Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH v2] secilc: kernel policy language is infix, (continued)
- [PATCH v4] selinux-notebook: New chapter: Hardening SELinux,
Topi Miettinen
- overlay userxattr seems to not adhere to defaultrole, Dominick Grift
- [PATCH v3] security/selinux: fix potential memleak in error branch,
Bernard Zhao
- [PATCH 0/4] SELinux Notebook: Add eBook reader build,
Richard Haines
- [RFC PATCH 1/2] security: Remove security_add_mnt_opt() as it's unused,
David Howells
- [PATCH V2 0/7] Various SELinux Notebook updates,
Richard Haines
- [PATCH] security,selinux: remove security_add_mnt_opt(),
Ondrej Mosnacek
- [PATCH v2] security/selinux: fix potential memleak in error branch,
Bernard Zhao
[PATCH 0/7] Various SELinux Notebook updates,
Richard Haines
[PATCH -next] selinux: Use struct_size() helper in kmalloc(),
Xiu Jianfeng
[PATCH] security/selinux: fix potential memleak,
Bernard Zhao
[PATCH] security/selinux: fix potential memleak in error branch,
Bernard Zhao
[PATCH 1/2] libsepol/cil: support IPv4/IPv6 address embedding,
Christian Göttsche
[PATCH XSERVER 1/2] selinux: remap security classes on policyload,
Christian Göttsche
[PATCH] libsepol: free ebitmap on end of function, Christian Göttsche
[PATCH V2 testsuite] tests/inet_socket: Add socket transition tests, Richard Haines
[PATCH 5.15 222/279] block: Check ADMIN before NICE for IOPRIO_CLASS_RT, Greg Kroah-Hartman
[PATCH 5.10 130/154] block: Check ADMIN before NICE for IOPRIO_CLASS_RT,
Greg Kroah-Hartman
[PATCH] Modified Russian and English man pages to fix typo; REQUIREUSERS -> REQUIRESEUSERS,
Jacob M Cutright
[PATCH v30 00/28] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v30 01/28] integrity: disassociate ima_filter_rule from security_audit_rule, Casey Schaufler
- [PATCH v30 02/28] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v30 03/28] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v30 04/28] LSM: provide lsm name and id slot mappings, Casey Schaufler
- [PATCH v30 05/28] IMA: avoid label collisions with stacked LSMs, Casey Schaufler
- [PATCH v30 06/28] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v30 07/28] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v30 08/28] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v30 09/28] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v30 10/28] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v30 11/28] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v30 12/28] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v30 13/28] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v30 14/28] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v30 15/28] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v30 16/28] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v30 17/28] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v30 18/28] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v30 19/28] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v30 20/28] binder: Pass LSM identifier for confirmation, Casey Schaufler
- [PATCH v30 21/28] LSM: Extend security_secid_to_secctx to include module selection, Casey Schaufler
- [PATCH v30 22/28] Audit: Keep multiple LSM data in audit_names, Casey Schaufler
- [PATCH v30 23/28] Audit: Create audit_stamp structure, Casey Schaufler
- [PATCH v30 24/28] Audit: Add framework for auxiliary records, Casey Schaufler
- [PATCH v30 25/28] Audit: Add record for multiple task security contexts, Casey Schaufler
