User`s guide
Power Management
46
• Add --list-opts option to print long option names for use with bash. (3.7)
• Add script browser. (3.8)
• Add new display options (-F, -p, and -P) to perf diff. (3.8)
• perf inject now supports input from a file. 3.8
• Add --pre and --post options to perf stat. (3.8)
• Add gtk.command config option to launch the GTK browser. This is equivalent to specifying --gtk
option on command line (3.8)
• Add new features to perf trace. (3.8)
• Expose hardware events translations in sysfs. (3.8)
• Add trace_options boot parameter to set trace options at boot time, such as enabling event stack
dumps. (3.8)
A.11 Power Management
• Add a generic DVFS framework with device-specific (non-CPU) OPPs. (3.2)
• Improve performance of LZO/plain hibernation. (3.2)
• Implement per-device power management QoS contraints. (3.2)
A.12 Security
• Add /sys/kernel/security/tomoyo/audit_interface, which generates audit logs in the form of
domain policy so they can be reused and appended to domain_policy interface by the TOMOYO auditing
daemon (tomoyo-auditd). TOMOYO is a kernel security module which implements mandatory access
control (MAC). (3.1)
• Add ACL group support for TOMOYO, which allows permissions to be globally granted. (3.1)
• Add policy namespace support for LXC (Linux containers). The policy namespace has its own set of
domain policy, exception policy and profiles, independent of other namespaces. (3.1)
• Add built-in policy support needed to support enforcing mode from early in the boot sequence. (3.1)
• Make several TOMOYO options configurable to support activating access controls without calling an
external policy loader program. (3.1)
• Permit the use of the following properties as conditions with TOMOYO: argv[], envp[], execve(),
executable's real path and symlink target, owner or group of file objects, and the UID or GID of the
current thread. (3.1)
• Implement Extended Verification Module (EVM), which protects a file's security extended attributes
(xattrs) against integrity attacks. (3.2)
• Implement Smack protections for domain transition: BPRM unsafe flags, secure exec, clear unsafe
personality bits, and clear parent death signal. (3.2)
• Enhance performance of Smack rule list lookups. (3.2)
• Allow user access to /smack/access, removing the requirement for CAP_MAC_ADMIN. (3.2)