* systemd-inhibit now allows filtering by mode when listing
inhibitors.
- * Units with resource management gained a new "Delegate"
- boolean property, which when set allows processes running
- inside the unit to further partition resources. This is
- primarily useful for systemd user instances as well as
- container managers.
+ * Scope and service units gained a new "Delegate" boolean
+ property, which when set allows processes running inside the
+ unit to further partition resources. This is primarily
+ useful for systemd user instances as well as container
+ managers.
* journald will now pick up audit messages directly from
the kernel, and log them like any other log message. The
fact that many distributions only ship a very small number
of LSB/SysV init scripts nowadays.
- * Priviliged Xen (dom0) domains are not considered
+ * Privileged Xen (dom0) domains are not considered
virtualization anymore by the virtualization detection
logic. After all, they generally have unrestricted access to
the hardware and usually are used to manage the unprivileged
* The memory.use_hierarchy cgroup attribute is now enabled for
all cgroups systemd creates in the memory cgroup
hierarchy. This option is likely to be come the built-in
- default in the kernel anyway, and the non-hierarchial mode
- never made much sense in the intrinsically hierarchial
+ default in the kernel anyway, and the non-hierarchical mode
+ never made much sense in the intrinsically hierarchical
cgroup system.
* A new field _SYSTEMD_SLICE= is logged along with all journal
together, or apply resource limits on them.
Slice units may be used to partition system resources in an
- hierarchial fashion and then assign other units to them. By
+ hierarchical fashion and then assign other units to them. By
default there are now three slices: system.slice (for all
system services), user.slice (for all user sessions),
machine.slice (for VMs and containers).
keys all the time, even in graphical sessions. If DEs want
to handle these events on their own they should take the new
handle-power-key, handle-sleep-key and handle-lid-switch
- inhibitors during their runtime. A simple way to achiveve
+ inhibitors during their runtime. A simple way to achieve
that is to invoke the DE wrapped in an invocation of:
systemd-inhibit --what=handle-power-key:handle-sleep-key:handle-lid-switch ...