This is the mail archive of the
gdb@sourceware.org
mailing list for the GDB project.
arm literal pool
- From: ranjith kumar <ranjithproxy at gmail dot com>
- To: dwarf-discuss at lists dot dwarfstd dot org, gcc-help at gcc dot gnu dot org, gdb at sourceware dot org
- Date: Tue, 15 Sep 2009 22:38:54 +0530
- Subject: arm literal pool
Hi,
1) Given an ARM executable, how to know weather a given address
contains an 'arm instruction' or 'literal pool' ??
2) What happens when we strip that binary? Can we still determine
whether given address contains an 'arm instruction' or 'literal
pool'?
3)Can libelf/libdwarf libraries determine whether given address
contains an 'arm instruction' or 'literal pool' even after that
library has been stripped? Where can I find sample programs which uses
libelf/libdwarf libraries and will tell whether given address
contains an 'arm instruction' or 'literal pool' ?
4) How debuggers build control flow graph from an executable, when
'literal pool' appears in between 'instructions'?
Thanks in advance.