Re: [PATCH 1/2 -v3] Namespacing of security/selinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2009-08-14 at 11:20 -0400, Stephen Smalley wrote:
> On Tue, 2009-07-07 at 17:49 -0400, Thomas Liu wrote:
> > This includes namespacing of all items originally labeled
> > security_ with sel_.
> > 
> > In addition, the functions sel_netif_sid and security_netif_sid
> > have been renamed because the namespacing would cause a conflict.
> > 
> > sel_netif_sid has been renamed to sel_netif_sid_by_index, and
> > security_netif_sid has been renamed to sel_netif_sid_by_name
> 
> This patch has a minor reject against the current security-testing tree.
> 
> However, I'm having second thoughts about the renaming idea.  There are
> a rather large number of documents, not to mention the userspace API,
> that talk about security_compute_av() and friends, and thus I'm a bit
> hesitant to render them all obsolete.

I'm certainly to let it die.  I haven't heard anyone outside of us care,
and to be honest, I don't like sel_ anyway, even if paul does.
(selinux_ FTW!!!111oneone!!!)

-Eric
> 
> > 
> > Signed-off-by: Thomas Liu <tliu@xxxxxxxxxx>
> > ---
> >  security/selinux/avc.c              |    8 +-
> >  security/selinux/exports.c          |    2 +-
> >  security/selinux/hooks.c            |   80 +++++++++++-----------
> >  security/selinux/include/netif.h    |    2 +-
> >  security/selinux/include/security.h |   60 ++++++++--------
> >  security/selinux/netif.c            |    6 +-
> >  security/selinux/netlabel.c         |    8 +-
> >  security/selinux/netnode.c          |    4 +-
> >  security/selinux/netport.c          |    2 +-
> >  security/selinux/selinuxfs.c        |   56 ++++++++--------
> >  security/selinux/ss/services.c      |  130 +++++++++++++++++-----------------
> >  security/selinux/xfrm.c             |    4 +-
> >  12 files changed, 182 insertions(+), 180 deletions(-)
> > 
> > diff --git a/security/selinux/avc.c b/security/selinux/avc.c
> > index 236aaa2..d0dfee0 100644
> > --- a/security/selinux/avc.c
> > +++ b/security/selinux/avc.c
> > @@ -203,7 +203,7 @@ static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tcla
> >  	char *scontext;
> >  	u32 scontext_len;
> >  
> > -	rc = security_sid_to_context(ssid, &scontext, &scontext_len);
> > +	rc = sel_sid_to_context(ssid, &scontext, &scontext_len);
> >  	if (rc)
> >  		audit_log_format(ab, "ssid=%d", ssid);
> >  	else {
> > @@ -211,7 +211,7 @@ static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tcla
> >  		kfree(scontext);
> >  	}
> >  
> > -	rc = security_sid_to_context(tsid, &scontext, &scontext_len);
> > +	rc = sel_sid_to_context(tsid, &scontext, &scontext_len);
> >  	if (rc)
> >  		audit_log_format(ab, " tsid=%d", tsid);
> >  	else {
> > @@ -448,7 +448,7 @@ static int avc_latest_notif_update(int seqno, int is_insert)
> >   * (@ssid, @tsid) and class @tclass.
> >   * The access vectors and the sequence number are
> >   * normally provided by the security server in
> > - * response to a security_compute_av() call.  If the
> > + * response to a sel_compute_av() call.  If the
> >   * sequence number @avd->seqno is not less than the latest
> >   * revocation notification, then the function copies
> >   * the access vectors into a cache entry, returns
> > @@ -911,7 +911,7 @@ int avc_has_perm_noaudit(u32 ssid, u32 tsid,
> >  		else
> >  			avd = &avd_entry;
> >  
> > -		rc = security_compute_av(ssid, tsid, tclass, requested, avd);
> > +		rc = sel_compute_av(ssid, tsid, tclass, requested, avd);
> >  		if (rc)
> >  			goto out;
> >  		rcu_read_lock();
> > diff --git a/security/selinux/exports.c b/security/selinux/exports.c
> > index c73aeaa..ba1f91d 100644
> > --- a/security/selinux/exports.c
> > +++ b/security/selinux/exports.c
> > @@ -28,7 +28,7 @@ extern atomic_t selinux_secmark_refcount;
> >  int selinux_string_to_sid(char *str, u32 *sid)
> >  {
> >  	if (selinux_enabled)
> > -		return security_context_to_sid(str, strlen(str), sid);
> > +		return sel_context_to_sid(str, strlen(str), sid);
> >  	else {
> >  		*sid = 0;
> >  		return 0;
> > diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
> > index 2081055..9d27178 100644
> > --- a/security/selinux/hooks.c
> > +++ b/security/selinux/hooks.c
> > @@ -525,21 +525,21 @@ static int selinux_get_mnt_opts(const struct super_block *sb,
> >  
> >  	i = 0;
> >  	if (sbsec->flags & FSCONTEXT_MNT) {
> > -		rc = security_sid_to_context(sbsec->sid, &context, &len);
> > +		rc = sel_sid_to_context(sbsec->sid, &context, &len);
> >  		if (rc)
> >  			goto out_free;
> >  		opts->mnt_opts[i] = context;
> >  		opts->mnt_opts_flags[i++] = FSCONTEXT_MNT;
> >  	}
> >  	if (sbsec->flags & CONTEXT_MNT) {
> > -		rc = security_sid_to_context(sbsec->mntpoint_sid, &context, &len);
> > +		rc = sel_sid_to_context(sbsec->mntpoint_sid, &context, &len);
> >  		if (rc)
> >  			goto out_free;
> >  		opts->mnt_opts[i] = context;
> >  		opts->mnt_opts_flags[i++] = CONTEXT_MNT;
> >  	}
> >  	if (sbsec->flags & DEFCONTEXT_MNT) {
> > -		rc = security_sid_to_context(sbsec->def_sid, &context, &len);
> > +		rc = sel_sid_to_context(sbsec->def_sid, &context, &len);
> >  		if (rc)
> >  			goto out_free;
> >  		opts->mnt_opts[i] = context;
> > @@ -549,7 +549,7 @@ static int selinux_get_mnt_opts(const struct super_block *sb,
> >  		struct inode *root = sbsec->sb->s_root->d_inode;
> >  		struct inode_security_struct *isec = root->i_security;
> >  
> > -		rc = security_sid_to_context(isec->sid, &context, &len);
> > +		rc = sel_sid_to_context(isec->sid, &context, &len);
> >  		if (rc)
> >  			goto out_free;
> >  		opts->mnt_opts[i] = context;
> > @@ -652,10 +652,10 @@ static int selinux_set_mnt_opts(struct super_block *sb,
> >  
> >  		if (flags[i] == SE_SBLABELSUPP)
> >  			continue;
> > -		rc = security_context_to_sid(mount_options[i],
> > +		rc = sel_context_to_sid(mount_options[i],
> >  					     strlen(mount_options[i]), &sid);
> >  		if (rc) {
> > -			printk(KERN_WARNING "SELinux: security_context_to_sid"
> > +			printk(KERN_WARNING "SELinux: sel_context_to_sid"
> >  			       "(%s) failed for (dev %s, type %s) errno=%d\n",
> >  			       mount_options[i], sb->s_id, name, rc);
> >  			goto out;
> > @@ -717,9 +717,11 @@ static int selinux_set_mnt_opts(struct super_block *sb,
> >  		sbsec->flags |= SE_SBPROC;
> >  
> >  	/* Determine the labeling behavior to use for this filesystem type. */
> > -	rc = security_fs_use((sbsec->flags & SE_SBPROC) ? "proc" : sb->s_type->name, &sbsec->behavior, &sbsec->sid);
> > +	rc = sel_fs_use((sbsec->flags & SE_SBPROC) ? "proc" : sb->s_type->name,
> > +							      &sbsec->behavior,
> > +							      &sbsec->sid);
> >  	if (rc) {
> > -		printk(KERN_WARNING "%s: security_fs_use(%s) returned %d\n",
> > +		printk(KERN_WARNING "%s: sel_fs_use(%s) returned %d\n",
> >  		       __func__, sb->s_type->name, rc);
