Sponsored Content
Full Discussion: __throw
Top Forums Programming __throw Post 302231558 by lagigliaivan on Tuesday 2nd of September 2008 03:15:08 PM
Old 09-02-2008
__throw

Hi All,

We are fixing an application, and to do this we've used GDB.
We have a coredump file, therefore we can print a backtrace and watch the variables content at the moment of the crash.

This is the outcome of bt gd command:

0 0x0ffab7dc in __pthread_rwlock_unlock (rwlock=0x109db640) at ../nptl/sysdeps/pthread/pthread_rwlock_unlock.c:30
#1 0x1047a3a0 in m_rcv (unit=0, pkt=0x109dccfc, cookie=0x1090ffc8)
at net.c:284
#2 0x103c1640 in packet (unit=0, pkt=0x109dccfc) at packet.c:2505

In the line 30 of the file pthread_rwlock_unlock.c there is a calling to pthread_rwlock_unlock() function, but gdb shows __pthread_rwlock_unlock.

After realizing this, we looked for the definition of pthread_rwlock_unlock and we found the following:

extern int pthread_rwlock_unlock (pthread_rwlock_t *__rwlock) __THROW;

Somebody knows what is the meaning of __THROW???

Thanks !!!!!

P.D. We are using gcc and Linux
 
ABRT-ACTION-ANALYZ(1)						    ABRT Manual 					     ABRT-ACTION-ANALYZ(1)

NAME
abrt-action-analyze-backtrace - Analyzes C/C++ backtrace, generates duplication hash, backtrace rating, and identifies crash function in problem directory DIR. SYNOPSIS
abrt-action-analyze-backtrace [-v] [-d DIR] DESCRIPTION
The tool reads a file named backtrace from problem directory, generates duplication hash, backtrace rating, and identifies crash function. Then it saves this data as new elements duphash, rating, crash_function in this problem directory. Integration with libreport events abrt-action-analyze-backtrace can be used as a secondary analyzer, after backtrace has been generated. The data generated by abrt-action-analyze-backtrace is useful for reporting the crash to bug databases: rating makes it possible to prevent reporting of bugs with low quality (non-informative) backtraces, duplication hash is used to find already filed bugs about similar crashes. Example usage in report_event.conf: EVENT=analyze analyzer=CCpp abrt-action-generate-backtrace || exit $? abrt-action-analyze-backtrace OPTIONS
-d DIR Path to problem directory. -v Be more verbose. Can be given multiple times. AUTHORS
o ABRT team SEE ALSO
abrt-action-generate-backtrace abrt 2.1.11 06/18/2014 ABRT-ACTION-ANALYZ(1)
All times are GMT -4. The time now is 07:56 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy