intro.1, execve.2, getcontext.3, passwd.5, bpf-helpers.7: wfix

Use gender-neutral pronouns.

Signed-off-by: Jakub Wilk <jwilk@jwilk.net>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Jakub Wilk 2019-03-16 15:15:40 +01:00 committed by Michael Kerrisk
parent e24b389ad8
commit 60ae21db4c
5 changed files with 5 additions and 5 deletions

View File

@ -61,7 +61,7 @@ One types commands to the
the command interpreter.
It is not built-in, but is just a program
and you can change your shell.
Everybody has her own favorite one.
Everybody has their own favorite one.
The standard one is called
.IR sh .
See also

View File

@ -559,7 +559,7 @@ The result of mounting a filesystem
varies across Linux kernel versions:
some will refuse execution of set-user-ID and set-group-ID
executables when this would
give the user powers she did not have already (and return
give the user powers they did not have already (and return
.BR EPERM ),
some will just ignore the set-user-ID and set-group-ID bits and
.BR exec ()

View File

@ -184,7 +184,7 @@ there is no easy way to detect whether a return from
is from the first call, or via a
.BR setcontext ()
call.
The user has to invent her own bookkeeping device, and a register
The user has to invent their own bookkeeping device, and a register
variable won't do since registers are restored.
.PP
When a signal occurs, the current user context is saved and

View File

@ -67,7 +67,7 @@ the shadow record should be obtained from an NIS+ server.
.PP
Regardless of whether shadow passwords are used, many system administrators
use an asterisk (*) in the encrypted password field to make sure
that this user can not authenticate him- or herself using a
that this user can not authenticate themself using a
password.
(But see NOTES below.)
.PP

View File

@ -2250,7 +2250,7 @@ Depending on the BPF program type, a local storage area
can be shared between multiple instances of the BPF program,
running simultaneously.
.sp
A user should care about the synchronization by himself.
A user should care about the synchronization by themself.
For example, by using the \fBBPF_STX_XADD\fP instruction to alter
the shared data.
.TP