Skip to content

Commit

Permalink
intro.1, execve.2, getcontext.3, passwd.5, bpf-helpers.7: wfix
Browse files Browse the repository at this point in the history
Use gender-neutral pronouns.

Signed-off-by: Jakub Wilk <jwilk@jwilk.net>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
  • Loading branch information
jwilk authored and mkerrisk committed May 6, 2019
1 parent e24b389 commit 60ae21d
Show file tree
Hide file tree
Showing 5 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion man1/intro.1
Expand Up @@ -61,7 +61,7 @@ One types commands to the
the command interpreter.
It is not built-in, but is just a program
and you can change your shell.
Everybody has her own favorite one.
Everybody has their own favorite one.
The standard one is called
.IR sh .
See also
Expand Down
2 changes: 1 addition & 1 deletion man2/execve.2
Expand Up @@ -559,7 +559,7 @@ The result of mounting a filesystem
varies across Linux kernel versions:
some will refuse execution of set-user-ID and set-group-ID
executables when this would
give the user powers she did not have already (and return
give the user powers they did not have already (and return
.BR EPERM ),
some will just ignore the set-user-ID and set-group-ID bits and
.BR exec ()
Expand Down
2 changes: 1 addition & 1 deletion man3/getcontext.3
Expand Up @@ -184,7 +184,7 @@ there is no easy way to detect whether a return from
is from the first call, or via a
.BR setcontext ()
call.
The user has to invent her own bookkeeping device, and a register
The user has to invent their own bookkeeping device, and a register
variable won't do since registers are restored.
.PP
When a signal occurs, the current user context is saved and
Expand Down
2 changes: 1 addition & 1 deletion man5/passwd.5
Expand Up @@ -67,7 +67,7 @@ the shadow record should be obtained from an NIS+ server.
.PP
Regardless of whether shadow passwords are used, many system administrators
use an asterisk (*) in the encrypted password field to make sure
that this user can not authenticate him- or herself using a
that this user can not authenticate themself using a
password.
(But see NOTES below.)
.PP
Expand Down
2 changes: 1 addition & 1 deletion man7/bpf-helpers.7
Expand Up @@ -2250,7 +2250,7 @@ Depending on the BPF program type, a local storage area
can be shared between multiple instances of the BPF program,
running simultaneously.
.sp
A user should care about the synchronization by himself.
A user should care about the synchronization by themself.
For example, by using the \fBBPF_STX_XADD\fP instruction to alter
the shared data.
.TP
Expand Down

0 comments on commit 60ae21d

Please sign in to comment.