Current File : //proc/self/root/usr/sbin/capsh
ELF�X@8@8	@@@@��888D�D�������h������TTTDDP�tdL�L�L�||Q�tdR�td������``/lib/ld-linux-aarch64.so.1GNU�S��E���tB+ �PGNU�3���G)�Fb�� �n
r�q��X"��N>79��m�$�"<���2Y� �g7���U
�����~�]��c�j�j����, �H��BCzK,_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTable__libc_start_main__cxa_finalizeabort__printf_chkcap_to_namecap_freeputsputcharcap_get_proccap_to_textperrorexitcap_iab_get_proccap_iab_to_textcap_get_flagcap_set_flag__stack_chk_failstrcmpcap_set_ambientcap_get_boundstrdupcap_from_namestrtokstderr__fprintf_chkfwritesysconfcap_max_bitsstrlen__isoc23_strtoulstrncmpcap_get_modecap_mode_namecap_set_proccap_drop_boundcap_get_ambientcap_reset_ambientcap_clear_flagmalloc__memcpy_chkcap_from_text__sprintf_chkforksleepprctl__errno_locationstrerrorcap_dupchrootcap_set_modechdircap_set_secbitsgetpwnamgetgrouplistcap_setgroupscap_setuidsetenvcallocgetgrnam_r__ctype_b_loccap_get_secbitsgetuidgetpwuidgeteuidgetgidgetgrgidgetgroupsstrcasestrsetgidkillwaitpidcap_iab_from_textcap_iab_set_proc__isoc23_strtoullexecvecap_new_launchercap_launchgetenvaccess__stack_chk_guardlibcap.so.2libc.so.6ld-linux-aarch64.so.1GLIBC_2.17GLIBC_2.34GLIBC_2.38� ������������������Y���X���	��`	��0	�	�������P����`�@� ���` �@(�00�8��@��H��P��X�0`� h��p�`x�0����������������`��0������������P�@��9 |H| p|(�|@�|H�|P(}X`}`�}h�}p�}x�}�~�(~�H~�h~��~��b��~��~��H�x��������� �X�h����� ��(0�0H�8��@��PȁX�`8�hh��x������������P��`������� �X�0��8Ȅ@�H8�`P�h��p��x����8��H�����������І���8�X��� ��0ȇ8�@(�HH�`h�h��p��x����@��p�����Љ���@��X��������Њ��� ��H�h��� ȋ0�88�@p�H��P�X�`8�hp�p��x���ȍ��� ��0��H��p�����Ȏ�����H��x������������0�X����� Ȑ(�0 �80�@h�H��P��Xؑ`��h �pP�x����������P��`�����ȓ���(��H������Д �0(�@`�H��PЕ`ؕh�p�x(��`��������Ж���(��8��`��������(������8��X�x����� �(�@0�H`�P��`��hș��� ���b�0��p������b�ؚ���@��x��������8��p�����b���0� h�(��0�8(�PP�X��`��hОp����P������������(��`�����Ƞ���8�	@�	x�	��	�0	�8	P�@	��H	��`	Тh	�p	@�x	x��	���	��	 ��������%�/�0��N �(�0�8�@�H�P�	X�
`�h�p�
x��������������������������� �!�"�#�$ �%(�&0�'8�(@�)H�*P�+X�,`�-h�.p�/x�1��2��3��4��5��6��7��8��9��:�;�<�=�>�?�@��A�B�C�D�E �F(�G0�H8�I@�JH�KP�LX�M`�Oh�Pp�Qx�R��S��T��U��V��W��X �{���� 	��{���_��{�����F�b4� � � � ����F��4� ����F��4� ����F��4� ����F��4� ����F�5� ����F�"5� ����F�B5� ����F�b5� ����F��5� ����F��5� ����F��5� ����F��5� ����F�6� ����F�"6� ����F�B6� ����F�b6� ����F��6� ����F��6� ����F��6� ����F��6� ����F�7� ����F�"7� ����F�B7� ����F�b7� ����F��7� ����F��7� ����F��7� ����F��7� ���G�8� ���G�"8� ���
G�B8� ���G�b8� ���G��8� ���G��8� ���G��8� ���G��8� ���"G�9� ���&G�"9� ���*G�B9� ���.G�b9� ���2G��9� ���6G��9� ���:G��9� ���>G��9� ���BG�:� ���FG�":� ���JG�B:� ���NG�b:� ���RG��:� ���VG��:� ���ZG��:� ���^G��:� ���bG�;� ���fG�";� ���jG�B;� ���nG�b;� ���rG��;� ���vG��;� ���zG��;� ���~G��;� ����G�<� ����G�"<� ����G�B<� ����G�b<� ����G��<� ����G��<� ����G��<� ����G��<� ����G�=� ����G�"=� ����G�B=� ����G�b=� ����G��=� ����G��=� ����G��=� ����G��=� ����G�>� ����G�">� ����G�B>� ����G�b>� ����G��>� ����G��>� �?#�{����c�G����S��[��c��*�k��s����`@�����q�
T�`�����`�`���; �Z#��� �R�*�R�����)�'� �v@�����U��� 
4�q`T����������@
4�@���B������4���`�D����4��� �"�����4���`�"����@4����������`4���@�-���`4���`�������`4�����"���@4��� �������  4���`����@)4��� �������"5�@9�q�9T M5����������@�R!������ �R���{#�k��T�RP��������������@��R�������� 	5�*���� �7 Փ���������5�*�����*������@�5�*5��*����@��6��&�����$������*���*��*���x�����7�k@�����qM��Tc@�����G�B��@�c(�A�R���� �R���3���Q5��������@9�q�T+���Q�@�R! 
�f���������v@�]��1���`��6���	��� �R������}�����C��@��ւ�������+������� ���?��� #5���g���@�5�k@������*��a�����5#5��������������+@������������@�����}���k@������*��&�!�R��u���&��R��q�� �R�3�n��&�����4������ �R�����@�R��c��w���������@�o���A�R�������5�������������������a@���<���������������s���`*������@����� @9�4���`�=��� 5�@����������������������������O������������v�����������5��q���#���@��������A�Rc��l�����@�)���a@� ��������1���������Z����������4c@�����G�B��@�A�R���� �RU��������"�Ҭ���4�������Ҧ���@4�����"�Ҡ����4���� �B�Қ����4��� "�B�Ҕ���`5�7@��&5�*��!�"�����+4r����7�q�T��T�*������c@�����G�B ����@�R!��}��������3�Rs����@�Rr����*����������������5@�R���������!�������R�*���@�6���G�@����@��������*�B �A�R������ �R�G����&���������������4�����! �@�RC��� �R���*������G������B��A�R�@�~�������� �R������G����B@�A�R@�r��� �R������G����k@��B��A�R@�g��� �R����|�����@��������`��#�c�$�Rc ��*�R������5��-�����5������`@�$������*��$����5�4���������G��c@�B` �@�c$�A�R?��� �R�������6�R�������9���4��*A���������1������5���!@�@�R��� �R}����*������4����@����������!��@�R��� �Ro����@ �4����*��a���t�4���! !��*�3���i���`��6���G��*�*�B�!�A�R@����� �RU������$�"�Ҭ����[4��� '���Ҧ���`X4��� (�B�Ҡ����T4���@)���Қ���`Q4���@*�"�Ҕ����"4����,���Ҏ����4���@0�"�҈���`c4����0�b�҂���4����1�����*�14����6�����4����6����@4����6������4����6�����4����<���b����5�"��#������c�G��`"����c@�!����� �R�����@����! �@�RR����@��@�R!�	���L����@���/����������4����/�������4���"����c�G�����c@����G�B@�{����c�G��@�"��c@�!��#�����������<���!����4����=�������|4���@>������`o4���?������`l4����?�"��	����O4�����"������L4������������J4�����H����H4���`�C���`V4��� �>����T4����B���� 84���B�������*`24����	�,����15���'���@9�*�@9���@��'@��@��q�WT�V5�@��*@}�����d���Q!�|@��i�7�"h`8_�q���T�������@��j ���.�������@�7�k@�����@��6���G��c@�B1�@�c,��k@�A�R���� �RK������������� ���R�k��#����@��������qm{T�k�����@�(��� z5�@�1�����7�3@����5�@��"�R@/�Y����~5����/�"�RS��� ��4��/�/��� �R!�����R���� ������������`�R�������������@
