diff options
author | Robert Haas | 2012-09-05 18:01:15 +0000 |
---|---|---|
committer | Robert Haas | 2012-09-05 18:01:59 +0000 |
commit | aa2b237ce51ef12c213ac55d4d3aba509cb3133e (patch) | |
tree | 4ffc1e8458088ff539e20916ac64271409790557 /contrib/sepgsql/selinux.c | |
parent | 46c508fbcf98ac334f1e831d21021d731c882fbb (diff) |
sepgsql cleanups.
This is needed to match recent changes elsewhere. Along the way, some
renaming for clarity.
KaiGai Kohei
Diffstat (limited to 'contrib/sepgsql/selinux.c')
-rw-r--r-- | contrib/sepgsql/selinux.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/contrib/sepgsql/selinux.c b/contrib/sepgsql/selinux.c index baf92b6f6db..7df98175ddf 100644 --- a/contrib/sepgsql/selinux.c +++ b/contrib/sepgsql/selinux.c @@ -893,7 +893,7 @@ sepgsql_compute_create(const char *scontext, * tclass: class code (SEPG_CLASS_*) of the object being referenced * required: a mask of required permissions (SEPG_<class>__<perm>) * audit_name: a human readable object name for audit logs, or NULL. - * abort: true, if caller wants to raise an error on access violation + * abort_on_violation: true, if error shall be raised on access violation */ bool sepgsql_check_perms(const char *scontext, @@ -901,7 +901,7 @@ sepgsql_check_perms(const char *scontext, uint16 tclass, uint32 required, const char *audit_name, - bool abort) + bool abort_on_violation) { struct av_decision avd; uint32 denied; @@ -937,7 +937,7 @@ sepgsql_check_perms(const char *scontext, audit_name); } - if (!result && abort) + if (!result && abort_on_violation) ereport(ERROR, (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), errmsg("SELinux: security policy violation"))); |