@@ -1112,7 +1112,7 @@ CapabilityBoundingSet=~CAP_B CAP_C</programlisting>
11121112 the root user) do not share their key material among each other. If <option >shared</option > is used a new
11131113 session keyring is allocated as for <option >private</option >, but the user keyring of the user configured with
11141114 <varname >User=</varname > is linked into it, so that keys assigned to the user may be requested by the unit's
1115- processes. In this modes multiple units running processes under the same user ID may share key material. Unless
1115+ processes. In this mode multiple units running processes under the same user ID may share key material. Unless
11161116 <option >inherit</option > is selected the unique invocation ID for the unit (see below) is added as a protected
11171117 key by the name <literal >invocation_id</literal > to the newly created session keyring. Defaults to
11181118 <option >private</option > for services of the system service manager and to <option >inherit</option > for
@@ -1738,7 +1738,7 @@ BindReadOnlyPaths=/var/lib/systemd</programlisting>
17381738 <varlistentry >
17391739 <term ><varname >NetworkNamespacePath=</varname ></term >
17401740
1741- <listitem ><para >Takes an absolute file system path refererring to a Linux network namespace
1741+ <listitem ><para >Takes an absolute file system path referring to a Linux network namespace
17421742 pseudo-file (i.e. a file like <filename >/proc/$PID/ns/net</filename > or a bind mount or symlink to
17431743 one). When set the invoked processes are added to the network namespace referenced by that path. The
17441744 path has to point to a valid namespace file at the moment the processes are forked off. If this
@@ -1792,7 +1792,7 @@ BindReadOnlyPaths=/var/lib/systemd</programlisting>
17921792 <varlistentry >
17931793 <term ><varname >IPCNamespacePath=</varname ></term >
17941794
1795- <listitem ><para >Takes an absolute file system path refererring to a Linux IPC namespace
1795+ <listitem ><para >Takes an absolute file system path referring to a Linux IPC namespace
17961796 pseudo-file (i.e. a file like <filename >/proc/$PID/ns/ipc</filename > or a bind mount or symlink to
17971797 one). When set the invoked processes are added to the network namespace referenced by that path. The
17981798 path has to point to a valid namespace file at the moment the processes are forked off. If this
0 commit comments