- [PATCH v30 26/28] Audit: Add record for multiple object security contexts, Casey Schaufler
- [PATCH v30 27/28] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v30 28/28] AppArmor: Remove the exclusive flag, Casey Schaufler
[GIT PULL] SELinux fixes for v5.16 (#2),
Paul Moore
[RFC PATCH 1/3] libsepol: introduce ebitmap_subtract(),
Christian Göttsche
[PATCH 1/3] mcstrans: port to new PCRE2 from end-of-life PCRE,
Christian Göttsche
[PATCH] semodule: Don't forget to munmap() data,
Petr Lautrbach
[PATCH] libselinux: Fix selinux_restorecon_parallel symbol version,
Petr Lautrbach
[PATCH 1/2] selinux: Add map perms,
Jason Zaman
[PATCH] Kernel policy language is infix,
Topi Miettinen
[PATCH] selinux: fix NULL-pointer dereference when hashtab allocation fails,
Ondrej Mosnacek
[PATCH testsuite] tests/inet_socket: Add socket transition tests, Richard Haines
[PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix,
David Anderson
[PATCH V2] netlabel: Update man page to clarify SELinux labeling,
Richard Haines
[PATCH] netlabel: Update man page to clarify SELinux labeling, Richard Haines
[PATCH] semodule: Fix lang_ext column index,
Petr Lautrbach
[PATCH] semodule: add -m | --checksum option,
Petr Lautrbach
[PATCH] ci: run the tests under ASan/UBsan on GHActions,
Evgeny Vereshchagin
[RFC PATCH] capability: add capable_or to test for multiple caps with exactly one audit message, Christian Göttsche
[PATCH v3] selinux-notebook: New chapter: Hardening SELinux,
Topi Miettinen
[PATCH v2] block: Check ADMIN before NICE for IOPRIO_CLASS_RT,
Alistair Delva
[PATCH] block: Check ADMIN before NICE for IOPRIO_CLASS_RT,
Alistair Delva
[PATCH v2] Support static-only builds, Alyssa Ross
[PATCH v2] selinux-notebook: New chapter: Hardening SELinux,
Topi Miettinen
[GIT PULL] SELinux fix / revert for v5.16 (#1),
Paul Moore
[PATCH] net,lsm,selinux: revert the security_sctp_assoc_established() hook,
Paul Moore
[PATCH] binder: fix test regression due to sender_euid change,
Todd Kjos
[PATCH 01/12] checkpolicy: use correct unsigned format specifiers,
Christian Göttsche
- [PATCH 02/12] libsepol: use string literals as format strings, Christian Göttsche
- [PATCH 03/12] policycoreutils: use string literal as format strings, Christian Göttsche
- [PATCH 04/12] Enable extra global compiler warnings, Christian Göttsche
- [PATCH 05/12] checkpolicy: ignore possible string truncation, Christian Göttsche
- [PATCH 06/12] policycoreutils: mark local functions static, Christian Göttsche
- [PATCH 07/12] sandbox: mark local functions static, Christian Göttsche
- [PATCH 08/12] python: mark local functions static, Christian Göttsche
- [PATCH 09/12] mcstrans: avoid missing prototypes, Christian Göttsche
- [PATCH 10/12] libsemanage: mark local functions static, Christian Göttsche
- [PATCH 11/12] libsemanage: include paired header for prototypes, Christian Göttsche
- [PATCH 12/12] libsemanage: add extern prototype for legacy function, Christian Göttsche
- Re: [PATCH 01/12] checkpolicy: use correct unsigned format specifiers, James Carter
[PATCH] selinux-notebook: New chapter: Hardening SELinux,
Topi Miettinen
[PATCH] Support static-only builds,
Alyssa Ross
[PATCH 5.10 1/3] binder: use euid from cred instead of using task,
Todd Kjos
[PATCH 5.4 1/3] binder: use euid from cred instead of using task,
Todd Kjos
[PATCH 4.19 1/2] binder: use euid from cred instead of using task,
Todd Kjos
[PATCH 4.14 1/2] binder: use euid from cred instead of using task,
Todd Kjos
