You can move around the graph by using the arrow keys.
Created with Raphaël 2.2.014Aug982Jul19Jun1830Oct2923222119161416Jul15131097330May759Apr86331Mar302927262423222018179875427Feb262414Jan11102Dec29Nov2823Aug228Jul724Jun543127May171220Mar131211424Jan2322211521Dec13768Aug30Jul282524201454322Jun2120Add the command line parameters that should NOT be setDocument the changes of vm.unprivileged_userfaultfd in v5.11Add the news about PAGE_POISONINGImprove wordingUpdate the README.v0.5.10v0.5.10Fix pylint warningRemember that SHADOW_CALL_STACK depends on clangSTACKPROTECTOR_PER_TASK is also available for ARM64INTEL_IOMMU_SVM is available only for X86_64Reorder arch checksSECURITY_DMESG_RESTRICT is recommended by KSPP nowThink about kptr_restrict later (KSPP recommends to set it to 1)Mention that nosmt is slowMore info on init_on_free and init_on_allocSLUB_DEBUG_ON is very slow, leave it for the kernel command lineUpdate KSPP recommendationsAdd defconfigs for v5.10HARDEN_BRANCH_PREDICTOR for ARM64 is enabled by default since v5.10Add ARM64_MTE for userspaceMaybe SHADOW_CALL_STACK should be alternative to STACKPROTECTOR_STRONGSave 'debugfs=no-mount' for futureUpdate the README.v0.5.9v0.5.9Fix indentation (thanks to pylint)Add a Q&A about spectre-meltdown-checker maintained by @speed47INIT_STACK_ALL -> INIT_STACK_ALL_ZERO (was renamed)Add SHADOW_CALL_STACK for ARM64Add the recommendation about TRIM_UNUSED_KSYMSAdd ARM64_BTI_KERNELAdd the recommendation about UBSAN_BOUNDSPAGE_POISONING -> PAGE_POISONING_ZEROImprove AND check reportsImprove HARDEN_EL2_VECTORS checkMerge remote-tracking branch 'pgils/el2_vectors'Add nested ComplexOptChecks supportDo not check CONFIG_HARDEN_EL2_VECTORS for v5.9+Add TODO about SLUB_DEBUG_ONAdd CLIP OS recommendation about EFI_CUSTOM_SSDT_OVERLAYSDisabling ACPI_TABLE_UPGRADE is now recommended by CLIP OSWithdraw my recommendation about BPF_JITUse cross compiler to build defconfigs