User`s guide

Power Management
46
Add --list-opts option to print long option names for use with bash. (3.7)
Add script browser. (3.8)
Add new display options (-F, -p, and -P) to perf diff. (3.8)
perf inject now supports input from a file. 3.8
Add --pre and --post options to perf stat. (3.8)
Add gtk.command config option to launch the GTK browser. This is equivalent to specifying --gtk
option on command line (3.8)
Add new features to perf trace. (3.8)
Expose hardware events translations in sysfs. (3.8)
Add trace_options boot parameter to set trace options at boot time, such as enabling event stack
dumps. (3.8)
A.11 Power Management
Add a generic DVFS framework with device-specific (non-CPU) OPPs. (3.2)
Improve performance of LZO/plain hibernation. (3.2)
Implement per-device power management QoS contraints. (3.2)
A.12 Security
Add /sys/kernel/security/tomoyo/audit_interface, which generates audit logs in the form of
domain policy so they can be reused and appended to domain_policy interface by the TOMOYO auditing
daemon (tomoyo-auditd). TOMOYO is a kernel security module which implements mandatory access
control (MAC). (3.1)
Add ACL group support for TOMOYO, which allows permissions to be globally granted. (3.1)
Add policy namespace support for LXC (Linux containers). The policy namespace has its own set of
domain policy, exception policy and profiles, independent of other namespaces. (3.1)
Add built-in policy support needed to support enforcing mode from early in the boot sequence. (3.1)
Make several TOMOYO options configurable to support activating access controls without calling an
external policy loader program. (3.1)
Permit the use of the following properties as conditions with TOMOYO: argv[], envp[], execve(),
executable's real path and symlink target, owner or group of file objects, and the UID or GID of the
current thread. (3.1)
Implement Extended Verification Module (EVM), which protects a file's security extended attributes
(xattrs) against integrity attacks. (3.2)
Implement Smack protections for domain transition: BPRM unsafe flags, secure exec, clear unsafe
personality bits, and clear parent death signal. (3.2)
Enhance performance of Smack rule list lookups. (3.2)
Allow user access to /smack/access, removing the requirement for CAP_MAC_ADMIN. (3.2)