[PATCH 4.9 1/2] binder: use euid from cred instead of using task,
Todd Kjos
[PATCH 4.4 1/2] binder: use euid from cred instead of using task,
Todd Kjos
[PATCH v3 0/1] fuse: Send file/inode security context during creation,
Vivek Goyal
[PATCH 0/5 v2] Fix/add optional file type handling for genfscon rules,
James Carter
[PATCH 2/5 v2] libsepol/cil: Refactor filecon file type handling, James Carter
[PATCH 3/5 v2] libsepol/cil: Allow optional file type in genfscon rules, James Carter
[PATCH 4/5 v2] secilc/docs: Document the optional file type for genfscon rules, James Carter
[PATCH 5/5] libsepol: Write out genfscon file type when writing out CIL policy, James Carter
[RFC PATCH] selinux: Add netlink xperm support,
Bram Bonne
[RFC PATCH] libsepol,checkpolicy: Add netlink xperm support,
Bram Bonne
[PATCH] Use IANA-managed domain example.com in examples,
markus . linnala
[RFC PATCH 0/1] selinux-testsuite: Add tests for sctp_socket transition rules,
Richard Haines
Re: [RFC PATCH v2 00/36] libsepol: add fuzzer for reading binary policies, Christian Göttsche
[PATCH net] selinux: fix SCTP client peeloff socket labeling,
Ondrej Mosnacek
[RFC] Cascade: a high level SELinux policy language,
Daniel Burgener
[PATCHv2 net 0/4] security: fixups for the security hooks in sctp,
Xin Long
[GIT PULL] SELinux patches for v5.16,
Paul Moore
[PATCH 0/4] Fix/add optional file type handling for genfscon rules,
James Carter
[PATCH userspace v4 0/8] Parallel setfiles/restorecon,
Ondrej Mosnacek
[PATCH testsuite v2] tests: make kernel iptables support optional,
Ondrej Mosnacek
[PATCH testsuite] tests/inet_socket: make kernel iptables support optional,
Ondrej Mosnacek
ANN: SELinux userspace 3.3 release, Petr Lautrbach
[PATCH net 0/4] security: fixups for the security hooks in sctp,
Xin Long
Re: [PATCH net 0/4] security: fixups for the security hooks in sctp, Richard Haines
[PATCH] sctp: initialize endpoint LSM labels also on the client side,
Ondrej Mosnacek
[PATCH testsuite] tests/sctp: add client peeloff tests,
Ondrej Mosnacek
[PATCH] libsepol: avoid passing NULL pointer to memcpy,
Christian Göttsche
Release 3.3 or not?,
Petr Lautrbach
kernel NULL pointer dereference on selinux_ip_postroute, Corentin Labbe
[PATCH] selinux: fix a sock regression in selinux_ip_postroute_compat(),
Paul Moore
[PATCH userspace v3 0/7] Parallel setfiles/restorecon,
Ondrej Mosnacek
[next] BUG: kernel NULL pointer dereference, address:: selinux_ip_postroute_compat,
Naresh Kamboju
[PATCH] libselinux: use dummy variable to silence glibc 2.34 warnings,
Christian Göttsche
[PATCH userspace v2 0/6] Parallel setfiles/restorecon,
Ondrej Mosnacek
[PATCH] selinux: fix all of the W=1 build warnings,
Paul Moore
[PATCH 1/3] libsepol: do not pass NULL to memcpy,
Christian Göttsche
[PATCH v2] selinux: make better use of the nf_hook_state passed to the NF hooks,
Paul Moore
Re: [PATCH] security/landlock: use square brackets around "landlock-ruleset",
Paul Moore
[PATCH v2 0/2] fuse: Send file/inode security context during creation,
Vivek Goyal
[PATCH v5 0/3] binder: use cred instead of task for security context,
Todd Kjos
[PATCH v2] security: Return xattr name from security_dentry_init_security(),
Vivek Goyal
[PATCH selinux v3] selinux: remove unneeded ipv6 hook wrappers,
Florian Westphal
[PATCH] selinux: consilidate comments from inode_doinit_with_dentry wrt !dentry,
Davidlohr Bueso
[RFC PATCH 00/35] libsepol: add fuzzer for reading binary policies,
Christian Göttsche