> >  		goto out;
> >  	}
> > @@ -1201,7 +1203,7 @@ static int selinux_proc_get_sid(struct proc_dir_entry *de,
> >  		path = end;
> >  		de = de->parent;
> >  	}
> > -	rc = security_genfs_sid("proc", path, tclass, sid);
> > +	rc = sel_genfs_sid("proc", path, tclass, sid);
> >  	free_page((unsigned long)buffer);
> >  	return rc;
> >  }
> > @@ -1318,7 +1320,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
> >  			sid = sbsec->def_sid;
> >  			rc = 0;
> >  		} else {
> > -			rc = security_context_to_sid_default(context, rc, &sid,
> > +			rc = sel_context_to_sid_default(context, rc, &sid,
> >  							     sbsec->def_sid,
> >  							     GFP_NOFS);
> >  			if (rc) {
> > @@ -1353,7 +1355,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
> >  
> >  		/* Try to obtain a transition SID. */
> >  		isec->sclass = inode_mode_to_security_class(inode->i_mode);
> > -		rc = security_transition_sid(isec->task_sid,
> > +		rc = sel_transition_sid(isec->task_sid,
> >  					     sbsec->sid,
> >  					     isec->sclass,
> >  					     &sid);
> > @@ -1630,7 +1632,7 @@ static int may_create(struct inode *dir,
> >  		return rc;
> >  
> >  	if (!newsid || !(sbsec->flags & SE_SBLABELSUPP)) {
> > -		rc = security_transition_sid(sid, dsec->sid, tclass, &newsid);
> > +		rc = sel_transition_sid(sid, dsec->sid, tclass, &newsid);
> >  		if (rc)
> >  			return rc;
> >  	}
> > @@ -1966,7 +1968,7 @@ static int selinux_sysctl_get_sid(ctl_table *table, u16 tclass, u32 *sid)
> >  	end -= 4;
> >  	memcpy(end, "/sys", 4);
> >  	path = end;
> > -	rc = security_genfs_sid("proc", path, tclass, sid);
> > +	rc = sel_genfs_sid("proc", path, tclass, sid);
> >  out_free:
> >  	free_page((unsigned long)buffer);
> >  out:
> > @@ -2132,7 +2134,7 @@ static int selinux_bprm_set_creds(struct linux_binprm *bprm)
> >  		new_tsec->exec_sid = 0;
> >  	} else {
> >  		/* Check for a default transition on this program. */
> > -		rc = security_transition_sid(old_tsec->sid, isec->sid,
> > +		rc = sel_transition_sid(old_tsec->sid, isec->sid,
> >  					     SECCLASS_PROCESS, &new_tsec->sid);
> >  		if (rc)
> >  			return rc;
> > @@ -2595,12 +2597,12 @@ static int selinux_inode_init_security(struct inode *inode, struct inode *dir,
> >  	newsid = tsec->create_sid;
> >  
> >  	if (!newsid || !(sbsec->flags & SE_SBLABELSUPP)) {
> > -		rc = security_transition_sid(sid, dsec->sid,
> > +		rc = sel_transition_sid(sid, dsec->sid,
> >  					     inode_mode_to_security_class(inode->i_mode),
> >  					     &newsid);
> >  		if (rc) {
> >  			printk(KERN_WARNING "%s:  "
> > -			       "security_transition_sid failed, rc=%d (dev=%s "
> > +			       "sel_transition_sid failed, rc=%d (dev=%s "
> >  			       "ino=%ld)\n",
> >  			       __func__,
> >  			       -rc, inode->i_sb->s_id, inode->i_ino);
> > @@ -2627,7 +2629,7 @@ static int selinux_inode_init_security(struct inode *inode, struct inode *dir,
> >  	}
> >  
> >  	if (value && len) {
> > -		rc = security_sid_to_context_force(newsid, &context, &clen);
> > +		rc = sel_sid_to_context_force(newsid, &context, &clen);
> >  		if (rc) {
> >  			kfree(namep);
> >  			return rc;
> > @@ -2777,11 +2779,11 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name,
> >  	if (rc)
> >  		return rc;
> >  
> > -	rc = security_context_to_sid(value, size, &newsid);
> > +	rc = sel_context_to_sid(value, size, &newsid);
> >  	if (rc == -EINVAL) {
> >  		if (!capable(CAP_MAC_ADMIN))
> >  			return rc;
> > -		rc = security_context_to_sid_force(value, size, &newsid);
> > +		rc = sel_context_to_sid_force(value, size, &newsid);
> >  	}
> >  	if (rc)
> >  		return rc;
> > @@ -2791,7 +2793,7 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name,
> >  	if (rc)
> >  		return rc;
> >  
> > -	rc = security_validate_transition(isec->sid, newsid, sid,
> > +	rc = sel_validate_transition(isec->sid, newsid, sid,
> >  					  isec->sclass);
> >  	if (rc)
> >  		return rc;
> > @@ -2817,7 +2819,7 @@ static void selinux_inode_post_setxattr(struct dentry *dentry, const char *name,
> >  		return;
> >  	}
> >  
> > -	rc = security_context_to_sid_force(value, size, &newsid);
> > +	rc = sel_context_to_sid_force(value, size, &newsid);
> >  	if (rc) {
> >  		printk(KERN_ERR "SELinux:  unable to map context to SID"
> >  		       "for (%s, %lu), rc=%d\n",
> > @@ -2880,10 +2882,10 @@ static int selinux_inode_getsecurity(const struct inode *inode, const char *name
> >  	error = selinux_capable(current, current_cred(), CAP_MAC_ADMIN,
> >  				SECURITY_CAP_NOAUDIT);
> >  	if (!error)
> > -		error = security_sid_to_context_force(isec->sid, &context,
> > +		error = sel_sid_to_context_force(isec->sid, &context,
> >  						      &size);
> >  	else
> > -		error = security_sid_to_context(isec->sid, &context, &size);
> > +		error = sel_sid_to_context(isec->sid, &context, &size);
> >  	if (error)
> >  		return error;
> >  	error = size;
> > @@ -2909,7 +2911,7 @@ static int selinux_inode_setsecurity(struct inode *inode, const char *name,
> >  	if (!value || !size)
> >  		return -EACCES;
> >  
> > -	rc = security_context_to_sid((void *)value, size, &newsid);
> > +	rc = sel_context_to_sid((void *)value, size, &newsid);
> >  	if (rc)
> >  		return rc;
> >  
> > @@ -3619,7 +3621,7 @@ static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid)
> >  	selinux_skb_xfrm_sid(skb, &xfrm_sid);
> >  	selinux_netlbl_skbuff_getsid(skb, family, &nlbl_type, &nlbl_sid);
> >  
> > -	err = security_net_peersid_resolve(nlbl_sid, nlbl_type, xfrm_sid, sid);
> > +	err = sel_net_peersid_resolve(nlbl_sid, nlbl_type, xfrm_sid, sid);
> >  	if (unlikely(err)) {
> >  		printk(KERN_WARNING
> >  		       "SELinux: failure in selinux_skb_peerlbl_sid(),"
> > @@ -3965,7 +3967,7 @@ static int selinux_socket_unix_stream_connect(struct socket *sock,
> >  	/* server child socket */
> >  	ssec = newsk->sk_security;
> >  	ssec->peer_sid = isec->sid;
> > -	err = security_sid_mls_copy(other_isec->sid, ssec->peer_sid, &ssec->sid);
> > +	err = sel_sid_mls_copy(other_isec->sid, ssec->peer_sid, &ssec->sid);
> >  
> >  	return err;
> >  }
> > @@ -4000,7 +4002,7 @@ static int selinux_inet_sys_rcv_skb(int ifindex, char *addrp, u16 family,
> >  	u32 if_sid;
> >  	u32 node_sid;
> >  
> > -	err = sel_netif_sid(ifindex, &if_sid);
> > +	err = sel_netif_sid_by_index(ifindex, &if_sid);
> >  	if (err)
> >  		return err;
> >  	err = avc_has_perm(peer_sid, if_sid,
> > @@ -4144,7 +4146,7 @@ static int selinux_socket_getpeersec_stream(struct socket *sock, char __user *op
> >  		goto out;
> >  	}
> >  
> > -	err = security_sid_to_context(peer_sid, &scontext, &scontext_len);
> > +	err = sel_sid_to_context(peer_sid, &scontext, &scontext_len);
> >  
> >  	if (err)
> >  		goto out;
> > @@ -4256,7 +4258,7 @@ static int selinux_inet_conn_request(struct sock *sk, struct sk_buff *skb,
