buf_len = strlen("initialized=0;enforcing=0;checkreqprot=0;") + 1;
 
        len = strlen(on);
-       for (i = 0; i < __POLICYDB_CAPABILITY_MAX; i++)
+       for (i = 0; i < __POLICYDB_CAP_MAX; i++)
                buf_len += strlen(selinux_policycap_names[i]) + len;
 
        buf = kzalloc(buf_len, GFP_KERNEL);
        rc = strlcat(buf, checkreqprot_get(state) ? on : off, buf_len);
        WARN_ON(rc >= buf_len);
 
-       for (i = 0; i < __POLICYDB_CAPABILITY_MAX; i++) {
+       for (i = 0; i < __POLICYDB_CAP_MAX; i++) {
                rc = strlcat(buf, selinux_policycap_names[i], buf_len);
                WARN_ON(rc >= buf_len);
 
 
 
 /* Policy capabilities */
 enum {
-       POLICYDB_CAPABILITY_NETPEER,
-       POLICYDB_CAPABILITY_OPENPERM,
-       POLICYDB_CAPABILITY_EXTSOCKCLASS,
-       POLICYDB_CAPABILITY_ALWAYSNETWORK,
-       POLICYDB_CAPABILITY_CGROUPSECLABEL,
-       POLICYDB_CAPABILITY_NNP_NOSUID_TRANSITION,
-       POLICYDB_CAPABILITY_GENFS_SECLABEL_SYMLINKS,
-       POLICYDB_CAPABILITY_IOCTL_SKIP_CLOEXEC,
-       __POLICYDB_CAPABILITY_MAX
+       POLICYDB_CAP_NETPEER,
+       POLICYDB_CAP_OPENPERM,
+       POLICYDB_CAP_EXTSOCKCLASS,
+       POLICYDB_CAP_ALWAYSNETWORK,
+       POLICYDB_CAP_CGROUPSECLABEL,
+       POLICYDB_CAP_NNP_NOSUID_TRANSITION,
+       POLICYDB_CAP_GENFS_SECLABEL_SYMLINKS,
+       POLICYDB_CAP_IOCTL_SKIP_CLOEXEC,
+       __POLICYDB_CAP_MAX
 };
-#define POLICYDB_CAPABILITY_MAX (__POLICYDB_CAPABILITY_MAX - 1)
+#define POLICYDB_CAP_MAX (__POLICYDB_CAP_MAX - 1)
 
-extern const char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX];
+extern const char *selinux_policycap_names[__POLICYDB_CAP_MAX];
 
 #endif /* _SELINUX_POLICYCAP_H_ */
 
 #include "policycap.h"
 
 /* Policy capability names */
-const char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX] = {
+const char *selinux_policycap_names[__POLICYDB_CAP_MAX] = {
        "network_peer_controls",
        "open_perms",
        "extended_socket_class",
 
 #endif
        bool checkreqprot;
        bool initialized;
-       bool policycap[__POLICYDB_CAPABILITY_MAX];
+       bool policycap[__POLICYDB_CAP_MAX];
 
        struct page *status_page;
        struct mutex status_lock;
 {
        struct selinux_state *state = &selinux_state;
 
-       return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_NETPEER]);
+       return READ_ONCE(state->policycap[POLICYDB_CAP_NETPEER]);
 }
 
 static inline bool selinux_policycap_openperm(void)
 {
        struct selinux_state *state = &selinux_state;
 
-       return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_OPENPERM]);
+       return READ_ONCE(state->policycap[POLICYDB_CAP_OPENPERM]);
 }
 
 static inline bool selinux_policycap_extsockclass(void)
 {
        struct selinux_state *state = &selinux_state;
 
-       return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_EXTSOCKCLASS]);
+       return READ_ONCE(state->policycap[POLICYDB_CAP_EXTSOCKCLASS]);
 }
 
 static inline bool selinux_policycap_alwaysnetwork(void)
 {
        struct selinux_state *state = &selinux_state;
 
-       return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_ALWAYSNETWORK]);
+       return READ_ONCE(state->policycap[POLICYDB_CAP_ALWAYSNETWORK]);
 }
 
 static inline bool selinux_policycap_cgroupseclabel(void)
 {
        struct selinux_state *state = &selinux_state;
 
-       return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_CGROUPSECLABEL]);
+       return READ_ONCE(state->policycap[POLICYDB_CAP_CGROUPSECLABEL]);
 }
 
 static inline bool selinux_policycap_nnp_nosuid_transition(void)
 {
        struct selinux_state *state = &selinux_state;
 
-       return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_NNP_NOSUID_TRANSITION]);
+       return READ_ONCE(state->policycap[POLICYDB_CAP_NNP_NOSUID_TRANSITION]);
 }
 
 static inline bool selinux_policycap_genfs_seclabel_symlinks(void)
 {
        struct selinux_state *state = &selinux_state;
 
-       return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_GENFS_SECLABEL_SYMLINKS]);
+       return READ_ONCE(state->policycap[POLICYDB_CAP_GENFS_SECLABEL_SYMLINKS]);
 }
 
 static inline bool selinux_policycap_ioctl_skip_cloexec(void)
 {
        struct selinux_state *state = &selinux_state;
 
-       return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_IOCTL_SKIP_CLOEXEC]);
+       return READ_ONCE(state->policycap[POLICYDB_CAP_IOCTL_SKIP_CLOEXEC]);
 }
 
 struct selinux_policy_convert_data;
 
        struct dentry *dentry = NULL;
        struct inode *inode = NULL;
 
-       for (iter = 0; iter <= POLICYDB_CAPABILITY_MAX; iter++) {
+       for (iter = 0; iter <= POLICYDB_CAP_MAX; iter++) {
                if (iter < ARRAY_SIZE(selinux_policycap_names))
                        dentry = d_alloc_name(fsi->policycap_dir,
                                              selinux_policycap_names[iter]);