diff --git a/Kernel_Feature_Matrix.md b/Kernel_Feature_Matrix.md
index 8a37055..8a6027c 100644
--- a/Kernel_Feature_Matrix.md
+++ b/Kernel_Feature_Matrix.md
@@ -21,7 +21,7 @@
| 4.17 |
- v8 abi1
- generic socket mediation (ie. basic network mediation)1
- improved profile attachment logic
- handle overlapping expression resolution up to 8 characters dynamic overlap in kernel2
- xattr attachment conditional1
- no_new_privs improved attachment with subset test based on confinement at time no_new_privs was entered3
- signal mediation of profile stacks4
- Bug fixes and code cleanups
| ```1``` AppArmor 3.0
```2``` Any userspace that supports attachment conditionasl 2.5+
```3``` no userspace requirements, reduces cases where nnp prevents a transition
```4```Same userspace as regular signal mediation AppArmor 2.9 |
| 4.18 | - add support for secids and using secctxes
- the ability to get a task's secid
- add support for audit rules filtering. AppArmor task label can be used in audit rule filters
- Bug fixes and code cleanups
| No apparmor userspace requirements. |
| 4.19 | Bug fixes and code cleanups| |
-| 4.20 | - Secmark mediation for custom policy
- Bug fixes and code cleanups
|
+| 4.20 | - Secmark mediation for custom policy1
- Bug fixes and code cleanups
| ```1``` Custom patch not in upstream apparmor |
| 5.0 | Bug fixes and code cleanups| |
| 5.1 | - LSM stacking with generic blobs (sara/landlock). Does not include secids so insufficient to stack with selinux and smack.
- Bug fixes and code cleanups
| no userspace requirements. There is a new kernel parameter lsm= that is used in place of the old security= parameter |
| 5.2 | wip - fine grained af_unix mediation
- unix rules1
- get peer sock label via so_peersec2
- dbus mediation3
- no-new-privs rules
| ```1``` AppArmor 3.0
```2```No userspace support needed to read via getsockopt. Library support for ```aa_getpeercon``` add in AppArmor 2.7
```3``` requires AppArmor 3.0 and D-Bus 1.10.0