On Tue, 2009-07-07 at 17:49 -0400, Thomas Liu wrote: > This includes namespacing of all items originally labeled > security_ with sel_. > > In addition, the functions sel_netif_sid and security_netif_sid > have been renamed because the namespacing would cause a conflict. > > sel_netif_sid has been renamed to sel_netif_sid_by_index, and > security_netif_sid has been renamed to sel_netif_sid_by_name This patch has a minor reject against the current security-testing tree. However, I'm having second thoughts about the renaming idea. There are a rather large number of documents, not to mention the userspace API, that talk about security_compute_av() and friends, and thus I'm a bit hesitant to render them all obsolete. > > Signed-off-by: Thomas Liu <tliu@xxxxxxxxxx> > --- > security/selinux/avc.c | 8 +- > security/selinux/exports.c | 2 +- > security/selinux/hooks.c | 80 +++++++++++----------- > security/selinux/include/netif.h | 2 +- > security/selinux/include/security.h | 60 ++++++++-------- > security/selinux/netif.c | 6 +- > security/selinux/netlabel.c | 8 +- > security/selinux/netnode.c | 4 +- > security/selinux/netport.c | 2 +- > security/selinux/selinuxfs.c | 56 ++++++++-------- > security/selinux/ss/services.c | 130 +++++++++++++++++----------------- > security/selinux/xfrm.c | 4 +- > 12 files changed, 182 insertions(+), 180 deletions(-) > > diff --git a/security/selinux/avc.c b/security/selinux/avc.c > index 236aaa2..d0dfee0 100644 > --- a/security/selinux/avc.c > +++ b/security/selinux/avc.c > @@ -203,7 +203,7 @@ static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tcla > char *scontext; > u32 scontext_len; > > - rc = security_sid_to_context(ssid, &scontext, &scontext_len); > + rc = sel_sid_to_context(ssid, &scontext, &scontext_len); > if (rc) > audit_log_format(ab, "ssid=%d", ssid); > else { > @@ -211,7 +211,7 @@ static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tcla > kfree(scontext); > } > > - rc = security_sid_to_context(tsid, &scontext, &scontext_len); > + rc = sel_sid_to_context(tsid, &scontext, &scontext_len); > if (rc) > audit_log_format(ab, " tsid=%d", tsid); > else { > @@ -448,7 +448,7 @@ static int avc_latest_notif_update(int seqno, int is_insert) > * (@ssid, @tsid) and class @tclass. > * The access vectors and the sequence number are > * normally provided by the security server in > - * response to a security_compute_av() call. If the > + * response to a sel_compute_av() call. If the > * sequence number @avd->seqno is not less than the latest > * revocation notification, then the function copies > * the access vectors into a cache entry, returns > @@ -911,7 +911,7 @@ int avc_has_perm_noaudit(u32 ssid, u32 tsid, > else > avd = &avd_entry; > > - rc = security_compute_av(ssid, tsid, tclass, requested, avd); > + rc = sel_compute_av(ssid, tsid, tclass, requested, avd); > if (rc) > goto out; > rcu_read_lock(); > diff --git a/security/selinux/exports.c b/security/selinux/exports.c > index c73aeaa..ba1f91d 100644 > --- a/security/selinux/exports.c > +++ b/security/selinux/exports.c > @@ -28,7 +28,7 @@ extern atomic_t selinux_secmark_refcount; > int selinux_string_to_sid(char *str, u32 *sid) > { > if (selinux_enabled) > - return security_context_to_sid(str, strlen(str), sid); > + return sel_context_to_sid(str, strlen(str), sid); > else { > *sid = 0; > return 0; > diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c > index 2081055..9d27178 100644 > --- a/security/selinux/hooks.c > +++ b/security/selinux/hooks.c > @@ -525,21 +525,21 @@ static int selinux_get_mnt_opts(const struct super_block *sb, > > i = 0; > if (sbsec->flags & FSCONTEXT_MNT) { > - rc = security_sid_to_context(sbsec->sid, &context, &len); > + rc = sel_sid_to_context(sbsec->sid, &context, &len); > if (rc) > goto out_free; > opts->mnt_opts[i] = context; > opts->mnt_opts_flags[i++] = FSCONTEXT_MNT; > } > if (sbsec->flags & CONTEXT_MNT) { > - rc = security_sid_to_context(sbsec->mntpoint_sid, &context, &len); > + rc = sel_sid_to_context(sbsec->mntpoint_sid, &context, &len); > if (rc) > goto out_free; > opts->mnt_opts[i] = context; > opts->mnt_opts_flags[i++] = CONTEXT_MNT; > } > if (sbsec->flags & DEFCONTEXT_MNT) { > - rc = security_sid_to_context(sbsec->def_sid, &context, &len); > + rc = sel_sid_to_context(sbsec->def_sid, &context, &len); > if (rc) > goto out_free; > opts->mnt_opts[i] = context; > @@ -549,7 +549,7 @@ static int selinux_get_mnt_opts(const struct super_block *sb, > struct inode *root = sbsec->sb->s_root->d_inode; > struct inode_security_struct *isec = root->i_security; > > - rc = security_sid_to_context(isec->sid, &context, &len); > + rc = sel_sid_to_context(isec->sid, &context, &len); > if (rc) > goto out_free; > opts->mnt_opts[i] = context; > @@ -652,10 +652,10 @@ static int selinux_set_mnt_opts(struct super_block *sb, > > if (flags[i] == SE_SBLABELSUPP) > continue; > - rc = security_context_to_sid(mount_options[i], > + rc = sel_context_to_sid(mount_options[i], > strlen(mount_options[i]), &sid); > if (rc) { > - printk(KERN_WARNING "SELinux: security_context_to_sid" > + printk(KERN_WARNING "SELinux: sel_context_to_sid" > "(%s) failed for (dev %s, type %s) errno=%d\n", > mount_options[i], sb->s_id, name, rc); > goto out; > @@ -717,9 +717,11 @@ static int selinux_set_mnt_opts(struct super_block *sb, > sbsec->flags |= SE_SBPROC; > > /* Determine the labeling behavior to use for this filesystem type. */ > - rc = security_fs_use((sbsec->flags & SE_SBPROC) ? "proc" : sb->s_type->name, &sbsec->behavior, &sbsec->sid); > + rc = sel_fs_use((sbsec->flags & SE_SBPROC) ? "proc" : sb->s_type->name, > + &sbsec->behavior, > + &sbsec->sid); > if (rc) { > - printk(KERN_WARNING "%s: security_fs_use(%s) returned %d\n", > + printk(KERN_WARNING "%s: sel_fs_use(%s) returned %d\n", > __func__, sb->s_type->name, rc); > goto out; > } > @@ -1201,7 +1203,7 @@ static int selinux_proc_get_sid(struct proc_dir_entry *de, > path = end; > de = de->parent; > } > - rc = security_genfs_sid("proc", path, tclass, sid); > + rc = sel_genfs_sid("proc", path, tclass, sid); > free_page((unsigned long)buffer); > return rc; > } > @@ -1318,7 +1320,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent > sid = sbsec->def_sid; > rc = 0; > } else { > - rc = security_context_to_sid_default(context, rc, &sid, > + rc = sel_context_to_sid_default(context, rc, &sid, > sbsec->def_sid, > GFP_NOFS); > if (rc) { > @@ -1353,7 +1355,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent > > /* Try to obtain a transition SID. */ > isec->sclass = inode_mode_to_security_class(inode->i_mode); > - rc = security_transition_sid(isec->task_sid, > + rc = sel_transition_sid(isec->task_sid, > sbsec->sid, > isec->sclass, > &sid); > @@ -1630,7 +1632,7 @@ static int may_create(struct inode *dir, > return rc; > > if (!newsid || !