ELF>E@Xu@8 @@@@HH 1+1+PPP8k8{8{PPkP{P{88800hhhDDStd88800PtdeeeTTQtdRtd8k8{8{/lib64/ld-linux-x86-64.so.2 GNUGNUN5蔏yΉGNU'xUc )VzG;. Xpy Q kGg^V.?tNe , Ai5F"}50_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTable__cxa_finalize__libc_start_main__printf_chkcap_freecap_to_nameputsputcharcap_get_proccap_dupcap_set_flagperrorexitstderrfwritestrcmpcap_set_proccap_set_ambientcap_get_boundstrdupcap_from_namestrtok__fprintf_chk__stack_chk_failsysconfstrlenstrtoulcap_max_bitsstrncmpcap_drop_boundcap_get_ambientcap_reset_ambientcap_clear_flagcap_to_textmallocmemcpycap_from_textcap_mode_name__sprintf_chkprctl__errno_locationstrerrorcap_set_modecap_get_modechrootforksleepchdircap_set_secbitskillwaitpidsetgidcap_setuidstrtoullgetpwnamgetgrouplistcap_setgroupscallocgetgrnam_r__ctype_b_locexecvecap_iab_get_proccap_iab_to_textcap_get_secbitsgetuidgetpwuidgeteuidgetgidgetgrgidgetgroupsgetenvaccesscap_iab_from_textcap_iab_set_proccap_get_flaglibcap.so.2libc.so.6GLIBC_2.3GLIBC_2.3.4GLIBC_2.14GLIBC_2.4GLIBC_2.34GLIBC_2.2.5qii {ti ii ui 8{E@{EH{H{ &DJOh}p}x}}}}}} } } } }}}}}}}}~~~~ ~(~0~8~@~H~P~ X~!`~"h~#p~$x~%~'~(~)~*~+~,~-~.~/~0~1~2~3~4~5~6789: ;(<0=8>@?H@PAXB`ChEpFxGHIJKLMNPHH_HtH52]%3]hhhhhhhhqhah Qh Ah 1h !h hhhhhhhhhhqhahQhAh1h!hhhh h!h"h#h$h%h&h'qh(ah)Qh*Ah+1h,!h-h.h/h0h1h2h3h4h5h6h7qh8ah9Qh:Ah;1h<!h=h>h?h@hAhBhChDhEhFhGqhHahIQhJA%}XD%uXD%mXD%eXD%]XD%UXD%MXD%EXD%=XD%5XD%-XD%%XD%XD%XD% XD%XD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%}WD%uWD%mWD%eWD%]WD%UWD%MWD%EWD%=WD%5WD%-WD%%WD%WD%WD% WD%WD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%}VD%uVD%mVD%eVD%]VD%UVD%MVD%EVD%=VD%5VD%-VDAWAVAUATUSH(|$Ht$HT$(dH%(H$1xmH~8cHH`|$D$HL$D$HL-&LyHDH$H~&HD$ M'LL  LH=&aLH=&z LH=&v LH={&nLH=i&cLH=r&jLH=&NLH=&LH=& LH=&PLH=& LH=& LH=& LH=&U LH=&sA LH=&W LH= '; LH=0' LH=I' LH=' LH=' LH=}' LH=r'8LH=G(!LH=3( uLH=5(N:ID$HD$ IHt$`H|$XLH=/#Ld$`1;DL!H|$XeyHl$XLHIL9<$t1DHt$`I|$ Y|$`~IH+H HQH81fD1yHQH="Hu[LHD$HH|$H!Hl$TUHLH|$`;|$TH|$XAE>1HRIHuHl$XH|$`[HSH|$@I|$ qI|$ 1`y6lHPH=!H^DH5(P19\IHHLfHHt$1AHH 5e1LLIUMIHZHT$HLII| HD$0.HT$HIEztHH=!!OHT$0LLHLHHLLhHtH;HH+HHH1AHH 4IHxIHHH)LLjIHh f.LLHHIeuѿLH5$1IMH LH1HtIHx8IH3IHI|$H5|Aĉ18DH'IH1H=%@)/8LH5;H1_I LHI)LLH5,'H5HL%LL1PHHIuҿ mH=%YH=*%CIH Hm%zHHHIH1AHH 1OL)LoIHx H9tdHEIH&H |$HzI|$ H5)VŅ D$HiSUH=}H)넉H#$HHHQKH81HI|$ H5\HA؉H&HJH81DD$TLHHJH81oLH"H=9$JH=K$4H=H=#H=#lH=VI|$H5A98DHIHIH81I|$ H5_Y|$HH|$HukDt$HHt$`1DAA9u?D$`9u#D$H&H=AH$CL$HHn$3H=UHIH=HIH"HHH=JHxH=#bH\$H5&1HHTHkH=Hq5HH=ZeHNHH=HI|$H5A;8DHqII|$ H5 qAG}8DHIHt$`I|$ |$`7IDD$`H#H I|$ 1E1H5dH-NHHL5Q1H`AA@QHDHH?tDHT$LD$8HL$LLHt$`HD$XH @BDI1HDd$LL$LHItTL9d$0~&IHDPt11LBDHEH H81LL$L|$@Hc|$Hju7HwHDH=jHiOHDH=XH?