- [RFC PATCH 01/35] cifuzz: enable report-unreproducible-crashes, Christian Göttsche
- [RFC PATCH 02/35] cifuzz: use the default runtime of 600 seconds, Christian Göttsche
- [RFC PATCH 03/35] libsepol/fuzz: silence secilc-fuzzer, Christian Göttsche
- [RFC PATCH 04/35] libsepol: add libfuzz based fuzzer for reading binary policies, Christian Göttsche
- [RFC PATCH 05/35] libsepol/fuzz: limit element sizes for fuzzing, Christian Göttsche
- [RFC PATCH 07/35] libsepol: use logging framework in ebitmap.c, Christian Göttsche
- [RFC PATCH 06/35] libsepol: use logging framework in conditional.c, Christian Göttsche
- [RFC PATCH 08/35] libsepol: use mallocarray wrapper to avoid overflows, Christian Göttsche
- [RFC PATCH 09/35] libsepol: use reallocarray wrapper to avoid overflows, Christian Göttsche
- [RFC PATCH 10/35] libsepol: add checks for read sizes, Christian Göttsche
- [RFC PATCH 11/35] libsepol: enforce avtab item limit, Christian Göttsche
- [RFC PATCH 12/35] libsepol: clean memory on conditional read failure, Christian Göttsche
- [RFC PATCH 13/35] libsepol: validate MLS levels, Christian Göttsche
- [RFC PATCH 14/35] libsepol: reject invalid fsuse types, Christian Göttsche
- [RFC PATCH 15/35] libsepol: reject invalid default targets, Christian Göttsche
- [RFC PATCH 16/35] libsepol: validate expanded user range and level, Christian Göttsche
- [RFC PATCH 18/35] libsepol: use size_t for indexes in strs helpers, Christian Göttsche
- [RFC PATCH 17/35] libsepol: validate types, Christian Göttsche
- [RFC PATCH 19/35] libsepol: reject abnormal huge sid ids, Christian Göttsche
- [RFC PATCH 22/35] libsepol: validate permission count of classes, Christian Göttsche
- [RFC PATCH 20/35] libsepol: do not crash on class gaps, Christian Göttsche
- [RFC PATCH 21/35] libsepol: do not crash on user gaps, Christian Göttsche
- [RFC PATCH 24/35] libsepol: zero member before potential dereference, Christian Göttsche
- [RFC PATCH 23/35] libsepol: resolve log message mismatch, Christian Göttsche
- [RFC PATCH 25/35] libsepol: validate avtab types, Christian Göttsche
- [RFC PATCH 26/35] libsepol: validate constraint expression operators and attributes, Christian Göttsche
- [RFC PATCH 27/35] libsepol: validate type of avtab type rules, Christian Göttsche
- [RFC PATCH 28/35] libsepol: validate ocontexts, Christian Göttsche
- [RFC PATCH 29/35] libsepol: validate genfs contexts, Christian Göttsche
- [RFC PATCH 30/35] libsepol: validate permissive types, Christian Göttsche
- [RFC PATCH 31/35] libsepol: validate policy properties, Christian Göttsche
- [RFC PATCH 32/35] libsepol: do not underflow on short format arguments, Christian Göttsche
- [RFC PATCH 33/35] libsepol: validate categories, Christian Göttsche
- [RFC PATCH 34/35] libsepol: use correct size for initial string list, Christian Göttsche
- [RFC PATCH 35/35] libsepol: do not create a string list with initial size zero, Christian Göttsche
- Re: [RFC PATCH 00/35] libsepol: add fuzzer for reading binary policies, James Carter
- [RFC PATCH v2 00/36] libsepol: add fuzzer for reading binary policies, Christian Göttsche
- [RFC PATCH v2 01/36] cifuzz: enable report-unreproducible-crashes, Christian Göttsche
- [RFC PATCH v2 02/36] cifuzz: use the default runtime of 600 seconds, Christian Göttsche
- [RFC PATCH v2 03/36] libsepol/fuzz: silence secilc-fuzzer, Christian Göttsche
- [RFC PATCH v2 04/36] libsepol: add libfuzz based fuzzer for reading binary policies, Christian Göttsche
