diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml
index 2e9cfa89dd..54dad930b1 100644
--- a/man/systemd.exec.xml
+++ b/man/systemd.exec.xml
@@ -1656,8 +1656,8 @@
mprotect2 system calls with
PROT_EXEC set and
shmat2 system calls with
- SHM_EXEC set. Note that this option is incompatible with programs that generate program
- code dynamically at runtime, such as JIT execution engines, or programs compiled making use of the code
+ SHM_EXEC set. Note that this option is incompatible with programs and libraries that
+ generate program code dynamically at runtime, including JIT execution engines, executable stacks, and code
"trampoline" feature of various C compilers. This option improves service security, as it makes harder for
software exploits to change running code dynamically. Note that this feature is fully available on x86-64, and
partially on x86. Specifically, the shmat() protection is not available on x86. Note that