�`@��������$����+����/�
�E������������5�3@�@�@�`z<������@��������@��-T����@��@9xax �_6���R�����`z<�����G��c@�B �@�c,�A�R���� �R������G����B�+�A�R@�~��� �R������G��*�B`+�A�R@�t��� �R������������@�����5������l��������c�G�+����c@����G�B�*�\������c�G��,�������G��@�@�����@�0��������*�B�.�A�R��H��� �R�������G����B-�A�R@�>��� �R�������!�G���1�����!�G��2��� ������*��'������R9$QC@�c���qB�A���h$8D@���T���l����R���R�R�R�R��R�������*�*�����@�R! 2�����@�����!������������@�Rc�����!3������@��~��!�3�����}�c��@�R�����@��|�@�R����{�c���!4������Rn���@�7�@��z��!�4�����y�c��@�R����k����*����K����*����?��@��A�@��*�*�! 5�@�R���������*<����?�@��*�@�R!�5�y����#��@�R!�5�t�������R�����*��B`
�@���5��#��*����
@�����@�R`����М���k�9T�@�����@�@�������@��������&��|4@�R�����*�*��������q�T�zt��*�*����N�a@���!(�����@�����������@���a@�s"�!(����� ���`@�@�����*������� 5�k@��7�q�T���k@�kmT�@�R!`�����k@�#���@�R!@�b š���^���!`)������E����j�6���G�@�����@�.������*�B�)�A�R��G��� �R�����!`(��*�i������� h�6���G�@�����@�������*�B�(�A�R��1��� �R�����!@'���S���q���`e�6���G�@�����@�������*�B�'�A�R����� �Rq����&��!@$�=����7@��74�7@��*����@<5�7@����R�*�����*�k7T�k@��k�.T�7����R�R�R�R!�R��Ri���`_�4���Y��� �RK�����q����������`95��;�����!��&��������*k�\�T���G��*�B`�A�R@���� �R/����!��&�����a����*k Z�T���G��*�B`�A�R@���� �R������G��c@�B��@�c�A�R���� �R����R��&�%��������!�0�@�Rg�����������c
��4�����������*�*�����R@7��q`T�&֚`����*�*������@��!`�@�R�@�F����R���R�R�R�R�R��R����q�P�TТ����c�G������@�R!��1�����k�y���Є�G��*�B��A�R�@�n��� �R���c@����G�B@�����Q�*�`�=���`�F���#@��*8���`�S�}��@���8����q���js��T�������G�A�R�js��@�B@<�J����js�l��� �R���������`%���=����*q-$T���������*�R����kaT�k@�$r�T���G��BA�@�_q�T�*�B;�A�R'��� �R}����*���������@�@����!�@�R�����h�����y���*�*�B�;�A�R��� �Rf��� <H�d������G��*�k@��B`:�A�R@�����`
�d��� �RV����*��@�R������[���"�������@�7�k@������>�5c@�����G�B@?�@�c �A�R�� �R>����"��������7�k@�h���@<�5c@�����G�B�>���c@����#@�@�R?��������*�����*�@�R! 6��������c@�����@���7�(�������������`���	����������s�t
���Z������
����c9�{C9���
������A�R������!�R�������*��A4������ ������G����B�/�A�R@����������������������G��*�B`&�A�R@����� �R����"���,�����7�������
