Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH v4 06/40] fs: add mount_setattr(), (continued)
- [PATCH v4 08/40] fs: add id translation helpers, Christian Brauner
- [PATCH v4 09/40] mount: attach mappings to mounts, Christian Brauner
- [PATCH v4 10/40] capability: handle idmapped mounts, Christian Brauner
- [PATCH v4 07/40] tests: add mount_setattr() selftests, Christian Brauner
- [PATCH v4 01/40] namespace: take lock_mount_hash() directly when changing flags, Christian Brauner
- [PATCH v4 11/40] namei: make permission helpers idmapped mount aware, Christian Brauner
- [PATCH v4 12/40] inode: make init and permission helpers idmapped mount aware, Christian Brauner
- [PATCH v4 19/40] namei: introduce struct renamedata, Christian Brauner
- [PATCH v4 14/40] acl: handle idmapped mounts, Christian Brauner
- [PATCH v4 15/40] xattr: handle idmapped mounts, Christian Brauner
- [PATCH v4 17/40] stat: handle idmapped mounts, Christian Brauner
- [PATCH v4 13/40] attr: handle idmapped mounts, Christian Brauner
- [PATCH v4 16/40] commoncap: handle idmapped mounts, Christian Brauner
- [PATCH v4 18/40] namei: handle idmapped mounts in may_*() helpers, Christian Brauner
- [PATCH v4 24/40] utimes: handle idmapped mounts, Christian Brauner
- [PATCH v4 38/40] fs: introduce MOUNT_ATTR_IDMAP, Christian Brauner
- [PATCH v4 29/40] would_dump: handle idmapped mounts, Christian Brauner
- [PATCH v4 23/40] af_unix: handle idmapped mounts, Christian Brauner
- [PATCH v4 21/40] open: handle idmapped mounts in do_truncate(), Christian Brauner
- [PATCH v4 37/40] overlayfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v4 36/40] ecryptfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v4 20/40] namei: prepare for idmapped mounts, Christian Brauner
- [PATCH v4 33/40] ima: handle idmapped mounts, Christian Brauner
- [PATCH v4 22/40] open: handle idmapped mounts, Christian Brauner
- [PATCH v4 35/40] ext4: support idmapped mounts, Christian Brauner
- [PATCH v4 39/40] tests: extend mount_setattr tests, Christian Brauner
- [PATCH v4 27/40] init: handle idmapped mounts, Christian Brauner
- [PATCH v4 32/40] apparmor: handle idmapped mounts, Christian Brauner
- [PATCH v4 25/40] fcntl: handle idmapped mounts, Christian Brauner
- [PATCH v4 26/40] notify: handle idmapped mounts, Christian Brauner
- [PATCH v4 28/40] ioctl: handle idmapped mounts, Christian Brauner
- [PATCH v4 30/40] exec: handle idmapped mounts, Christian Brauner
- [PATCH v4 34/40] fat: handle idmapped mounts, Christian Brauner
- [PATCH v2 1/1] scripts/ci: add configuration for a Vagrant virtual machine,
Nicolas Iooss
- [PATCH] all: various small html to markdown conversions,
Paul Moore
- [RFC PATCH] selinux: handle MPTCP consistently with TCP,
Paolo Abeni
- [PATCH] proc: Allow pid_revalidate() during LOOKUP_RCU,
Stephen Brennan
- Fix Checkmodule when Writing down to older Module Versions,
Matthew Ife
- review needed - coreutils ported to a newer version of libselinux, Petr Lautrbach
- [PATCH v3 00/38] idmapped mounts,
Christian Brauner
- [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags, Christian Brauner
- [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static, Christian Brauner
- [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt(), Christian Brauner
- [PATCH v3 15/38] stat: handle idmapped mounts, Christian Brauner
- [PATCH v3 14/38] commoncap: handle idmapped mounts, Christian Brauner
- [PATCH v3 13/38] xattr: handle idmapped mounts, Christian Brauner
- [PATCH v3 11/38] attr: handle idmapped mounts, Christian Brauner
- [PATCH v3 19/38] open: handle idmapped mounts in do_truncate(), Christian Brauner
- [PATCH v3 16/38] namei: handle idmapped mounts in may_*() helpers, Christian Brauner
- [PATCH v3 17/38] namei: introduce struct renamedata, Christian Brauner
- [PATCH v3 12/38] acl: handle idmapped mounts, Christian Brauner
- [PATCH v3 32/38] fat: handle idmapped mounts, Christian Brauner
- [PATCH v3 25/38] init: handle idmapped mounts, Christian Brauner
- [PATCH v3 37/38] tests: extend mount_setattr tests, Christian Brauner
- [PATCH v3 30/38] apparmor: handle idmapped mounts, Christian Brauner
- [PATCH v3 35/38] overlayfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v3 23/38] fcntl: handle idmapped mounts, Christian Brauner
- [PATCH v3 21/38] af_unix: handle idmapped mounts, Christian Brauner
- [PATCH v3 34/38] ecryptfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v3 36/38] fs: introduce MOUNT_ATTR_IDMAP, Christian Brauner
- [PATCH v3 31/38] ima: handle idmapped mounts, Christian Brauner
