Hi, 1) Given an ARM executable, how to know weather a given address contains an 'arm instruction' or 'literal pool' ?? 2) What happens when we strip that binary? Can we still determine whether given address contains an 'arm instruction' or 'literal pool'? 3)Can libelf/libdwarf libraries determine whether given address contains an 'arm instruction' or 'literal pool' even after that library has been stripped? Where can I find sample programs which uses libelf/libdwarf libraries and will tell whether given address contains an 'arm instruction' or 'literal pool' ? 4) How debuggers build control flow graph from an executable, when 'literal pool' appears in between 'instructions'? Thanks in advance.