arm literal pool

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

1)   Given an ARM executable, how to know weather a given address
contains  an 'arm instruction' or 'literal pool' ??

2) What happens when we strip that binary?  Can we still determine
whether given address contains  an 'arm instruction' or 'literal
pool'?

3)Can    libelf/libdwarf libraries  determine  whether given address
contains  an 'arm instruction' or 'literal pool'  even after that
library has been stripped? Where can I find sample programs which uses
libelf/libdwarf libraries and will tell  whether given address
contains  an 'arm instruction' or 'literal pool' ?

4) How debuggers build control flow graph from an executable, when
'literal pool' appears in between 'instructions'?

Thanks in advance.

[Index of Archives]     [Linux C Programming]     [Linux Kernel]     [eCos]     [Fedora Development]     [Fedora Announce]     [Autoconf]     [The DWARVES Debugging Tools]     [Yosemite Campsites]     [Yosemite News]     [Linux GCC]

  Powered by Linux