X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=elogind.git;a=blobdiff_plain;f=man%2Fsystemd.exec.xml;h=cc5442d45cf17be9b0c29051533cbf2428a44403;hp=c419424d9d6d0603587dc71b8b8e31baabe8bbeb;hb=8d0e0ddda6501479eb69164687c83c1a7667b33a;hpb=0fdeb6e011dfdb17636c81e2d7e0d632186359ce diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index c419424d9..cc5442d45 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -941,8 +941,8 @@ mounts the /usr directory read-only for processes invoked by this unit. If set to - full the - /etc is mounted + full, the + /etc directory is mounted read-only, too. This setting ensures that any modification of the vendor supplied operating system (and @@ -952,7 +952,7 @@ all long-running services, unless they are involved with system updates or need to modify the operating system in - other ways. Note however, that + other ways. Note however that processes retaining the CAP_SYS_ADMIN capability can undo the effect of this setting. This setting is hence @@ -974,7 +974,7 @@ /run/user are made inaccessible and empty for processes invoked by this unit. If set - to read-only the + to read-only, the two directores are made read-only instead. It is recommended to enable this setting for all long-running @@ -982,7 +982,7 @@ ones), to ensure they cannot get access to private user data, unless the services actually require access to - the user's private data. Note however, + the user's private data. Note however that processes retaining the CAP_SYS_ADMIN capability can undo the effect of this setting. This setting