ELF>PA@q@8 @@@@ &&PPPhkh{h{ xkx{x{88800hhhDDStd88800PtdbbbLLQtdRtdhkh{h{/lib64/ld-linux-x86-64.so.2 GNUGNU8(MT՚pIͩJGNUL@LNڡ]emxUL ?. 7(sJhq (I0@TgVzNt ] , 9a3}.F"c_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTable__cxa_finalize__libc_start_main__printf_chkcap_freecap_to_nameputsputcharcap_get_proccap_dupcap_set_flagperrorexitstderrfwritestrcmpcap_set_proccap_set_ambientcap_get_boundstrdupcap_from_namestrtok__fprintf_chk__stack_chk_failcap_max_bitsstrncmpcap_drop_boundcap_get_ambientcap_reset_ambientcap_clear_flagcap_to_textstrlenmallocmemcpycap_from_textcap_mode_namechrootchdircap_set_mode__errno_locationstrerrorcap_get_mode__sprintf_chkstrtoulprctlforksleepcap_set_secbitskillwaitpidsetgidcap_setuidstrtoullgetpwnamgetgrouplistcap_setgroupssysconfcallocgetgrnam_r__ctype_b_loccap_iab_from_textcap_iab_set_procexecvecap_iab_get_proccap_iab_to_textcap_get_secbitsgetuidgetpwuidgeteuidgetgidgetgrgidgetgroupscap_get_flaglibcap.so.2libc.so.6GLIBC_2.3GLIBC_2.3.4GLIBC_2.14GLIBC_2.4GLIBC_2.34GLIBC_2.2.5cii mti wii ui h{0Bp{A NL#@MJ}}}}}}}} } } } }}}~~~~ ~(~0~8~@~H~P~X~`~h~p~x~ ~!~"~$~%~&~'~(~)~*~+~,~-~.~/~0~12345 6(70889@:H;P<X=`>h?pAxBCDEFGHIKHH_HtH5Z]%[]hhhhhhhhqhah Qh Ah 1h !h hhhhhhhhhhqhahQhAh1h!hhhh h!h"h#h$h%h&h'qh(ah)Qh*Ah+1h,!h-h.h/h0h1h2h3h4h5h6h7qh8ah9Qh:Ah;1h<!h=h>h?h@hAhBhChDhE%5[D%-[D%5[D%XD%XD%XD%XD%XD%XD%XD%XD%XD%}XD%uXD%mXD%eXD%]XD%UXD%MXD%EXD%=XD%5XD%-XD%%XD%XD%XD% XD%XD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%}WD%uWD%mWD%eWD%]WD%UWD%MWD%EWD%=WD%5WD%-WD%%WD%WD%WD% WD%WD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VDAWAVAUATUSH(|$Ht$HT$(dH%(H$1xm8cHtH5,P1Hb|$D$HL$D$HL-'LyHDH$H&HD$ M'LL= LH=&!aLH=& LH=&v LH=&nLH=&cLH=&~LH=&~LH=&LH=&K LH='/`LH=& LH=&  LH=& LH=&m LH=& LH=& LH=&kj LH='O LH='3m LH=A' LH=B' LH=;'} LH=0'HLH='1LH='LH='~ID$HD$ IHt$`H|$XMLH=#Ld$`1;DLf1H|$XuaokyHl$XLHIL;<$t1DHt$`I|$ y|$`~IHr)H HWRH81fD1yH&RH=#Hu[LHD$H H|$H!Hl$TUHL-H|$`K!|$TH|$XA-E1HRIHuHl$XH|$`[HSH|$)@I|$ I|$ 1yVlHQH=<"H^DIHHLHHt$1AHH 21LPLIuM8IHZHT$HLII| HD$0^HT$HI ztHH=!HT$0LLHLHHLLHtHkHH[HHH1AHH 1mIHxUIHuHHIL4 L1IH f.LL(#HHIuѿLH5$1K!H1(HHHIH 1AHH 0LLQIHx HPH=G HuIH&H HIHxIHIHsN$8zLH5H1!I LHI)LLH5t%IMH LH1bAH5HL%LL1+HHIuҿ 8I|$11Aĉ18gDH$IIH Hw#,H="FH="0/H#HHH>LH81H$z|$HI|$ 11ŅxD$H>@I|$ 11HLA؉H$HKH81LHv!#DD$TLHHHkKH81H="H="~H=XkH=F"WH=(AH="+I|$11AS 8_DH0IHJH8111I|$ t|$HH|$H;Dt$HHt$`1DAA9D$`9D$HeI|$11 AE8DHI7I|$ 11A8]DHSIAH"L$HH"H=.HUIH=HHt$`I|$ |$``IDD$`H;#H I|$ 1E1VH5KH-HHL51/HAA@HDHHtDHT$UHT$HHHD$L1H|$FHIH ILHHD$`dpHL$`LL$LNHct$`{L {(8~KMIHGH!H81EtHHD$IHpLHHD$0HHIL|$@E1H@Hx HD$XHD$86LD$8HL$LLHt$`BHD$XH @BDI1HDd$LL$LHItTL9d$0~&IHDPt11LBDHFH H81LL$L|$@HHc|$Hu7H/HKFH=YHH!FH=GHpVIHLHDH51BHH=~H=mhLH)HD$H5k H1HI7H=1@HFEH=^H{H=~eIHHDH=^HF,H=LH=VLH=LH= LH=~A LH= bLH= FI|$HHHPH9A<$-HD$H8sHL$HT$(LIHcD$HI?HL$ H71HCHHDH5HI1LSHKH5,CH=H5CH=uHHEH5HI1|LHpCAĸ@LLHtHэpHHH0 3uHL5vHOILLAH51@L%7H 2IDL@H"H5HE1@LH ID@H5HE1@ LH ID@HEH51k1x-@ŀLH ID@@H5nHE13ADHlj3L ^HtLH OHtHMDAH5f1VA\H HtHDH5J1E1H$L%=H51H޿dH-HDD$f.H=>H>H9tH.