Elf file type is EXEC (Executable file) Entry point 0xffffffff802719a0 There are 6 program headers, starting at offset 64 Program Headers: Type Offset VirtAddr PhysAddr FileSiz MemSiz Flags Align PHDR 0x0000000000000040 0x0000000000000040 0xffffffff80000040 0x0000000000000150 0x0000000000000150 R 8 INTERP 0x0000000000001120 0xffffffff80200120 0xffffffff80200120 0x000000000000000d 0x000000000000000d R 1 [Requesting program interpreter: /red/herring] LOAD 0x0000000000000000 0x0000000000000000 0xffffffff80000000 0x0000000000000190 0x0000000000000190 R 1000 LOAD 0x0000000000001120 0xffffffff80200120 0xffffffff80200120 0x00000000005b22a0 0x00000000005b22a0 R E 1000 LOAD 0x00000000005b33c0 0xffffffff809b23c0 0xffffffff809b23c0 0x00000000000a99d3 0x0000000001b419b8 RW 1000 DYNAMIC 0x00000000005b33c0 0xffffffff809b23c0 0xffffffff809b23c0 0x00000000000000d0 0x00000000000000d0 RW 8 Section to Segment mapping: Segment Sections... 00 01 .interp 02 03 .interp .hash .dynsym .dynstr .text .rodata set_sysctl_set set_modmetadata_set set_sysinit_set set_sysuninit_set set_db_cmd_set set_db_show_cmd_set set_cons_set set_ratectl_set set_crypto_set set_ieee80211_ioctl_setset set_ieee80211_ioctl_getset set_scanner_set set_kbddriver_set set_videodriver_set set_scterm_set set_vga_set set_scrndr_set .eh_frame 04 .dynamic .data .bss 05 .dynamic