ELF><@q@8 @@@@hh ""PPP``hkh{h{ xkx{x{DDPtdbbbTTQtdRtdhkh{h{/lib64/ld-linux-x86-64.so.2GNU_,]aSQ}ͳX=bGNUL@LNڡ]emO$gk  Zx4F[*=S-J a,hy&&8O`?B~, d14T "{_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTablecap_from_namecap_to_namecap_setuidcap_get_secbitscap_get_ambientcap_reset_ambientcap_drop_boundcap_set_proccap_max_bitscap_iab_from_textcap_set_modecap_mode_namecap_freecap_get_boundcap_clear_flagcap_get_proccap_setgroupscap_from_textcap_set_flagcap_to_textcap_get_modecap_iab_set_proccap_set_ambientcap_dupcap_get_flagcap_iab_get_proccap_iab_to_textcap_set_secbitschroot__printf_chkexitstrncmpperrorgetpwuidgetgrgidputsfork__stack_chk_failputcharkillstrdupstrtokgetgrnam_rgetpwnamcallocstrlenprctl__errno_locationchdir__fprintf_chkmemcpystrtoulmallocgetgid__ctype_b_locstderrgetgroupsgetuidexecvestrtoullfwritegeteuidwaitpidsleep__cxa_finalize__sprintf_chkgetgrouplistsetgidstrcmpstrerror__libc_start_mainsysconflibcap.so.2libc.so.6GLIBC_2.3GLIBC_2.3.4GLIBC_2.14GLIBC_2.4GLIBC_2.2.5cii mti wii ui h{=p{=NL#@MJ}}}}}}}} } } } } }}~~~~ ~(~0~8~@~H~P~X~`~h~p~x~ ~!~"~$~%~&~'~(~)~*~+~,~-~.~/~0~12345 6(70889@:H;P<X=`>h?pAxBCDEFGHIKHH_HtH5Z]%\]@%Z]h%R]h%J]h%B]h%:]h%2]h%*]h%"]hp%]h`%]h P% ]h @%]h 0%\h %\h %\h%\h%\h%\h%\h%\h%\h%\h%\h%\hp%\h`%\hP%\h@%\h0%z\h %r\h%j\h%b\h%Z\h %R\h!%J\h"%B\h#%:\h$%2\h%%*\h&%"\h'p%\h(`%\h)P% \h*@%\h+0%[h, %[h-%[h.%[h/%[h0%[h1%[h2%[h3%[h4%[h5%[h6%[h7p%[h8`%[h9P%[h:@%[h;0%z[h< %r[h=%j[h>%b[h?%Z[h@%R[hA%J[hB%B[hC%:[hD%2[hE%2[f%2[f%J[fAWAVAUATUSH|$H4$HT$dH%(H$1xR8cHtH51P1HGD$H$D$ LtHg+HD$LzfDM'H5g+L H5i+LH5V+L H5a+L H5M+LH59+L~H5@+LH5P+LH5T+L LH=X+ LH=a+wLH=O+ LH=;+$ LH=++ LH=+ LH=*+s LH=P+W LH=U+; LH=b+- LH=g+ LH=+ LH=+ LH=+ LH=+LH=),LH=,LH=,NID$HD$IHt$PH|$H]H5'L1tA@H|$P^~H|$HCyyHl$HH|$PvHnIM9Q1f.Ht$PI|$ A|$Ph~IH-H HVH81^fD1!{HzVH=p'H9L`HH HH\$DXf.HLBH|$P3|$DH|$HA+E1H5_&IHuLd$HH|$PLHf.I|$ ~I|$ 1m`H_UH=&HIHHLvHHt$1AHH 71LLI5MEIHZHT$ HLII| HD$(HT$ HI ztHH=%HT$(LLHLHHLLxHtH+HHHkHH1AHH 5tIHxIH|HH L L~IH8% f.LLu/HHIuʿLH5J(1H1p!IHHRHH 1AHH 4zHcH IHx NL)H=$LbIH>+H HIHxIHIH#p83LH5#H1kI pLHILLH5)IMH '#LH1:H5:#`H5#L%6#L1>HHHuο !1I|$1HÉ1Ps8H)IIH H'H=!'H=;'lHN'HHHPH81bH0|$ I|$ 11HÅZD$ '^1I|$ 11HA؉H(HOH81LH%DD$DLH HOH81]H='GH=&1H=!RH=& H=GnH=&XI|$11Hi8Ht!IHNH8111I|$ (|$ H|$ l$ Ht$P1҉A9DD$PD9D$ LI|$11HA1+8MDH I5I|$ 11}Hf8H IAH'L$ H&H= gHMH=HW=Ht$PI|$ |$PGIDD$PH~'H I|$ 1E1 H5 H-HH1HO!AA@HDHHtDHT$ HT$ HIsHH5H1LHIH ILHHvD$PdLl$ppHL$PLLW8Hct$P{L_ {8;KMIHKH&H81E1HHD$ IHZ HHD$0HHI1Hx HD$HHD$85LD$8HL$ LLHt$P HD$HH@DH1H5\$(IHtVH9\$0~&IUHDPt11LDHJپHo$H81LHc|$(H~u7HHJH=HmSHJH=HC)IHXLH#DH51H-H=$QH=#;LHD4H$H5$H1HI7H=1@yHIH=HiOH=9IHG!H[IH=HH=!dLH=rJLH=vLH=|n LH=iR5 LH=m6LH=qI|$HHH$HAA<$-H$H8HH$LIHcD$HHT$I?HL$HAE1H5HHHH5nHI1L)H!H5GH=KH5oGH=AfHHH5-HI1RLHGAĸ@LLHtHэpHHH0 