Use gender neutral terms
This commit is contained in:
parent
8cd6080f6c
commit
ef59ab738e
5 changed files with 7 additions and 7 deletions
|
@ -315,7 +315,7 @@ pub(super) fn count_metavar_decls(matcher: &[TokenTree]) -> usize {
|
||||||
/// only on the nesting depth of repetitions in the originating token tree it
|
/// only on the nesting depth of repetitions in the originating token tree it
|
||||||
/// was derived from.
|
/// was derived from.
|
||||||
///
|
///
|
||||||
/// In layman's terms: `NamedMatch` will form a tree representing nested matches of a particular
|
/// In layperson's terms: `NamedMatch` will form a tree representing nested matches of a particular
|
||||||
/// meta variable. For example, if we are matching the following macro against the following
|
/// meta variable. For example, if we are matching the following macro against the following
|
||||||
/// invocation...
|
/// invocation...
|
||||||
///
|
///
|
||||||
|
|
|
@ -1657,7 +1657,7 @@ fn receiver_is_valid<'fcx, 'tcx>(
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
debug!("receiver_is_valid: type `{:?}` does not deref to `{:?}`", receiver_ty, self_ty);
|
debug!("receiver_is_valid: type `{:?}` does not deref to `{:?}`", receiver_ty, self_ty);
|
||||||
// If he receiver already has errors reported due to it, consider it valid to avoid
|
// If the receiver already has errors reported due to it, consider it valid to avoid
|
||||||
// unnecessary errors (#58712).
|
// unnecessary errors (#58712).
|
||||||
return receiver_ty.references_error();
|
return receiver_ty.references_error();
|
||||||
}
|
}
|
||||||
|
|
|
@ -2700,7 +2700,7 @@ fn linkage_by_name(tcx: TyCtxt<'_>, def_id: DefId, name: &str) -> Linkage {
|
||||||
// Use the names from src/llvm/docs/LangRef.rst here. Most types are only
|
// Use the names from src/llvm/docs/LangRef.rst here. Most types are only
|
||||||
// applicable to variable declarations and may not really make sense for
|
// applicable to variable declarations and may not really make sense for
|
||||||
// Rust code in the first place but allow them anyway and trust that the
|
// Rust code in the first place but allow them anyway and trust that the
|
||||||
// user knows what s/he's doing. Who knows, unanticipated use cases may pop
|
// user knows what they're doing. Who knows, unanticipated use cases may pop
|
||||||
// up in the future.
|
// up in the future.
|
||||||
//
|
//
|
||||||
// ghost, dllimport, dllexport and linkonce_odr_autohide are not supported
|
// ghost, dllimport, dllexport and linkonce_odr_autohide are not supported
|
||||||
|
|
|
@ -644,9 +644,9 @@ fn recursive_rmdir_toctou() {
|
||||||
// Test for time-of-check to time-of-use issues.
|
// Test for time-of-check to time-of-use issues.
|
||||||
//
|
//
|
||||||
// Scenario:
|
// Scenario:
|
||||||
// The attacker wants to get directory contents deleted, to which he does not have access.
|
// The attacker wants to get directory contents deleted, to which they do not have access.
|
||||||
// He has a way to get a privileged Rust binary call `std::fs::remove_dir_all()` on a
|
// They have a way to get a privileged Rust binary call `std::fs::remove_dir_all()` on a
|
||||||
// directory he controls, e.g. in his home directory.
|
// directory they control, e.g. in their home directory.
|
||||||
//
|
//
|
||||||
// The POC sets up the `attack_dest/attack_file` which the attacker wants to have deleted.
|
// The POC sets up the `attack_dest/attack_file` which the attacker wants to have deleted.
|
||||||
// The attacker repeatedly creates a directory and replaces it with a symlink from
|
// The attacker repeatedly creates a directory and replaces it with a symlink from
|
||||||
|
|
|
@ -980,7 +980,7 @@ pub mod fast {
|
||||||
unsafe fn try_initialize<F: FnOnce() -> T>(&self, init: F) -> Option<&'static T> {
|
unsafe fn try_initialize<F: FnOnce() -> T>(&self, init: F) -> Option<&'static T> {
|
||||||
// SAFETY: See comment above (this function doc).
|
// SAFETY: See comment above (this function doc).
|
||||||
if !mem::needs_drop::<T>() || unsafe { self.try_register_dtor() } {
|
if !mem::needs_drop::<T>() || unsafe { self.try_register_dtor() } {
|
||||||
// SAFETY: See comment above (his function doc).
|
// SAFETY: See comment above (this function doc).
|
||||||
Some(unsafe { self.inner.initialize(init) })
|
Some(unsafe { self.inner.initialize(init) })
|
||||||
} else {
|
} else {
|
||||||
None
|
None
|
||||||
|
|
Loading…
Add table
Reference in a new issue