http://gcc.gnu.org/bugzilla/show_bug.cgi?id=55693
--- Comment #14 from Aldy Hernandez <aldyh at redhat dot com> 2013-01-18 17:14:56 UTC --- > You can use DYLD_PRINT_BINDINGS to find out which __cxa_allocate_exception > call > is being used, it'll also give you the addresses so you can make sure that the > right one is being called as you step through. DYLD_PRINT_BINDINGS doesn't even list __cxa_allocate_exception for a simple program with a throw. dyld: bind: libgcc_s.1.dylib:0x100998000 = libSystem.B.dylib:dyld_stub_binder, *0x100998000 = 0x7FFF80F46F94 dyld: bind: libstdc++.6.dylib:0x1000AD0A0 = libSystem.B.dylib:__DefaultRuneLocale, *0x1000AD0A0 = 0x7FFF701FFBE0 dyld: bind: libstdc++.6.dylib:0x1000AD1C8 = libSystem.B.dylib:___mb_cur_max, *0x1000AD1C8 = 0x7FFF70200898 dyld: bind: libstdc++.6.dylib:0x1000AD020 = libSystem.B.dylib:___stderrp, *0x1000AD020 = 0x7FFF701FD2F8 dyld: bind: libstdc++.6.dylib:0x1000AD0B8 = libSystem.B.dylib:___stdinp, *0x1000AD0B8 = 0x7FFF701FD2E8 dyld: bind: libstdc++.6.dylib:0x1000AD0A8 = libSystem.B.dylib:___stdoutp, *0x1000AD0A8 = 0x7FFF701FD2F0 dyld: bind: libstdc++.6.dylib:0x1000AD000 = libSystem.B.dylib:dyld_stub_binder, *0x1000AD000 = 0x7FFF80F46F94 dyld: bind: libitm.1.dylib:0x100157020 = eh-1.exe:__ZdaPv, *0x100157020 = 0x100000960 dyld: bind: libitm.1.dylib:0x100157018 = eh-1.exe:__ZdlPv, *0x100157018 = 0x100000940 dyld: bind: libitm.1.dylib:0x100157028 = libSystem.B.dylib:__DefaultRuneLocale, *0x100157028 = 0x7FFF701FFBE0 dyld: bind: libitm.1.dylib:0x100157030 = libSystem.B.dylib:___stderrp, *0x100157030 = 0x7FFF701FD2F8 dyld: bind: libitm.1.dylib:0x100157010 = libSystem.B.dylib:_free, *0x100157010 = 0x7FFF80E45115 dyld: bind: libitm.1.dylib:0x100157000 = libSystem.B.dylib:dyld_stub_binder, *0x100157000 = 0x7FFF80F46F94 dyld: bind: eh-1.exe:0x100001010 = libstdc++.6.dylib:__ZTIi, *0x100001010 = 0x1000AE2C0 dyld: bind: eh-1.exe:0x100001028 = libstdc++.6.dylib:___gxx_personality_v0, *0x100001028 = 0x1000059D0 dyld: bind: eh-1.exe:0x100001020 = libitm.1.dylib:__ITM_deregisterTMCloneTable, *0x100001020 = 0x10013FED7 dyld: bind: eh-1.exe:0x100001018 = libitm.1.dylib:__ITM_registerTMCloneTable, *0x100001018 = 0x10013FE45 dyld: bind: eh-1.exe:0x100001000 = libSystem.B.dylib:dyld_stub_binder, *0x100001000 = 0x7FFF80F46F94 dyld: weak bind: libstdc++.6.dylib:0x1000AD010 = eh-1.exe:__ZdaPv, *0x1000AD010 = 0x100000960 dyld: weak bind: libstdc++.6.dylib:0x1000AD458 = eh-1.exe:__ZdaPv, *0x1000AD458 = 0x100000960 dyld: weak bind: libstdc++.6.dylib:0x1000AD460 = eh-1.exe:__ZdlPv, *0x1000AD460 = 0x100000940 dyld: lazy bind: libstdc++.6.dylib:0x1000AD600 = libSystem.B.dylib:_pthread_key_create, *0x1000AD600 = 0x7FFF80E4221A dyld: lazy bind: libstdc++.6.dylib:0x1000AD488 = libSystem.B.dylib:___cxa_atexit, *0x1000AD488 = 0x7FFF80E44981 dyld: lazy bind: libitm.1.dylib:0x1001570F0 = libSystem.B.dylib:___cxa_atexit, *0x1001570F0 = 0x7FFF80E44981 dyld: lazy bind: eh-1.exe:0x100001080 = libSystem.B.dylib:_dladdr, *0x100001080 = 0x7FFF80E44D9A dyld: lazy bind: eh-1.exe:0x100001090 = libSystem.B.dylib:_getsectdatafromheader_64, *0x100001090 = 0x7FFF80E44BA6