��k@���B�RL���`5�c@� �5c@�����G�B�=�����"������ �7������ ��c@���"�R8���`5�k@���5c@�����G�B =�p��c@�����G�B �j���B����c�G��$�������G���7@�B�%�A�R@�G��� �R������g���:����c�G�����!���8�c@�v������������c�G�8�����B����c�G� 7�����@%����� �R�����`����� �R{����@����� �Rv����:���� �Rq�����9�z��� �Rl���� 	�u��� �Rg����.�p��� �Rb����`-�k��� �R]�����#�f������ �b��� �RT������]��� �RO����@�X��� �RJ������S��� �RE�����N��� �R@������I��� �R;������D��� �R6����`/�?��� �R1������:��� �R,�����5��� �R'������0��� �R"������+����*����@�&��� �R����@�!��� �R��� � � ��������@��#������G�����	����������G�@�����_� � ���&���!�&�?�T��!�G�a����_���&���!�&�!�"��A��!�A�����B�G�b����_� �?#�{��������`�f9@7���G�����@������� �R`�&9�@��{¨�#�_�_$��� � �?#�{�������[����!��@�R�S��R��c�����*�?��*���b
������*_q�T ՀT�����������@�R�������������s�*�?��*�*_q��T�5�SA���[B� ��cC��{Ĩ�#�3���*���!������SA�@�R�[B��cC��{Ĩ�#՚�� �?#�{�����S�@��� �����d������!���@�R�����l������SA��{¨�#�g���`�x��� �Rj��� �?#�{�����S����� ���a�����@����!@�@�R������P������SA��{¨�#�K���@�\��� �RN������W�����A��� �RG��� � �?#����!�G��{��C���"@�����@5�����������R�R�����5�@�q�T#�$�Rc��*���R,������G��@�@�B���aT�{A����@�����#�_�������������� ���� �R��������� �R���?#�C���B�G��{��C��S��*�R�[���@@����ҽ��������������4�*�*��� 5s�*W��� ��6���G��@�@�B����T�{A����SB��[C��C��#������c�a������
����ւ�	��)��� 5�@��*�����5�����������������������G��@�@�B���T�{A����SB��[C��cD��C��#Ն���*�c������B�G������q�#�@@�!��c�-��c��B �A�RP��������� �R�������G����B@�A�R@�D��� �R�������G��q�@��#�!��@�c�-�c�����B��A�R3��� �R�����c������c�G�"��!�����c@�c��� �R}������?#�{�������*j����T�@��{¨�#�_����*���G��B`�A�R@���� �Re���?#��{��!�&����S��*3�`��������y���k�T��*!@	���@�R������G���"���B Ԛ!�	�@�R����b@�B��s"���
� ���@�R����b�@������SA��@��{è�#�_��*���@�R!`	������ �?#�����B�G��{��C��S�����A@����������`@9�q�T�����R����@�!@9�5��!�G��@�"@�c���!T�{A��SB�����#�_���G������B�
�A�R@����� �R������� �{�����{���_�,%s set =%s%u%s%s <unsupported>failed to get process capabilitiesCurrent: %s
failed to get IAB for processfailed to obtain text for IABCurrent IAB: %s
Capabilities not availableUnable to check CAP_EFFECTIVE CAP_SETPCAP valueclearallUnable to %s ambient capability [%s]
failed to allocate names
capability [%s] is unknown to libcap
failed to %s ambient [%s=%u]
sysconf(%d) returned a non-positive number: %ld
%s (%d)<reserved for> %s (%d) [/proc/self/status:CapXXX: 0x%016llx]

    %s
%s: want non-negative integer, got "%s"
/bin/bashyesnolockedunlocked???--quietobtaining highest capability nameWARNING: libcap needs an update (cap=%d should have a name).