> >  		req->secid = sksec->sid;
> >  		req->peer_secid = SECSID_NULL;
> >  	} else {
> > -		err = security_sid_mls_copy(sksec->sid, peersid, &newsid);
> > +		err = sel_sid_mls_copy(sksec->sid, peersid, &newsid);
> >  		if (err)
> >  			return err;
> >  		req->secid = newsid;
> > @@ -4322,7 +4324,7 @@ static int selinux_nlmsg_perm(struct sock *sk, struct sk_buff *skb)
> >  				  "SELinux:  unrecognized netlink message"
> >  				  " type=%hu for sclass=%hu\n",
> >  				  nlh->nlmsg_type, isec->sclass);
> > -			if (!selinux_enforcing || security_get_allow_unknown())
> > +			if (!selinux_enforcing || sel_get_allow_unknown())
> >  				err = 0;
> >  		}
> >  
> > @@ -4556,7 +4558,7 @@ static unsigned int selinux_ip_postroute(struct sk_buff *skb, int ifindex,
> >  		u32 if_sid;
> >  		u32 node_sid;
> >  
> > -		if (sel_netif_sid(ifindex, &if_sid))
> > +		if (sel_netif_sid_by_index(ifindex, &if_sid))
> >  			return NF_DROP;
> >  		if (avc_has_perm(peer_sid, if_sid,
> >  				 SECCLASS_NETIF, NETIF__EGRESS, &ad))
> > @@ -4790,7 +4792,7 @@ static int selinux_msg_queue_msgsnd(struct msg_queue *msq, struct msg_msg *msg,
> >  		 * Compute new sid based on current process and
> >  		 * message queue this message will be stored in
> >  		 */
> > -		rc = security_transition_sid(sid, isec->sid, SECCLASS_MSG,
> > +		rc = sel_transition_sid(sid, isec->sid, SECCLASS_MSG,
> >  					     &msec->sid);
> >  		if (rc)
> >  			return rc;
> > @@ -5095,7 +5097,7 @@ static int selinux_getprocattr(struct task_struct *p,
> >  	if (!sid)
> >  		return 0;
> >  
> > -	error = security_sid_to_context(sid, value, &len);
> > +	error = sel_sid_to_context(sid, value, &len);
> >  	if (error)
> >  		return error;
> >  	return len;
> > @@ -5147,11 +5149,11 @@ static int selinux_setprocattr(struct task_struct *p,
> >  			str[size-1] = 0;
> >  			size--;
> >  		}
> > -		error = security_context_to_sid(value, size, &sid);
> > +		error = sel_context_to_sid(value, size, &sid);
> >  		if (error == -EINVAL && !strcmp(name, "fscreate")) {
> >  			if (!capable(CAP_MAC_ADMIN))
> >  				return error;
> > -			error = security_context_to_sid_force(value, size,
> > +			error = sel_context_to_sid_force(value, size,
> >  							      &sid);
> >  		}
> >  		if (error)
> > @@ -5188,7 +5190,7 @@ static int selinux_setprocattr(struct task_struct *p,
> >  		/* Only allow single threaded processes to change context */
> >  		error = -EPERM;
> >  		if (!is_single_threaded(p)) {
> > -			error = security_bounded_transition(tsec->sid, sid);
> > +			error = sel_bounded_transition(tsec->sid, sid);
> >  			if (error)
> >  				goto abort_change;
> >  		}
> > @@ -5231,12 +5233,12 @@ abort_change:
> >  
> >  static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
> >  {
> > -	return security_sid_to_context(secid, secdata, seclen);
> > +	return sel_sid_to_context(secid, secdata, seclen);
> >  }
> >  
> >  static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
> >  {
> > -	return security_context_to_sid(secdata, seclen, secid);
> > +	return sel_context_to_sid(secdata, seclen, secid);
> >  }
> >  
> >  static void selinux_release_secctx(char *secdata, u32 seclen)
> > @@ -5303,7 +5305,7 @@ static int selinux_key_getsecurity(struct key *key, char **_buffer)
> >  	unsigned len;
> >  	int rc;
> >  
> > -	rc = security_sid_to_context(ksec->sid, &context, &len);
> > +	rc = sel_sid_to_context(ksec->sid, &context, &len);
> >  	if (!rc)
> >  		rc = len;
> >  	*_buffer = context;
> > diff --git a/security/selinux/include/netif.h b/security/selinux/include/netif.h
> > index ce23edd..b6c3b43 100644
> > --- a/security/selinux/include/netif.h
> > +++ b/security/selinux/include/netif.h
> > @@ -17,7 +17,7 @@
> >  #ifndef _SELINUX_NETIF_H_
> >  #define _SELINUX_NETIF_H_
> >  
> > -int sel_netif_sid(int ifindex, u32 *sid);
> > +int sel_netif_sid_by_index(int ifindex, u32 *sid);
> >  
> >  #endif	/* _SELINUX_NETIF_H_ */
> >  
> > diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h
> > index ca83579..373e672 100644
> > --- a/security/selinux/include/security.h
> > +++ b/security/selinux/include/security.h
> > @@ -80,9 +80,9 @@ extern int selinux_policycap_openperm;
> >  /* limitation of boundary depth  */
> >  #define POLICYDB_BOUNDS_MAXDEPTH	4
> >  
> > -int security_load_policy(void *data, size_t len);
> > +int sel_load_policy(void *data, size_t len);
> >  
> > -int security_policycap_supported(unsigned int req_cap);
> > +int sel_policycap_supported(unsigned int req_cap);
> >  
> >  #define SEL_VEC_MAX 32
> >  struct av_decision {
> > @@ -96,58 +96,58 @@ struct av_decision {
> >  /* definitions of av_decision.flags */
> >  #define AVD_FLAGS_PERMISSIVE	0x0001
> >  
> > -int security_compute_av(u32 ssid, u32 tsid,
> > +int sel_compute_av(u32 ssid, u32 tsid,
> >  	u16 tclass, u32 requested,
> >  	struct av_decision *avd);
> >  
> > -int security_transition_sid(u32 ssid, u32 tsid,
> > +int sel_transition_sid(u32 ssid, u32 tsid,
> >  	u16 tclass, u32 *out_sid);
> >  
> > -int security_member_sid(u32 ssid, u32 tsid,
> > +int sel_member_sid(u32 ssid, u32 tsid,
> >  	u16 tclass, u32 *out_sid);
> >  
> > -int security_change_sid(u32 ssid, u32 tsid,
> > +int sel_change_sid(u32 ssid, u32 tsid,
> >  	u16 tclass, u32 *out_sid);
> >  
> > -int security_sid_to_context(u32 sid, char **scontext,
> > +int sel_sid_to_context(u32 sid, char **scontext,
> >  	u32 *scontext_len);
> >  
> > -int security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len);
> > +int sel_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len);
> >  
> > -int security_context_to_sid(const char *scontext, u32 scontext_len,
> > +int sel_context_to_sid(const char *scontext, u32 scontext_len,
> >  	u32 *out_sid);
> >  
> > -int security_context_to_sid_default(const char *scontext, u32 scontext_len,
> > +int sel_context_to_sid_default(const char *scontext, u32 scontext_len,
> >  				    u32 *out_sid, u32 def_sid, gfp_t gfp_flags);
> >  
> > -int security_context_to_sid_force(const char *scontext, u32 scontext_len,
> > +int sel_context_to_sid_force(const char *scontext, u32 scontext_len,
> >  				  u32 *sid);
> >  
> > -int security_get_user_sids(u32 callsid, char *username,
> > +int sel_get_user_sids(u32 callsid, char *username,
> >  			   u32 **sids, u32 *nel);
> >  
> > -int security_port_sid(u8 protocol, u16 port, u32 *out_sid);
> > +int sel_port_sid(u8 protocol, u16 port, u32 *out_sid);
> >  
> > -int security_netif_sid(char *name, u32 *if_sid);
> > +int sel_netif_sid_by_name(char *name, u32 *if_sid);
> >  
> > -int security_node_sid(u16 domain, void *addr, u32 addrlen,
> > +int sel_node_sid(u16 domain, void *addr, u32 addrlen,
> >  	u32 *out_sid);
> >  
> > -int security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid,
> > +int sel_validate_transition(u32 oldsid, u32 newsid, u32 tasksid,
> >  				 u16 tclass);
