From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 8339 invoked by alias); 18 Jan 2013 17:15:26 -0000 Received: (qmail 7865 invoked by uid 55); 18 Jan 2013 17:15:00 -0000 From: "aldyh at redhat dot com" To: gcc-bugs@gcc.gnu.org Subject: [Bug libitm/55693] [4.8 Regression] libitm.c++/eh-1.C execution test fails on darwin from r193271 Date: Fri, 18 Jan 2013 17:15:00 -0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gcc X-Bugzilla-Component: libitm X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: aldyh at redhat dot com X-Bugzilla-Status: NEW X-Bugzilla-Priority: P3 X-Bugzilla-Assigned-To: aldyh at gcc dot gnu.org X-Bugzilla-Target-Milestone: 4.8.0 X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: X-Bugzilla-URL: http://gcc.gnu.org/bugzilla/ Auto-Submitted: auto-generated Content-Type: text/plain; charset="UTF-8" MIME-Version: 1.0 Mailing-List: contact gcc-bugs-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-bugs-owner@gcc.gnu.org X-SW-Source: 2013-01/txt/msg01768.txt.bz2 http://gcc.gnu.org/bugzilla/show_bug.cgi?id=55693 --- Comment #14 from Aldy Hernandez 2013-01-18 17:14:56 UTC --- > You can use DYLD_PRINT_BINDINGS to find out which __cxa_allocate_exception call > is being used, it'll also give you the addresses so you can make sure that the > right one is being called as you step through. DYLD_PRINT_BINDINGS doesn't even list __cxa_allocate_exception for a simple program with a throw. dyld: bind: libgcc_s.1.dylib:0x100998000 = libSystem.B.dylib:dyld_stub_binder, *0x100998000 = 0x7FFF80F46F94 dyld: bind: libstdc++.6.dylib:0x1000AD0A0 = libSystem.B.dylib:__DefaultRuneLocale, *0x1000AD0A0 = 0x7FFF701FFBE0 dyld: bind: libstdc++.6.dylib:0x1000AD1C8 = libSystem.B.dylib:___mb_cur_max, *0x1000AD1C8 = 0x7FFF70200898 dyld: bind: libstdc++.6.dylib:0x1000AD020 = libSystem.B.dylib:___stderrp, *0x1000AD020 = 0x7FFF701FD2F8 dyld: bind: libstdc++.6.dylib:0x1000AD0B8 = libSystem.B.dylib:___stdinp, *0x1000AD0B8 = 0x7FFF701FD2E8 dyld: bind: libstdc++.6.dylib:0x1000AD0A8 = libSystem.B.dylib:___stdoutp, *0x1000AD0A8 = 0x7FFF701FD2F0 dyld: bind: libstdc++.6.dylib:0x1000AD000 = libSystem.B.dylib:dyld_stub_binder, *0x1000AD000 = 0x7FFF80F46F94 dyld: bind: libitm.1.dylib:0x100157020 = eh-1.exe:__ZdaPv, *0x100157020 = 0x100000960 dyld: bind: libitm.1.dylib:0x100157018 = eh-1.exe:__ZdlPv, *0x100157018 = 0x100000940 dyld: bind: libitm.1.dylib:0x100157028 = libSystem.B.dylib:__DefaultRuneLocale, *0x100157028 = 0x7FFF701FFBE0 dyld: bind: libitm.1.dylib:0x100157030 = libSystem.B.dylib:___stderrp, *0x100157030 = 0x7FFF701FD2F8 dyld: bind: libitm.1.dylib:0x100157010 = libSystem.B.dylib:_free, *0x100157010 = 0x7FFF80E45115 dyld: bind: libitm.1.dylib:0x100157000 = libSystem.B.dylib:dyld_stub_binder, *0x100157000 = 0x7FFF80F46F94 dyld: bind: eh-1.exe:0x100001010 = libstdc++.6.dylib:__ZTIi, *0x100001010 = 0x1000AE2C0 dyld: bind: eh-1.exe:0x100001028 = libstdc++.6.dylib:___gxx_personality_v0, *0x100001028 = 0x1000059D0 dyld: bind: eh-1.exe:0x100001020 = libitm.1.dylib:__ITM_deregisterTMCloneTable, *0x100001020 = 0x10013FED7 dyld: bind: eh-1.exe:0x100001018 = libitm.1.dylib:__ITM_registerTMCloneTable, *0x100001018 = 0x10013FE45 dyld: bind: eh-1.exe:0x100001000 = libSystem.B.dylib:dyld_stub_binder, *0x100001000 = 0x7FFF80F46F94 dyld: weak bind: libstdc++.6.dylib:0x1000AD010 = eh-1.exe:__ZdaPv, *0x1000AD010 = 0x100000960 dyld: weak bind: libstdc++.6.dylib:0x1000AD458 = eh-1.exe:__ZdaPv, *0x1000AD458 = 0x100000960 dyld: weak bind: libstdc++.6.dylib:0x1000AD460 = eh-1.exe:__ZdlPv, *0x1000AD460 = 0x100000940 dyld: lazy bind: libstdc++.6.dylib:0x1000AD600 = libSystem.B.dylib:_pthread_key_create, *0x1000AD600 = 0x7FFF80E4221A dyld: lazy bind: libstdc++.6.dylib:0x1000AD488 = libSystem.B.dylib:___cxa_atexit, *0x1000AD488 = 0x7FFF80E44981 dyld: lazy bind: libitm.1.dylib:0x1001570F0 = libSystem.B.dylib:___cxa_atexit, *0x1001570F0 = 0x7FFF80E44981 dyld: lazy bind: eh-1.exe:0x100001080 = libSystem.B.dylib:_dladdr, *0x100001080 = 0x7FFF80E44D9A dyld: lazy bind: eh-1.exe:0x100001090 = libSystem.B.dylib:_getsectdatafromheader_64, *0x100001090 = 0x7FFF80E44BA6