--drop=unable to raise CAP_SETPCAP for BSET changesunable to lower CAP_SETPCAP post BSET changeUnable to drop bounding capability [%s]
failed to drop [%s=%u]
--dropped=cap[%s] not recognized by library
cap[%s] raised in bounding vector
--has-ambientambient set not supported--addamb=--delamb=--noambfailed to reset ambient set--noenv--inh=libcap:cap_clear_flag() internal errorFatal error concerning process capabilitiesOut of memory for inh setnone%s %s+iFatal error internalizing capabilitiesUnable to set inheritable capabilities--strict--caps=unable to interpret [%s]
Unable to set capabilities [%s]
--modesSupported modes:UNKNOWN %s--modeunsupported mode: %s
failed to set mode [%s]: %s
unrecognized command [%s]
Mode: %s
--inmode=mismatched mode got=%s want=%s
--keep=invalid --keep valueprctl(PR_SET_KEEPCAPS, %u) failed: %s
--chroot=Unable to duplicate capabilitiesunable to select CAP_SET_SYS_CHROOTunable to raise CAP_SYS_CHROOTunable to lower CAP_SYS_CHROOT/Unable to chroot/chdir to [%s]--secbits=invalid --secbits valuefailed to set securebits to 0%o/0x%x
--forkfor=already forked
invalid --forkfor valuerequire non-zero --forkfor value
unable to fork()--killit=invalid --killit signo valueno forked process to kill
Unable to kill child processwaitpid didn't match child: %u != %u
child terminated with odd signal (%d != %d)
--uid=invalid --uid valueFailed to set uid=%u: %s
--cap-uid=invalid --cap-uid valueFailed to cap_setuid(%u): %s
--gid=invalid --gid valueFailed to set gid=%u: %s
--groups=No memory for [%s] operation
No memory for gid list
Too many groups specified (%d)
Failed to identify gid for group [%s]
Failed to setgroups.
--user=User [%s] not known
Unable to get group list for userUnable to set group list for userFailed to set uid=%u(user=%s): %s
HOMEunable to set HOMEUSERunable to set USER--decode=0x%016llx=--supports=cap[%s=%d] not supported by kernel
--printBoundingAmbientSecurebits: 0%lo/0x%lx/%u'b%s (no-new-privs=%d)
 secure-noroot: %s (%s)
 secure-no-suid-fixup: %s (%s)
 secure-keep-caps: %s (%s)
 secure-no-ambient-raise: %s (%s)
uid=%u(%s) euid=%u(%s)
gid=%u(%s)
groups=%s%u(%s)Guessed mode: %s (%d)
--==-+=+PATHno PATH environment variable found for re-execing
insufficient memory for parts of path
insufficient memory for path building
%s/%s:failed to create launcherchild failed to startfailed to wait for PID=%d, result=%x: child PID=%d terminated by signo=%d
child PID=%d generated result=%0x
execve '%s' failed!
--shell=--has-p=cap[%s] not permitted
--has-i=cap[%s] not inheritable
--has-a=cap[%s] not in ambient vector
--has-b=cap[%s] not in bounding vector
--is-uid=invalid --is-uid valueuid: got=%d, want=%d
--is-gid=invalid --is-gid valuegid: got=%d, want=%d
--iab=iab: '%s' malformed
unable to set IAB tuple--no-new-privsunable to set no-new-privs--has-no-new-privsno-new-privs not set
--license%s see License file for details.
Copyright (c) 2008-11,16,19-21 Andrew G. Morgan <morgan@kernel.org>
--explain=unrecognised value '%s'
negative capability (%d) invalid
<unnamed in libcap> (%d)<unsupported> (%d) [/proc/self/status:CapXXX: 0x%016llx]
--suggest=invalid named cap--currentusage: %s [args ...]
