%PDF- %PDF-
Mini Shell

Mini Shell

Direktori : /sbin/
Upload File :
Create Path :
Current File : //sbin/capsh

ELF>l@��@8
@@@@���3�3@@@33����C�C�������xH�H�H�88800hhhDDS�td88800P�td�����Q�tdR�td������/lib64/ld-linux-x86-64.so.2 GNU���GNUt>�S��ZR\��hoqJ�GNUR���@RT�ڡ]�e�m�������x�F\B�� �vdl�k�O��yx��3����E��V�+ <�������g	4�A�A dt�]��]O, ~,S6}�1hH#X"�_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTable__libc_start_main__cxa_finalize__printf_chkcap_freecap_to_nameputsputcharcap_get_proccap_to_textperrorexitcap_iab_get_proccap_iab_to_textcap_get_flagcap_set_flag__stack_chk_failstrcmpcap_set_ambientcap_get_boundstrdupcap_from_namestrtokstderr__fprintf_chkfwritesysconfcap_max_bitsstrlen__isoc23_strtoulstrncmpcap_get_modecap_mode_namecap_set_proccap_drop_boundcap_get_ambientcap_reset_ambientcap_clear_flagmalloc__memcpy_chkcap_from_text__sprintf_chkforksleepprctl__errno_locationstrerrorcap_dupchrootcap_set_modechdircap_set_secbitsgetenvaccesscap_get_secbitsgetuidgetpwuidgeteuidgetgidgetgrgidgetgroupsexecvecap_new_launchercap_launchwaitpidsetgidkillcap_setuidstrcasestrgetpwnamgetgrouplistcap_setgroupssetenvcallocgetgrnam_r__ctype_b_loc__isoc23_strtoullcap_iab_from_textcap_iab_set_proclibcap.so.2libc.so.6GLIBC_2.3GLIBC_2.3.4GLIBC_2.4GLIBC_2.34GLIBC_2.38GLIBC_2.2.5�ii
�ti	�ii
���������ui	����l���l�������`�� � ���(���0���8�@�@�`�H�@�P� �X���`�`�h� �p��x�������������`���0��� �����������`���������������P���@��� ������������@������ ���(���0���8�`�@� ��� ���(���0��8�Ç`��h�@�p�x�x�����؟����� ������@���`�����������������Ƞ�����(���`���������"��ȡ�1��� �A�(�8�0�h�8���@�ȢH�N�P��X�8�`�a���p����������o����������H�����������{������@� �H�X�P���X�ȥ�����8���p�����������ئ�����8���h����������� �ȧ(���@��P�0�X�̈��h���������������������8�������T���0���q��X���������� � �(�X�0���8���@���H�Ȫ`���h���p�0�x�X���x�������ث�����H�������������� ���H���Ɖ���������� �,�(�;�0���8��@��H�P�P�8�X�p�`���h�h�p�Юx��������8���`�����������������������������P���Ȋ�������������а���8��p� ���0�ȱ8���`��h�8�p�h����������Ȳ��"������8���3���p�������P� ��(�W�0�g�8�@�@�x�`���h�z�p���x�ش���������8���`�������@�������ȵ��ʋ�����������@���h����� ���(�ж0��@��H�"�`� �h�<�p��x�X�������ط��������8���h���������� ���`�������J������й�����P�����Ⱥ���H�@�p�H���P�R�X��`�]������P�����������]������(���`�������Ƚ������� �8�(�p�0���8��`��h�H�p�x�x�h���������� ���X����������}�������T��R��(��F��S��P`�h�p�x���������	��
����
���������������������� �(�0�8�@�H� P�!X�"`�#h�$p�%x�&��'��)��*��+��,��-��.��/��0��1��2��3��4��5��6��7�8�9�:�; �<(�=0�>8�?@�@H�AP�BX�C`�Dh�Ep�Gx�H��I��J��K��L��M��N��O��Q��H��H�џH��t��H����5*��%,�@��h���f���h����f���h����f���h���f���h���f���h���f���h���f���h�r���f���h�b���f���h	�R���f���h
�B���f���h�2���f���h�"���f���h