(sbsec->flags & SE_SBLABELSUPP)) { > - rc = security_transition_sid(sid, dsec->sid, tclass, &newsid); > + rc = sel_transition_sid(sid, dsec->sid, tclass, &newsid); > if (rc) > return rc; > } > @@ -1966,7 +1968,7 @@ static int selinux_sysctl_get_sid(ctl_table *table, u16 tclass, u32 *sid) > end -= 4; > memcpy(end, "/sys", 4); > path = end; > - rc = security_genfs_sid("proc", path, tclass, sid); > + rc = sel_genfs_sid("proc", path, tclass, sid); > out_free: > free_page((unsigned long)buffer); > out: > @@ -2132,7 +2134,7 @@ static int selinux_bprm_set_creds(struct linux_binprm *bprm) > new_tsec->exec_sid = 0; > } else { > /* Check for a default transition on this program. */ > - rc = security_transition_sid(old_tsec->sid, isec->sid, > + rc = sel_transition_sid(old_tsec->sid, isec->sid, > SECCLASS_PROCESS, &new_tsec->sid); > if (rc) > return rc; > @@ -2595,12 +2597,12 @@ static int selinux_inode_init_security(struct inode *inode, struct inode *dir, > newsid = tsec->create_sid; > > if (!newsid || !(sbsec->flags & SE_SBLABELSUPP)) { > - rc = security_transition_sid(sid, dsec->sid, > + rc = sel_transition_sid(sid, dsec->sid, > inode_mode_to_security_class(inode->i_mode), > &newsid); > if (rc) { > printk(KERN_WARNING "%s: " > - "security_transition_sid failed, rc=%d (dev=%s " > + "sel_transition_sid failed, rc=%d (dev=%s " > "ino=%ld)\n", > __func__, > -rc, inode->i_sb->s_id, inode->i_ino); > @@ -2627,7 +2629,7 @@ static int selinux_inode_init_security(struct inode *inode, struct inode *dir, > } > > if (value && len) { > - rc = security_sid_to_context_force(newsid, &context, &clen); > + rc = sel_sid_to_context_force(newsid, &context, &clen); > if (rc) { > kfree(namep); > return rc; > @@ -2777,11 +2779,11 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name, > if (rc) > return rc; > > - rc = security_context_to_sid(value, size, &newsid); > + rc = sel_context_to_sid(value, size, &newsid); > if (rc == -EINVAL) { > if (!capable(CAP_MAC_ADMIN)) > return rc; > - rc = security_context_to_sid_force(value, size, &newsid); > + rc = sel_context_to_sid_force(value, size, &newsid); > } > if (rc) > return rc; > @@ -2791,7 +2793,7 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name, > if (rc) > return rc; > > - rc = security_validate_transition(isec->sid, newsid, sid, > + rc = sel_validate_transition(isec->sid, newsid, sid, > isec->sclass); > if (rc) > return rc; > @@ -2817,7 +2819,7 @@ static void selinux_inode_post_setxattr(struct dentry *dentry, const char *name, > return; > } > > - rc = security_context_to_sid_force(value, size, &newsid); > + rc = sel_context_to_sid_force(value, size, &newsid); > if (rc) { > printk(KERN_ERR "SELinux: unable to map context to SID" > "for (%s, %lu), rc=%d\n", > @@ -2880,10 +2882,10 @@ static int selinux_inode_getsecurity(const struct inode *inode, const char *name > error = selinux_capable(current, current_cred(), CAP_MAC_ADMIN, > SECURITY_CAP_NOAUDIT); > if (!error) > - error = security_sid_to_context_force(isec->sid, &context, > + error = sel_sid_to_context_force(isec->sid, &context, > &size); > else > - error = security_sid_to_context(isec->sid, &context, &size); > + error = sel_sid_to_context(isec->sid, &context, &size); > if (error) > return error; > error = size; > @@ -2909,7 +2911,7 @@ static int selinux_inode_setsecurity(struct inode *inode, const char *name, > if (!value || !size) > return -EACCES; > > - rc = security_context_to_sid((void *)value, size, &newsid); > + rc = sel_context_to_sid((void *)value, size, &newsid); > if (rc) > return rc; > > @@ -3619,7 +3621,7 @@ static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid) > selinux_skb_xfrm_sid(skb, &xfrm_sid); > selinux_netlbl_skbuff_getsid(skb, family, &nlbl_type, &nlbl_sid); > > - err = security_net_peersid_resolve(nlbl_sid, nlbl_type, xfrm_sid, sid); > + err = sel_net_peersid_resolve(nlbl_sid, nlbl_type, xfrm_sid, sid); > if (unlikely(err)) { > printk(KERN_WARNING > "SELinux: failure in selinux_skb_peerlbl_sid()," > @@ -3965,7 +3967,7 @@ static int selinux_socket_unix_stream_connect(struct socket *sock, > /* server child socket */ > ssec = newsk->sk_security; > ssec->peer_sid = isec->sid; > - err = security_sid_mls_copy(other_isec->sid, ssec->peer_sid, &ssec->sid); > + err = sel_sid_mls_copy(other_isec->sid, ssec->peer_sid, &ssec->sid); > > return err; > } > @@ -4000,7 +4002,7 @@ static int selinux_inet_sys_rcv_skb(int ifindex, char *addrp, u16 family, > u32 if_sid; > u32 node_sid; > > - err = sel_netif_sid(ifindex, &if_sid); > + err = sel_netif_sid_by_index(ifindex, &if_sid); > if (err) > return err; > err = avc_has_perm(peer_sid, if_sid, > @@ -4144,7 +4146,7 @@ static int selinux_socket_getpeersec_stream(struct socket *sock, char __user *op > goto out; > } > > - err = security_sid_to_context(peer_sid, &scontext, &scontext_len); > + err = sel_sid_to_context(peer_sid, &scontext, &scontext_len); > > if (err) > goto out; > @@ -4256,7 +4258,7 @@ static int selinux_inet_conn_request(struct sock *sk, struct sk_buff *skb, > req->secid = sksec->sid; > req->peer_secid = SECSID_NULL; > } else { > - err = security_sid_mls_copy(sksec->sid, peersid, &newsid); > + err = sel_sid_mls_copy(sksec->sid, peersid, &newsid); > if (err) > return err; > req->secid = newsid; > @@ -4322,7 +4324,7 @@ static int selinux_nlmsg_perm(struct sock *sk, struct sk_buff *skb) > "SELinux: unrecognized