  --addamb=xxx   add xxx,... capabilities to ambient set
  --cap-uid=<n>  use libcap cap_setuid() to change uid
  --caps=xxx     set caps as per cap_from_text()
  --chroot=path  chroot(2) to this path
  --current      show current caps and IAB vectors
  --decode=xxx   decode a hex string to a list of caps
  --delamb=xxx   remove xxx,... capabilities from ambient
  --drop=xxx     drop xxx,... caps from bounding set
  --explain=xxx  explain what capability xxx permits
  --forkfor=<n>  fork and make child sleep for <n> sec
  --gid=<n>      set gid to <n> (hint: id <username>)
  --groups=g,... set the supplemental groups
  --has-a=xxx    exit 1 if capability xxx not ambient
  --has-b=xxx    exit 1 if capability xxx not dropped
  --has-ambient  exit 1 unless ambient vector supported
  --has-i=xxx    exit 1 if capability xxx not inheritable
  --has-p=xxx    exit 1 if capability xxx not permitted
  --has-no-new-privs  exit 1 if privs not limited
  --help, -h     this message (or try 'man capsh')
  --iab=...      use cap_iab_from_text() to set iab
  --inh=xxx      set xxx,.. inheritable set
  --inmode=<xxx> exit 1 if current mode is not <xxx>
  --is-uid=<n>   exit 1 if uid != <n>
  --is-gid=<n>   exit 1 if gid != <n>
  --keep=<n>     set keep-capability bit to <n>
  --killit=<n>   send signal(n) to child
  --license      display license info
  --mode         display current libcap mode
  --mode=<xxx>   set libcap mode to <xxx>
  --modes        list libcap named modes
  --no-new-privs set sticky process privilege limiter
  --noamb        reset (drop) all ambient capabilities
  --noenv        no fixup of env vars (for --user)
  --print        display capability relevant state
  --quiet        if first argument skip max cap check
  --secbits=<n>  write a new value for securebits
  --shell=/xx/yy use /xx/yy instead of /bin/bash for --
  --strict       toggle --caps, --drop and --inh fixups
  --suggest=text search cap descriptions for text
  --supports=xxx exit 1 if capability xxx unsupported
  --uid=<n>      set uid to <n> (hint: id <username>)
  --user=<name>  set uid,gid and groups to that of user
  ==             re-exec(capsh) with args as for --
  =+             cap_launch capsh with args as for -+
  --             remaining arguments are for /bin/bash
  -+             cap_launch /bin/bash with remaining args
                 (without -- [%s] will simply exit(0))
--help-hunable to find executable '%s' in PATH
Allows a process to perform checkpointand restore operations. Also permitsexplicit PID control via clone3() andalso writing to ns_last_pid.Allows a process to manipulate aspects of the kernelenhanced Berkeley Packet Filter (BPF) system. This isan execution subsystem of the kernel, that manages BPFprograms. CAP_BPF permits a process to:  - create all types of BPF maps  - advanced verifier features:    - indirect variable access    - bounded loops    - BPF to BPF function calls    - scalar precision tracking    - larger complexity limits    - dead code elimination    - potentially other featuresOther capabilities can be used together with CAP_BFP tofurther manipulate the BPF system:  - CAP_PERFMON relaxes the verifier checks as follows:    - BPF programs can use pointer-to-integer      conversions    - speculation attack hardening measures can be      bypassed    - bpf_probe_read to read arbitrary kernel memory is      permitted    - bpf_trace_printk to print the content of kernel      memory  - CAP_SYS_ADMIN permits the following:    - use of bpf_probe_write_user    - iteration over the system-wide loaded programs,      maps, links BTFs and convert their IDs to file      descriptors.  - CAP_PERFMON is required to load tracing programs.  - CAP_NET_ADMIN is required to load networking    programs.Allows a process to enable observability of privilegedoperations related to performance. The mechanismsinclude perf_events, i915_perf and other kernelsubsystems.Allows a process to read the audit log via a multicastAllows a process to block system suspends - prevent thesystem from entering a lower power state.Allows a process to trigger something that can wake thesystem up.Allows a process to configure the kernel's syslog(printk) behavior.Allows a process to configure the Mandatory AccessControl (MAC) policy. Not all kernels are configuredwith a MAC enabled, but if they are this capability isreserved for code to perform administration tasks.Allows a process to override Manditory Access Control(MAC) access. Not all kernels are configured with a MACmechanism, but this is the capability reserved foroverriding them.Allows a process to set capabilities on files.Permits a process to uid_map the uid=0 of theparent user namespace into that of the childnamespace. Also, permits a process to overridesecurebits locks through user namespacecreation.Allows a process to configure audit logging via aunicast netlink socket.Allows a process to write to the audit log via aAllows a process to take leases on files.Allows a process to perform privileged operations withthe mknod() system call.Allows a process to manipulate tty devices:  - configure tty devices  - perform vhangup() of a ttyAllows a process to perform time manipulation of clocks:  - alter the system clock  - enable irix_stime on MIPS  - set the real-time clockAllows a process to adjust resource related parametersof processes and the system:  - set and override resource limits  - override quota limits  - override the reserved space on ext2 filesystem    (this can also be achieved via CAP_FSETID)  - modify the data journaling mode on ext3 filesystem,    which uses journaling resources  - override size restrictions on IPC message queues  - configure more than 64Hz interrupts from the    real-time clock  - override the maximum number of consoles for console    allocation  - override the maximum number of keymapsAllows a process to maipulate the execution prioritiesof arbitrary processes:  - those involving different UIDs  - setting their CPU affinity  - alter the FIFO vs. round-robin (realtime)    scheduling for itself and other processes.Allows a process to initiate a reboot of the system.Allows a process to perform a somewhat arbitrarygrab-bag of privileged operations. Over time, thiscapability should weaken as specific capabilities arecreated for subsets of CAP_SYS_ADMINs functionality:  - configuration of the secure attention key  - administration of the random device  - examination and configuration of disk quotas  - setting the domainname  - setting the hostname  - calling bdflush()  - mount() and umount(), setting up new SMB connection  - some autofs root ioctls  - nfsservctl  - VM86_REQUEST_IRQ  - to read/write pci config on alpha  - irix_prctl on mips (setstacksize)  - flushing all cache on m68k (sys_cacheflush)  - removing semaphores  - Used instead of CAP_CHOWN to "chown" IPC message    queues, semaphores and shared memory  - locking/unlocking of shared memory segment  - turning swap on/off  - forged pids on socket credentials passing  - setting readahead and flushing buffers on block    devices  - setting geometry in floppy driver  - turning DMA on/off in xd driver  - administration of md devices (mostly the above, but    some extra ioctls)  - tuning the ide driver  - access to the nvram device  - administration of apm_bios, serial and bttv (TV)    device  - manufacturer commands in isdn CAPI support driver  - reading non-standardized portions of PCI    configuration space  - DDI debug ioctl on sbpcd driver  - setting up serial ports  - sending raw qic-117 commands  - enabling/disabling tagged queuing on SCSI    controllers and sending arbitrary SCSI commands  - setting encryption key on loopback filesystem  - setting zone reclaim policyAllows a process to configure process accounting.Allows a process to perform a ptrace() of any otherprocess.Allows a process to perform a chroot syscall to changethe effective root of the process' file system:redirect to directory "/" to some other location.Allows a process to perform raw IO:  - permit ioper/iopl access  - permit sending USB messages to any device via    /dev/bus/usbAllows a process to initiate the loading and unloadingof kernel modules. This capability can effectivelymodify kernel without limit.Allows a process to override IPC ownership checks.Allows a process to lock shared memory segments for IPCpurposes.  