Use gender neutral terms
This commit is contained in:
parent
8cd6080f6c
commit
ef59ab738e
5 changed files with 7 additions and 7 deletions
|
@ -315,7 +315,7 @@ pub(super) fn count_metavar_decls(matcher: &[TokenTree]) -> usize {
|
|||
/// only on the nesting depth of repetitions in the originating token tree it
|
||||
/// was derived from.
|
||||
///
|
||||
/// In layman's terms: `NamedMatch` will form a tree representing nested matches of a particular
|
||||
/// In layperson's terms: `NamedMatch` will form a tree representing nested matches of a particular
|
||||
/// meta variable. For example, if we are matching the following macro against the following
|
||||
/// invocation...
|
||||
///
|
||||
|
|
|
@ -1657,7 +1657,7 @@ fn receiver_is_valid<'fcx, 'tcx>(
|
|||
}
|
||||
} else {
|
||||
debug!("receiver_is_valid: type `{:?}` does not deref to `{:?}`", receiver_ty, self_ty);
|
||||
// If he receiver already has errors reported due to it, consider it valid to avoid
|
||||
// If the receiver already has errors reported due to it, consider it valid to avoid
|
||||
// unnecessary errors (#58712).
|
||||
return receiver_ty.references_error();
|
||||
}
|
||||
|
|
|
@ -2700,7 +2700,7 @@ fn linkage_by_name(tcx: TyCtxt<'_>, def_id: DefId, name: &str) -> Linkage {
|
|||
// Use the names from src/llvm/docs/LangRef.rst here. Most types are only
|
||||
// applicable to variable declarations and may not really make sense for
|
||||
// Rust code in the first place but allow them anyway and trust that the
|
||||
// user knows what s/he's doing. Who knows, unanticipated use cases may pop
|
||||
// user knows what they're doing. Who knows, unanticipated use cases may pop
|
||||
// up in the future.
|
||||
//
|
||||
// ghost, dllimport, dllexport and linkonce_odr_autohide are not supported
|
||||
|
|
|
@ -644,9 +644,9 @@ fn recursive_rmdir_toctou() {
|
|||
// Test for time-of-check to time-of-use issues.
|
||||
//
|
||||
// Scenario:
|
||||
// The attacker wants to get directory contents deleted, to which he does not have access.
|
||||
// He has a way to get a privileged Rust binary call `std::fs::remove_dir_all()` on a
|
||||
// directory he controls, e.g. in his home directory.
|
||||
// The attacker wants to get directory contents deleted, to which they do not have access.
|
||||
// They have a way to get a privileged Rust binary call `std::fs::remove_dir_all()` on a
|
||||
// directory they control, e.g. in their home directory.
|
||||
//
|
||||
// The POC sets up the `attack_dest/attack_file` which the attacker wants to have deleted.
|
||||
// The attacker repeatedly creates a directory and replaces it with a symlink from
|
||||
|
|
|
@ -980,7 +980,7 @@ pub mod fast {
|
|||
unsafe fn try_initialize<F: FnOnce() -> T>(&self, init: F) -> Option<&'static T> {
|
||||
// SAFETY: See comment above (this function doc).
|
||||
if !mem::needs_drop::<T>() || unsafe { self.try_register_dtor() } {
|
||||
// SAFETY: See comment above (his function doc).
|
||||
// SAFETY: See comment above (this function doc).
|
||||
Some(unsafe { self.inner.initialize(init) })
|
||||
} else {
|
||||
None
|
||||
|
|
Loading…
Add table
Reference in a new issue