����f���h����f���h��f���h���f���h����f���h����f���h���f���h���f���h���f���h���f���h�r���f���h�b���f���h�R���f���h�B���f���h�2���f���h�"���f���h����f���h����f���h��f���h ���f���h!����f���h"����f���h#���f���h$���f���h%���f���h&���f���h'�r���f���h(�b���f���h)�R���f���h*�B���f���h+�2���f���h,�"���f���h-����f���h.����f���h/��f���h0���f���h1����f���h2����f���h3���f���h4���f���h5���f���h6���f���h7�r���f���h8�b���f���h9�R���f���h:�B���f���h;�2���f���h<�"���f���h=����f���h>����f���h?��f���h@���f���hA����f���hB����f���hC���f���hD���f���hE���f���hF���f���hG�r���f���hH�b���f���hI�R���f���hJ�B���f���hK�2���f����%֚fD���%ΚfD���%֚fD���%6�fD���%.�fD���%&�fD���%�fD���%�fD���%�fD���%�fD���%��fD���%��fD���%�fD���%�fD���%ޗfD���%֗fD���%ΗfD���%ƗfD���%��fD���%��fD���%��fD���%��fD���%��fD���%��fD���%��fD���%��fD���%~�fD���%v�fD���%n�fD���%f�fD���%^�fD���%V�fD���%N�fD���%F�fD���%>�fD���%6�fD���%.�fD���%&�fD���%�fD���%�fD���%�fD���%�fD���%��fD���%��fD���%�fD���%�fD���%ޖfD���%֖fD���%ΖfD���%ƖfD���%��fD���%��fD���%��fD���%��fD���%��fD���%��fD���%��fD���%��fD���%~�fD���%v�fD���%n�fD���%f�fD���%^�fD���%V�fD���%N�fD���%F�fD���%>�fD���%6�fD���%.�fD���%&�fD���%�fD���%�fD���%�fD���%�fD���%��fD���%��fD���%�fD���%�fD���%ޕfDH�=�B��������H�=86�~��������H�=@6�h���H���������H�=�B�J��������H�=;6�4�������f.���UH��AWAVAUATSH��8����H�����H������dH�%(H�E�1����H�����E1�Dž���A�Dž��L�XH�16Dž����H������D����L������fDH������H�=6L�(L���/�������A�����L��H�=�5�i��������
L��H�=�5�M������L��H�=�5���������	L��H�=�5���������	L��H�=�5��������L��H�=�5�������L��H�=�5�k��������L��H�=�5�������L��H�=�5�8��������L��H�=�5�|������L��H�=�5�������C�L��H�=�5�I������3A�E<=�\����G������P���H�5	6�H��1������Dž��H������A��D9����5���1��F���fD����I��I��H��������E1��!L��H�=�3H���;�����t?�Zf�H����������D������L��A��������YE���NA��D�������x|H��u�D�����A����f.�H�����I�}
� �������������m���������L������H�OAI�H��
H�A��H�81��j�����@���H�����L������������x����H��H�����8ct����H�5�?��P�1����H�����H������L�(����1�������[���H�=
3�%�������L����I��H���j	H��H�����H�w1D�����L�����I��I��L����CfDH���x������������%���H���A���V�������E����1�L�����I��H��t+L��L���������H��u����������A���L���L�����H��D������{���L���s���L������P���fDI�}	����7���DI�}	1���"����Dž���������;����������H�=�1������M���������������H��H����������H��I���������1�H���#���H��I�����M���H������H�H�BH�����H��H�������L��I������H��I�D
H��H������Y���H�����H��I���o�ztH���H�=P1�����ulH�����H�SL��L�����L������L������H��H����L����M��tL���R���L������H���B�������H���������L���M��L��1�H�����H�
�0����끋����YH��H������H�H�xH����<���I��H����H��tH������H���K���L���������L���3��������	L��H�=�0������L��H�=�0������	L��H�=�0�����)�
L��H�=�0������
L��H�=�0������������$I�}
H�5�0�5 �����f����������������J����������W���L������I�H��
H�O<�*���H�5�/�����L�%�/L�-�/�L��L��1��b�����������L��H��I���j��uҿ
�|����I�}H�5�/�w��É�1��g��������j�8�S�����H��<I��H�Ȍ�H�81���������r�I��	���w�L��H��I�������;���L��L��H�5t<�1����~���D�����H��:�H��H��H�E�H�81��s���H�����A���L��H�?9����D�����L��H�C-H���H�81��+�����������H��H���^H���H�I��H����1�A��H��H�
�l����eL�������?L���P�H������H�H�x	H����F�H��A�������E����H����L������I�H�	<H��	���I�]L�%\-A��H��L���Z��t>A��D�����L��H��I���<��uӿH��H�5+-1������D�������r����C�8�,�H��H�5
-H���&���H�=n-��H��A���S�E���4���L�������3���I�}
H�5K-����H���������A�؉�H�8;H�A��H�81��j��@�	L��H�=U-������
�L��H�=�-�����`
�
L��H�=�-������
�L��H�=�-�h�����	�	L��H�=�-�L�����
�L��H�=).�0������	L��H�=P.�������L��H�=I.�����.	L��H�=>.����]L��H�=�.�j����L��H�=�.�S����L��H�=�.�<����L��H�=}.�%�����L��H�=�.�i����"I�EH�������[���H�����H�=�+H�����L��H�5�*�1���H�����H�5S=�1�H�H���q�H�[H�=�/H���~������H��H�=�/�g����������H����H�=�(H�����L������H��7I����L������H��)I��t���H����!�H�=�8H�����.����L��H�=-�+������L��H�=�-�����h�L��H�=�-��������L��H�=v-��������	L��H�=c-�����4�	L��H�=~-�������L��H�=�-������L��H�=�-�����BL��H�=�-������	L��H�=�-�������	�
L��H�=�-�"������
L��H�=�-��A�ƅ��L��H�=.����������j���A�EA�}=D����L����������<E����H�����D��H�8H��H����H�������4���H��H������H���|/����y�H�=R+���I��H����H����I��H���nL��L�=�.���H������I�����M�lL���,�L��I��H��u<�L������L��L��1�H�
�*���L����1�����L����I��H��u�H��H�������H�cCH�81��!�L���9�L���1�����H�5��H�=�)��H�5��H�=�)����7���H�=��A�ĸ@M��L���H��tH�эp�H���H��H��0�7��u�1�H�7E1�E1�1�1��'1���H��A����I��L��QA��1�L��AUL�%6%H�5�6H�&%L�-,%�,�A��L��^HD�H�%A��_ID�H�5�(�1���A��L��H��$HD�A��H�5p6�ID�1����A�� L��H��$HD�A���ID�H�5�(1���1��l���x-A�ƀL��H��$�HD�A��@H�5&6ID�1��k�����lj��}�I������A���k�L�
B$H��tL�H�
3$M��tI�M��E��H�5F(1�������lj���H�
�#H��tH���H�5,(�1����H��0����1�H�5�&E1�L�-�#��H�޿dL�5�"�:�H�h(����@B�<�H�������H�����M��H��tL�B��H�5�'�1�I���^�L��D9����
������lj�����ٿH�5'H��1��"���H���U�I��H����L� H�����Hc���1Ҁ��+H��H��H������H�;H�����H���H�H�q'�H�81���H�;������D��H�=�"��A�����L������I��S���L�����\���H�?��&�H�=�4H��N��@���H���&�H�=A4H��)����H���2�H�=�3H�������H������L������D����L������I��������I��H���1�H���5��Å���
L���C�1�H����������9��������A��A���{H�I�H�:A�P���S��H��3�1��\���2�H�����I�}�����b������������L������D�����H�22I�H�����I�}H�5�#�6�lj�������_��0��8����H��#I����I�}H�5'#��lj�������!�����8�����H�#I����I�}	H�5�"�������H�����������������t	D������H�����1�D���]�A��A9�u~D�����A��D9�u`E1�D��������I�}
H�5�"�F�lj������o��@��8�)���H��"I�����L������I�H�����H��/�7������H��/�%�H�f~��H�=�!H��u���[�E1��,A�^E��t
�
��D��A����I��I��)���H�xD��E��J����H��H���1H������H�����H�H�p
�~�H�����H�����H���H���u����'H������H��H�H�p
H����;�H���L���H�;H��u��]���H�����I�}
�����v��������Z��(�G�1������9��H�5�$�1��P��������H�5�1H��H��1��,���H������H�5,1H�1��
�1����E1�E1�1�1�1��'�=����n�H��|��H�=�#H�������I�]H�����I��H���Dž���dL��0����pH��H�����L��������Hc����A�|$L��������A�|$�����}��������I�t$ �H�=� �#����7�H��H�=� �������H�=� �S������E�
�H��I�����I��H��������H��H�����I��H���yH������D������1�H�H�x	H�_H�����H�����H������AL�����L��L��L��H�����������H�����H�����@A��H��1�H�������������������H��I����H9������I�H��DP�w���1�1�L������A����$��8�
�A�L$I��H��,I��H�|z�H�81�����{�H��H����L��H�,��H��+H�7z�H�81��`��0�L��D�������l��Hc�L������uML���U����H��y��H�=NH�������L������H�I��p�H��y��H�=&H������1�I�}	��F��H�5`�I��H��1���M���>�L��H�?1�L�-U�����@��L���H��H�����t߉�H�����H���H��I��txH���H�51���L����L���A����H��,��������H��xD�������H�>,�H�81����H�=��#������H�5��1����E1�E1�1�1Ҿ�&��������H�=N�����[�I�}���H��H����H���.�����H�=����� �I�}	H�5��p
H�������9����A��H���I�}	H�5!�?