Also enables mlock and mlockall systemcalls.Allows a process to use raw networking:  - RAW sockets  - PACKET sockets  - binding to any address for transparent proxying    (also permitted via CAP_NET_ADMIN)Allows a process to perform network configurationoperations:  - interface configuration  - administration of IP firewall, masquerading and    accounting  - setting debug options on sockets  - modification of routing tables  - setting arbitrary process, and process group    ownership on sockets    (this is also allowed via CAP_NET_RAW)  - setting TOS (Type of service)  - setting promiscuous mode  - clearing driver statistics  - multicasing  - read/write of device-specific registers  - activation of ATM control socketsAllows a process to broadcast to the network and tolisten to multicast.Allows a process to bind to privileged ports:  - TCP/UDP sockets below 1024  - ATM VCIs below 32Allows a process to modify the S_IMMUTABLE andS_APPEND file attributes.Allows a process to freely manipulate its inheritablecapabilities.Linux supports the POSIX.1e Inheritable set, the POXIX.1e (Xvector) known in Linux as the Bounding vector, as well asthe Linux extension Ambient vector.This capability permits dropping bits from the Boundingvector (ie. raising B bits in the libcap IABrepresentation). It also permits the process to raiseAmbient vector bits that are both raised in the Permittedand Inheritable sets of the process. This capability cannotbe used to raise Permitted bits, Effective bits beyond thosealready present in the process' permitted set, orInheritable bits beyond those present in the Boundingvector.[Historical note: prior to the advent of file capabilities(2008), this capability was suppressed by default, as itsunsuppressed behavior was not auditable: it couldasynchronously grant its own Permitted capabilities to andremove capabilities from other processes arbitrarily. Theformer leads to undefined behavior, and the latter is betterserved by the kill system call.]Allows a process to freely manipulate its own UIDs:  - arbitrarily set the UID, EUID, REUID and RESUID    values  - allows the forging of UID credentials passed over a    socketAllows a process to freely manipulate its own GIDs:  - arbitrarily set the GID, EGID, REGID, RESGID values  - arbitrarily set the supplementary GIDs  - allows the forging of GID credentials passed over aAllows a process to send a kill(2) signal to any otherprocess - overriding the limitation that there be a[E]UID match between source and target process.Allows a process to set the S_ISUID and S_ISUID bits ofthe file permissions, even when the process' effectiveUID or GID/supplementary GIDs do not match that of thefile.Allows a process to perform operations on files, evenwhere file owner ID should otherwise need be equal tothe UID, except where CAP_FSETID is applicable. Itdoesn't override MAC and DAC restrictions.Allows a process to override all DAC restrictionslimiting the read and search of files anddirectories. This excludes DAC access covered byCAP_LINUX_IMMUTABLE.Allows a process to override of all DiscretionaryAccess Control (DAC) access, including ACL executeaccess. That is read, write or execute files that theprocess would otherwise not have access to. Thisexcludes DAC access covered by CAP_LINUX_IMMUTABLE.Allows a process to arbitrarily change the user andgroup ownership of a file.;x��������������4����t����Ĵ���Դ����TT�������ȷ������<d���d4����zRx���4A,X���0@t���<$T����PA-A ��B�N���A-|ȳ��D�����A-A@��C��E��C��g
��������A-AK��������A-(�����lA-A ��B��P
����A-A(̴���A-A ��B��P
����A-A(40����A-A0C��B�a
���A-A``��@A-APC��B��C��`
������A-AB��a��A������A-AP������-B��o��A��$��\A-A ��B�F
���A-A,������A-B0��C��C�a
�����A-A(�����A-A0C��B��[
����A-A0H���A-A`��F�
�	����D�����Y�X�	`	0		���P�`@ �`@0����0 �`0����`0����P@����3
@`�������o��
���+8�	���o���o����o�o ���o �3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3�3��9 |H|p|�|�|�|(}`}�}�}�}�}~(~H~h~�~�b�~�~Hx���� �X�h�������0�H�����ȁ�8�h�x�������P�`������ �X���Ȅ�8�P�������8�H�������І�8�X�����ȇ�(�H�h�������@�p���Љ�@�X�����Њ� �H�h���ȋ�8�p�����8�p�����ȍ� �0�H�p���Ȏ��H�x��������0�X�����Ȑ� �0�h�����ؑ�� �P�������P�`���ȓ�(�H�����Д�(�`���Еؕ��(�`�����Ж�(�8�`�����(���8�X�x�������0�`�����ș� ��b0�p����bؚ�@�x�����8�p����b���0�h����(�P�����О��P�������(�`���Ƞ�8�@�x�����P�����Т�@�x���� �/usr/lib/debug/.dwz/aarch64-linux-gnu/libcap2-bin.debug�f�r�
������L\HM�53e1f2baa345a38b17db741c422b0102209d50.debug6?].shstrtab.interp.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.data.rel.ro.dynamic.got.data.bss.gnu_debugaltlink.gnu_debuglink88TT$&xx 4���o��>��XFN���o  �[���o��`j88�tB�+�+�~�3�3y�3�3@�99@'@�@`@`�X`X`�C�L�L�|�ȤȤ|���������������H�����������	��	�	X��	L�	4(