- [RFC PATCH v2 05/36] libsepol/fuzz: limit element sizes for fuzzing, Christian Göttsche
- [RFC PATCH v2 06/36] libsepol: use logging framework in conditional.c, Christian Göttsche
- [RFC PATCH v2 07/36] libsepol: use logging framework in ebitmap.c, Christian Göttsche
- [RFC PATCH v2 08/36] libsepol: use mallocarray wrapper to avoid overflows, Christian Göttsche
- [RFC PATCH v2 10/36] libsepol: add checks for read sizes, Christian Göttsche
- [RFC PATCH v2 09/36] libsepol: use reallocarray wrapper to avoid overflows, Christian Göttsche
- [RFC PATCH v2 11/36] libsepol: enforce avtab item limit, Christian Göttsche
- [RFC PATCH v2 13/36] libsepol: reject abnormal huge sid ids, Christian Göttsche
- [RFC PATCH v2 12/36] libsepol: clean memory on conditional insertion failure, Christian Göttsche
- [RFC PATCH v2 14/36] libsepol: reject invalid filetrans source type, Christian Göttsche
- [RFC PATCH v2 16/36] libsepol: use size_t for indexes in strs helpers, Christian Göttsche
- [RFC PATCH v2 15/36] libsepol: zero member before potential dereference, Christian Göttsche
- [RFC PATCH v2 17/36] libsepol: do not underflow on short format arguments, Christian Göttsche
- [RFC PATCH v2 19/36] libsepol: do not crash on user gaps, Christian Göttsche
- [RFC PATCH v2 20/36] libsepol: use correct size for initial string list, Christian Göttsche
- [RFC PATCH v2 21/36] libsepol: do not create a string list with initial size zero, Christian Göttsche
- [RFC PATCH v2 22/36] libsepol: split validation of datum array gaps and entries, Christian Göttsche
- [RFC PATCH v2 23/36] libsepol: validate MLS levels, Christian Göttsche
- [RFC PATCH v2 18/36] libsepol: do not crash on class gaps, Christian Göttsche
- [RFC PATCH v2 25/36] libsepol: validate permission count of classes, Christian Göttsche
- [RFC PATCH v2 24/36] libsepol: validate expanded user range and level, Christian Göttsche
- [RFC PATCH v2 26/36] libsepol: resolve log message mismatch, Christian Göttsche
- [RFC PATCH v2 28/36] libsepol: validate constraint expression operators and attributes, Christian Göttsche
- [RFC PATCH v2 27/36] libsepol: validate avtab and avrule types, Christian Göttsche
- [RFC PATCH v2 29/36] libsepol: validate type of avtab type rules, Christian Göttsche
- [RFC PATCH v2 30/36] libsepol: validate ocontexts, Christian Göttsche
- [RFC PATCH v2 31/36] libsepol: validate genfs contexts, Christian Göttsche
- [RFC PATCH v2 32/36] libsepol: validate permissive types, Christian Göttsche
- [RFC PATCH v2 34/36] libsepol: validate categories, Christian Göttsche
- [RFC PATCH v2 33/36] libsepol: validate policy properties, Christian Göttsche
- [RFC PATCH v2 36/36] libsepol: validate class default targets, Christian Göttsche
- [RFC PATCH v2 35/36] libsepol: validate fsuse types, Christian Göttsche
- [RFC PATCH v2 37/40] [WIP] libsepol: export policydb_validate, Christian Göttsche
- [RFC PATCH v2 38/40] [WIP] checkpolicy: validate generated policies, Christian Göttsche
- [RFC PATCH v2 40/40] [CROSS-PATCH] libsepol: do not pass NULL to memcpy, Christian Göttsche
- [RFC PATCH v2 39/40] [CROSS-PATCH] libsepol: avoid passing NULL pointer to memcpy, Christian Göttsche
- Re: [RFC PATCH v2 00/36] libsepol: add fuzzer for reading binary policies, James Carter
- [PATCH v3 00/36] libsepol: add fuzzer for reading binary policies, Christian Göttsche
- [PATCH v3 09/36] libsepol: use reallocarray wrapper to avoid overflows, Christian Göttsche
- [PATCH v3 10/36] libsepol: add checks for read sizes, Christian Göttsche
