user_namespaces.7: tfix

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2016-08-08 05:52:55 +10:00
parent afdd425e68
commit a4680ab51d
1 changed files with 1 additions and 1 deletions

View File

@ -855,7 +855,7 @@ by denying any pathway for an unprivileged process to drop groups with
There are various places where an unmapped user ID (group ID)
may be exposed to user space.
For example, the first process in a new user namespace may call
.BR getuid ()
.BR getuid (2)
before a user ID mapping has been defined for the namespace.
In most such cases, an unmapped user ID is converted
.\" from_kuid_munged(), from_kgid_munged()