H���G����9��g�A��H��^�L������H�XI�H���D�H�����I�}�$����xn������u������L������H�w+I�H����H�����I�}������x-������$�������L������H�+I�H�����L������I�H���y�H�����I�}�����x�����H��H���������H������H�������u
��������L������H��I�H���E�H�����I�}�%�����k����X��H��H���������H������H���R����u
������7�L������H�+I�H�����H�5��1��4�����������H��*���L������H�6I�H��
��H�=n"�Q�������H�=]�;������H�= �%������H�=O�������H�=�������H�=&������i��H�=�%������S��H�=�%�����=��H�=^%�����'��H�=��������H�=$�u������H�=�_����H�=$�N�������H�=n�8������H�=�&�"������H�=i&�������H�=������|��H�=�"������f��H�=�#������P��H�="�����:��H�=c"�����$��H�=�#�������f.�@��1�I��^H��H���PTE1�1�H�=1����s�f.�H�=�~H��~H9�tH�nsH��t	�����H�=q~H�5j~H)�H��H��?H��H�H�tH�MsH��t��fD�����=E~u+UH�=*sH��tH�=6s�9���d����~]������w����UH��1��H��AWL�=�AVAUL�-�ATI��H�5�S1�H�������+@H���L��1�H�5�����L���_��M������A�ԅ�x0t�����I��H��u���L��H�5�1�������D��uH��H�=j[A\A]A^A_]�R��f�H���
[A\A]A^A_]����UH��ATS����H������1�H��H���.��H�5�I��H��1����L�����H��[A\]����UH��ATS���H������H��H�����I��H������H��H�5�1����L���F��H��[A\]�:��f.�UH��SH��dH�%(H�E�1���ut�/��H��H������1�H�M�H���0�����R���}�t:A��1�H��H�
R���H�E�dH+%(uH��H�]���fDH�����1����G���UH��AWAVAUI��ATA��S1�H��(dH�%(H�E�1����L��H�=BI��������t�SD���������������l����y�H�E�dH+%(�mH��(L��[A\A]A^A_]����L�����H�E�H���@H�}�L�-L�u��*f�L��H����������}�D���������1�L���p��H��H��u�L�����H�E�dH+%(��H�}�H��([A\A]A^A_]������/��E��H�
3H��H�#H�oHD�H�loI��H�81����H�������e��H�FoH�پH�WH�81��e����;��E��D�M�I�ؾH��H�
�HD�H��nH��H�81��"�������S��H��n��H�=xH����������f�UH��S��H���P��H��~H�]���I��H��n��H���H�81������y��f�UHc�H�Uh��H��AUATI��SH��H������I�����D��L��D9�~xH�5�1��5��L������D��1�H��H�5q����H�H��t+H��L�%�@L��1�H������H�S�H��u�H��[A\A]]ÐH�5��1�����ff.�UH��ATI��SH��H��dH�%(H�E�1����H��t6�;-t11�H�u�H�����H�U�:uH�U�dH+%(u8H��[A\]�f�H�!mI��L��H���H�81��=�������n����H��H���,%s set =%s%u%s%s <unsupported>Current: %s
failed to get IAB for processfailed to obtain text for IABCurrent IAB: %s
Capabilities not availableclearraiseallfailed to allocate names
failed to %s ambient [%s=%u]
<reserved for> %s (%d)    %s
/bin/bashunlockedyesno???--quiet--drop=failed to drop [%s=%u]
--dropped=--has-ambientambient set not supported--addamb=--delamb=--noambfailed to reset ambient set--noenv--inh=Out of memory for inh setnone%s %s+i--strict--caps=unable to interpret [%s]
--modesSupported modes:UNKNOWN %s--modeunsupported mode: %s
failed to set mode [%s]: %s
unrecognized command [%s]
Mode: %s
--inmode=--keep=invalid --keep value--chroot=/--secbits=invalid --secbits value--forkfor=already forked
invalid --forkfor valueunable to fork()--killit=invalid --killit signo valueno forked process to kill
Unable to kill child process--uid=invalid --uid valueFailed to set uid=%u: %s
--cap-uid=invalid --cap-uid valueFailed to cap_setuid(%u): %s
--gid=invalid --gid valueFailed to set gid=%u: %s
--groups=No memory for [%s] operation
No memory for gid list
Failed to setgroups.
