[prev in list] [next in list] [prev in thread] [next in thread]
List: linux-man
Subject: [PATCH] intro.1, execve.2, getcontext.3, passwd.5, bpf-helpers.7: wfix
From: Jakub Wilk <jwilk () jwilk ! net>
Date: 2019-03-16 14:15:40
Message-ID: 20190316141540.6708-1-jwilk () jwilk ! net
[Download RAW message or body]
Use gender-neutral pronouns.
Signed-off-by: Jakub Wilk <jwilk@jwilk.net>
---
man1/intro.1 | 2 +-
man2/execve.2 | 2 +-
man3/getcontext.3 | 2 +-
man5/passwd.5 | 2 +-
man7/bpf-helpers.7 | 2 +-
5 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/man1/intro.1 b/man1/intro.1
index 03649841d..63fcf5dea 100644
--- a/man1/intro.1
+++ b/man1/intro.1
@@ -61,7 +61,7 @@ One types commands to the
the command interpreter.
It is not built-in, but is just a program
and you can change your shell.
-Everybody has her own favorite one.
+Everybody has their own favorite one.
The standard one is called
.IR sh .
See also
diff --git a/man2/execve.2 b/man2/execve.2
index 082bcb1a4..324e26a3d 100644
--- a/man2/execve.2
+++ b/man2/execve.2
@@ -555,7 +555,7 @@ The result of mounting a filesystem
varies across Linux kernel versions:
some will refuse execution of set-user-ID and set-group-ID
executables when this would
-give the user powers she did not have already (and return
+give the user powers they did not have already (and return
.BR EPERM ),
some will just ignore the set-user-ID and set-group-ID bits and
.BR exec ()
diff --git a/man3/getcontext.3 b/man3/getcontext.3
index 7e6b2f230..141b6e98a 100644
--- a/man3/getcontext.3
+++ b/man3/getcontext.3
@@ -184,7 +184,7 @@ there is no easy way to detect whether a return from
is from the first call, or via a
.BR setcontext ()
call.
-The user has to invent her own bookkeeping device, and a register
+The user has to invent their own bookkeeping device, and a register
variable won't do since registers are restored.
.PP
When a signal occurs, the current user context is saved and
diff --git a/man5/passwd.5 b/man5/passwd.5
index 70b1105e1..469d29260 100644
--- a/man5/passwd.5
+++ b/man5/passwd.5
@@ -67,7 +67,7 @@ the shadow record should be obtained from an NIS+ server.
.PP
Regardless of whether shadow passwords are used, many system administrators
use an asterisk (*) in the encrypted password field to make sure
-that this user can not authenticate him- or herself using a
+that this user can not authenticate themself using a
password.
(But see NOTES below.)
.PP
diff --git a/man7/bpf-helpers.7 b/man7/bpf-helpers.7
index 7112b4536..6f07f476e 100644
--- a/man7/bpf-helpers.7
+++ b/man7/bpf-helpers.7
@@ -2250,7 +2250,7 @@ Depending on the BPF program type, a local storage area
can be shared between multiple instances of the BPF program,
running simultaneously.
.sp
-A user should care about the synchronization by himself.
+A user should care about the synchronization by themself.
For example, by using the \fBBPF_STX_XADD\fP instruction to alter
the shared data.
.TP
--
2.20.1
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic