From fbb59e706287525a9157edc65944030f9cd251fd Mon Sep 17 00:00:00 2001 From: Dan Gohman Date: Tue, 7 Jun 2022 09:53:26 -0700 Subject: [PATCH] Update library/std/src/os/unix/io/mod.rs Co-authored-by: Sean Stangl --- library/std/src/os/unix/io/mod.rs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/library/std/src/os/unix/io/mod.rs b/library/std/src/os/unix/io/mod.rs index d2c5f741324..73cb3d31a7b 100644 --- a/library/std/src/os/unix/io/mod.rs +++ b/library/std/src/os/unix/io/mod.rs @@ -56,7 +56,7 @@ //! and read from or written to must be `unsafe`? No. Rust's safety guarantees //! only cover what the program itself can do, and not what entities outside //! the program can do to it. `/proc/self/mem` is considered to be such an -//! external entity, along with debugggers and people with physical access to +//! external entity, along with debuggers and people with physical access to //! the hardware. This is true even in cases where the program is controling //! the external entity. //!