--user=User [%s] not known
unable to set HOMEunable to set USER--decode=0x%016llx=--supports=--printBoundingAmbient secure-noroot: %s (%s)
 secure-keep-caps: %s (%s)
uid=%u(%s) euid=%u(%s)
gid=%u(%s)
%s%u(%s)Guessed mode: %s (%d)
--==-+=+PATH%s/%sfailed to create launcherchild failed to startexecve '%s' failed!
--shell=--has-p=cap[%s] not permitted
--has-i=cap[%s] not inheritable
--has-a=--has-b=--is-uid=invalid --is-uid valueuid: got=%d, want=%d
--is-gid=invalid --is-gid valuegid: got=%d, want=%d
--iab=iab: '%s' malformed
unable to set IAB tuple--no-new-privsunable to set no-new-privs--has-no-new-privsno-new-privs not set
--license--explain=unrecognised value '%s'
<unnamed in libcap> (%d)<unsupported> (%d)--suggest=invalid named cap--current--help-halso writing to ns_last_pid.    - bounded loops    - dead code elimination      conversions      bypassed      permitted      memory      descriptors.    programs.subsystems.system up.(printk) behavior.overriding them.creation.unicast netlink socket.the mknod() system call.  - configure tty devices  - alter the system clock  - enable irix_stime on MIPS  - set the real-time clockof processes and the system:  - override quota limits    real-time clock    allocationof arbitrary processes:  - setting the domainname  - setting the hostname  - calling bdflush()  - some autofs root ioctls  - nfsservctl  - VM86_REQUEST_IRQ  - removing semaphores  - turning swap on/off    devices    some extra ioctls)  - tuning the ide driver    device    configuration space  - setting up serial portsprocess.  - permit ioper/iopl access    /dev/bus/usbmodify kernel without limit.calls.  - RAW sockets  - PACKET socketsoperations:  - interface configuration    accounting    ownership on sockets  - setting promiscuous mode  - multicasinglisten to multicast.  - ATM VCIs below 32S_APPEND file attributes.capabilities.vector.    values    socketCAP_LINUX_IMMUTABLE.group ownership of a file.failed to get process capabilitiesUnable to check CAP_EFFECTIVE CAP_SETPCAP valueUnable to %s ambient capability [%s]
capability [%s] is unknown to libcap
sysconf(%d) returned a non-positive number: %ld
 [/proc/self/status:CapXXX: 0x%016llx]

%s: want non-negative integer, got "%s"
obtaining highest capability nameWARNING: libcap needs an update (cap=%d should have a name).
unable to raise CAP_SETPCAP for BSET changesunable to lower CAP_SETPCAP post BSET changeUnable to drop bounding capability [%s]
cap[%s] not recognized by library
cap[%s] raised in bounding vector
libcap:cap_clear_flag() internal errorFatal error concerning process capabilitiesFatal error internalizing capabilitiesUnable to set inheritable capabilitiesUnable to set capabilities [%s]
mismatched mode got=%s want=%s
prctl(PR_SET_KEEPCAPS, %u) failed: %s
Unable to duplicate capabilitiesunable to select CAP_SET_SYS_CHROOTunable to raise CAP_SYS_CHROOTunable to lower CAP_SYS_CHROOTUnable to chroot/chdir to [%s]failed to set securebits to 0%o/0x%x
require non-zero --forkfor value
waitpid didn't match child: %u != %u
child terminated with odd signal (%d != %d)
Too many groups specified (%d)
Failed to identify gid for group [%s]
Unable to get group list for userUnable to set group list for userFailed to set uid=%u(user=%s): %s
cap[%s=%d] not supported by kernel
Securebits: 0%lo/0x%lx/%u'b%s (no-new-privs=%d)
 secure-no-suid-fixup: %s (%s)
 secure-no-ambient-raise: %s (%s)
no PATH environment variable found for re-execing
insufficient memory for parts of path
insufficient memory for path building
failed to wait for PID=%d, result=%x: child PID=%d terminated by signo=%d
child PID=%d generated result=%0x
cap[%s] not in ambient vector
cap[%s] not in bounding vector
%s see License file for details.
