I am working with Firefox on a research project. Firefox makes uses
of lots of
JIT'ed code during run time.
I instrumented Firefox using a custom
PIN tool to find
out locations(address) of some things I as looking for. The issue is
that those location are in
JIT'ed code. I want to know
what is actually happening over there in the code.
To do this I dumped the corresponding memory region and used
objdump to disassemble the dump.
objdump -D -b binary -mi386 file.dump to see the
instructions that would have been executed. To my surprise the only
section listed is
.data section (a very big one).
Either i am incorrectly disassembling it or something else is wrong
with my understanding. I expect to see more sections like
.text where actual executable instructions should be
.data section should not be executable.
Am I correct in my understanding here?
Also If some one can please advise me on how to properly know what
is happening in
Linux 3.13.0-24-generic #47-Ubuntu SMP x86_64