xenial (2) setgroups.2.gz

Provided by: manpages-dev_4.04-2_all bug

NAME

       getgroups, setgroups - get/set list of supplementary group IDs

SYNOPSIS

       #include <sys/types.h>
       #include <unistd.h>

       int getgroups(int size, gid_t list[]);

       #include <grp.h>

       int setgroups(size_t size, const gid_t *list);

   Feature Test Macro Requirements for glibc (see feature_test_macros(7)):

       setgroups(): _BSD_SOURCE

DESCRIPTION

       getgroups() returns the supplementary group IDs of the calling process in list.  The argument size should
       be set to the maximum number of items that can be stored in the  buffer  pointed  to  by  list.   If  the
       calling  process  is  a  member  of  more  than  size supplementary groups, then an error results.  It is
       unspecified whether the effective group ID of the calling process  is  included  in  the  returned  list.
       (Thus, an application should also call getegid(2) and add or remove the resulting value.)

       If size is zero, list is not modified, but the total number of supplementary group IDs for the process is
       returned.  This allows the caller to determine the size of a dynamically allocated list to be used  in  a
       further call to getgroups().

       setgroups() sets the supplementary group IDs for the calling process.  Appropriate privileges (Linux: the
       CAP_SETGID capability) are required.  The size argument specifies the number of supplementary  group  IDs
       in the buffer pointed to by list.

RETURN VALUE

       On  success,  getgroups()  returns  the number of supplementary group IDs.  On error, -1 is returned, and
       errno is set appropriately.

       On success, setgroups() returns 0.  On error, -1 is returned, and errno is set appropriately.

ERRORS

       EFAULT list has an invalid address.

       getgroups() can additionally fail with the following error:

       EINVAL size is less than the number of supplementary group IDs, but is not zero.

       setgroups() can additionally fail with the following errors:

       EINVAL size is greater than NGROUPS_MAX (32 before Linux 2.6.4; 65536 since Linux 2.6.4).

       ENOMEM Out of memory.

       EPERM  The calling process has insufficient privilege (it does not have the CAP_SETGID capability).

       EPERM (since Linux 3.19)
              The  use  of  setgroups()  is  denied  in  this  user   namespace.    See   the   description   of
              /proc/[pid]/setgroups in user_namespaces(7).

CONFORMING TO

       SVr4,  4.3BSD.  The getgroups() function is in POSIX.1-2001 and POSIX.1-2008.  Since setgroups() requires
       privilege, it is not covered by POSIX.1.

NOTES

       A process can have up to NGROUPS_MAX supplementary group IDs in addition to the effective group ID.   The
       constant  NGROUPS_MAX is defined in <limits.h>.  The set of supplementary group IDs is inherited from the
       parent process, and preserved across an execve(2).

       The maximum number of supplementary group IDs can be found at run time using sysconf(3):

           long ngroups_max;
           ngroups_max = sysconf(_SC_NGROUPS_MAX);

       The maximum return value of getgroups() cannot be larger than one more  than  this  value.   Since  Linux
       2.6.4,  the  maximum  number  of supplementary group IDs is also exposed via the Linux-specific read-only
       file, /proc/sys/kernel/ngroups_max.

       The original Linux getgroups() system call supported only 16-bit  group  IDs.   Subsequently,  Linux  2.4
       added  getgroups32(),  supporting 32-bit IDs.  The glibc getgroups() wrapper function transparently deals
       with the variation across kernel versions.

   C library/kernel differences
       At the kernel level, user IDs and group IDs are a per-thread attribute.  However, POSIX requires that all
       threads  in  a  process  share the same credentials.  The NPTL threading implementation handles the POSIX
       requirements by providing wrapper functions for the various system calls that  change  process  UIDs  and
       GIDs.   These  wrapper  functions  (including the one for setgroups()) employ a signal-based technique to
       ensure that when one thread changes credentials, all of the other threads  in  the  process  also  change
       their credentials.  For details, see nptl(7).

SEE ALSO

       getgid(2), setgid(2), getgrouplist(3), group_member(3), initgroups(3), capabilities(7), credentials(7)

COLOPHON

       This  page  is  part  of  release  4.04  of  the  Linux man-pages project.  A description of the project,
       information  about  reporting  bugs,  and  the  latest  version  of  this   page,   can   be   found   at
       http://www.kernel.org/doc/man-pages/.