- [PATCH v3 22/38] utimes: handle idmapped mounts, Christian Brauner
- [PATCH v3 26/38] ioctl: handle idmapped mounts, Christian Brauner
- [PATCH v3 28/38] exec: handle idmapped mounts, Christian Brauner
- [PATCH v3 20/38] open: handle idmapped mounts, Christian Brauner
- [PATCH v3 33/38] ext4: support idmapped mounts, Christian Brauner
- [PATCH v3 27/38] would_dump: handle idmapped mounts, Christian Brauner
- [PATCH v3 24/38] notify: handle idmapped mounts, Christian Brauner
- [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers, Christian Brauner
- [PATCH v3 18/38] namei: prepare for idmapped mounts, Christian Brauner
- [PATCH v3 06/38] fs: add id translation helpers, Christian Brauner
- [PATCH v3 04/38] fs: add mount_setattr(), Christian Brauner
- [PATCH v3 07/38] mount: attach mappings to mounts, Christian Brauner
- [PATCH v3 05/38] tests: add mount_setattr() selftests, Christian Brauner
- [PATCH v3 09/38] namei: add idmapped mount aware permission helpers, Christian Brauner
- [PATCH v3 08/38] capability: handle idmapped mounts, Christian Brauner
- Re: [PATCH v3 00/38] idmapped mounts, Serge E. Hallyn
- [PATCH userspace] travis: run only selinux-testsuite,
Ondrej Mosnacek
- https://github.com/SELinuxProject/selinux/pull/271,
Petr Lautrbach
- [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test,
Lokesh Gidra
- Failed to start Udev Kernel device manager,
Ashish Mishra
- [PATCH 1/1] scripts/ci: add configuration for a Vagrant virtual machine,
Nicolas Iooss
- [PATCH 1/1] Add configuration to build and run tests in GitHub Actions,
Nicolas Iooss
- Re: [RFC] Introduce MAJOR.MINOR.PATCH version for the whole project, Petr Lautrbach
- [PATCH 000/141] Fix fall-through warnings for Clang,
Gustavo A. R. Silva
- Re: [PATCH 000/141] Fix fall-through warnings for Clang, Gustavo A. R. Silva
Re: [PATCH 000/141] Fix fall-through warnings for Clang, Miguel Ojeda
Re: [PATCH 000/141] Fix fall-through warnings for Clang, Jason Gunthorpe
Message not available
Re: [PATCH 000/141] Fix fall-through warnings for Clang, Martin K. Petersen
Re: (subset) [PATCH 000/141] Fix fall-through warnings for Clang, Martin K. Petersen
[PATCH] mls_mcs.md: Convert section to markdown,
Richard Haines
[PATCH v6 0/8] IMA: support for measuring kernel integrity critical data,
Tushar Sugandhi
[PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks,
Paul Moore
[PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs,
Ondrej Mosnacek
[pcmoore-selinux:working-selinuxns 7/12] security/selinux/hooks.c:7275:42: sparse: sparse: incorrect type in argument 1 (different address spaces),
kernel test robot
[PATCH 0/6] libsepol/cil: Various CIL cleanups,
James Carter
Rebased selinux/working-selinuxns on top of selinux/next, Paul Moore
[PATCH v2 00/39] fs: idmapped mounts,
Christian Brauner
- [PATCH v2 03/39] namespace: only take read lock in do_reconfigure_mnt(), Christian Brauner
- [PATCH v2 02/39] mount: make {lock,unlock}_mount_hash() static, Christian Brauner
- [PATCH v2 04/39] fs: add mount_setattr(), Christian Brauner
- [PATCH v2 01/39] namespace: take lock_mount_hash() directly when changing flags, Christian Brauner
- [PATCH v2 06/39] fs: add id translation helpers, Christian Brauner
- [PATCH v2 08/39] capability: handle idmapped mounts, Christian Brauner
- [PATCH v2 05/39] tests: add mount_setattr() selftests, Christian Brauner
- [PATCH v2 07/39] mount: attach mappings to mounts, Christian Brauner
- [PATCH v2 09/39] namei: add idmapped mount aware permission helpers, Christian Brauner
- [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers, Christian Brauner
- [PATCH v2 11/39] attr: handle idmapped mounts, Christian Brauner
- [PATCH v2 14/39] commoncap: handle idmapped mounts, Christian Brauner
- [PATCH v2 12/39] acl: handle idmapped mounts, Christian Brauner
- [PATCH v2 16/39] namei: handle idmapped mounts in may_*() helpers, Christian Brauner
- [PATCH v2 17/39] namei: introduce struct renamedata, Christian Brauner
- [PATCH v2 19/39] open: handle idmapped mounts in do_truncate(), Christian Brauner
- [PATCH v2 18/39] namei: prepare for idmapped mounts, Christian Brauner
- [PATCH v2 13/39] xattr: handle idmapped mounts, Christian Brauner
- [PATCH v2 15/39] stat: handle idmapped mounts, Christian Brauner
- [PATCH v2 36/39] overlayfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v2 31/39] audit: handle idmapped mounts, Christian Brauner
- [PATCH v2 33/39] fat: handle idmapped mounts, Christian Brauner
- [PATCH v2 37/39] fs: introduce MOUNT_ATTR_IDMAP, Christian Brauner