%IH`LHQDH5\1H H=" MH=7LHH=H=YH=lLH=PLH=LH= LH=8 LH=LH=lzLH=4,LH=GE1E1111'uHBH=HgMA<$=H|$ IHL$HcD$M7LHT$(HI?HQBIHlH81I?81HH H5BHI1LKHCH5AH=H5AH=XHHH4IHHH5%1RLHAHAAĸ@MLHtHэpHHH0 3u1HE1E111'1EH߉ILRA1LUL%H5`H-HYALHEA^HH5YHE1vALHgHEAH59HE1IA LH:HEAHEH511x-AƀLHHEA@H5HE1/AHmljL HtLH HtHMDAH51AH xHtHDH51E1H$L%|FH513H޿dH-hHD$IHuH=LHH#H81LHLIDLJDH|$:XyLHl$HD$dH+%(H(H[]A\A]A^A_DHIHHL-~Lt$NLHH|$3|$DH|$u[1LMHHuHl$H|$VHNHD$dH+%(H(L[]A\A]A^A_H= nH= XEH HHH HEHn6IH819HHH6HپH H81EDL$IؾH|H oHEH5HH81H5H=<Hjf.ATAH~A\IH5DH H81K!ATISHHdH%(HD$1.Ht9;-t41HHH$:uHT$dH+%(u;H[A\fDH5ILH H81HH,%s set =%s%u%s%s Capabilities not availableunable to select CAP_SETPCAPclearraiseallfailed to allocate names failed to %s ambient [%s=%u] /bin/bashunlockedyesno???--drop=failed to drop [%s=%u] --dropped=--has-ambientambient set not supported --addamb=--delamb=--noambfailed to reset ambient set --inh=Out of memory for inh setnone%s %s+i--caps=unable to interpret [%s] --modesSupported modes:UNKNOWN %s--mode=failed to set mode [%s]: %s --inmode=--keep=invalid --keep value--chroot=/--secbits=invalid --secbits value--forkfor=already forked invalid --forkfor valueunable to fork()--killit=invalid --killit signo valueno forked process to kill Unable to kill child process--uid=invalid --uid valueFailed to set uid=%u: %s --cap-uid=invalid --cap-uid valueFailed to cap_setuid(%u): %s --gid=invalid --gid valueFailed to set gid=%u: %s --groups=No memory for [%s] operation No memory for gid list Failed to setgroups. --user=User [%s] not known --decode=0x%016llx=--supports=--printCurrent: %s BoundingAmbientfailed to get IAB for processfailed to obtain text for IABCurrent IAB: %s secure-noroot: %s (%s) secure-keep-caps: %s (%s) uid=%u(%s) euid=%u(%s) gid=%u(%s) %s%u(%s)Guessed mode: %s (%d) --==%s/%sexecve '%s' failed! --shell=--has-p=cap[%s] not permitted --has-i=cap[%s] not inheritable --has-a=--is-uid=invalid --is-uid valueuid: got=%d, want=%d --is-gid=invalid --is-gid valuegid: got=%d, want=%d --iab=iab: '%s' malformed unable to set IAP vectors--no-new-privsunable to set no-new-privs--has-no-new-privsno-new-privs not set --license--help-hunsupported mode: %s PATHmodification requires CAP_SETPCAP unable to raise CAP_SETPCAP for AMBIENT changesunable to lower CAP_SETPCAP post AMBIENT changeUnable to %s ambient capability [%s] capability [%s] is unknown to libcap sysconf(%d) returned a non-positive number: %ld %s: want non-negative integer, got "%s" obtaining highest capability nameWARNING: libcap needs an update (cap=%d should have a name). unable to raise CAP_SETPCAP for BSET changesunable to lower CAP_SETPCAP post BSET changeUnable to drop bounding capability [%s] cap[%s] not recognized by library cap[%s] raised in bounding vector libcap:cap_clear_flag() internal errorFatal error concerning process capabilitiesFatal error internalizing capabilitiesUnable to set inheritable capabilitiesUnable to set capabilities [%s] mismatched mode got=%s want=%s prctl(PR_SET_KEEPCAPS, %u) failed: %s Unable to duplicate capabilitiesunable to select CAP_SET_SYS_CHROOTunable to raise CAP_SYS_CHROOTunable to lower CAP_SYS_CHROOTUnable to chroot/chdir to [%s]failed to set securebits to 0%o/0x%x waitpid didn't match child: %u != %u child terminated with odd signal (%d != %d) Too many groups specified (%d) Failed