Last Updated : 12 Jul, 2025
grpck command in Linux System verifies the integrity of the groups' information. It checks that all entries in /etc/group and "/etc/gshadow" have the proper format and contain valid data. The user is prompted to delete entries that are incorrectly formatted or which have uncorrectable errors.
Syntaxgrpck [options] [group [gshadow]]
Checks are made to verify that each entry has:
The checks for the correct number of fields and a unique group name are fatal. If an entry has the wrong number of fields, the user will be prompted to delete the entire line. The commands which operate on the /etc/group and /etc/gshadow files are not able to alter corrupted or duplicated entries. grpck should be used in those circumstances to remove the offending entries.
Configuration: The following configuration variables in /etc/login.defs change the behavior of this tool:
The grpck command exits with the following values:
grpck command without any Option: It will give two message immediately
Example: We can't use grpck command directly. Only the Administrator or root user can use this commands.
Different options with the grpck Command:
We can use grpck command when we are Administrator or root user. Use command given below to enter in root or administrator mode.
Sudo -i
Example: Now we will create Users and will apply grpck command to see how it will work. We can Create Group and User using this command.
addgroup group_name adduser user_name -G group_name
for i in `seq 1 100`; do echo adduser -G group1 "user$i"|| break ;done
Examples:
Common Configuration Files Associated with GroupsWe are seeing some unknown things from starting like - /etc/passwd, /etc/shadow etc. Let's see what are these unknown symbols signifies.These are configuration files which come into play after a user created.
1. etc/passwd:When a new user is added, the information is stored as a single, colon-separated line in /etc/passwd. Here is an example of an entry in this file:
# tail -1 /etc/passwd2. etc/shadow:
With shadow passwords, a new entry is automatically added to /etc/shadow when a new user is created. This file can be viewed only by root. Here is an example of an entry in this file:
# tail -1 /etc/shadow3. etc/gshadow:
Hashed group passwords are stored in this file. However, group passwords are rarely used. Here is an example of an entry in this file:
# tail -1 /etc/gshadow4. etc/group:
Because Oracle Linux uses a UPG scheme, a new entry is automatically created in /etc/group when a new user is added. The group name is the same as the username. Here is an example of an entry in this file:
# tail -1 /etc/group
Now we successfully stored user in-group and know about all configuration Files .
Common Options Available for the grpck Command 1. -r --read-onlyExecute the grpck command in read-only mode. This causes all questions regarding changes to be answered no without user intervention.
grpck -r /etc/passwd
Example:
2. -s --sortSort entries in /etc/group /etc/gshadow by GID(Group ID).
grpck -s /etc/group
Example:
ConclusionThe grpck command is an essential tool for ensuring the integrity of group-related information on a Linux system. By verifying and correcting errors in the "/etc/group" and "/etc/gshadow" files, it helps prevent issues that could arise from corrupted or duplicated entries. If you're managing a large number of users or simply maintaining a clean system, grpck is a valuable command for system administrators.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4