@@ -335,7 +335,7 @@ sepgsql_avc_lookup(const char *scontext, const char *tcontext, uint16 tclass)
335
335
*
336
336
* It returns 'true', if the security policy suggested to allow the required
337
337
* permissions. Otherwise, it returns 'false' or raises an error according
338
- * to the 'abort ' argument.
338
+ * to the 'abort_on_violation ' argument.
339
339
* The 'tobject' and 'tclass' identify the target object being referenced,
340
340
* and 'required' is a bitmask of permissions (SEPG_*__*) defined for each
341
341
* object classes.
@@ -345,7 +345,8 @@ sepgsql_avc_lookup(const char *scontext, const char *tcontext, uint16 tclass)
345
345
bool
346
346
sepgsql_avc_check_perms_label (const char * tcontext ,
347
347
uint16 tclass , uint32 required ,
348
- const char * audit_name , bool abort )
348
+ const char * audit_name ,
349
+ bool abort_on_violation )
349
350
{
350
351
char * scontext = sepgsql_get_client_label ();
351
352
avc_cache * cache ;
@@ -415,7 +416,7 @@ sepgsql_avc_check_perms_label(const char *tcontext,
415
416
audit_name );
416
417
}
417
418
418
- if (abort && !result )
419
+ if (abort_on_violation && !result )
419
420
ereport (ERROR ,
420
421
(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
421
422
errmsg ("SELinux: security policy violation" )));
@@ -426,14 +427,15 @@ sepgsql_avc_check_perms_label(const char *tcontext,
426
427
bool
427
428
sepgsql_avc_check_perms (const ObjectAddress * tobject ,
428
429
uint16 tclass , uint32 required ,
429
- const char * audit_name , bool abort )
430
+ const char * audit_name ,
431
+ bool abort_on_violation )
430
432
{
431
433
char * tcontext = GetSecurityLabel (tobject , SEPGSQL_LABEL_TAG );
432
434
bool rc ;
433
435
434
436
rc = sepgsql_avc_check_perms_label (tcontext ,
435
437
tclass , required ,
436
- audit_name , abort );
438
+ audit_name , abort_on_violation );
437
439
if (tcontext )
438
440
pfree (tcontext );
439
441
0 commit comments