> >  
> > -int security_bounded_transition(u32 oldsid, u32 newsid);
> > +int sel_bounded_transition(u32 oldsid, u32 newsid);
> >  
> > -int security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid);
> > +int sel_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid);
> >  
> > -int security_net_peersid_resolve(u32 nlbl_sid, u32 nlbl_type,
> > +int sel_net_peersid_resolve(u32 nlbl_sid, u32 nlbl_type,
> >  				 u32 xfrm_sid,
> >  				 u32 *peer_sid);
> >  
> > -int security_get_classes(char ***classes, int *nclasses);
> > -int security_get_permissions(char *class, char ***perms, int *nperms);
> > -int security_get_reject_unknown(void);
> > -int security_get_allow_unknown(void);
> > +int sel_get_classes(char ***classes, int *nclasses);
> > +int sel_get_permissions(char *class, char ***perms, int *nperms);
> > +int sel_get_reject_unknown(void);
> > +int sel_get_allow_unknown(void);
> >  
> >  #define SECURITY_FS_USE_XATTR		1 /* use xattr */
> >  #define SECURITY_FS_USE_TRANS		2 /* use transition SIDs, e.g. devpts/tmpfs */
> > @@ -156,34 +156,34 @@ int security_get_allow_unknown(void);
> >  #define SECURITY_FS_USE_NONE		5 /* no labeling support */
> >  #define SECURITY_FS_USE_MNTPOINT	6 /* use mountpoint labeling */
> >  
> > -int security_fs_use(const char *fstype, unsigned int *behavior,
> > +int sel_fs_use(const char *fstype, unsigned int *behavior,
> >  	u32 *sid);
> >  
> > -int security_genfs_sid(const char *fstype, char *name, u16 sclass,
> > +int sel_genfs_sid(const char *fstype, char *name, u16 sclass,
> >  	u32 *sid);
> >  
> >  #ifdef CONFIG_NETLABEL
> > -int security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr,
> > +int sel_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr,
> >  				   u32 *sid);
> >  
> > -int security_netlbl_sid_to_secattr(u32 sid,
> > +int sel_netlbl_sid_to_secattr(u32 sid,
> >  				   struct netlbl_lsm_secattr *secattr);
> >  #else
> > -static inline int security_netlbl_secattr_to_sid(
> > +static inline int sel_netlbl_secattr_to_sid(
> >  					    struct netlbl_lsm_secattr *secattr,
> >  					    u32 *sid)
> >  {
> >  	return -EIDRM;
> >  }
> >  
> > -static inline int security_netlbl_sid_to_secattr(u32 sid,
> > +static inline int sel_netlbl_sid_to_secattr(u32 sid,
> >  					   struct netlbl_lsm_secattr *secattr)
> >  {
> >  	return -ENOENT;
> >  }
> >  #endif /* CONFIG_NETLABEL */
> >  
> > -const char *security_get_initial_sid_context(u32 sid);
> > +const char *sel_get_initial_sid_context(u32 sid);
> >  
> >  #endif /* _SELINUX_SECURITY_H_ */
> >  
> > diff --git a/security/selinux/netif.c b/security/selinux/netif.c
> > index b4e14bc..3aae049 100644
> > --- a/security/selinux/netif.c
> > +++ b/security/selinux/netif.c
> > @@ -175,7 +175,7 @@ static int sel_netif_sid_slow(int ifindex, u32 *sid)
> >  		ret = -ENOMEM;
> >  		goto out;
> >  	}
> > -	ret = security_netif_sid(dev->name, &new->nsec.sid);
> > +	ret = sel_netif_sid_by_name(dev->name, &new->nsec.sid);
> >  	if (ret != 0)
> >  		goto out;
> >  	new->nsec.ifindex = ifindex;
> > @@ -198,7 +198,7 @@ out:
> >  }
> >  
> >  /**
> > - * sel_netif_sid - Lookup the SID of a network interface
> > + * sel_netif_sid_by_index - Lookup the SID of a network interface
> >   * @ifindex: the network interface
> >   * @sid: interface SID
> >   *
> > @@ -210,7 +210,7 @@ out:
> >   * on failure.
> >   *
> >   */
> > -int sel_netif_sid(int ifindex, u32 *sid)
> > +int sel_netif_sid_by_index(int ifindex, u32 *sid)
> >  {
> >  	struct sel_netif *netif;
> >  
> > diff --git a/security/selinux/netlabel.c b/security/selinux/netlabel.c
> > index 2e98441..26aa550 100644
> > --- a/security/selinux/netlabel.c
> > +++ b/security/selinux/netlabel.c
> > @@ -58,7 +58,7 @@ static int selinux_netlbl_sidlookup_cached(struct sk_buff *skb,
> >  {
> >  	int rc;
> >  
> > -	rc = security_netlbl_secattr_to_sid(secattr, sid);
> > +	rc = sel_netlbl_secattr_to_sid(secattr, sid);
> >  	if (rc == 0 &&
> >  	    (secattr->flags & NETLBL_SECATTR_CACHEABLE) &&
> >  	    (secattr->flags & NETLBL_SECATTR_CACHE))
> > @@ -89,7 +89,7 @@ static struct netlbl_lsm_secattr *selinux_netlbl_sock_genattr(struct sock *sk)
> >  	secattr = netlbl_secattr_alloc(GFP_ATOMIC);
> >  	if (secattr == NULL)
> >  		return NULL;
> > -	rc = security_netlbl_sid_to_secattr(sksec->sid, secattr);
> > +	rc = sel_netlbl_sid_to_secattr(sksec->sid, secattr);
> >  	if (rc != 0) {
> >  		netlbl_secattr_free(secattr);
> >  		return NULL;
> > @@ -228,7 +228,7 @@ int selinux_netlbl_skbuff_setsid(struct sk_buff *skb,
> >  	if (secattr == NULL) {
> >  		secattr = &secattr_storage;
> >  		netlbl_secattr_init(secattr);
> > -		rc = security_netlbl_sid_to_secattr(sid, secattr);
> > +		rc = sel_netlbl_sid_to_secattr(sid, secattr);
> >  		if (rc != 0)
> >  			goto skbuff_setsid_return;
> >  	}
> > @@ -261,7 +261,7 @@ int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family)
> >  		return 0;
> >  
> >  	netlbl_secattr_init(&secattr);
> > -	rc = security_netlbl_sid_to_secattr(req->secid, &secattr);
> > +	rc = sel_netlbl_sid_to_secattr(req->secid, &secattr);
> >  	if (rc != 0)
> >  		goto inet_conn_request_return;
> >  	rc = netlbl_req_setattr(req, &secattr);
> > diff --git a/security/selinux/netnode.c b/security/selinux/netnode.c
> > index 7100072..894a4f0 100644
> > --- a/security/selinux/netnode.c
> > +++ b/security/selinux/netnode.c
> > @@ -229,12 +229,12 @@ static int sel_netnode_sid_slow(void *addr, u16 family, u32 *sid)
> >  		goto out;
> >  	switch (family) {
> >  	case PF_INET:
> > -		ret = security_node_sid(PF_INET,
> > +		ret = sel_node_sid(PF_INET,
> >  					addr, sizeof(struct in_addr), sid);
> >  		new->nsec.addr.ipv4 = *(__be32 *)addr;
> >  		break;
> >  	case PF_INET6:
> > -		ret = security_node_sid(PF_INET6,
> > +		ret = sel_node_sid(PF_INET6,
> >  					addr, sizeof(struct in6_addr), sid);
> >  		ipv6_addr_copy(&new->nsec.addr.ipv6, addr);
> >  		break;
> > diff --git a/security/selinux/netport.c b/security/selinux/netport.c
> > index fe7fba6..8724815 100644
> > --- a/security/selinux/netport.c
> > +++ b/security/selinux/netport.c
> > @@ -174,7 +174,7 @@ static int sel_netport_sid_slow(u8 protocol, u16 pnum, u32 *sid)
> >  	new = kzalloc(sizeof(*new), GFP_ATOMIC);
> >  	if (new == NULL)
> >  		goto out;
> > -	ret = security_port_sid(protocol, pnum, sid);
> > +	ret = sel_port_sid(protocol, pnum, sid);
> >  	if (ret != 0)
> >  		goto out;
> >  
> > diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c
> > index b4fc506..4129d90 100644
> > --- a/security/selinux/selinuxfs.c
> > +++ b/security/selinux/selinuxfs.c
> > @@ -193,7 +193,7 @@ static ssize_t sel_read_handle_unknown(struct file *filp, char __user *buf,
> >  	ssize_t length;
> >  	ino_t ino = filp->f_path.dentry->d_inode->i_ino;
> >  	int handle_unknown = (ino == SEL_REJECT_UNKNOWN) ?