netlink message" > " type=%hu for sclass=%hu\n", > nlh->nlmsg_type, isec->sclass); > - if (!selinux_enforcing || security_get_allow_unknown()) > + if (!selinux_enforcing || sel_get_allow_unknown()) > err = 0; > } > > @@ -4556,7 +4558,7 @@ static unsigned int selinux_ip_postroute(struct sk_buff *skb, int ifindex, > u32 if_sid; > u32 node_sid; > > - if (sel_netif_sid(ifindex, &if_sid)) > + if (sel_netif_sid_by_index(ifindex, &if_sid)) > return NF_DROP; > if (avc_has_perm(peer_sid, if_sid, > SECCLASS_NETIF, NETIF__EGRESS, &ad)) > @@ -4790,7 +4792,7 @@ static int selinux_msg_queue_msgsnd(struct msg_queue *msq, struct msg_msg *msg, > * Compute new sid based on current process and > * message queue this message will be stored in > */ > - rc = security_transition_sid(sid, isec->sid, SECCLASS_MSG, > + rc = sel_transition_sid(sid, isec->sid, SECCLASS_MSG, > &msec->sid); > if (rc) > return rc; > @@ -5095,7 +5097,7 @@ static int selinux_getprocattr(struct task_struct *p, > if (!sid) > return 0; > > - error = security_sid_to_context(sid, value, &len); > + error = sel_sid_to_context(sid, value, &len); > if (error) > return error; > return len; > @@ -5147,11 +5149,11 @@ static int selinux_setprocattr(struct task_struct *p, > str[size-1] = 0; > size--; > } > - error = security_context_to_sid(value, size, &sid); > + error = sel_context_to_sid(value, size, &sid); > if (error == -EINVAL && !strcmp(name, "fscreate")) { > if (!capable(CAP_MAC_ADMIN)) > return error; > - error = security_context_to_sid_force(value, size, > + error = sel_context_to_sid_force(value, size, > &sid); > } > if (error) > @@ -5188,7 +5190,7 @@ static int selinux_setprocattr(struct task_struct *p, > /* Only allow single threaded processes to change context */ > error = -EPERM; > if (!is_single_threaded(p)) { > - error = security_bounded_transition(tsec->sid, sid); > + error = sel_bounded_transition(tsec->sid, sid); > if (error) > goto abort_change; > } > @@ -5231,12 +5233,12 @@ abort_change: > > static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) > { > - return security_sid_to_context(secid, secdata, seclen); > + return sel_sid_to_context(secid, secdata, seclen); > } > > static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) > { > - return security_context_to_sid(secdata, seclen, secid); > + return sel_context_to_sid(secdata, seclen, secid); > } > > static void selinux_release_secctx(char *secdata, u32 seclen) > @@ -5303,7 +5305,7 @@ static int selinux_key_getsecurity(struct key *key, char **_buffer) > unsigned len; > int rc; > > - rc = security_sid_to_context(ksec->sid, &context, &len); > + rc = sel_sid_to_context(ksec->sid, &context, &len); > if (!rc) > rc = len; > *_buffer = context; > diff --git a/security/selinux/include/netif.h b/security/selinux/include/netif.h > index ce23edd..b6c3b43 100644 > --- a/security/selinux/include/netif.h > +++ b/security/selinux/include/netif.h > @@ -17,7 +17,7 @@ > #ifndef _SELINUX_NETIF_H_ > #define _SELINUX_NETIF_H_ > > -int sel_netif_sid(int ifindex, u32 *sid); > +int sel_netif_sid_by_index(int ifindex, u32 *sid); > > #endif /* _SELINUX_NETIF_H_ */ > > diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h > index ca83579..373e672 100644 > --- a/security/selinux/include/security.h > +++ b/security/selinux/include/security.h > @@ -80,9 +80,9 @@ extern int selinux_policycap_openperm; > /* limitation of boundary depth */ > #define POLICYDB_BOUNDS_MAXDEPTH 4 > > -int security_load_policy(void *data, size_t len); > +int sel_load_policy(void *data, size_t len); > > -int security_policycap_supported(unsigned int req_cap); > +int sel_policycap_supported(unsigned int req_cap); > > #define SEL_VEC_MAX 32 > struct av_decision { > @@ -96,58 +96,58 @@ struct av_decision { > /* definitions of av_decision.flags */ > #define AVD_FLAGS_PERMISSIVE 0x0001 > > -int security_compute_av(u32 ssid, u32 tsid, > +int sel_compute_av(u32 ssid, u32 tsid, > u16 tclass, u32 requested, > struct av_decision *avd); > > -int security_transition_sid(u32 ssid, u32 tsid, > +int sel_transition_sid(u32 ssid, u32 tsid, > u16 tclass, u32 *out_sid); > > -int security_member_sid(u32 ssid, u32 tsid, > +int sel_member_sid(u32 ssid, u32 tsid, > u16 tclass, u32 *out_sid); > > -int security_change_sid(u32 ssid, u32 tsid, > +int sel_change_sid(u32 ssid, u32 tsid, > u16 tclass, u32 *out_sid); > > -int security_sid_to_context(u32 sid, char **scontext, > +int sel_sid_to_context(u32 sid, char **scontext, > u32 *scontext_len); > > -int security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len); > +int sel_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len); > > -int security_context_to_sid(const char *scontext, u32 scontext_len, > +int sel_context_to_sid(const char *scontext, u32 scontext_len, > u32 *out_sid); > > -int security_context_to_sid_default(const char *scontext, u32 scontext_len, > +int sel_context_to_sid_default(const char *scontext, u32 scontext_len, > u32 *out_sid, u32 def_sid, gfp_t gfp_flags); > > -int security_context_to_sid_force(const char *scontext, u32 scontext_len, > +int sel_context_to_sid_force(const char *scontext, u32 scontext_len, > u32 *sid); > > -int security_get_user_sids(u32 callsid, char *username, > +int sel_get_user_sids(u32 callsid, char *username, > u32 **sids, u32 *nel); > > -int security_port_sid(u8 protocol, u16 port, u32 *out_sid); > +int sel_port_sid(u8 protocol, u16 port, u32 *out_sid); > > -int security_netif_sid(char *name, u32 *if_sid); > +int sel_netif_sid_by_name(char *name, u32 *if_sid); > > -int security_node_sid(u16 domain, void *addr, u32 addrlen, > +int sel_node_sid(u16 domain, void *addr, u32 addrlen, > u32 *out_sid); > > -int security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid, > +int sel_validate_transition(u32 oldsid, u32 newsid, u32 tasksid, > u16 tclass); > > -int security_bounded_transition(u32 oldsid, u32 newsid); > +int sel_bounded_transition(u32 oldsid, u32 newsid); > > -int security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid); > +int sel_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid); > > -int