1
0
mirror of https://github.com/systemd/systemd.git synced 2024-12-22 17:35:35 +03:00

Replace gendered pronouns with gender neutral ones. (#16844)

This commit is contained in:
PhoenixDiscord 2020-08-27 04:52:48 +02:00 committed by GitHub
parent 33e1a5d8d3
commit e8607daf7d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
8 changed files with 9 additions and 9 deletions

View File

@ -196,8 +196,8 @@ The currently used part of the file is the **header_size** plus the
**arena_size** field of the header. If a writer needs to write to a file where
the actual file size on disk is smaller than the reported value it shall
immediately rotate the file and start a new one. If a writer is asked to write
to a file with a header that is shorter than his own definition of the struct
Header, he shall immediately rotate the file and start a new one.
to a file with a header that is shorter than its own definition of the struct
Header, it shall immediately rotate the file and start a new one.
The **n_objects** field contains a counter for objects currently available in
this file. As objects are appended to the end of the file this counter is

View File

@ -21,7 +21,7 @@ struct LookupPaths {
char **search_path;
/* Where we shall create or remove our installation symlinks, aka "configuration", and where the user/admin
* shall place his own unit files. */
* shall place their own unit files. */
char *persistent_config;
char *runtime_config;

View File

@ -65,7 +65,7 @@ int procfs_tasks_set_limit(uint64_t limit) {
if (limit == 0) /* This makes no sense, we are userspace and hence count as tasks too, and we want to live,
* hence the limit conceptually has to be above 0. Also, most likely if anyone asks for a zero
* limit he/she probably means "no limit", hence let's better refuse this to avoid
* limit they probably mean "no limit", hence let's better refuse this to avoid
* confusion. */
return -EINVAL;

View File

@ -412,7 +412,7 @@ static int acquire_path(const char *path, int flags, mode_t mode) {
if (connect(fd, &sa.sa, sa_len) < 0)
return errno == EINVAL ? -ENXIO : -errno; /* Propagate initial error if we get EINVAL, i.e. we have
* indication that his wasn't an AF_UNIX socket after all */
* indication that this wasn't an AF_UNIX socket after all */
if ((flags & O_ACCMODE) == O_RDONLY)
r = shutdown(fd, SHUT_WR);

View File

@ -1337,7 +1337,7 @@ static int parse_argv(int argc, char *argv[]) {
return log_oom();
/* If the user asked for a particular
* property, show it to him, even if it is
* property, show it to them, even if it is
* empty. */
arg_all = true;
break;

View File

@ -2672,7 +2672,7 @@ static int parse_argv(int argc, char *argv[]) {
return log_oom();
/* If the user asked for a particular
* property, show it to him, even if it is
* property, show it to them, even if it is
* empty. */
arg_all = true;
break;

View File

@ -1005,7 +1005,7 @@ static int parse_argv(int argc, char *argv[]) {
return log_oom();
/* If the user asked for a particular
* property, show it to him, even if it is
* property, show it to them, even if it is
* empty. */
arg_all = true;
break;

View File

@ -186,7 +186,7 @@ static int dev_pci_onboard(sd_device *dev, struct netnames *names) {
/* Some BIOSes report rubbish indexes that are excessively high (2^24-1 is an index VMware likes to
* report for example). Let's define a cut-off where we don't consider the index reliable anymore. We
* pick some arbitrary cut-off, which is somewhere beyond the realistic number of physical network
* interface a system might have. Ideally the kernel would already filter his crap for us, but it
* interface a system might have. Ideally the kernel would already filter this crap for us, but it
* doesn't currently. */
if (idx > ONBOARD_INDEX_MAX)
return -ENOENT;