Copyright (c) 2008-11,16,19-21 Andrew G. Morgan <morgan@kernel.org>
negative capability (%d) invalid
 [/proc/self/status:CapXXX: 0x%016llx]
usage: %s [args ...]
  --addamb=xxx   add xxx,... capabilities to ambient set
  --cap-uid=<n>  use libcap cap_setuid() to change uid
  --caps=xxx     set caps as per cap_from_text()
  --chroot=path  chroot(2) to this path
  --current      show current caps and IAB vectors
  --decode=xxx   decode a hex string to a list of caps
  --delamb=xxx   remove xxx,... capabilities from ambient
  --drop=xxx     drop xxx,... caps from bounding set
  --explain=xxx  explain what capability xxx permits
  --forkfor=<n>  fork and make child sleep for <n> sec
  --gid=<n>      set gid to <n> (hint: id <username>)
  --groups=g,... set the supplemental groups
  --has-a=xxx    exit 1 if capability xxx not ambient
  --has-b=xxx    exit 1 if capability xxx not dropped
  --has-ambient  exit 1 unless ambient vector supported
  --has-i=xxx    exit 1 if capability xxx not inheritable
  --has-p=xxx    exit 1 if capability xxx not permitted
  --has-no-new-privs  exit 1 if privs not limited
  --help, -h     this message (or try 'man capsh')
  --iab=...      use cap_iab_from_text() to set iab
  --inh=xxx      set xxx,.. inheritable set
  --inmode=<xxx> exit 1 if current mode is not <xxx>
  --is-uid=<n>   exit 1 if uid != <n>
  --is-gid=<n>   exit 1 if gid != <n>
  --keep=<n>     set keep-capability bit to <n>
  --killit=<n>   send signal(n) to child
  --license      display license info
  --mode         display current libcap mode
  --mode=<xxx>   set libcap mode to <xxx>
  --modes        list libcap named modes
  --no-new-privs set sticky process privilege limiter
  --noamb        reset (drop) all ambient capabilities
  --noenv        no fixup of env vars (for --user)
  --print        display capability relevant state
  --quiet        if first argument skip max cap check
  --secbits=<n>  write a new value for securebits
  --shell=/xx/yy use /xx/yy instead of /bin/bash for --
  --strict       toggle --caps, --drop and --inh fixups
  --suggest=text search cap descriptions for text
  --supports=xxx exit 1 if capability xxx unsupported
  --uid=<n>      set uid to <n> (hint: id <username>)
  --user=<name>  set uid,gid and groups to that of user
  ==             re-exec(capsh) with args as for --
  =+             cap_launch capsh with args as for -+
  --             remaining arguments are for /bin/bash
  -+             cap_launch /bin/bash with remaining args
                 (without -- [%s] will simply exit(0))
unable to find executable '%s' in PATH
Allows a process to perform checkpointand restore operations. Also permitsexplicit PID control via clone3() andAllows a process to manipulate aspects of the kernelenhanced Berkeley Packet Filter (BPF) system. This isan execution subsystem of the kernel, that manages BPFprograms. CAP_BPF permits a process to:  - create all types of BPF maps  - advanced verifier features:    - indirect variable access    - BPF to BPF function calls    - scalar precision tracking    - larger complexity limits    - potentially other featuresOther capabilities can be used together with CAP_BFP tofurther manipulate the BPF system:  - CAP_PERFMON relaxes the verifier checks as follows:    - BPF programs can use pointer-to-integer    - speculation attack hardening measures can be    - bpf_probe_read to read arbitrary kernel memory is    - bpf_trace_printk to print the content of kernel  - CAP_SYS_ADMIN permits the following:    - use of bpf_probe_write_user    - iteration over the system-wide loaded programs,      maps, links BTFs and convert their IDs to file  - CAP_PERFMON is required to load tracing programs.  - CAP_NET_ADMIN is required to load networkingAllows a process to enable observability of privilegedoperations related to performance. The mechanismsinclude perf_events, i915_perf and other kernelAllows a process to read the audit log via a multicastAllows a process to block system suspends - prevent thesystem from entering a lower power state.Allows a process to trigger something that can wake theAllows a process to configure the kernel's syslogAllows a process to configure the Mandatory AccessControl (MAC) policy. Not all kernels are configuredwith a MAC enabled, but if they are this capability isreserved for code to perform administration tasks.Allows a process to override Manditory Access Control(MAC) access. Not all kernels are configured with a MACmechanism, but this is the capability reserved forAllows a process to set capabilities on files.Permits a process to uid_map the uid=0 of theparent user namespace into that of the childnamespace. Also, permits a process to overridesecurebits locks through user namespaceAllows a process to configure audit logging via aAllows a process to write to the audit log via aAllows a process to take leases on files.Allows a process to perform privileged operations withAllows a process to manipulate tty devices:  - perform vhangup() of a ttyAllows a process to perform time manipulation of clocks:Allows a process to adjust resource related parameters  - set and override resource limits  - override the reserved space on ext2 filesystem    (this can also be achieved via CAP_FSETID)  - modify the data journaling mode on ext3 filesystem,    which uses journaling resources  - override size restrictions on IPC message queues  - configure more than 64Hz interrupts from the  - override the maximum number of consoles for console  - override the maximum number of keymapsAllows a process to maipulate the execution priorities  - those involving different UIDs  - setting their CPU affinity  - alter the FIFO vs. round-robin (realtime)    scheduling for itself and other processes.Allows a process to initiate a reboot of the system.Allows a process to perform a somewhat arbitrarygrab-bag of privileged operations. Over time, thiscapability should weaken as specific capabilities arecreated for subsets of CAP_SYS_ADMINs functionality:  - configuration of the secure attention key  - administration of the random device  - examination and configuration of disk quotas  - mount() and umount(), setting up new SMB connection  - to read/write pci config on alpha  - irix_prctl on mips (setstacksize)  - flushing all cache on m68k (sys_cacheflush)  - Used instead of CAP_CHOWN to "chown" IPC message    queues, semaphores and shared memory  - locking/unlocking of shared memory segment  - forged pids on socket credentials passing  - setting readahead and flushing buffers on block  - setting geometry in floppy driver  - turning DMA on/off in xd driver  - administration of md devices (mostly the above, but  - access to the nvram device  - administration of apm_bios, serial and bttv (TV)  - manufacturer commands in isdn CAPI support driver  - reading non-standardized portions of PCI  - DDI debug ioctl on sbpcd driver  - sending raw qic-117 commands  - enabling/disabling tagged queuing on SCSI    controllers and sending arbitrary SCSI commands  - setting encryption key on loopback filesystem  - setting zone reclaim policyAllows a process to configure process accounting.Allows a process to perform a ptrace() of any otherAllows a process to perform a chroot syscall to changethe effective root of the process' file system:redirect to directory "/" to some other location.Allows a process to perform raw IO:  - permit sending USB messages to any device viaAllows a process to initiate the loading and unloadingof kernel modules. This capability can effectivelyAllows a process to override IPC ownership checks.Allows a process to lock shared memory segments for IPCpurposes.  