- [PATCH v2 24/39] notify: handle idmapped mounts, Christian Brauner
- [PATCH v2 38/39] selftests: add idmapped mounts xattr selftest, Christian Brauner
- [PATCH v2 32/39] ima: handle idmapped mounts, Christian Brauner
- [PATCH v2 28/39] exec: handle idmapped mounts, Christian Brauner
- [PATCH v2 25/39] init: handle idmapped mounts, Christian Brauner
- [PATCH v2 22/39] utimes: handle idmapped mounts, Christian Brauner
- [PATCH v2 20/39] open: handle idmapped mounts, Christian Brauner
- [PATCH v2 30/39] apparmor: handle idmapped mounts, Christian Brauner
- [PATCH v2 23/39] fcntl: handle idmapped mounts, Christian Brauner
- [PATCH v2 26/39] ioctl: handle idmapped mounts, Christian Brauner
- [PATCH v2 34/39] ext4: support idmapped mounts, Christian Brauner
- [PATCH v2 27/39] would_dump: handle idmapped mounts, Christian Brauner
- [PATCH v2 21/39] af_unix: handle idmapped mounts, Christian Brauner
- [PATCH v2 35/39] ecryptfs: do not mount on top of idmapped mounts, Christian Brauner
- Re: [PATCH v2 00/39] fs: idmapped mounts, Jonathan Corbet
- Re: [PATCH v2 00/39] fs: idmapped mounts, Stephen Barber
- Re: [PATCH v2 00/39] fs: idmapped mounts, Darrick J. Wong
- Message not available
[GIT PULL] SELinux fixes for v5.10 (#1),
Paul Moore
[PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist(),
Paul Moore
[PATCH v2] selinux: Fix error return code in sel_ib_pkey_sid_slow(),
Chen Zhou
[PATCH userspace] ci: add new dependencies needed by selinux-testsuite,
Ondrej Mosnacek
[PATCH] selinux: Fix error return code in sel_ib_pkey_sid_slow(),
Chen Zhou
[PATCH v13 0/4] SELinux support for anonymous inodes and UFFD,
Lokesh Gidra
[PATCH 1/1] libsepol: free memory when realloc() fails,
Nicolas Iooss
[PATCH userspace v2 0/3] Update manpages to reflect that runtime SELinux disable is deprecated,
Ondrej Mosnacek
[PATCH userspace] selinux(8): explain that runtime disable is deprecated,
Ondrej Mosnacek
SElinux bug with docker custom path, Louis MILCENT
[RFC PATCH] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs,
Casey Schaufler
Bug (?) report for secilc and CIL semantics: some unexpected behaviours,
Lorenzo Ceragioli
[PATCH] netlabel: fix our progress tracking in netlbl_unlabel_staticlist(),
Paul Moore
Inputs for error " libselinux.so.1: cannot open shared object file: No such file or directory ",
Ashish Mishra
[PATCH v12 0/4] SELinux support for anonymous inodes and UFFD,
Lokesh Gidra
Selinux policy for x509_ima.der public certificate loaded by kernel during boot,
rishi gupta
[PATCH v11 0/4] SELinux support for anonymous inodes and UFFD,
Lokesh Gidra
[PATCH 1/2] [lsm] introduce a new hook to query LSM for functionality,
Olga Kornievskaia
Possibly unwanted rootcontext= behavior?,
Ondrej Mosnacek
[PATCH] selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling,
Paul Moore
[PATCH v22 00/23] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v22 01/23] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v22 03/23] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v22 04/23] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v22 07/23] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v22 02/23] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v22 12/23] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v22 14/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- <Possible follow-ups>
- [PATCH v22 00/23] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH v22 01/23] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v22 02/23] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v22 03/23] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v22 04/23] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v22 07/23] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v22 12/23] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v22 14/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v22 15/23] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v22 16/23] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v22 18/23] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v22 17/23] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v22 19/23] audit: add support for non-syscall auxiliary records, Casey Schaufler
- [PATCH v22 20/23] Audit: Add new record for multiple process LSM attributes, Casey Schaufler
- [PATCH v22 21/23] Audit: Add a new record for multiple object LSM attributes, Casey Schaufler
