@@ -335,7 +335,7 @@ sepgsql_avc_lookup(const char *scontext, const char *tcontext, uint16 tclass)
335335 *
336336 * It returns 'true', if the security policy suggested to allow the required
337337 * permissions. Otherwise, it returns 'false' or raises an error according
338- * to the 'abort ' argument.
338+ * to the 'abort_on_violation ' argument.
339339 * The 'tobject' and 'tclass' identify the target object being referenced,
340340 * and 'required' is a bitmask of permissions (SEPG_*__*) defined for each
341341 * object classes.
@@ -345,7 +345,8 @@ sepgsql_avc_lookup(const char *scontext, const char *tcontext, uint16 tclass)
345345bool
346346sepgsql_avc_check_perms_label (const char * tcontext ,
347347uint16 tclass ,uint32 required ,
348- const char * audit_name ,bool abort )
348+ const char * audit_name ,
349+ bool abort_on_violation )
349350{
350351char * scontext = sepgsql_get_client_label ();
351352avc_cache * cache ;
@@ -415,7 +416,7 @@ sepgsql_avc_check_perms_label(const char *tcontext,
415416audit_name );
416417}
417418
418- if (abort && !result )
419+ if (abort_on_violation && !result )
419420ereport (ERROR ,
420421(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
421422errmsg ("SELinux: security policy violation" )));
@@ -426,14 +427,15 @@ sepgsql_avc_check_perms_label(const char *tcontext,
426427bool
427428sepgsql_avc_check_perms (const ObjectAddress * tobject ,
428429uint16 tclass ,uint32 required ,
429- const char * audit_name ,bool abort )
430+ const char * audit_name ,
431+ bool abort_on_violation )
430432{
431433char * tcontext = GetSecurityLabel (tobject ,SEPGSQL_LABEL_TAG );
432434bool rc ;
433435
434436rc = sepgsql_avc_check_perms_label (tcontext ,
435437tclass ,required ,
436- audit_name ,abort );
438+ audit_name ,abort_on_violation );
437439if (tcontext )
438440pfree (tcontext );
439441