}
/*
- * If pid is in /a/b/c, he may see that /a exists, but not /b or /a/c.
+ * If pid is in /a/b/c, they may see that /a exists, but not /b or /a/c.
*/
static bool caller_may_see_dir(pid_t pid, const char *contrl, const char *cg)
{
}
/*
- * If pid is in /a/b/c/d, he may only act on things under cg=/a/b/c/d.
- * If pid is in /a, he may act on /a/b, but not on /b.
+ * If pid is in /a/b/c/d, they may only act on things under cg=/a/b/c/d.
+ * If pid is in /a, they may act on /a/b, but not on /b.
* if the answer is false and nextcg is not NULL, then *nextcg will point
* to a string containing the next cgroup directory under cg, which must be
* freed by the caller.
/*
* for is_privileged_over,
- * specify whether we require the calling uid to be root in his
+ * specify whether we require the calling uid to be root in their
* namespace
*/
#define NS_ROOT_REQD true
if (!f)
return false;
- /* if caller's not root in his namespace, reject */
+ /* if caller's not root in their namespace, reject */
nsuid = convert_id_to_ns(f, uid);
if (nsuid)
goto out;
/*
* This being a fuse request, the uid and gid must be valid
* in the caller's namespace. So we can just check to make
- * sure that the caller is root in his uid, and privileged
+ * sure that the caller is root in their uid, and privileged
* over the file's current owner.
*/
if (!is_privileged_over(fc->pid, fc->uid, k->uid, NS_ROOT_OPT)) {
/*
* This being a fuse request, the uid and gid must be valid
* in the caller's namespace. So we can just check to make
- * sure that the caller is root in his uid, and privileged
+ * sure that the caller is root in their uid, and privileged
* over the file's current owner.
*/
if (!is_privileged_over(fc->pid, fc->uid, k->uid, NS_ROOT_REQD)) {