- [PATCH v22 22/23] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v22 23/23] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v22 00/23] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH v23 01/23] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v23 03/23] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v23 04/23] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v23 05/23] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v23 06/23] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v23 07/23] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v23 08/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v23 09/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v23 10/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v23 11/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v23 12/23] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v23 13/23] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v23 14/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v23 15/23] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v23 16/23] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v23 17/23] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v23 18/23] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v23 19/23] audit: add support for non-syscall auxiliary records, Casey Schaufler
- [PATCH v23 20/23] Audit: Add new record for multiple process LSM attributes, Casey Schaufler
- [PATCH v23 21/23] Audit: Add a new record for multiple object LSM attributes, Casey Schaufler
- [PATCH v23 22/23] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v23 23/23] AppArmor: Remove the exclusive flag, Casey Schaufler
[RFC PATCH 0/1] selinux-testsuite: Reduce sctp test runtime,
Richard Haines
Changes to Travis Usage,
William Roberts
[PATCH] selinux: drop super_block backpointer from superblock_security_struct,
Ondrej Mosnacek
[PATCH testsuite] tests/overlay: replace Python script with a C program,
Ondrej Mosnacek
[PATCH testsuite] tests/Makefile: silence modprobe output,
Ondrej Mosnacek
[PATCH V2 0/1] selinux-testsuite: Add btrfs support for filesystem tests,
Richard Haines
homedir file context definitions,
Vit Mojzis
[PATCH testsuite] travis: handle the case of multiple rawhide images,
Ondrej Mosnacek
[PATCH testsuite] travis: fix kernel update check,
Ondrej Mosnacek
[PATCH userspace] ci: bump Fedora image version to 33,
Ondrej Mosnacek
[PATCH testsuite v2 0/4] Test all filesystems by default,
Ondrej Mosnacek
[PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data,
Tushar Sugandhi
[PATCH testsuite] travis: bump stable fedora version to 33,
Ondrej Mosnacek
[PATCH testsuite 0/3] Test all filesystems by default,
Ondrej Mosnacek
[PATCH] python/sepolicy: allow to override manpage date,
Bernhard M. Wiedemann
[PATCH testsuite] travis: skip kernel update+reboot if it's not necessary,
Ondrej Mosnacek
[PATCH userspace v2] ci: use parallel build,
Ondrej Mosnacek
[PATCH userspace] ci: use parallel build, Ondrej Mosnacek
[RFC] Finding the right target branch for patches that span IMA and SeLinux,
Tushar Sugandhi
[PATCH] test_sctp.te: avoid use of corenet_sctp_bind_generic_node(),
Ondrej Mosnacek
[RFC PATCH v2] selinux: Fix kmemleak after disabling selinux runtime,
Chen Jun
[PATCH 00/34] fs: idmapped mounts,
Christian Brauner
- [PATCH 02/34] namespace: only take read lock in do_reconfigure_mnt(), Christian Brauner
- [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags, Christian Brauner
- [PATCH 07/34] capability: handle idmapped mounts, Christian Brauner
- [PATCH 03/34] fs: add mount_setattr(), Christian Brauner
- [PATCH 04/34] tests: add mount_setattr() selftests, Christian Brauner
- [PATCH 11/34] acl: handle idmapped mounts, Christian Brauner
- [PATCH 22/34] af_unix: handle idmapped mounts, Christian Brauner
- [PATCH 31/34] expfs: handle idmapped mounts, Christian Brauner
- [PATCH 25/34] exec: handle idmapped mounts, Christian Brauner
- [PATCH 18/34] namei: prepare for idmapped mounts, Christian Brauner
- [PATCH 19/34] namei: add lookup helpers with idmapped mounts aware permission checking, Christian Brauner
- [PATCH 13/34] selftests: add idmapped mounts xattr selftest, Christian Brauner
- [PATCH 24/34] would_dump: handle idmapped mounts, Christian Brauner
- [PATCH 23/34] utimes: handle idmapped mounts, Christian Brauner
- [PATCH 20/34] open: handle idmapped mounts in do_truncate(), Christian Brauner
- [PATCH 28/34] audit: handle idmapped mounts, Christian Brauner
- [PATCH 17/34] namei: introduce struct renamedata, Christian Brauner
- [PATCH 32/34] overlayfs: handle idmapped lower directories, Christian Brauner
- [PATCH 27/34] apparmor: handle idmapped mounts, Christian Brauner
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]