> > -		security_get_reject_unknown() : !security_get_allow_unknown();
> > +		sel_get_reject_unknown() : !sel_get_allow_unknown();
> >  
> >  	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", handle_unknown);
> >  	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
> > @@ -320,7 +320,7 @@ static ssize_t sel_write_load(struct file *file, const char __user *buf,
> >  	if (copy_from_user(data, buf, count) != 0)
> >  		goto out;
> >  
> > -	length = security_load_policy(data, count);
> > +	length = sel_load_policy(data, count);
> >  	if (length)
> >  		goto out;
> >  
> > @@ -367,11 +367,11 @@ static ssize_t sel_write_context(struct file *file, char *buf, size_t size)
> >  	if (length)
> >  		return length;
> >  
> > -	length = security_context_to_sid(buf, size, &sid);
> > +	length = sel_context_to_sid(buf, size, &sid);
> >  	if (length < 0)
> >  		return length;
> >  
> > -	length = security_sid_to_context(sid, &canon, &len);
> > +	length = sel_sid_to_context(sid, &canon, &len);
> >  	if (length < 0)
> >  		return length;
> >  
> > @@ -515,14 +515,14 @@ static ssize_t sel_write_access(struct file *file, char *buf, size_t size)
> >  	if (sscanf(buf, "%s %s %hu %x", scon, tcon, &tclass, &req) != 4)
> >  		goto out2;
> >  
> > -	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
> > +	length = sel_context_to_sid(scon, strlen(scon)+1, &ssid);
> >  	if (length < 0)
> >  		goto out2;
> > -	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
> > +	length = sel_context_to_sid(tcon, strlen(tcon)+1, &tsid);
> >  	if (length < 0)
> >  		goto out2;
> >  
> > -	length = security_compute_av(ssid, tsid, tclass, req, &avd);
> > +	length = sel_compute_av(ssid, tsid, tclass, req, &avd);
> >  	if (length < 0)
> >  		goto out2;
> >  
> > @@ -564,18 +564,18 @@ static ssize_t sel_write_create(struct file *file, char *buf, size_t size)
> >  	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
> >  		goto out2;
> >  
> > -	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
> > +	length = sel_context_to_sid(scon, strlen(scon)+1, &ssid);
> >  	if (length < 0)
> >  		goto out2;
> > -	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
> > +	length = sel_context_to_sid(tcon, strlen(tcon)+1, &tsid);
> >  	if (length < 0)
> >  		goto out2;
> >  
> > -	length = security_transition_sid(ssid, tsid, tclass, &newsid);
> > +	length = sel_transition_sid(ssid, tsid, tclass, &newsid);
> >  	if (length < 0)
> >  		goto out2;
> >  
> > -	length = security_sid_to_context(newsid, &newcon, &len);
> > +	length = sel_sid_to_context(newsid, &newcon, &len);
> >  	if (length < 0)
> >  		goto out2;
> >  
> > @@ -623,18 +623,18 @@ static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size)
> >  	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
> >  		goto out2;
> >  
> > -	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
> > +	length = sel_context_to_sid(scon, strlen(scon)+1, &ssid);
> >  	if (length < 0)
> >  		goto out2;
> > -	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
> > +	length = sel_context_to_sid(tcon, strlen(tcon)+1, &tsid);
> >  	if (length < 0)
> >  		goto out2;
> >  
> > -	length = security_change_sid(ssid, tsid, tclass, &newsid);
> > +	length = sel_change_sid(ssid, tsid, tclass, &newsid);
> >  	if (length < 0)
> >  		goto out2;
> >  
> > -	length = security_sid_to_context(newsid, &newcon, &len);
> > +	length = sel_sid_to_context(newsid, &newcon, &len);
> >  	if (length < 0)
> >  		goto out2;
> >  
> > @@ -680,18 +680,18 @@ static ssize_t sel_write_user(struct file *file, char *buf, size_t size)
> >  	if (sscanf(buf, "%s %s", con, user) != 2)
> >  		goto out2;
> >  
> > -	length = security_context_to_sid(con, strlen(con)+1, &sid);
> > +	length = sel_context_to_sid(con, strlen(con)+1, &sid);
> >  	if (length < 0)
> >  		goto out2;
> >  
> > -	length = security_get_user_sids(sid, user, &sids, &nsids);
> > +	length = sel_get_user_sids(sid, user, &sids, &nsids);
> >  	if (length < 0)
> >  		goto out2;
> >  
> >  	length = sprintf(buf, "%u", nsids) + 1;
> >  	ptr = buf + length;
> >  	for (i = 0; i < nsids; i++) {
> > -		rc = security_sid_to_context(sids[i], &newcon, &len);
> > +		rc = sel_sid_to_context(sids[i], &newcon, &len);
> >  		if (rc) {
> >  			length = rc;
> >  			goto out3;
> > @@ -741,18 +741,18 @@ static ssize_t sel_write_member(struct file *file, char *buf, size_t size)
> >  	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
> >  		goto out2;
> >  
> > -	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
> > +	length = sel_context_to_sid(scon, strlen(scon)+1, &ssid);
> >  	if (length < 0)
> >  		goto out2;
> > -	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
> > +	length = sel_context_to_sid(tcon, strlen(tcon)+1, &tsid);
> >  	if (length < 0)
> >  		goto out2;
> >  
> > -	length = security_member_sid(ssid, tsid, tclass, &newsid);
> > +	length = sel_member_sid(ssid, tsid, tclass, &newsid);
> >  	if (length < 0)
> >  		goto out2;
> >  
> > -	length = security_sid_to_context(newsid, &newcon, &len);
> > +	length = sel_sid_to_context(newsid, &newcon, &len);
> >  	if (length < 0)
> >  		goto out2;
> >  
> > @@ -1015,7 +1015,7 @@ static int sel_make_bools(void)
> >  			goto err;
> >  		}
> >  		isec = (struct inode_security_struct *)inode->i_security;
> > -		ret = security_genfs_sid("selinuxfs", page, SECCLASS_FILE, &sid);
> > +		ret = sel_genfs_sid("selinuxfs", page, SECCLASS_FILE, &sid);
> >  		if (ret)
> >  			goto err;
> >  		isec->sid = sid;
> > @@ -1244,7 +1244,7 @@ static ssize_t sel_read_initcon(struct file *file, char __user *buf,
> >  
> >  	inode = file->f_path.dentry->d_inode;
> >  	sid = inode->i_ino&SEL_INO_MASK;
> > -	ret = security_sid_to_context(sid, &con, &len);
> > +	ret = sel_sid_to_context(sid, &con, &len);
> >  	if (ret < 0)
> >  		return ret;
> >  
> > @@ -1264,7 +1264,7 @@ static int sel_make_initcon_files(struct dentry *dir)
> >  	for (i = 1; i <= SECINITSID_NUM; i++) {
> >  		struct inode *inode;
> >  		struct dentry *dentry;
> > -		dentry = d_alloc_name(dir, security_get_initial_sid_context(i));
> > +		dentry = d_alloc_name(dir, sel_get_initial_sid_context(i));
> >  		if (!dentry) {
> >  			ret = -ENOMEM;
> >  			goto out;
> > @@ -1364,7 +1364,7 @@ static ssize_t sel_read_policycap(struct file *file, char __user *buf,
> >  	ssize_t length;
> >  	unsigned long i_ino = file->f_path.dentry->d_inode->i_ino;
> >  
> > -	value = security_policycap_supported(i_ino & SEL_INO_MASK);
> > +	value = sel_policycap_supported(i_ino & SEL_INO_MASK);
> >  	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", value);
> >  
> >  	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
> > @@ -1380,7 +1380,7 @@ static int sel_make_perm_files(char *objclass, int classvalue,
> >  	int i, rc = 0, nperms;
> >  	char **perms;
> >  
> > -	rc = security_get_permissions(objclass, &perms, &nperms);
> > +	rc = sel_get_permissions(objclass, &perms, &nperms);
> >  	if (rc)
> >  		goto out;
> >  
> > @@ -1484,7 +1484,7 @@ static int sel_make_classes(void)
> >  	/* delete any existing entries */
> >  	sel_remove_classes();
> >  
> > -	rc = security_get_classes(&classes, &nclasses);
> > +	rc = sel_get_classes(&classes, &nclasses);
> >  	if (rc < 0)
> >  		goto out;
> >  
> > diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c
> > index ff17820..988fef6 100644
> > --- a/security/selinux/ss/services.c
> > +++ b/security/selinux/ss/services.c
> > @@ -285,7 +285,7 @@ mls_ops:
> >  
> >  /*
> >   * security_dump_masked_av - dumps masked permissions during
> > - * security_compute_av due to RBAC, MLS/Constraint and Type bounds.