3uHL-H%ILLAH5b!1@L%H IDL@HH5HE1@LH aID@H5!HE1n@ LH 4ID@HEH5;1A1x-@ŀLH ID@@H5 HE1 dAHlj L HtLH HtHMDAH51,A2H }HtHDH511ۿLl$pL%oH5y1\LdHBA|HT$ HT$ L HtLALH5H1HL9 dADH5H1IHHH=~H|$wI|$ 11H9AHVI|$ 11H9WAH[Ht$PI|$|$P IHH]Ht$HI|$lt$HHL$PHHu |$P{IHMHHt$HI|$x@Lt$HHL$PHHSu |$P(IHHIHH=H=sH=]1I^HHPTLH #H=BDH=BHBH9tHBHt H=BH5BH)HH?HHHtH}BHtfD=Bu/UH=^BHt H=jBhqB]{f.UHSHHHHt8HoHEHHtP1AH #uH[]H=H=sHA"H=HcIfAWAVAUIATAUSH(dH%(HD$1Ht$H|$H5L1tD@H|$LDH|$<~yHl$H|$3H+HD$dH+%(H([]A\A]A^A_LIHHLl$MfLL H|$c|$DH|$Cu_1H5iIHuHl$H|$rHjHD$dH+%(H(L[]A\A]A^A_ H=iH=#tEH HHHMHEHz?IH81UH#HT?LH5H81#EDL$MHdH WHEH?HoH81 H>H=$HfDAVH1AUL5/L-ATIH5US1o,DHL1H5MLHAԅx8tHHuLH51M f.u[H=]A\A]A^[ ]A\A]A^>f.@AWL=?9AVIAUIATAUH-09SL)HHt1LLDAHH9uH[]A\A]A^A_HHCapabilities not availableunable to select CAP_SETPCAPclearraiseallfailed to allocate names failed to %s ambient [%s=%u] ,%s set =%s%u%s%s /bin/bashunlockedyesno???--drop=failed to drop [%s=%u] --dropped=--has-ambientambient set not supported --addamb=--delamb=--noambfailed to reset ambient set --inh=Out of memory for inh setnone%s %s+i--caps=unable to interpret [%s] --modesSupported modes:UNKNOWN %s--mode=failed to set mode [%s]: %s --inmode=--keep=--chroot=/--secbits=--forkfor=already forked unable to fork()--killit=no forked process to kill Unable to kill child process--uid=Failed to set uid=%u: %s --cap-uid=Failed to cap_setuid(%u): %s --gid=Failed to set gid=%u: %s --groups=No memory for [%s] operation No memory for gid list Failed to setgroups. --user=User [%s] not known --decode=0x%016llx=--supports=--printCurrent: %s BoundingAmbientCurrent IAB: %s secure-noroot: %s (%s) secure-keep-caps: %s (%s) uid=%u(%s) euid=%u(%s) gid=%u(%s) %s%u(%s)Guessed mode: %s (%d) --==execve '%s' failed! --shell=--has-p=cap[%s] not permitted --has-i=cap[%s] not inheritable --has-a=--is-uid=uid: got=%d, want=%d --is-gid=gid: got=%d, want=%d --iab=iab: '%s' malformed unable to set IAP vectors--helpunsupported mode: %s modification requires CAP_SETPCAP unable to raise CAP_SETPCAP for AMBIENT changesunable to lower CAP_SETPCAP post AMBIENT changeUnable to %s ambient capability [%s] capability [%s] is unknown to libcap WARNING: libcap needs an update (cap=%d should have a name). unable to raise CAP_SETPCAP for BSET changesunable to lower CAP_SETPCAP post BSET changeUnable to drop bounding capability [%s] cap[%s] not recognized by library cap[%s] raised in bounding vector libcap:cap_clear_flag() internal errorFatal error concerning process capabilitiesFatal error internalizing capabilitiesUnable to set inheritable capabilitiesUnable to set capabilities [%s] mismatched mode got=%s want=%s prctl(PR_SET_KEEPCAPS, %u) failed: %s Unable to duplicate capabilitiesunable to select