Use gender-neutral pronouns.
Signed-off-by: Jakub Wilk <jwilk@jwilk.net>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
the command interpreter.
It is not built-in, but is just a program
and you can change your shell.
-Everybody has her own favorite one.
+Everybody has their own favorite one.
The standard one is called
.IR sh .
See also
varies across Linux kernel versions:
some will refuse execution of set-user-ID and set-group-ID
executables when this would
-give the user powers she did not have already (and return
+give the user powers they did not have already (and return
.BR EPERM ),
some will just ignore the set-user-ID and set-group-ID bits and
.BR exec ()
is from the first call, or via a
.BR setcontext ()
call.
-The user has to invent her own bookkeeping device, and a register
+The user has to invent their own bookkeeping device, and a register
variable won't do since registers are restored.
.PP
When a signal occurs, the current user context is saved and
.PP
Regardless of whether shadow passwords are used, many system administrators
use an asterisk (*) in the encrypted password field to make sure
-that this user can not authenticate him- or herself using a
+that this user can not authenticate themself using a
password.
(But see NOTES below.)
.PP
can be shared between multiple instances of the BPF program,
running simultaneously.
.sp
-A user should care about the synchronization by himself.
+A user should care about the synchronization by themself.
For example, by using the \fBBPF_STX_XADD\fP instruction to alter
the shared data.
.TP