> > + * sel_compute_av due to RBAC, MLS/Constraint and Type bounds.
> >   */
> >  static int dump_masked_av_helper(void *k, void *d, void *args)
> >  {
> > @@ -347,7 +347,7 @@ static void security_dump_masked_av(struct context *scontext,
> >  	if (!ab)
> >  		goto out;
> >  
> > -	audit_log_format(ab, "op=security_compute_av reason=%s "
> > +	audit_log_format(ab, "op=sel_compute_av reason=%s "
> >  			 "scontext=%s tcontext=%s tclass=%s perms=",
> >  			 reason, scontext_name, tcontext_name, tclass_name);
> >  
> > @@ -622,7 +622,7 @@ static int security_validtrans_handle_fail(struct context *ocontext,
> >  	if (context_struct_to_string(tcontext, &t, &tlen) < 0)
> >  		goto out;
> >  	audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR,
> > -		  "security_validate_transition:  denied for"
> > +		  "sel_validate_transition:  denied for"
> >  		  " oldcontext=%s newcontext=%s taskcontext=%s tclass=%s",
> >  		  o, n, t, policydb.p_class_val_to_name[tclass-1]);
> >  out:
> > @@ -635,7 +635,7 @@ out:
> >  	return -EPERM;
> >  }
> >  
> > -int security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid,
> > +int sel_validate_transition(u32 oldsid, u32 newsid, u32 tasksid,
> >  				 u16 tclass)
> >  {
> >  	struct context *ocontext;
> > @@ -710,7 +710,7 @@ out:
> >  }
> >  
> >  /*
> > - * security_bounded_transition - check whether the given
> > + * sel_bounded_transition - check whether the given
> >   * transition is directed to bounded, or not.
> >   * It returns 0, if @newsid is bounded by @oldsid.
> >   * Otherwise, it returns error code.
> > @@ -718,7 +718,7 @@ out:
> >   * @oldsid : current security identifier
> >   * @newsid : destinated security identifier
> >   */
> > -int security_bounded_transition(u32 old_sid, u32 new_sid)
> > +int sel_bounded_transition(u32 old_sid, u32 new_sid)
> >  {
> >  	struct context *old_context, *new_context;
> >  	struct type_datum *type;
> > @@ -777,7 +777,7 @@ int security_bounded_transition(u32 old_sid, u32 new_sid)
> >  					      &new_name, &length)) {
> >  			audit_log(current->audit_context,
> >  				  GFP_ATOMIC, AUDIT_SELINUX_ERR,
> > -				  "op=security_bounded_transition "
> > +				  "op=sel_bounded_transition "
> >  				  "result=denied "
> >  				  "oldcontext=%s newcontext=%s",
> >  				  old_name, new_name);
> > @@ -793,7 +793,7 @@ out:
> >  
> > 
> >  /**
> > - * security_compute_av - Compute access vector decisions.
> > + * sel_compute_av - Compute access vector decisions.
> >   * @ssid: source security identifier
> >   * @tsid: target security identifier
> >   * @tclass: target security class
> > @@ -805,7 +805,7 @@ out:
> >   * Return -%EINVAL if any of the parameters are invalid or %0
> >   * if the access vector decisions were computed successfully.
> >   */
> > -int security_compute_av(u32 ssid,
> > +int sel_compute_av(u32 ssid,
> >  			u32 tsid,
> >  			u16 tclass,
> >  			u32 requested,
> > @@ -904,14 +904,14 @@ static int context_struct_to_string(struct context *context, char **scontext, u3
> >  
> >  #include "initial_sid_to_string.h"
> >  
> > -const char *security_get_initial_sid_context(u32 sid)
> > +const char *sel_get_initial_sid_context(u32 sid)
> >  {
> >  	if (unlikely(sid > SECINITSID_NUM))
> >  		return NULL;
> >  	return initial_sid_to_string[sid];
> >  }
> >  
> > -static int security_sid_to_context_core(u32 sid, char **scontext,
> > +static int sel_sid_to_context_core(u32 sid, char **scontext,
> >  					u32 *scontext_len, int force)
> >  {
> >  	struct context *context;
> > @@ -959,7 +959,7 @@ out:
> >  }
> >  
> >  /**
> > - * security_sid_to_context - Obtain a context for a given SID.
> > + * sel_sid_to_context - Obtain a context for a given SID.
> >   * @sid: security identifier, SID
> >   * @scontext: security context
> >   * @scontext_len: length in bytes
> > @@ -968,14 +968,14 @@ out:
> >   * into a dynamically allocated string of the correct size.  Set @scontext
> >   * to point to this string and set @scontext_len to the length of the string.
> >   */
> > -int security_sid_to_context(u32 sid, char **scontext, u32 *scontext_len)
> > +int sel_sid_to_context(u32 sid, char **scontext, u32 *scontext_len)
> >  {
> > -	return security_sid_to_context_core(sid, scontext, scontext_len, 0);
> > +	return sel_sid_to_context_core(sid, scontext, scontext_len, 0);
> >  }
> >  
> > -int security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len)
> > +int sel_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len)
> >  {
> > -	return security_sid_to_context_core(sid, scontext, scontext_len, 1);
> > +	return sel_sid_to_context_core(sid, scontext, scontext_len, 1);
> >  }
> >  
> >  /*
> > @@ -1066,7 +1066,7 @@ out:
> >  	return rc;
> >  }
> >  
> > -static int security_context_to_sid_core(const char *scontext, u32 scontext_len,
> > +static int sel_context_to_sid_core(const char *scontext, u32 scontext_len,
> >  					u32 *sid, u32 def_sid, gfp_t gfp_flags,
> >  					int force)
> >  {
> > @@ -1124,7 +1124,7 @@ out:
> >  }
> >  
> >  /**
> > - * security_context_to_sid - Obtain a SID for a given security context.
> > + * sel_context_to_sid - Obtain a SID for a given security context.
> >   * @scontext: security context
> >   * @scontext_len: length in bytes
> >   * @sid: security identifier, SID
> > @@ -1134,14 +1134,14 @@ out:
> >   * Returns -%EINVAL if the context is invalid, -%ENOMEM if insufficient
> >   * memory is available, or 0 on success.
> >   */
> > -int security_context_to_sid(const char *scontext, u32 scontext_len, u32 *sid)
> > +int sel_context_to_sid(const char *scontext, u32 scontext_len, u32 *sid)
> >  {
> > -	return security_context_to_sid_core(scontext, scontext_len,
> > +	return sel_context_to_sid_core(scontext, scontext_len,
> >  					    sid, SECSID_NULL, GFP_KERNEL, 0);
> >  }
> >  
> >  /**
> > - * security_context_to_sid_default - Obtain a SID for a given security context,
> > + * sel_context_to_sid_default - Obtain a SID for a given security context,
> >   * falling back to specified default if needed.