CAP_SET_SYS_CHROOTunable to raise CAP_SYS_CHROOTunable to lower CAP_SYS_CHROOTUnable to chroot/chdir to [%s]failed to set securebits to 0%o/0x%x waitpid didn't match child: %u != %u child terminated with odd signal (%d != %d) Too many groups specified (%d) Failed to identify gid for group [%s] Unable to get group list for userUnable to set group list for userFailed to set uid=%u(user=%s): %s cap[%s=%d] not supported by kernel Securebits: 0%lo/0x%lx/%u'b%s secure-no-suid-fixup: %s (%s) secure-no-ambient-raise: %s (%s) cap[%s] not in ambient vector usage: %s [args ...] --help this message (or try 'man capsh') --print display capability relevant state --decode=xxx decode a hex string to a list of caps --supports=xxx exit 1 if capability xxx unsupported --has-p=xxx exit 1 if capability xxx not permitted --has-i=xxx exit 1 if capability xxx not inheritable --drop=xxx remove xxx,.. capabilities from bset --dropped=xxx exit 1 unless bounding cap xxx dropped --has-ambient exit 1 unless ambient vector supported --has-a=xxx exit 1 if capability xxx not ambient --addamb=xxx add xxx,... capabilities to ambient set --delamb=xxx remove xxx,... capabilities from ambient --noamb reset (drop) all ambient capabilities --caps=xxx set caps as per cap_from_text() --inh=xxx set xxx,.. inheritable set --secbits= write a new value for securebits --iab=... use cap_iab_from_text() to set iab --keep= set keep-capability bit to --uid= set uid to (hint: id ) --cap-uid= libcap cap_setuid() to change uid --is-uid= exit 1 if uid != --gid= set gid to (hint: id ) --is-gid= exit 1 if gid != --groups=g,... set the supplemental groups --user= set uid,gid and groups to that of user --chroot=path chroot(2) to this path --modes list libcap named capability modes --mode= set capability mode to --inmode= exit 1 if current mode is not --killit= send signal(n) to child --forkfor= fork and make child sleep for sec --shell=/xx/yy use /xx/yy instead of /bin/bash for -- == re-exec(capsh) with args as for -- -- remaining arguments are for /bin/bash (without -- [%s] will simply exit(0)) ;T pp 0pp8zRx X+zRx $hpFJ w?;*3$"D(\ADG B AAA `\BBB E(D0A8D` 8A0A(B BBBI  8D0A(B BBBE HBLP K(A0{ (H BBBM A(F BBB08-BBB B(A0A8GDl]BIE E(D0H8G@j8A0A(B BBB0==Wc Bh{p{o 8  x}PH ooooDox{6 F V f v !!&!6!F!V!f!v!!!!!!!!!""&"6"F"V"f"v"""""""""##&#6#F#V#f#v#########$$&$6$F$V$f$v$$/usr/lib/debug/.dwz/x86_64-linux-gnu/libcap2-bin.debug6=M񛃀9^ƅ2c95058fd6dc5d6153b5517dcdb3ed583d0562.debugxּ.shstrtab.interp.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.got.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.data.bss.gnu_debugaltlink.gnu_debuglink $& 4o0> 88hF NoDD[o`jHHtBPP~ y p$$$$BB PPbbThbhbh{hkp{pkx{xkx}xmp ph pK\p4p