to identify gid for group [%s] Unable to get group list for userUnable to set group list for userFailed to set uid=%u(user=%s): %s cap[%s=%d] not supported by kernel Securebits: 0%lo/0x%lx/%u'b%s (no-new-privs=%d) secure-no-suid-fixup: %s (%s) secure-no-ambient-raise: %s (%s) no PATH environment variable found for re-execing insufficient memory for parts of path insufficient memory for path building cap[%s] not in ambient vector %s has a you choose license: BSD 3-clause or GPL2 Copyright (c) 2008-11,16,19,2020 Andrew G. Morgan usage: %s [args ...] --has-a=xxx exit 1 if capability xxx not ambient --has-ambient exit 1 unless ambient vector supported --addamb=xxx add xxx,... capabilities to ambient set --cap-uid= use libcap cap_setuid() to change uid --caps=xxx set caps as per cap_from_text() --chroot=path chroot(2) to this path --decode=xxx decode a hex string to a list of caps --delamb=xxx remove xxx,... capabilities from ambient --forkfor= fork and make child sleep for sec --gid= set gid to (hint: id ) --groups=g,... set the supplemental groups --has-p=xxx exit 1 if capability xxx not permitted --has-i=xxx exit 1 if capability xxx not inheritable --has-no-new-privs exit 1 if privs not limited --help, -h this message (or try 'man capsh') --iab=... use cap_iab_from_text() to set iab --inh=xxx set xxx,.. inheritable set --inmode= exit 1 if current mode is not --is-uid= exit 1 if uid != --is-gid= exit 1 if gid != --keep= set keep-capability bit to --killit= send signal(n) to child --license display license info --modes list libcap named capability modes --mode= set capability mode to --no-new-privs set sticky process privilege limiter --noamb reset (drop) all ambient capabilities --print display capability relevant state --secbits= write a new value for securebits --shell=/xx/yy use /xx/yy instead of /bin/bash for -- --supports=xxx exit 1 if capability xxx unsupported --uid= set uid to (hint: id ) --user= set uid,gid and groups to that of user == re-exec(capsh) with args as for -- -- remaining arguments are for /bin/bash (without -- [%s] will simply exit(0)) unable to find executable '%s' in PATH ;T XpxX(TzRx &D$4FJ w?:*3$"\\tBLI I(H0K8F@o 8H0A(B BBBG D8F0A(B BBB((ADG B AAA `BBB B(D0D8D` 8D0A(B BBBJ  8D0A(B BBBE d?BO A (,BDG0I ABG DFBB B(A0A8GLIbPEEH{eq $K8{@{oh   P}@8 oooo&oP{0 @ P ` p !! !0!@!P!`!p!!!!!!!!!"" "0"@"P"`"p"""""""""## #0#@#P#`#p#########$$ $0$@$P$`$p$$$$$$$capsh-2.48-9.el9_2.x86_64.debugy7zXZִF!t/]?Eh=ڊ2N [:]yV{}l;EѠn5|5=JLՏb)Hcd3d~ne]Y@&"[y~fW FD]rr@4l𱚭24^D NHF&\4֨yae .ȑvl_TFJpb4-? fT|m'tD0'鍰j]Ջ2G5L@s&pY̥+R"D@tFT;B2:ܭ.KW \J @E,{=\=ZLYb\Ũ4(5hi2՘989 &[&'pb#PZaG&YܳCT23B5T#s`0jj%$avG]EeFL .QQ=f'HlʋV0,bU@!raֱgYZ.shstrtab.interp.note.gnu.property.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.sec.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.data.rel.ro.dynamic.got.data.bss.gnu_debuglink.gnu_debugdata 880&hh$9 GoQ Yh h ao&&nop}88B@@  $$))!$K$K PPeeTee8{8k@{@kH{HkP{PkP}Pmp ph p$(p,t(