> >   *
> >   * @scontext: security context
> > @@ -1158,17 +1158,17 @@ int security_context_to_sid(const char *scontext, u32 scontext_len, u32 *sid)
> >   * Returns -%EINVAL if the context is invalid, -%ENOMEM if insufficient
> >   * memory is available, or 0 on success.
> >   */
> > -int security_context_to_sid_default(const char *scontext, u32 scontext_len,
> > +int sel_context_to_sid_default(const char *scontext, u32 scontext_len,
> >  				    u32 *sid, u32 def_sid, gfp_t gfp_flags)
> >  {
> > -	return security_context_to_sid_core(scontext, scontext_len,
> > +	return sel_context_to_sid_core(scontext, scontext_len,
> >  					    sid, def_sid, gfp_flags, 1);
> >  }
> >  
> > -int security_context_to_sid_force(const char *scontext, u32 scontext_len,
> > +int sel_context_to_sid_force(const char *scontext, u32 scontext_len,
> >  				  u32 *sid)
> >  {
> > -	return security_context_to_sid_core(scontext, scontext_len,
> > +	return sel_context_to_sid_core(scontext, scontext_len,
> >  					    sid, SECSID_NULL, GFP_KERNEL, 1);
> >  }
> >  
> > @@ -1341,7 +1341,7 @@ out:
> >  }
> >  
> >  /**
> > - * security_transition_sid - Compute the SID for a new subject/object.
> > + * sel_transition_sid - Compute the SID for a new subject/object.
> >   * @ssid: source security identifier
> >   * @tsid: target security identifier
> >   * @tclass: target security class
> > @@ -1353,7 +1353,7 @@ out:
> >   * if insufficient memory is available, or %0 if the new SID was
> >   * computed successfully.
> >   */
> > -int security_transition_sid(u32 ssid,
> > +int sel_transition_sid(u32 ssid,
> >  			    u32 tsid,
> >  			    u16 tclass,
> >  			    u32 *out_sid)
> > @@ -1362,7 +1362,7 @@ int security_transition_sid(u32 ssid,
> >  }
> >  
> >  /**
> > - * security_member_sid - Compute the SID for member selection.
> > + * sel_member_sid - Compute the SID for member selection.
> >   * @ssid: source security identifier
> >   * @tsid: target security identifier
> >   * @tclass: target security class
> > @@ -1374,7 +1374,7 @@ int security_transition_sid(u32 ssid,
> >   * if insufficient memory is available, or %0 if the SID was
> >   * computed successfully.
> >   */
> > -int security_member_sid(u32 ssid,
> > +int sel_member_sid(u32 ssid,
> >  			u32 tsid,
> >  			u16 tclass,
> >  			u32 *out_sid)
> > @@ -1383,7 +1383,7 @@ int security_member_sid(u32 ssid,
> >  }
> >  
> >  /**
> > - * security_change_sid - Compute the SID for object relabeling.
> > + * sel_change_sid - Compute the SID for object relabeling.
> >   * @ssid: source security identifier
> >   * @tsid: target security identifier
> >   * @tclass: target security class
> > @@ -1395,7 +1395,7 @@ int security_member_sid(u32 ssid,
> >   * if insufficient memory is available, or %0 if the SID was
> >   * computed successfully.
> >   */
> > -int security_change_sid(u32 ssid,
> > +int sel_change_sid(u32 ssid,
> >  			u32 tsid,
> >  			u16 tclass,
> >  			u32 *out_sid)
> > @@ -1536,7 +1536,7 @@ static int validate_classes(struct policydb *p)
> >  	}
> >  	if (print_unknown_handle)
> >  		printk(KERN_INFO "SELinux: the above unknown classes and permissions will be %s\n",
> > -			(security_get_allow_unknown() ? "allowed" : "denied"));
> > +			(sel_get_allow_unknown() ? "allowed" : "denied"));
> >  	return 0;
> >  }
> >  
> > @@ -1685,7 +1685,7 @@ bad:
> >  	goto out;
> >  }
> >  
> > -static void security_load_policycaps(void)
> > +static void sel_load_policycaps(void)
> >  {
> >  	selinux_policycap_netpeer = ebitmap_get_bit(&policydb.policycaps,
> >  						  POLICYDB_CAPABILITY_NETPEER);
> > @@ -1697,7 +1697,7 @@ extern void selinux_complete_init(void);
> >  static int security_preserve_bools(struct policydb *p);
> >  
> >  /**
> > - * security_load_policy - Load a security policy configuration.
> > + * sel_load_policy - Load a security policy configuration.
> >   * @data: binary policy data
> >   * @len: length of data in bytes
> >   *
> > @@ -1706,7 +1706,7 @@ static int security_preserve_bools(struct policydb *p);
> >   * This function will flush the access vector cache after
> >   * loading the new policy.
> >   */
> > -int security_load_policy(void *data, size_t len)
> > +int sel_load_policy(void *data, size_t len)
> >  {
> >  	struct policydb oldpolicydb, newpolicydb;
> >  	struct sidtab oldsidtab, newsidtab;
> > @@ -1735,7 +1735,7 @@ int security_load_policy(void *data, size_t len)
> >  			avtab_cache_destroy();
> >  			return -EINVAL;
> >  		}
> > -		security_load_policycaps();
> > +		sel_load_policycaps();
> >  		policydb_loaded_version = policydb.policyvers;
> >  		ss_initialized = 1;
> >  		seqno = ++latest_granting;
> > @@ -1798,7 +1798,7 @@ int security_load_policy(void *data, size_t len)
> >  	write_lock_irq(&policy_rwlock);
> >  	memcpy(&policydb, &newpolicydb, sizeof policydb);
> >  	sidtab_set(&sidtab, &newsidtab);
> > -	security_load_policycaps();
> > +	sel_load_policycaps();
> >  	seqno = ++latest_granting;
> >  	policydb_loaded_version = policydb.policyvers;
> >  	write_unlock_irq(&policy_rwlock);
> > @@ -1822,12 +1822,12 @@ err:
> >  }
> >  
> >  /**
> > - * security_port_sid - Obtain the SID for a port.
> > + * sel_port_sid - Obtain the SID for a port.
> >   * @protocol: protocol number
> >   * @port: port number
> >   * @out_sid: security identifier
> >   */
> > -int security_port_sid(u8 protocol, u16 port, u32 *out_sid)
> > +int sel_port_sid(u8 protocol, u16 port, u32 *out_sid)
> >  {
> >  	struct ocontext *c;
> >  	int rc = 0;
> > @@ -1862,11 +1862,11 @@ out:
> >  }
> >  
> >  /**
> > - * security_netif_sid - Obtain the SID for a network interface.
> > + * sel_netif_sid_by_name - Obtain the SID for a network interface.
> >   * @name: interface name
> >   * @if_sid: interface SID
> >   */
> > -int security_netif_sid(char *name, u32 *if_sid)
> > +int sel_netif_sid_by_name(char *name, u32 *if_sid)
> >  {
> >  	int rc = 0;
> >  	struct ocontext *c;
> > @@ -1916,13 +1916,13 @@ static int match_ipv6_addrmask(u32 *input, u32 *addr, u32 *mask)
> >  }
> >  
> >  /**
> > - * security_node_sid - Obtain the SID for a node (host).
> > + * sel_node_sid - Obtain the SID for a node (host).
> >   * @domain: communication domain aka address family
> >   * @addrp: address
> >   * @addrlen: address length in bytes
> >   * @out_sid: security identifier
> >   */
> > -int security_node_sid(u16 domain,
> > +int sel_node_sid(u16 domain,
> >  		      void *addrp,
> >  		      u32 addrlen,
> >  		      u32 *out_sid)
> > @@ -1992,7 +1992,7 @@ out:
> >  #define SIDS_NEL 25
> >  
> >  /**
> > - * security_get_user_sids - Obtain reachable SIDs for a user.
> > + * sel_get_user_sids - Obtain reachable SIDs for a user.