>Ht H=Y>H5R>H)HH?HHHtH >HtfD=%>u+UH==Ht H==d=]wAWH1AVL5 AUL- ATL%UHH5 S1H#HLL1MLPՅx5tIHuLH5G 1MuHH=* []A\A]A^A_fH []A\A]A^A_UHSHHHHt8HHEHHtP1AH uH[]H= CH= -HT<"H=HfAWAVAUATAUHSH(dH%(HD$1Ht$H|$HH=_ Ll$1>DL`JDH|$B:8yLHl$wHD$dH+%(H(H[]A\A]A^A_MDHIHHL-> Lt$NLHH|$|$D_H|$u[1LHHuHl$H|$HHD$dH+%(H(L[]A\A]A^A_dH=HH=21EH HH HHEH.:IH81HgH:HپHH81g=EDL$IؾH< H / HEH9HG H81#dH9H= HHH,%s set =%s%u%s%s Capabilities not availableunable to select CAP_SETPCAPclearraiseallfailed to allocate names failed to %s ambient [%s=%u] /bin/bashunlockedyesno???--drop=failed to drop [%s=%u] --dropped=--has-ambientambient set not supported --addamb=--delamb=--noambfailed to reset ambient set --inh=Out of memory for inh setnone%s %s+i--caps=unable to interpret [%s] --modesSupported modes:UNKNOWN %s--mode=failed to set mode [%s]: %s --inmode=--keep=--chroot=/--secbits=--forkfor=already forked unable to fork()--killit=no forked process to kill Unable to kill child process--uid=Failed to set uid=%u: %s --cap-uid=Failed to cap_setuid(%u): %s --gid=Failed to set gid=%u: %s --groups=No memory for [%s] operation No memory for gid list Failed to setgroups. --user=User [%s] not known --decode=0x%016llx=--supports=--printCurrent: %s BoundingAmbientCurrent IAB: %s secure-noroot: %s (%s) secure-keep-caps: %s (%s) uid=%u(%s) euid=%u(%s) gid=%u(%s) %s%u(%s)Guessed mode: %s (%d) --==execve '%s' failed! --shell=--has-p=cap[%s] not permitted --has-i=cap[%s] not inheritable --has-a=--is-uid=uid: got=%d, want=%d --is-gid=gid: got=%d, want=%d --iab=iab: '%s' malformed unable to set IAP vectors--helpunsupported mode: %s modification requires CAP_SETPCAP unable to raise CAP_SETPCAP for AMBIENT changesunable to lower CAP_SETPCAP post AMBIENT changeUnable to %s ambient capability [%s] capability [%s] is unknown to libcap WARNING: libcap needs an update (cap=%d should have a name). unable to raise CAP_SETPCAP for BSET changesunable to lower CAP_SETPCAP post BSET changeUnable to drop bounding capability [%s] cap[%s] not recognized by library cap[%s] raised in bounding vector libcap:cap_clear_flag() internal errorFatal error concerning process capabilitiesFatal error internalizing capabilitiesUnable to set inheritable capabilitiesUnable to set capabilities [%s] mismatched mode got=%s want=%s prctl(PR_SET_KEEPCAPS, %u) failed: %s Unable to duplicate capabilitiesunable to select CAP_SET_SYS_CHROOTunable to raise