Provided by: manpages-dev_3.35-0.1ubuntu1_all bug

NAME

       killpg - send signal to a process group

SYNOPSIS

       #include <signal.h>

       int killpg(int pgrp, int sig);

   Feature Test Macro Requirements for glibc (see feature_test_macros(7)):

       killpg():
           _BSD_SOURCE || _XOPEN_SOURCE >= 500 || _XOPEN_SOURCE && _XOPEN_SOURCE_EXTENDED

DESCRIPTION

       killpg()  sends  the  signal  sig  to the process group pgrp.  See signal(7) for a list of
       signals.

       If pgrp is 0, killpg() sends the signal to the calling process's  process  group.   (POSIX
       says: If pgrp is less than or equal to 1, the behavior is undefined.)

       For  a  process  to  have  permission to send a signal it must either be privileged (under
       Linux: have the CAP_KILL capability), or the real or effective  user  ID  of  the  sending
       process  must  equal  the real or saved set-user-ID of the target process.  In the case of
       SIGCONT it suffices when the sending and receiving processes belong to the same session.

RETURN VALUE

       On success, zero is returned.  On error, -1 is returned, and errno is set appropriately.

ERRORS

       EINVAL Sig is not a valid signal number.

       EPERM  The process does not have permission to send  the  signal  to  any  of  the  target
              processes.

       ESRCH  No process can be found in the process group specified by pgrp.

       ESRCH  The  process  group  was given as 0 but the sending process does not have a process
              group.

CONFORMING TO

       SVr4, 4.4BSD (the killpg() function call first appeared in 4BSD), POSIX.1-2001.

NOTES

       There are various differences between the permission  checking  in  BSD-type  systems  and
       System V-type systems.  See the POSIX rationale for kill().  A difference not mentioned by
       POSIX concerns the return value EPERM: BSD documents that no  signal  is  sent  and  EPERM
       returned  when  the  permission  check failed for at least one target process, while POSIX
       documents EPERM only when the permission check failed for all target processes.

       On  Linux,  killpg()  is  implemented  as  a  library  function  that   makes   the   call
       kill(-pgrp, sig).

SEE ALSO

       getpgrp(2), kill(2), signal(2), capabilities(7), credentials(7)

COLOPHON

       This  page  is  part of release 3.35 of the Linux man-pages project.  A description of the
       project, and information about reporting bugs, can be found at  http://man7.org/linux/man-
       pages/.