aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMichael Kerrisk <mtk.manpages@gmail.com>2016-08-08 05:52:55 +1000
committerMichael Kerrisk <mtk.manpages@gmail.com>2016-08-08 05:54:16 +1000
commita4680ab51d4114e174e75a37ab8b874b6568a527 (patch)
tree31b50a3e13d6e7688d13612088002d714a050504
parentafdd425e68e134e6086f6d750228021adb0fdd77 (diff)
downloadman-pages-a4680ab51d4114e174e75a37ab8b874b6568a527.tar.gz
user_namespaces.7: tfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
-rw-r--r--man7/user_namespaces.72
1 files changed, 1 insertions, 1 deletions
diff --git a/man7/user_namespaces.7 b/man7/user_namespaces.7
index ffc556c059..5d2ab44274 100644
--- a/man7/user_namespaces.7
+++ b/man7/user_namespaces.7
@@ -855,7 +855,7 @@ by denying any pathway for an unprivileged process to drop groups with
There are various places where an unmapped user ID (group ID)
may be exposed to user space.
For example, the first process in a new user namespace may call
-.BR getuid ()
+.BR getuid (2)
before a user ID mapping has been defined for the namespace.
In most such cases, an unmapped user ID is converted
.\" from_kuid_munged(), from_kgid_munged()