security_net_peersid_resolve(u32 nlbl_sid, u32 nlbl_type, > +int sel_net_peersid_resolve(u32 nlbl_sid, u32 nlbl_type, > u32 xfrm_sid, > u32 *peer_sid); > > -int security_get_classes(char ***classes, int *nclasses); > -int security_get_permissions(char *class, char ***perms, int *nperms); > -int security_get_reject_unknown(void); > -int security_get_allow_unknown(void); > +int sel_get_classes(char ***classes, int *nclasses); > +int sel_get_permissions(char *class, char ***perms, int *nperms); > +int sel_get_reject_unknown(void); > +int sel_get_allow_unknown(void); > > #define SECURITY_FS_USE_XATTR 1 /* use xattr */ > #define SECURITY_FS_USE_TRANS 2 /* use transition SIDs, e.g. devpts/tmpfs */ > @@ -156,34 +156,34 @@ int security_get_allow_unknown(void); > #define SECURITY_FS_USE_NONE 5 /* no labeling support */ > #define SECURITY_FS_USE_MNTPOINT 6 /* use mountpoint labeling */ > > -int security_fs_use(const char *fstype, unsigned int *behavior, > +int sel_fs_use(const char *fstype, unsigned int *behavior, > u32 *sid); > > -int security_genfs_sid(const char *fstype, char *name, u16 sclass, > +int sel_genfs_sid(const char *fstype, char *name, u16 sclass, > u32 *sid); > > #ifdef CONFIG_NETLABEL > -int security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr, > +int sel_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr, > u32 *sid); > > -int security_netlbl_sid_to_secattr(u32 sid, > +int sel_netlbl_sid_to_secattr(u32 sid, > struct netlbl_lsm_secattr *secattr); > #else > -static inline int security_netlbl_secattr_to_sid( > +static inline int sel_netlbl_secattr_to_sid( > struct netlbl_lsm_secattr *secattr, > u32 *sid) > { > return -EIDRM; > } > > -static inline int security_netlbl_sid_to_secattr(u32 sid, > +static inline int sel_netlbl_sid_to_secattr(u32 sid, > struct netlbl_lsm_secattr *secattr) > { > return -ENOENT; > } > #endif /* CONFIG_NETLABEL */ > > -const char *security_get_initial_sid_context(u32 sid); > +const char *sel_get_initial_sid_context(u32 sid); > > #endif /* _SELINUX_SECURITY_H_ */ > > diff --git a/security/selinux/netif.c b/security/selinux/netif.c > index b4e14bc..3aae049 100644 > --- a/security/selinux/netif.c > +++ b/security/selinux/netif.c > @@ -175,7 +175,7 @@ static int sel_netif_sid_slow(int ifindex, u32 *sid) > ret = -ENOMEM; > goto out; > } > - ret = security_netif_sid(dev->name, &new->nsec.sid); > + ret = sel_netif_sid_by_name(dev->name, &new->nsec.sid); > if (ret != 0) > goto out; > new->nsec.ifindex = ifindex; > @@ -198,7 +198,7 @@ out: > } > > /** > - * sel_netif_sid - Lookup the SID of a network interface > + * sel_netif_sid_by_index - Lookup the SID of a network interface > * @ifindex: the network interface > * @sid: interface SID > * > @@ -210,7 +210,7 @@ out: > * on failure. > * > */ > -int sel_netif_sid(int ifindex, u32 *sid) > +int sel_netif_sid_by_index(int ifindex, u32 *sid) > { > struct sel_netif *netif; > > diff --git a/security/selinux/netlabel.c b/security/selinux/netlabel.c > index 2e98441..26aa550 100644 > --- a/security/selinux/netlabel.c > +++ b/security/selinux/netlabel.c > @@ -58,7 +58,7 @@ static int selinux_netlbl_sidlookup_cached(struct sk_buff *skb, > { > int rc; > > - rc = security_netlbl_secattr_to_sid(secattr, sid); > + rc = sel_netlbl_secattr_to_sid(secattr, sid); > if (rc == 0 && > (secattr->flags & NETLBL_SECATTR_CACHEABLE) && > (secattr->flags & NETLBL_SECATTR_CACHE)) > @@ -89,7 +89,7 @@ static struct netlbl_lsm_secattr *selinux_netlbl_sock_genattr(struct sock *sk) > secattr = netlbl_secattr_alloc(GFP_ATOMIC); > if (secattr == NULL) > return NULL; > - rc = security_netlbl_sid_to_secattr(sksec->sid, secattr); > + rc = sel_netlbl_sid_to_secattr(sksec->sid, secattr); > if (rc != 0) { > netlbl_secattr_free(secattr); > return NULL; > @@ -228,7 +228,7 @@ int selinux_netlbl_skbuff_setsid(struct sk_buff *skb, > if (secattr == NULL) { > secattr = &secattr_storage; > netlbl_secattr_init(secattr); > - rc = security_netlbl_sid_to_secattr(sid, secattr); > + rc = sel_netlbl_sid_to_secattr(sid, secattr); > if (rc != 0) > goto skbuff_setsid_return; > } > @@ -261,7 +261,7 @@ int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) > return 0; > > netlbl_secattr_init(&secattr); > - rc = security_netlbl_sid_to_secattr(req->secid, &secattr); > + rc = sel_netlbl_sid_to_secattr(req->secid, &secattr); > if (rc != 0) > goto inet_conn_request_return; > rc = netlbl_req_setattr(req, &secattr); > diff --git a/security/selinux/netnode.c b/security/selinux/netnode.c > index 7100072..894a4f0 100644 > --- a/security/selinux/netnode.c > +++ b/security/selinux/netnode.c > @@ -229,12 +229,12 @@ static int sel_netnode_sid_slow(void *addr, u16 family, u32 *sid) > goto out; > switch (family) { > case PF_INET: > - ret = security_node_sid(PF_INET, > + ret = sel_node_sid(PF_INET, > addr, sizeof(struct in_addr), sid); > new->nsec.addr.ipv4 = *(__be32 *)addr; > break; > case PF_INET6: > - ret = security_node_sid(PF_INET6, > + ret = sel_node_sid(PF_INET6, > addr, sizeof(struct in6_addr), sid); > ipv6_addr_copy(&new->nsec.addr.ipv6, addr); > break; > diff --git a/security/selinux/netport.c b/security/selinux/netport.c > index fe7fba6..8724815 100644 > --- a/security/selinux/netport.c > +++ b/security/selinux/netport.c > @@ -174,7 +174,7 @@ static int sel_netport_sid_slow(u8 protocol, u16 pnum, u32 *sid) > new = kzalloc(sizeof(*new), GFP_ATOMIC); > if (new == NULL) > goto out; > - ret = security_port_sid(protocol, pnum, sid); > + ret = sel_port_sid(protocol, pnum, sid); > if (ret != 0) > goto out; > > diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c > index b4fc506..4129d90 100644 > --- a/security/selinux/selinuxfs.c > +++ b/security/selinux/selinuxfs.c > @@ -193,7 +193,7 @@ static ssize_t sel_read_handle_unknown(struct file *filp, char __user *buf, > ssize_t length; > ino_t ino = filp->f_path.dentry->d_inode->i_ino; > int handle_unknown = (ino == SEL_REJECT_UNKNOWN) ? > - security_get_reject_unknown() : !security_get_allow_unknown(); > + sel_get_reject_unknown() : !sel_get_allow_unknown(); > > length = scnprintf(tmpbuf, TMPBUFLEN, "%d", handle_unknown); > return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); > @@ -320,7 +320,7 @@ static ssize_t sel_write_load(struct file *file, const char __user *buf, > if (copy_from_user(data, buf, count) != 0) > goto out; > > - length = security_load_policy(data, count); > + length = sel_load_policy(data, count); > if (length) > goto out; > > @@ -367,11 +367,11 @@ static ssize_t sel_write_context(struct file *file, char *buf, size_t size) > if (length) > return length; > > - length = security_context_to_sid(buf, size, &sid); > + length = sel_context_to_sid(buf, size, &sid); > if (length < 0) > return length; > > - length = security_sid_to_context(sid, &canon, &len); > + length = sel_sid_to_context(sid, &canon, &len); > if (length < 0) > return length; > > @@ -515,14 +515,14 @@ static ssize_t sel_write_access(struct file *file, char *buf, size_t size) > if (sscanf(buf, "%s %s %hu %x", scon, tcon, &tclass, &req) != 4) > goto out2; > > - length = security_context_to_sid(scon, strlen(scon)+1, &ssid); > + length = sel_context_to_sid(scon, strlen(scon)+1, &ssid); > if (length < 0) > goto out2; > - length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid); > + length = sel_context_to_sid(tcon, strlen(tcon)+1, &tsid); > if (length < 0) > goto out2; > > - length = security_compute_av(ssid, tsid, tclass, req, &avd); > + length = sel_compute_av(ssid, tsid, tclass, req, &avd); > if (length < 0) > goto out2; > > @@ -564,18 +564,18 @@ static ssize_t sel_write_create(struct file *file, char *buf, size_t size) > if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3) > goto out2; > > - length = security_context_to_sid(scon, strlen(scon)+1, &ssid); > + length = sel_context_to_sid(scon, strlen(scon)+1, &ssid); > if (length < 0) > goto out2; > - length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid); > + length = sel_context_to_sid(tcon, strlen(tcon)+1, &tsid); > if (length < 0) > goto out2; > > - length = security_transition_sid(ssid, tsid, tclass, &newsid); > + length = sel_transition_sid(ssid, tsid, tclass, &newsid); > if (length < 0) > goto out2; > > - length = security_sid_to_context(newsid, &newcon, &len); > + length = sel_sid_to_context(newsid, &newcon, &len); > if (length < 0) > goto out2; > > @@ -623,18 +623,18 @@ static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size) > if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3) > goto out2; > > - length = security_context_to_sid(scon, strlen(scon)+1, &ssid); > + length = sel_context_to_sid(scon, strlen(scon)+1, &ssid); > if (length < 0) > goto out2; > - length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid); > + length = sel_context_to_sid(tcon, strlen(tcon)+1, &tsid); > if (length < 0) > goto out2; > > - length = security_change_sid(ssid, tsid, tclass, &newsid); > + length = sel_change_sid(ssid, tsid, tclass, &newsid); > if (length < 0) > goto out2; > > - length = security_sid_to_context(newsid, &newcon, &len); > + length = sel_sid_to_context(newsid, &newcon, &len); > if (length < 0) > goto out2; > > @@ -680,18 +680,18 @@ static ssize_t sel_write_user(struct file *file, char *buf, size_t size) > if (sscanf(buf, "%s %s", con, user) != 2) > goto out2; > > - length = security_context_to_sid(con, strlen(con)+1, &sid); > + length = sel_context_to_sid(con, strlen(con)+1, &sid); > if (length < 0) > goto out2; > > - length = security_get_user_sids(sid, user, &sids, &nsids); > + length = sel_get_user_sids(sid, user, &sids, &nsids); > if (length < 0) > goto out2; > > length = sprintf(buf, "%u", nsids) + 1; > ptr = buf + length; > for (i = 0; i < nsids; i++) { > - rc = security_sid_to_context(sids[i], &newcon, &len); > + rc = sel_sid_to_context(sids[i], &newcon, &len); > if (rc) { > length = rc; > goto out3; > @@ -741,18 +741,18 @@ static ssize_t sel_write_member(struct file *file, char *buf, size_t size) > if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3) > goto out2; > > - length = security_context_to_sid(scon, strlen(scon)+1, &ssid); > + length = sel_context_to_sid(scon, strlen(scon)+1, &ssid); > if (length < 0) > goto out2; > - length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid); > + length = sel_context_to_sid(tcon, strlen(tcon)+1, &tsid); > if (length < 0) > goto out2; > > - length = security_member_sid(ssid, tsid, tclass, &newsid); > + length = sel_member_sid(ssid, tsid, tclass, &newsid); > if (length < 0) > goto out2; > > - length = security_sid_to_context(newsid, &newcon, &len); > + length = sel_sid_to_context(newsid, &newcon, &len); > if (length < 0) > goto out2; > > @@ -1015,7 +1015,7 @@ static int sel_make_bools(void) > goto err; > } > isec = (struct inode_security_struct *)inode->i_security; > - ret = security_genfs_sid("selinuxfs", page, SECCLASS_FILE, &sid); > + ret = sel_genfs_sid("selinuxfs", page, SECCLASS_FILE, &sid); > if (ret) > goto err; > isec->sid = sid; > @@ -1244,7 +1244,7 @@ static ssize_t sel_read_initcon(struct file *file, char __user *buf, > > inode = file->f_path.dentry->d_inode; > sid = inode->i_ino&SEL_INO_MASK; > - ret = security_sid_to_context(sid, &con, &len); > + ret = sel_sid_to_context(sid, &con, &len); > if (ret < 0) > return ret; > > @@ -1264,7 +1264,7 @@ static int sel_make_initcon_files(struct dentry *dir) > for (i = 1; i <= SECINITSID_NUM; i++) { > struct inode *inode; > struct dentry *dentry; > - dentry = d_alloc_name(dir, security_get_initial_sid_context(i)); > + dentry = d_alloc_name(dir, sel_get_initial_sid_context(i)); > if (!dentry) { > ret = -ENOMEM; > goto out; > @@ -1364,7 +1364,7 @@ static ssize_t sel_read_policycap(struct file *file, char __user *buf, > ssize_t length; > unsigned long i_ino = file->f_path.dentry->d_inode->i_ino; > > - value = security_policycap_supported(i_ino & SEL_INO_MASK); > + value = sel_policycap_supported(i_ino & SEL_INO_MASK); > length = scnprintf(tmpbuf, TMPBUFLEN, "%d", value); > > return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); > @@ -1380,7 +1380,7 @@ static int sel_make_perm_files(char *objclass, int classvalue, > int i, rc = 0, nperms; > char **perms; > > - rc = security_get_permissions(objclass, &perms, &nperms); > + rc = sel_get_permissions(objclass, &perms, &nperms); > if (rc) > goto out; > > @@ -1484,7 +1484,7 @@ static int sel_make_classes(void) > /* delete any existing entries */ > sel_remove_classes(); > > - rc = security_get_classes(&classes, &nclasses); > + rc = sel_get_classes(&classes, &nclasses); > if (rc < 0) > goto out; > > diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c > index ff17820..988fef6 100644 > --- a/security/selinux/ss/services.c > +++ b/security/selinux/ss/services.c > @@ -285,7 +285,7 @@ mls_ops: > > /* > * security_dump_masked_av - dumps masked permissions during > - * security_compute_av due to RBAC, MLS/Constraint and Type bounds. > + * sel_compute_av due to RBAC, MLS/Constraint and Type bounds. > */ > static int dump_masked_av_helper(void *k, void *d, void *args) > { > @@ -347,7 +347,7 @@ static void security_dump_masked_av(struct context *scontext, > if (!ab) > goto out; > > - audit_log_format(ab, "op=security_compute_av reason=%s " > + audit_log_format(ab, "op=sel_compute_av reason=%s " > "scontext=%s tcontext=%s tclass=%s perms=", > reason, scontext_name, tcontext_name, tclass_name); > > @@ -622,7 +622,7 @@ static int security_validtrans_handle_fail(struct context *ocontext, > if (context_struct_to_string(tcontext, &t, &tlen) < 0) > goto out; > audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR, > - "security_validate_transition: denied for" > + "sel_validate_transition: denied for" > " oldcontext=%s newcontext=%s taskcontext=%s tclass=%s", > o, n, t, policydb.p_class_val_to_name[tclass-1]); > out: > @@ -635,7 +635,7 @@ out: > return -EPERM; > } > > -int security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid, > +int sel_validate_transition(u32 oldsid, u32 newsid, u32 tasksid, > u16 tclass) > { > struct context *ocontext; > @@ -710,7 +710,7 @@ out: > } > > /* > - * security_bounded_transition - check whether the given > + * sel_bounded_transition - check whether the given > * transition is directed to bounded, or not. > * It returns 0, if @newsid is bounded by @oldsid. > * Otherwise, it returns error code. > @@ -718,7 +718,7 @@ out: > * @oldsid : current security identifier > * @newsid : destinated security identifier > */ > -int security_bounded_transition(u32 old_sid, u32 new_sid) > +int sel_bounded_transition(u32 old_sid, u32 new_sid) > { > struct context *old_context, *new_context; > struct type_datum *type; > @@ -777,7 +777,7 @@ int security_bounded_transition(u32 old_sid, u32 new_sid) > &new_name, &length)) { > audit_log(current->audit_context, > GFP_ATOMIC, AUDIT_SELINUX_ERR, > - "op=security_bounded_transition " > + "op=sel_bounded_transition " > "result=denied " > "oldcontext=%s newcontext=%s", > old_name, new_name); > @@ -793,7 +793,7 @@ out: > > > /** > - * security_compute_av - Compute access vector decisions. > + * sel_compute_av - Compute access vector decisions. > * @ssid: source security identifier > * @tsid: target security identifier > * @tclass: target security class > @@ -805,7 +805,7 @@ out: > * Return -%EINVAL if any of the parameters are invalid or %0 > * if the access vector decisions were computed successfully. > */ > -int security_compute_av(u32 ssid, > +int sel_compute_av(u32 ssid, > u32 tsid, > u16 tclass, > u32 requested, > @@ -904,14 +904,14 @@ static int context_struct_to_string(struct context *context, char **scontext, u3 > > #include "initial_sid_to_string.h" > > -const char *security_get_initial_sid_context(u32 sid) > +const char *sel_get_initial_sid_context(u32 sid) > { > if (unlikely(sid > SECINITSID_NUM)) > return NULL; > return initial_sid_to_string[sid]; > } > > -static int security_sid_to_context_core(u32 sid, char **scontext, > +static int sel_sid_to_context_core(u32 sid, char **scontext, > u32 *scontext_len, int force) > { > struct context *context; > @@ -959,7 +959,7 @@ out: > } > > /** > - * security_sid_to_context - Obtain a context for a given SID. > + * sel_sid_to_context - Obtain a context for a given SID. > * @sid: security identifier, SID > * @scontext: security context > * @scontext_len: length in bytes > @@ -968,14 +968,14 @@ out: > * into a dynamically allocated string of the correct size. Set @scontext > * to point to this string and set @scontext_len to the length of the string. > */ > -int security_sid_to_context(u32 sid, char **scontext, u32 *scontext_len) > +int sel_sid_to_context(u32 sid, char **scontext, u32 *scontext_len) > { > - return security_sid_to_context_core(sid, scontext, scontext_len, 0); > + return sel_sid_to_context_core(sid, scontext, scontext_len, 0); > } > > -int security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len) > +int sel_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len) > { > - return security_sid_to_context_core(sid, scontext, scontext_len, 1); > + return sel_sid_to_context_core(sid, scontext, scontext_len, 1); > } > > /* > @@ -1066,7 +1066,7 @@ out: > return rc; > } > > -static int security_context_to_sid_core(const char *scontext, u32 scontext_len, > +static int sel_context_to_sid_core(const char *scontext, u32 scontext_len, > u32 *sid, u32 def_sid, gfp_t gfp_flags, > int force) > { > @@ -1124,7 +1124,7 @@ out: > } > > /** > - * security_context_to_sid - Obtain a SID for a given security context. > + * sel_context_to_sid - Obtain a SID for a given security context. > * @scontext: security context > * @scontext_len: length in bytes > * @sid: security identifier, SID > @@ -1134,14 +1134,14 @@ out: > * Returns -%EINVAL if the context is invalid, -%ENOMEM if insufficient > * memory is available, or 0 on success. > */ > -int security_context_to_sid(const char *scontext, u32 scontext_len, u32 *sid) > +int sel_context_to_sid(const char *scontext, u32 scontext_len, u32 *sid) > { > - return security_context_to_sid_core(scontext, scontext_len, > + return sel_context_to_sid_core(scontext, scontext_len, > sid, SECSID_NULL, GFP_KERNEL, 0); > } > > /** > - * security_context_to_sid_default - Obtain a SID for a given security context, > + * sel_context_to_sid_default - Obtain a SID for a given security context, > * falling back to specified default if needed. > * > * @scontext: security context > @@ -1158,17 +1158,17 @@ int security_context_to_sid(const char *scontext, u32 scontext_len, u32 *sid) > * Returns -%EINVAL if the context is invalid, -%ENOMEM if insufficient > * memory is available, or 0 on success. > */ > -int security_context_to_sid_default(const char *scontext, u32 scontext_len, > +int sel_context_to_sid_default(const char *scontext, u32 scontext_len, > u32 *sid, u32 def_sid, gfp_t gfp_flags) > { > - return security_context_to_sid_core(scontext, scontext_len, > + return sel_context_to_sid_core(scontext, scontext_len, > sid, def_sid, gfp_flags, 1); > } > > -int security_context_to_sid_force(const char *scontext, u32 scontext_len, > +int sel_context_to_sid_force(const char *scontext, u32 scontext_len, > u32 *sid) > { > - return security_context_to_sid_core(scontext, scontext_len, > + return sel_context_to_sid_core(scontext, scontext_len, > sid, SECSID_NULL, GFP_KERNEL, 1); > } > > @@ -1341,7 +1341,7 @@ out: > } > > /** > - * security_transition_sid - Compute the SID for a new subject/object. > + * sel_transition_sid - Compute the SID for a new subject/object. > * @ssid: source security identifier > * @tsid: target security identifier > * @tclass: target security class > @@ -1353,7 +1353,7 @@ out: > * if insufficient memory is available, or %0 if the new SID was > * computed successfully. > */ > -int security_transition_sid(u32 ssid, > +int sel_transition_sid(u32 ssid, > u32 tsid, > u16 tclass, > u32 *out_sid) > @@ -1362,7 +1362,7 @@ int security_transition_sid(u32 ssid, > } > > /** > - * security_member_sid - Compute the SID for member selection. > + * sel_member_sid - Compute the SID for member selection. > * @ssid: source security identifier > * @tsid: target security identifier > * @tclass: target security class > @@ -1374,7 +1374,7 @@ int security_transition_sid(u32 ssid, > * if insufficient memory is available, or %0 if the SID was > * computed successfully. > */ > -int security_member_sid(u32 ssid, > +int sel_member_sid(u32 ssid, > u32 tsid, > u16 tclass, > u32 *out_sid) > @@ -1383,7 +1383,7 @@ int security_member_sid(u32 ssid, > } > > /** > - * security_change_sid - Compute the SID for object relabeling. > + * sel_change_sid - Compute the SID for object relabeling. > * @ssid: source security identifier > * @tsid: target security identifier > * @tclass: target security class > @@ -1395,7 +1395,7 @@ int security_member_sid(u32 ssid, > * if insufficient memory is available, or %0 if the SID was > * computed successfully. > */ > -int security_change_sid(u32 ssid, > +int sel_change_sid(u32 ssid, > u32 tsid, > u16 tclass, > u32 *out_sid) > @@ -1536,7 +1536,7 @@ static int validate_classes(struct policydb *p) > } > if (print_unknown_handle) > printk(KERN_INFO "SELinux: the above unknown classes and permissions will be %s\n", > - (security_get_allow_unknown() ? "allowed" : "denied")); > + (sel_get_allow_unknown() ? "allowed" : "denied")); > return 0; > } > > @@ -1685,7 +1685,7 @@ bad: > goto out; > } > > -static void security_load_policycaps(void) > +static void sel_load_policycaps(void) > { > selinux_policycap_netpeer = ebitmap_get_bit(&policydb.policycaps, > POLICYDB_CAPABILITY_NETPEER); > @@ -1697,7 +1697,7 @@ extern void selinux_complete_init(void); > static int security_preserve_bools(struct policydb *p); > > /** > - * security_load_policy - Load a security policy configuration. > + * sel_load_policy - Load a security policy configuration. > * @data: binary policy data > * @len: length of data in bytes > * > @@ -1706,7 +1706,7 @@ static int security_preserve_bools(struct policydb *p); > * This function will flush the access vector cache after > * loading the new policy. > */ > -int security_load_policy(void *data, size_t len) > +int sel_load_policy(void *data, size_t len) > { > struct policydb oldpolicydb, newpolicydb; > struct sidtab oldsidtab, newsidtab; > @@ -1735,7 +1735,7 @@ int security_load_policy(void *data, size_t len) > avtab_cache_destroy(); > return -EINVAL; > } > - security_load_policycaps(); > + sel_load_policycaps(); > policydb_loaded_version = policydb.policyvers; > ss_initialized = 1; > seqno = ++latest_granting; > @@ -1798,7 +1798,7 @@ int security_load_policy(void *data, size_t len) > write_lock_irq(&policy_rwlock); > memcpy(&policydb, &newpolicydb, sizeof policydb); > sidtab_set(&sidtab, &newsidtab); > - security_load_policycaps(); > + sel_load_policycaps(); > seqno = ++latest_granting; > policydb_loaded_version = policydb.policyvers; > write_unlock_irq(&policy_rwlock); > @@ -1822,12 +1822,12 @@ err: > } > > /** > - * security_port_sid - Obtain the SID for a port. > + * sel_port_sid - Obtain the SID for a port. > * @protocol: protocol number > * @port: port number > * @out_sid: security identifier > */ > -int security_port_sid(u8 protocol, u16 port, u32 *out_sid) > +int sel_port_sid(u8 protocol, u16 port, u32 *out_sid) > { > struct ocontext *c; > int rc = 0; > @@ -1862,11 +1862,11 @@ out: > } > > /** > - * security_netif_sid - Obtain the SID for a network interface. > + * sel_netif_sid_by_name - Obtain the SID for a network interface. > * @name: interface name > * @if_sid: interface SID > */ > -int security_netif_sid(char *name, u32 *if_sid) > +int sel_netif_sid_by_name(char *name, u32 *if_sid) > { > int rc = 0; > struct ocontext *c; > @@ -1916,13 +1916,13 @@ static int match_ipv6_addrmask(u32 *input, u32 *addr, u32 *mask) > } > > /** > - * security_node_sid - Obtain the SID for a node (host). > + * sel_node_sid - Obtain the SID for a node (host). > * @domain: communication domain aka address family > * @addrp: address > * @addrlen: address length in bytes > * @out_sid: security identifier > */ > -int security_node_sid(u16 domain, > +int sel_node_sid(u16 domain, > void *addrp, > u32 addrlen, > u32 *out_sid) > @@ -1992,7 +1992,7 @@ out: > #define SIDS_NEL 25 > > /** > - * security_get_user_sids - Obtain reachable SIDs for a user. > + * sel_get_user_sids - Obtain reachable SIDs for a