X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=elogind.git;a=blobdiff_plain;f=man%2Fsystemd.exec.xml;h=cc5442d45cf17be9b0c29051533cbf2428a44403;hp=c419424d9d6d0603587dc71b8b8e31baabe8bbeb;hb=8d0e0ddda6501479eb69164687c83c1a7667b33a;hpb=0fdeb6e011dfdb17636c81e2d7e0d632186359ce
diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml
index c419424d9..cc5442d45 100644
--- a/man/systemd.exec.xml
+++ b/man/systemd.exec.xml
@@ -941,8 +941,8 @@
mounts the /usr
directory read-only for processes
invoked by this unit. If set to
- full the
- /etc is mounted
+ full, the
+ /etc directory is mounted
read-only, too. This setting ensures
that any modification of the vendor
supplied operating system (and
@@ -952,7 +952,7 @@
all long-running services, unless they
are involved with system updates or
need to modify the operating system in
- other ways. Note however, that
+ other ways. Note however that
processes retaining the CAP_SYS_ADMIN
capability can undo the effect of this
setting. This setting is hence
@@ -974,7 +974,7 @@
/run/user are
made inaccessible and empty for
processes invoked by this unit. If set
- to read-only the
+ to read-only, the
two directores are made read-only
instead. It is recommended to enable
this setting for all long-running
@@ -982,7 +982,7 @@
ones), to ensure they cannot get access
to private user data, unless the
services actually require access to
- the user's private data. Note however,
+ the user's private data. Note however
that processes retaining the
CAP_SYS_ADMIN capability can undo the
effect of this setting. This setting