about summary refs log tree commit diff
path: root/library/std/src/fs.rs
diff options
context:
space:
mode:
authorklensy <klensy@users.noreply.github.com>2024-12-07 13:51:08 +0300
committerklensy <klensy@users.noreply.github.com>2025-07-03 10:51:06 +0300
commitc76d032f0144b650a438ee1efba89c475e0b115b (patch)
tree88aad6141d0dd4a3dd1ce5de8c38b001c5bd3ba4 /library/std/src/fs.rs
parentf51c9870bab634afb9e7a262b6ca7816bb9e940d (diff)
downloadrust-c76d032f0144b650a438ee1efba89c475e0b115b.tar.gz
rust-c76d032f0144b650a438ee1efba89c475e0b115b.zip
setup CI and tidy to use typos for spellchecking and fix few typos
Diffstat (limited to 'library/std/src/fs.rs')
-rw-r--r--library/std/src/fs.rs2
1 files changed, 1 insertions, 1 deletions
diff --git a/library/std/src/fs.rs b/library/std/src/fs.rs
index d9902d41928..7ae8e700ff6 100644
--- a/library/std/src/fs.rs
+++ b/library/std/src/fs.rs
@@ -3091,7 +3091,7 @@ pub fn read_dir<P: AsRef<Path>>(path: P) -> io::Result<ReadDir> {
 /// On UNIX-like systems, this function will update the permission bits
 /// of the file pointed to by the symlink.
 ///
-/// Note that this behavior can lead to privalage escalation vulnerabilites,
+/// Note that this behavior can lead to privalage escalation vulnerabilities,
 /// where the ability to create a symlink in one directory allows you to
 /// cause the permissions of another file or directory to be modified.
 ///