aboutsummaryrefslogtreecommitdiffstats
path: root/man7/user_namespaces.7
diff options
context:
space:
mode:
authorMichael Kerrisk <mtk.manpages@gmail.com>2016-08-08 05:52:55 +1000
committerMichael Kerrisk <mtk.manpages@gmail.com>2016-08-08 05:54:16 +1000
commita4680ab51d4114e174e75a37ab8b874b6568a527 (patch)
tree31b50a3e13d6e7688d13612088002d714a050504 /man7/user_namespaces.7
parentafdd425e68e134e6086f6d750228021adb0fdd77 (diff)
downloadman-pages-a4680ab51d4114e174e75a37ab8b874b6568a527.tar.gz
user_namespaces.7: tfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
Diffstat (limited to 'man7/user_namespaces.7')
-rw-r--r--man7/user_namespaces.72
1 files changed, 1 insertions, 1 deletions
diff --git a/man7/user_namespaces.7 b/man7/user_namespaces.7
index ffc556c059..5d2ab44274 100644
--- a/man7/user_namespaces.7
+++ b/man7/user_namespaces.7
@@ -855,7 +855,7 @@ by denying any pathway for an unprivileged process to drop groups with
There are various places where an unmapped user ID (group ID)
may be exposed to user space.
For example, the first process in a new user namespace may call
-.BR getuid ()
+.BR getuid (2)
before a user ID mapping has been defined for the namespace.
In most such cases, an unmapped user ID is converted
.\" from_kuid_munged(), from_kgid_munged()