CAP_SYS_CHROOTunable to lower CAP_SYS_CHROOTUnable to chroot/chdir to [%s]failed to set securebits to 0%o/0x%x waitpid didn't match child: %u != %u child terminated with odd signal (%d != %d) Too many groups specified (%d) Failed to identify gid for group [%s] Unable to get group list for userUnable to set group list for userFailed to set uid=%u(user=%s): %s cap[%s=%d] not supported by kernel Securebits: 0%lo/0x%lx/%u'b%s secure-no-suid-fixup: %s (%s) secure-no-ambient-raise: %s (%s) cap[%s] not in ambient vector usage: %s [args ...] --help this message (or try 'man capsh') --print display capability relevant state --decode=xxx decode a hex string to a list of caps --supports=xxx exit 1 if capability xxx unsupported --has-p=xxx exit 1 if capability xxx not permitted --has-i=xxx exit 1 if capability xxx not inheritable --drop=xxx remove xxx,.. capabilities from bset --dropped=xxx exit 1 unless bounding cap xxx dropped --has-ambient exit 1 unless ambient vector supported --has-a=xxx exit 1 if capability xxx not ambient --addamb=xxx add xxx,... capabilities to ambient set --delamb=xxx remove xxx,... capabilities from ambient --noamb reset (drop) all ambient capabilities --caps=xxx set caps as per cap_from_text() --inh=xxx set xxx,.. inheritable set --secbits= write a new value for securebits --iab=... use cap_iab_from_text() to set iab --keep= set keep-capability bit to --uid= set uid to (hint: id ) --cap-uid= libcap cap_setuid() to change uid --is-uid= exit 1 if uid != --gid= set gid to (hint: id ) --is-gid= exit 1 if gid != --groups=g,... set the supplemental groups --user= set uid,gid and groups to that of user --chroot=path chroot(2) to this path --modes list libcap named capability modes --mode= set capability mode to --inmode= exit 1 if current mode is not --killit= send signal(n) to child --forkfor= fork and make child sleep for sec --shell=/xx/yy use /xx/yy instead of /bin/bash for -- == re-exec(capsh) with args as for -- -- remaining arguments are for /bin/bash (without -- [%s] will simply exit(0)) ;L@h08dzRx &D$4pFJ w?:*3$"\0t`\PBLI I(H0K8F@o 8H0A(B BBBG D8F0A(B BBB(ADG B AAA `TBBB B(D0D8D` 8D0A(B BBBJ  8D0A(B BBBE 0|@-FBB B(A0A8G0BAWc Fh{p{oH   x} ooooox{0 @ P ` p !! !0!@!P!`!p!!!!!!!!!"" "0"@"P"`"p"""""""""## #0#@#P#`#p#########$$ $0$@$P$`$p$$/usr/lib/debug/.dwz/x86_64-linux-gnu/libcap2-bin.debug/An;HˢP&3828064d1cabd6541f05d59ad3fb7049cda94a.debug.shstrtab.interp.note.gnu.property.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.got.plt.sec.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.data.bss.gnu_debugaltlink.gnu_debuglink 880&hh$9 Go0Q hYH H aonop}B  p$$0$$` ) )fFF PPbbL`b`bh{hkp{pkx{xkx}xmp ph pK\p4p"