From e89ec68d5db9aa58b8170b351e730d45304c812b Mon Sep 17 00:00:00 2001 From: Dan Gohman Date: Wed, 8 Jun 2022 08:26:56 -0700 Subject: [PATCH] Update library/std/src/os/unix/io/mod.rs Co-authored-by: Mara Bos --- library/std/src/os/unix/io/mod.rs | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/library/std/src/os/unix/io/mod.rs b/library/std/src/os/unix/io/mod.rs index 8935f303081c..0a9c95fd409a 100644 --- a/library/std/src/os/unix/io/mod.rs +++ b/library/std/src/os/unix/io/mod.rs @@ -46,9 +46,8 @@ //! //! ## What about `/proc/self/mem` and similar OS features? //! -//! Some platforms have special files, such as `/proc/self/mem`, which is a -//! filesystem path that can be opened, producing a file descriptor that, when -//! read from or written to, reads and writes the process's memory. These reads +//! Some platforms have special files, such as `/proc/self/mem`, which +//! provide read and write access to the process's memory. Such reads //! and writes happen outside the control of the Rust compiler, so they do not //! uphold Rust's memory safety guarantees. //!