You can move around the graph by using the arrow keys.
Created with Raphaël 2.2.022Jan2124Dec521Nov923Sep222116111030Aug29201914982Jul19Jun1830Oct2923222119161416Jul15131097330May759Apr86331Mar302927262423222018179875427Feb262414Jan11102Dec29Nov2823Aug228Jul724Jun543127May171220Mar131211424Jan2322211521Dec13768Aug30Jul282524201454322Jun2120Update the example output in the READMEAdd check typeUpdate the example output in the READMEPrint compactlyIntroduce KconfigCheck classFix TRIM_UNUSED_KSYMS checkAdd l1d_flush (for future reference)Add ARM64_PTR_AUTH_KERNEL extracted from ARM64_PTR_AUTHDocument the output modes specified by the `-m` parameterTODO: RISC-VUpdate the README (a lot of new checks appeared)Keep the old X86_PTDUMP check as a backupSimplify the check about PTDUMP_DEBUGFS (I was correct)Add more checks from grsecurity for cutting attack surface (part II)Fix the 'decision' field of the IO_URING checkAdd more checks from grsecurity for cutting attack surface (part I)Fix the 'decision' field of the KPROBES checkAdd the commentImprove the READMEGet a bit more coverageUpdate the READMEv0.5.14v0.5.14Move 'self_protection' & 'maintainer' higherAdd HARDENED_USERCOPY_PAGESPAN check from KSPPAdd comments about the maintainer recommendationsFix UBSAN_BOUNDS recommendationsRANDOMIZE_KSTACK_OFFSET_DEFAULT is recommended by KSPPUpdate the KSPP recommendationsAdd defconfigs for Linux v5.14Merge pull request #54 from evdenis/masterAdd BLK_DEV_FDAdd RANDOMIZE_KSTACK_OFFSET_DEFAULTAdd CFI_CLANGAdd ARM64_EPANMerge pull request #51 from Hacks4Snacks/masterAdded Linux/x86_64 kernel config link for CBL-MarinerAdded cbl-mariner kernel configuration file.Add hardware tag-based KASAN with arm64 Memory Tagging ExtensionAdd the command line parameters that should NOT be setDocument the changes of vm.unprivileged_userfaultfd in v5.11Add the news about PAGE_POISONING