From 0dd258d12f2eb4bb394b82cafd202cc13f9b7bda Mon Sep 17 00:00:00 2001 From: "@trimstray" Date: Tue, 22 Jan 2019 15:39:10 +0100 Subject: [PATCH] fixed example (group for shm) --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index bf1675e..13430ab 100644 --- a/README.md +++ b/README.md @@ -551,7 +551,7 @@ tmpfs /dev/shm tmpfs rw,nodev,nosuid,noexec,size=1024M,mode=1777 0 0 > You can also create a group named 'shm' and put application users for SHM-using applications in there. Then the access can be completely be restricted as such: ```bash -tmpfs /dev/shm tmpfs rw,nodev,nosuid,noexec,mode=1770,size=1024M 0 0 +tmpfs /dev/shm tmpfs rw,nodev,nosuid,noexec,size=1024M,mode=1770,uid=root,gid=shm 0 0 ``` #### :eight_pointed_black_star: Secure /proc filesystem