user. > * @fromsid: starting SID > * @username: username > * @sids: array of reachable SIDs for user > @@ -2005,7 +2005,7 @@ out: > * number of elements in the array. > */ > > -int security_get_user_sids(u32 fromsid, > +int sel_get_user_sids(u32 fromsid, > char *username, > u32 **sids, > u32 *nel) > @@ -2107,7 +2107,7 @@ out: > } > > /** > - * security_genfs_sid - Obtain a SID for a file in a filesystem > + * sel_genfs_sid - Obtain a SID for a file in a filesystem > * @fstype: filesystem type > * @path: path from root of mount > * @sclass: file security class > @@ -2117,7 +2117,7 @@ out: > * cannot support xattr or use a fixed labeling behavior like > * transition SIDs or task SIDs. > */ > -int security_genfs_sid(const char *fstype, > +int sel_genfs_sid(const char *fstype, > char *path, > u16 sclass, > u32 *sid) > @@ -2172,12 +2172,12 @@ out: > } > > /** > - * security_fs_use - Determine how to handle labeling for a filesystem. > + * sel_fs_use - Determine how to handle labeling for a filesystem. > * @fstype: filesystem type > * @behavior: labeling behavior > * @sid: SID for filesystem (superblock) > */ > -int security_fs_use( > +int sel_fs_use( > const char *fstype, > unsigned int *behavior, > u32 *sid) > @@ -2205,7 +2205,7 @@ int security_fs_use( > } > *sid = c->sid[0]; > } else { > - rc = security_genfs_sid(fstype, "/", SECCLASS_DIR, sid); > + rc = sel_genfs_sid(fstype, "/", SECCLASS_DIR, sid); > if (rc) { > *behavior = SECURITY_FS_USE_NONE; > rc = 0; > @@ -2365,10 +2365,10 @@ out: > } > > /* > - * security_sid_mls_copy() - computes a new sid based on the given > + * sel_sid_mls_copy() - computes a new sid based on the given > * sid and the mls portion of mls_sid. > */ > -int security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid) > +int sel_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid) > { > struct context *context1; > struct context *context2; > @@ -2421,7 +2421,7 @@ int security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid) > bad: > if (!context_struct_to_string(&newcon, &s, &len)) { > audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR, > - "security_sid_mls_copy: invalid context %s", s); > + "sel_sid_mls_copy: invalid context %s", s); > kfree(s); > } > > @@ -2433,7 +2433,7 @@ out: > } > > /** > - * security_net_peersid_resolve - Compare and resolve two network peer SIDs > + * sel_net_peersid_resolve - Compare and resolve two network peer SIDs > * @nlbl_sid: NetLabel SID > * @nlbl_type: NetLabel labeling protocol type > * @xfrm_sid: XFRM SID > @@ -2452,7 +2452,7 @@ out: > * multiple, inconsistent labels | -<errno> | SECSID_NULL > * > */ > -int security_net_peersid_resolve(u32 nlbl_sid, u32 nlbl_type, > +int sel_net_peersid_resolve(u32 nlbl_sid, u32 nlbl_type, > u32 xfrm_sid, > u32 *peer_sid) > { > @@ -2528,7 +2528,7 @@ static int get_classes_callback(void *k, void *d, void *args) > return 0; > } > > -int security_get_classes(char ***classes, int *nclasses) > +int sel_get_classes(char ***classes, int *nclasses) > { > int rc = -ENOMEM; > > @@ -2566,7 +2566,7 @@ static int get_permissions_callback(void *k, void *d, void *args) > return 0; > } > > -int security_get_permissions(char *class, char ***perms, int *nperms) > +int sel_get_permissions(char *class, char ***perms, int *nperms) > { > int rc = -ENOMEM, i; > struct class_datum *match; > @@ -2610,18 +2610,18 @@ err: > return rc; > } > > -int security_get_reject_unknown(void) > +int sel_get_reject_unknown(void) > { > return policydb.reject_unknown; > } > > -int security_get_allow_unknown(void) > +int sel_get_allow_unknown(void) > { > return policydb.allow_unknown; > } > > /** > - * security_policycap_supported - Check for a specific policy capability > + * sel_policycap_supported - Check for a specific policy capability > * @req_cap: capability > * > * Description: > @@ -2630,7 +2630,7 @@ int security_get_allow_unknown(void) > * supported, false (0) if it isn't supported. > * > */ > -int security_policycap_supported(unsigned int req_cap) > +int sel_policycap_supported(unsigned int req_cap) > { > int rc; > > @@ -2944,7 +2944,7 @@ static void security_netlbl_cache_add(struct netlbl_lsm_secattr *secattr, > } > > /** > - * security_netlbl_secattr_to_sid - Convert a NetLabel secattr to a SELinux SID > + * sel_netlbl_secattr_to_sid - Convert a NetLabel secattr to a SELinux SID > * @secattr: the NetLabel packet security attributes > * @sid: the SELinux SID > * > @@ -2958,7 +2958,7 @@ static void security_netlbl_cache_add(struct netlbl_lsm_secattr *secattr, > * failure. > * > */ > -int security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr, > +int sel_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr, > u32 *sid) > { > int rc = -EIDRM; > @@ -3020,7 +3020,7 @@ netlbl_secattr_to_sid_return_cleanup: > } > > /** > - * security_netlbl_sid_to_secattr - Convert a SELinux SID to a NetLabel secattr > + * sel_netlbl_sid_to_secattr - Convert a SELinux SID to a NetLabel secattr > * @sid: the SELinux SID > * @secattr: the NetLabel packet security attributes > * > @@ -3029,7 +3029,7 @@ netlbl_secattr_to_sid_return_cleanup: > * Returns zero on success, negative values on failure. > * > */ > -int security_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr) > +int sel_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr) > { > int rc; > struct context *ctx; > diff --git a/security/selinux/xfrm.c b/security/selinux/xfrm.c > index 72b1845..8e292ad 100644 > --- a/security/selinux/xfrm.c > +++ b/security/selinux/xfrm.c > @@ -229,7 +229,7 @@ static int selinux_xfrm_sec_ctx_alloc(struct xfrm_sec_ctx **ctxp, > uctx+1, > str_len); > ctx->ctx_str[str_len] = 0; > - rc = security_context_to_sid(ctx->ctx_str, > + rc = sel_context_to_sid(ctx->ctx_str, > str_len, > &ctx->ctx_sid); > > @@ -248,7 +248,7 @@ static int selinux_xfrm_sec_ctx_alloc(struct xfrm_sec_ctx **ctxp, > return rc; > > not_from_user: > - rc = security_sid_to_context(sid, &ctx_str, &str_len); > + rc = sel_sid_to_context(sid, &ctx_str, &str_len); > if (rc) > goto out; > -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.