Also enables mlock and mlockall systemAllows a process to use raw networking:  - binding to any address for transparent proxying    (also permitted via CAP_NET_ADMIN)Allows a process to perform network configuration  - administration of IP firewall, masquerading and  - setting debug options on sockets  - modification of routing tables  - setting arbitrary process, and process group    (this is also allowed via CAP_NET_RAW)  - setting TOS (Type of service)  - clearing driver statistics  - read/write of device-specific registers  - activation of ATM control socketsAllows a process to broadcast to the network and toAllows a process to bind to privileged ports:  - TCP/UDP sockets below 1024Allows a process to modify the S_IMMUTABLE andAllows a process to freely manipulate its inheritableLinux supports the POSIX.1e Inheritable set, the POXIX.1e (Xvector) known in Linux as the Bounding vector, as well asthe Linux extension Ambient vector.This capability permits dropping bits from the Boundingvector (ie. raising B bits in the libcap IABrepresentation). It also permits the process to raiseAmbient vector bits that are both raised in the Permittedand Inheritable sets of the process. This capability cannotbe used to raise Permitted bits, Effective bits beyond thosealready present in the process' permitted set, orInheritable bits beyond those present in the Bounding[Historical note: prior to the advent of file capabilities(2008), this capability was suppressed by default, as itsunsuppressed behavior was not auditable: it couldasynchronously grant its own Permitted capabilities to andremove capabilities from other processes arbitrarily. Theformer leads to undefined behavior, and the latter is betterserved by the kill system call.]Allows a process to freely manipulate its own UIDs:  - arbitrarily set the UID, EUID, REUID and RESUID  - allows the forging of UID credentials passed over aAllows a process to freely manipulate its own GIDs:  - arbitrarily set the GID, EGID, REGID, RESGID values  - arbitrarily set the supplementary GIDs  - allows the forging of GID credentials passed over aAllows a process to send a kill(2) signal to any otherprocess - overriding the limitation that there be a[E]UID match between source and target process.Allows a process to set the S_ISUID and S_ISUID bits ofthe file permissions, even when the process' effectiveUID or GID/supplementary GIDs do not match that of theAllows a process to perform operations on files, evenwhere file owner ID should otherwise need be equal tothe UID, except where CAP_FSETID is applicable. Itdoesn't override MAC and DAC restrictions.Allows a process to override all DAC restrictionslimiting the read and search of files anddirectories. This excludes DAC access covered byAllows a process to override of all DiscretionaryAccess Control (DAC) access, including ACL executeaccess. That is read, write or execute files that theprocess would otherwise not have access to. Thisexcludes DAC access covered by CAP_LINUX_IMMUTABLE.Allows a process to arbitrarily change the user and;�����������܈��l��&����\������������ܬ��H,���������,���L���<����`l����zRx�`���&D$4X~���FJw�?9*3$"\���0t����0����A�M
B�K��I�K��
GS �����OA�C
C��C�h������ ����VA�C
C��J$>���4��� @�����A�C
E�x
Gd2���,��4| ���A�C
F���E�D�y
L�
E ����GA�C
A�U
A(�4����A�O
D��H��
B$خ���A�C
B�D�S
C ,�����!E�C
P������l�l����`� �������@�`�@� ���`� ��������`�0� �����`�������P�@� ������@����������`� ���@
s�������o���
H� �,��	���o���o����o�o����oH�0@@@P@`@p@�@�@�@�@�@�@�@�@AA A0A@APA`ApA�A�A�A�A�A�A�A�ABB B0B@BPB`BpB�B�B�B�B�B�B�B�BCC C0C@CPC`CpC�C�C�C�C�C�C�C�CDD D0D@DPD`DpD�D�D�D�D�D�D�D������Ç�@�x���؟� ��@�`�������Ƞ�(�`����"�ȡ1��A�8�h���ȢN��8�a�p����o����H�����{���� �X���ȥ�8�p�����ئ�8�h�������ȧ���0�̈h���������8���T�0�q�X������� �X�������Ȫ����0�X�x���ث�H������ �H�Ɖ������,�;�����P�8�p���h�Ю���8�`�������������P�Ȋ�����а�8�p���ȱ���8�h����Ȳ"��8�3�p����P��W�g�@�x���z���ش���8�`���@���ȵʋ���@�h�����ж��"� �<��X���ط��8�h���� �`���J��й�P���Ⱥ�H�p���R��]��P�����]��(�`���Ƚ���8�p�����H�x�h���� �X����}�/usr/lib/debug/.dwz/x86_64-linux-gnu/libcap2-bin.debug�S&R�/�c��7�]�j�OqJ743ea05389da5a525c9b9010686f714a0c0fae.debug��
b.shstrtab.interp.note.gnu.property.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.got.plt.sec.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.data.rel.ro.dynamic.data.bss.gnu_debugaltlink.gnu_debuglink880&hh$9�� G���o��0Q���Y��a���o���n���o��p}����B�,�, �@@� @ @���D�D0� E E���I�I")�ss
���A���������P�������������H �H�H��H�H�����
 	���h ��K 4�4h�/

Zerion Mini Shell 1.0