- [PATCH v3 15/36] libsepol: zero member before potential dereference, Christian Göttsche
- [PATCH v3 29/36] libsepol: validate type of avtab type rules, Christian Göttsche
- [PATCH v3 04/36] libsepol: add libfuzz based fuzzer for reading binary policies, Christian Göttsche
- [PATCH v3 07/36] libsepol: use logging framework in ebitmap.c, Christian Göttsche
- [PATCH v3 02/36] cifuzz: use the default runtime of 600 seconds, Christian Göttsche
- [PATCH v3 12/36] libsepol: clean memory on conditional insertion failure, Christian Göttsche
- [PATCH v3 08/36] libsepol: use mallocarray wrapper to avoid overflows, Christian Göttsche
- [PATCH v3 20/36] libsepol: use correct size for initial string list, Christian Göttsche
- [PATCH v3 28/36] libsepol: validate constraint expression operators and attributes, Christian Göttsche
- [PATCH v3 18/36] libsepol: do not crash on class gaps, Christian Göttsche
- [PATCH v3 26/36] libsepol: resolve log message mismatch, Christian Göttsche
- [PATCH v3 22/36] libsepol: split validation of datum array gaps and entries, Christian Göttsche
- [PATCH v3 36/36] libsepol: validate class default targets, Christian Göttsche
- [PATCH v3 33/36] libsepol: validate policy properties, Christian Göttsche
- [PATCH v3 32/36] libsepol: validate permissive types, Christian Göttsche
- [PATCH v3 34/36] libsepol: validate categories, Christian Göttsche
- [PATCH v3 01/36] cifuzz: enable report-unreproducible-crashes, Christian Göttsche
- [PATCH v3 21/36] libsepol: do not create a string list with initial size zero, Christian Göttsche
- [PATCH v3 14/36] libsepol: reject invalid filetrans source type, Christian Göttsche
- [PATCH v3 03/36] libsepol/fuzz: silence secilc-fuzzer, Christian Göttsche
- [PATCH v3 05/36] libsepol/fuzz: limit element sizes for fuzzing, Christian Göttsche
- [PATCH v3 23/36] libsepol: validate MLS levels, Christian Göttsche
- [PATCH v3 11/36] libsepol: enforce avtab item limit, Christian Göttsche
- [PATCH v3 27/36] libsepol: validate avtab and avrule types, Christian Göttsche
- [PATCH v3 16/36] libsepol: use size_t for indexes in strs helpers, Christian Göttsche
- [PATCH v3 06/36] libsepol: use logging framework in conditional.c, Christian Göttsche
- [PATCH v3 17/36] libsepol: do not underflow on short format arguments, Christian Göttsche
- [PATCH v3 24/36] libsepol: validate expanded user range and level, Christian Göttsche
- [PATCH v3 30/36] libsepol: validate ocontexts, Christian Göttsche
- [PATCH v3 31/36] libsepol: validate genfs contexts, Christian Göttsche
- [PATCH v3 19/36] libsepol: do not crash on user gaps, Christian Göttsche
- [PATCH v3 13/36] libsepol: reject abnormal huge sid ids, Christian Göttsche
- [PATCH v3 25/36] libsepol: validate permission count of classes, Christian Göttsche
- [PATCH v3 35/36] libsepol: validate fsuse types, Christian Göttsche
- Re: [PATCH v3 00/36] libsepol: add fuzzer for reading binary policies, James Carter
[PATCH] selinux: make better use of the nf_hook_state passed to the NF hooks,
Paul Moore
[PATCH v2 selinux] selinux: remove unneeded ipv6 hook wrappers,
Florian Westphal
[PATCH security-next] selinux: remove ipv6 hook wrappers,
Florian Westphal
[PATCH 1/4] libsepol: Fix potential undefined shifts,
James Carter
[PATCH] libsepol/cil: Fix potential undefined shifts,
James Carter
[PATCH v4 0/3] binder: use cred instead of task for security context,
Todd Kjos
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]