To be able to call *setgroups*(2), the calling process must at least have *CAP_SETGID*. But since Linux 3.19 a further restriction applies: the kernel gives permission to call *setgroups*(2) only after the GID map (**/proc/**__pid__*/gid_map*) has been set. The GID map is writable by root when *setgroups*(2) is enabled (i.e., *allow*, the default), and the GID map becomes writable by unprivileged processes when *setgroups*(2) is permanently disabled (with *deny*).
*-R*, *--root* __dir__::
-run the command with root directory set to _dir_.
+Run the command with root directory set to _dir_.
*-w*, *--wd* __dir__::
-change working directory to _dir_.
+Change working directory to _dir_.
*-S*, *--setuid* _uid_::
Set the user ID which will be used in the entered namespace.
*--boottime* _offset_::
Set the offset of *CLOCK_BOOTTIME* which will be used in the entered time namespace. This option requires unsharing a time namespace with *--time*.
-*--clear-env**::
+*--clear-env*::
Do not pass the environment variables of the calling process to the unshared process.
include::man-common/help-version.adoc[]