1--- !ELF 2FileHeader: 3 Class: ELFCLASS64 4 Data: ELFDATA2LSB 5 Type: ET_EXEC 6 Machine: EM_X86_64 7 Entry: 0x00000000004004FA 8Sections: 9 - Name: .text 10 Type: SHT_PROGBITS 11 Flags: [ SHF_ALLOC, SHF_EXECINSTR ] 12 Address: 0x00000000004003E0 13 AddressAlign: 0x0000000000000010 14 Content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ame: .rela.text 16 Type: SHT_RELA 17 Flags: [ SHF_INFO_LINK ] 18 Link: .symtab 19 AddressAlign: 0x0000000000000008 20 Info: .text 21 Relocations: 22 - Name: .rodata 23 Type: SHT_PROGBITS 24 Flags: [ SHF_ALLOC ] 25 Address: 0x0000000000400580 26 AddressAlign: 0x0000000000000008 27 Content: '01000200000000000000000000000000' 28 - Name: .dynamic 29 Type: SHT_DYNAMIC 30 Flags: [ SHF_WRITE, SHF_ALLOC ] 31 Address: 0x0000000000600E28 32 Link: .dynstr 33 AddressAlign: 0x0000000000000008 34 Content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ymbols: 36 - Name: FUNC 37 Type: STT_FUNC 38 Section: .text 39 Value: 0x00000000004004F0 40 Size: 0x000000000000000A 41 Binding: STB_GLOBAL 42 - Name: main 43 Type: STT_FUNC 44 Section: .text 45 Value: 0x00000000004004FA 46 Size: 0x0000000000000004 47 Binding: STB_GLOBAL 48 - Name: XYZ 49 Type: STT_FUNC 50 Section: .text 51 Value: 0x00000000004004CD 52 Size: 0x0000000000000023 53 Binding: STB_GLOBAL 54DynamicSymbols: 55 - Name: mydata 56 Section: .rodata 57 Value: 0x0000000000400100 58 Binding: STB_GLOBAL 59ProgramHeaders: 60 - Type: PT_PHDR 61 Flags: [ PF_X, PF_R ] 62 VAddr: 0x004003E0 63 PAddr: 0x004003E0 64 FirstSec: .text 65 LastSec: .text 66 - Type: PT_LOAD 67 Flags: [ PF_X, PF_R ] 68 VAddr: 0x004003E0 69 PAddr: 0x004003E0 70 FirstSec: .text 71 LastSec: .text 72 - Type: PT_DYNAMIC 73 Flags: [ PF_X, PF_R ] 74 VAddr: 0x00600E28 75 PAddr: 0x00600E28 76 FirstSec: .dynamic 77 LastSec: .dynamic 78... 79