diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index 2e9cfa89dd..54dad930b1 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -1656,8 +1656,8 @@ mprotect2 system calls with PROT_EXEC set and shmat2 system calls with - SHM_EXEC set. Note that this option is incompatible with programs that generate program - code dynamically at runtime, such as JIT execution engines, or programs compiled making use of the code + SHM_EXEC set. Note that this option is incompatible with programs and libraries that + generate program code dynamically at runtime, including JIT execution engines, executable stacks, and code "trampoline" feature of various C compilers. This option improves service security, as it makes harder for software exploits to change running code dynamically. Note that this feature is fully available on x86-64, and partially on x86. Specifically, the shmat() protection is not available on x86. Note that