http://gcc.gnu.org/bugzilla/show_bug.cgi?id=55693



--- Comment #14 from Aldy Hernandez <aldyh at redhat dot com> 2013-01-18 
17:14:56 UTC ---

> You can use DYLD_PRINT_BINDINGS to find out which __cxa_allocate_exception 
> call

> is being used, it'll also give you the addresses so you can make sure that the

> right one is being called as you step through.



DYLD_PRINT_BINDINGS doesn't even list __cxa_allocate_exception for a 

simple program with a throw.



dyld: bind: libgcc_s.1.dylib:0x100998000 = 

libSystem.B.dylib:dyld_stub_binder, *0x100998000 = 0x7FFF80F46F94

dyld: bind: libstdc++.6.dylib:0x1000AD0A0 = 

libSystem.B.dylib:__DefaultRuneLocale, *0x1000AD0A0 = 0x7FFF701FFBE0

dyld: bind: libstdc++.6.dylib:0x1000AD1C8 = 

libSystem.B.dylib:___mb_cur_max, *0x1000AD1C8 = 0x7FFF70200898

dyld: bind: libstdc++.6.dylib:0x1000AD020 = 

libSystem.B.dylib:___stderrp, *0x1000AD020 = 0x7FFF701FD2F8

dyld: bind: libstdc++.6.dylib:0x1000AD0B8 = libSystem.B.dylib:___stdinp, 

*0x1000AD0B8 = 0x7FFF701FD2E8

dyld: bind: libstdc++.6.dylib:0x1000AD0A8 = 

libSystem.B.dylib:___stdoutp, *0x1000AD0A8 = 0x7FFF701FD2F0

dyld: bind: libstdc++.6.dylib:0x1000AD000 = 

libSystem.B.dylib:dyld_stub_binder, *0x1000AD000 = 0x7FFF80F46F94

dyld: bind: libitm.1.dylib:0x100157020 = eh-1.exe:__ZdaPv, *0x100157020 

= 0x100000960

dyld: bind: libitm.1.dylib:0x100157018 = eh-1.exe:__ZdlPv, *0x100157018 

= 0x100000940

dyld: bind: libitm.1.dylib:0x100157028 = 

libSystem.B.dylib:__DefaultRuneLocale, *0x100157028 = 0x7FFF701FFBE0

dyld: bind: libitm.1.dylib:0x100157030 = libSystem.B.dylib:___stderrp, 

*0x100157030 = 0x7FFF701FD2F8

dyld: bind: libitm.1.dylib:0x100157010 = libSystem.B.dylib:_free, 

*0x100157010 = 0x7FFF80E45115

dyld: bind: libitm.1.dylib:0x100157000 = 

libSystem.B.dylib:dyld_stub_binder, *0x100157000 = 0x7FFF80F46F94

dyld: bind: eh-1.exe:0x100001010 = libstdc++.6.dylib:__ZTIi, 

*0x100001010 = 0x1000AE2C0

dyld: bind: eh-1.exe:0x100001028 = 

libstdc++.6.dylib:___gxx_personality_v0, *0x100001028 = 0x1000059D0

dyld: bind: eh-1.exe:0x100001020 = 

libitm.1.dylib:__ITM_deregisterTMCloneTable, *0x100001020 = 0x10013FED7

dyld: bind: eh-1.exe:0x100001018 = 

libitm.1.dylib:__ITM_registerTMCloneTable, *0x100001018 = 0x10013FE45

dyld: bind: eh-1.exe:0x100001000 = libSystem.B.dylib:dyld_stub_binder, 

*0x100001000 = 0x7FFF80F46F94

dyld: weak bind: libstdc++.6.dylib:0x1000AD010 = eh-1.exe:__ZdaPv, 

*0x1000AD010 = 0x100000960

dyld: weak bind: libstdc++.6.dylib:0x1000AD458 = eh-1.exe:__ZdaPv, 

*0x1000AD458 = 0x100000960

dyld: weak bind: libstdc++.6.dylib:0x1000AD460 = eh-1.exe:__ZdlPv, 

*0x1000AD460 = 0x100000940

dyld: lazy bind: libstdc++.6.dylib:0x1000AD600 = 

libSystem.B.dylib:_pthread_key_create, *0x1000AD600 = 0x7FFF80E4221A

dyld: lazy bind: libstdc++.6.dylib:0x1000AD488 = 

libSystem.B.dylib:___cxa_atexit, *0x1000AD488 = 0x7FFF80E44981

dyld: lazy bind: libitm.1.dylib:0x1001570F0 = 

libSystem.B.dylib:___cxa_atexit, *0x1001570F0 = 0x7FFF80E44981

dyld: lazy bind: eh-1.exe:0x100001080 = libSystem.B.dylib:_dladdr, 

*0x100001080 = 0x7FFF80E44D9A

dyld: lazy bind: eh-1.exe:0x100001090 = 

libSystem.B.dylib:_getsectdatafromheader_64, *0x100001090 = 0x7FFF80E44BA6

Reply via email to