00 +0000)
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@5255 91177308-0d34-0410-b5e6-96231b3b80d8

lib/ExecutionEngine/JIT/Callback.cpp

index b843e106895055d4f1191081e43eb52bf0651cda..3b40e2ebe1da61d442ca215ea7ee53d3f9d234d3 100644 (file)
@@ -19,8 +19,15 @@ static void TrapHandler(int TN, siginfo_t *SI, ucontext_t *ucp) {
 #ifdef REG_EIP   /* this code does not compile on Sparc! */
   if (SI->si_code != SEGV_MAPERR || SI->si_addr != 0 ||
       ucp->uc_mcontext.gregs[REG_EIP] != 0) {
-    std::cerr << "Bad SEGV encountered!\n";
-    abort();
+    std::cerr << "Bad SEGV encountered EIP = 0x" << std::hex
+             << ucp->uc_mcontext.gregs[REG_EIP] << " addr = "
+             << SI->si_addr << "!\n";
+
+    struct sigaction SA;              // Restore old SEGV handler...
+    SA.sa_handler = SIG_DFL;
+    SA.sa_flags = SA_NOMASK;
+    sigaction(SIGSEGV, &SA, 0);
+    return;  // Should core dump now...
   }
 
   // The call instruction should have pushed the return value onto the stack...