> >   * @fromsid: starting SID
> >   * @username: username
> >   * @sids: array of reachable SIDs for user
> > @@ -2005,7 +2005,7 @@ out:
> >   * number of elements in the array.
> >   */
> >  
> > -int security_get_user_sids(u32 fromsid,
> > +int sel_get_user_sids(u32 fromsid,
> >  			   char *username,
> >  			   u32 **sids,
> >  			   u32 *nel)
> > @@ -2107,7 +2107,7 @@ out:
> >  }
> >  
> >  /**
> > - * security_genfs_sid - Obtain a SID for a file in a filesystem
> > + * sel_genfs_sid - Obtain a SID for a file in a filesystem
> >   * @fstype: filesystem type
> >   * @path: path from root of mount
> >   * @sclass: file security class
> > @@ -2117,7 +2117,7 @@ out:
> >   * cannot support xattr or use a fixed labeling behavior like
> >   * transition SIDs or task SIDs.
> >   */
> > -int security_genfs_sid(const char *fstype,
> > +int sel_genfs_sid(const char *fstype,
> >  		       char *path,
> >  		       u16 sclass,
> >  		       u32 *sid)
> > @@ -2172,12 +2172,12 @@ out:
> >  }
> >  
> >  /**
> > - * security_fs_use - Determine how to handle labeling for a filesystem.
> > + * sel_fs_use - Determine how to handle labeling for a filesystem.
> >   * @fstype: filesystem type
> >   * @behavior: labeling behavior
> >   * @sid: SID for filesystem (superblock)
> >   */
> > -int security_fs_use(
> > +int sel_fs_use(
> >  	const char *fstype,
> >  	unsigned int *behavior,
> >  	u32 *sid)
> > @@ -2205,7 +2205,7 @@ int security_fs_use(
> >  		}
> >  		*sid = c->sid[0];
> >  	} else {
> > -		rc = security_genfs_sid(fstype, "/", SECCLASS_DIR, sid);
> > +		rc = sel_genfs_sid(fstype, "/", SECCLASS_DIR, sid);
> >  		if (rc) {
> >  			*behavior = SECURITY_FS_USE_NONE;
> >  			rc = 0;
> > @@ -2365,10 +2365,10 @@ out:
> >  }
> >  
> >  /*
> > - * security_sid_mls_copy() - computes a new sid based on the given
> > + * sel_sid_mls_copy() - computes a new sid based on the given
> >   * sid and the mls portion of mls_sid.
> >   */
> > -int security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid)
> > +int sel_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid)
> >  {
> >  	struct context *context1;
> >  	struct context *context2;
> > @@ -2421,7 +2421,7 @@ int security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid)
> >  bad:
> >  	if (!context_struct_to_string(&newcon, &s, &len)) {
> >  		audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR,
> > -			  "security_sid_mls_copy: invalid context %s", s);
> > +			  "sel_sid_mls_copy: invalid context %s", s);
> >  		kfree(s);
> >  	}
> >  
> > @@ -2433,7 +2433,7 @@ out:
> >  }
> >  
> >  /**
> > - * security_net_peersid_resolve - Compare and resolve two network peer SIDs
> > + * sel_net_peersid_resolve - Compare and resolve two network peer SIDs
> >   * @nlbl_sid: NetLabel SID
> >   * @nlbl_type: NetLabel labeling protocol type
> >   * @xfrm_sid: XFRM SID
> > @@ -2452,7 +2452,7 @@ out:
> >   *   multiple, inconsistent labels |    -<errno>     |    SECSID_NULL
> >   *
> >   */
> > -int security_net_peersid_resolve(u32 nlbl_sid, u32 nlbl_type,
> > +int sel_net_peersid_resolve(u32 nlbl_sid, u32 nlbl_type,
> >  				 u32 xfrm_sid,
> >  				 u32 *peer_sid)
> >  {
> > @@ -2528,7 +2528,7 @@ static int get_classes_callback(void *k, void *d, void *args)
> >  	return 0;
> >  }
> >  
> > -int security_get_classes(char ***classes, int *nclasses)
> > +int sel_get_classes(char ***classes, int *nclasses)
> >  {
> >  	int rc = -ENOMEM;
> >  
> > @@ -2566,7 +2566,7 @@ static int get_permissions_callback(void *k, void *d, void *args)
> >  	return 0;
> >  }
> >  
> > -int security_get_permissions(char *class, char ***perms, int *nperms)
> > +int sel_get_permissions(char *class, char ***perms, int *nperms)
> >  {
> >  	int rc = -ENOMEM, i;
> >  	struct class_datum *match;
> > @@ -2610,18 +2610,18 @@ err:
> >  	return rc;
> >  }
> >  
> > -int security_get_reject_unknown(void)
> > +int sel_get_reject_unknown(void)
> >  {
> >  	return policydb.reject_unknown;
> >  }
> >  
> > -int security_get_allow_unknown(void)
> > +int sel_get_allow_unknown(void)
> >  {
> >  	return policydb.allow_unknown;
> >  }
> >  
> >  /**
> > - * security_policycap_supported - Check for a specific policy capability
> > + * sel_policycap_supported - Check for a specific policy capability
> >   * @req_cap: capability
> >   *
> >   * Description:
> > @@ -2630,7 +2630,7 @@ int security_get_allow_unknown(void)
> >   * supported, false (0) if it isn't supported.
> >   *
> >   */
> > -int security_policycap_supported(unsigned int req_cap)
> > +int sel_policycap_supported(unsigned int req_cap)
> >  {
> >  	int rc;
> >  
> > @@ -2944,7 +2944,7 @@ static void security_netlbl_cache_add(struct netlbl_lsm_secattr *secattr,
> >  }
> >  
> >  /**
> > - * security_netlbl_secattr_to_sid - Convert a NetLabel secattr to a SELinux SID
> > + * sel_netlbl_secattr_to_sid - Convert a NetLabel secattr to a SELinux SID
> >   * @secattr: the NetLabel packet security attributes
> >   * @sid: the SELinux SID
> >   *
> > @@ -2958,7 +2958,7 @@ static void security_netlbl_cache_add(struct netlbl_lsm_secattr *secattr,
> >   * failure.
> >   *
> >   */
> > -int security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr,
> > +int sel_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr,
> >  				   u32 *sid)
> >  {
> >  	int rc = -EIDRM;
> > @@ -3020,7 +3020,7 @@ netlbl_secattr_to_sid_return_cleanup:
> >  }
> >  
> >  /**
> > - * security_netlbl_sid_to_secattr - Convert a SELinux SID to a NetLabel secattr
> > + * sel_netlbl_sid_to_secattr - Convert a SELinux SID to a NetLabel secattr
> >   * @sid: the SELinux SID
> >   * @secattr: the NetLabel packet security attributes
> >   *
> > @@ -3029,7 +3029,7 @@ netlbl_secattr_to_sid_return_cleanup:
> >   * Returns zero on success, negative values on failure.
> >   *
> >   */
> > -int security_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr)
> > +int sel_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr)
> >  {
> >  	int rc;
> >  	struct context *ctx;
> > diff --git a/security/selinux/xfrm.c b/security/selinux/xfrm.c
> > index 72b1845..8e292ad 100644
> > --- a/security/selinux/xfrm.c
> > +++ b/security/selinux/xfrm.c
> > @@ -229,7 +229,7 @@ static int selinux_xfrm_sec_ctx_alloc(struct xfrm_sec_ctx **ctxp,
> >  	       uctx+1,
> >  	       str_len);
> >  	ctx->ctx_str[str_len] = 0;
> > -	rc = security_context_to_sid(ctx->ctx_str,
> > +	rc = sel_context_to_sid(ctx->ctx_str,
> >  				     str_len,
> >  				     &ctx->ctx_sid);
> >  
> > @@ -248,7 +248,7 @@ static int selinux_xfrm_sec_ctx_alloc(struct xfrm_sec_ctx **ctxp,
> >  	return rc;
> >  
> >  not_from_user:
> > -	rc = security_sid_to_context(sid, &ctx_str, &str_len);
> > +	rc = sel_sid_to_context(sid, &ctx_str, &str_len);
> >  	if (rc)
> >  		goto out;
> >  



--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux