diff options
| author | Michael Kerrisk <mtk.manpages@gmail.com> | 2016-08-08 05:52:55 +1000 |
|---|---|---|
| committer | Michael Kerrisk <mtk.manpages@gmail.com> | 2016-08-08 05:54:16 +1000 |
| commit | a4680ab51d4114e174e75a37ab8b874b6568a527 (patch) | |
| tree | 31b50a3e13d6e7688d13612088002d714a050504 | |
| parent | afdd425e68e134e6086f6d750228021adb0fdd77 (diff) | |
| download | man-pages-a4680ab51d4114e174e75a37ab8b874b6568a527.tar.gz | |
user_namespaces.7: tfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
| -rw-r--r-- | man7/user_namespaces.7 | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/man7/user_namespaces.7 b/man7/user_namespaces.7 index ffc556c059..5d2ab44274 100644 --- a/man7/user_namespaces.7 +++ b/man7/user_namespaces.7 @@ -855,7 +855,7 @@ by denying any pathway for an unprivileged process to drop groups with There are various places where an unmapped user ID (group ID) may be exposed to user space. For example, the first process in a new user namespace may call -.BR getuid () +.BR getuid (2) before a user ID mapping has been defined for the namespace. In most such cases, an unmapped user ID is converted .\" from_kuid_munged(), from_kgid_munged() |
