about summary refs log tree commit diff
path: root/src/libstd/sys
diff options
context:
space:
mode:
authorDylan DPC <dylan.dpc@gmail.com>2020-04-14 15:35:35 +0200
committerGitHub <noreply@github.com>2020-04-14 15:35:35 +0200
commit816443e6cfbd07443ec9c26f9b83fdd9ffa5715c (patch)
tree387ee6e30eec34b94999b8b49bd2770a5313c07c /src/libstd/sys
parentd249f67a27965d930e75acbd3db6b90e3940331b (diff)
parentde143312f8c7c137f09418878045a48331463d19 (diff)
downloadrust-816443e6cfbd07443ec9c26f9b83fdd9ffa5715c.tar.gz
rust-816443e6cfbd07443ec9c26f9b83fdd9ffa5715c.zip
Rollup merge of #71124 - JOE1994:patch-3, r=Dylan-DPC
Add missing comma

Added missing comma in doc comment
Diffstat (limited to 'src/libstd/sys')
-rw-r--r--src/libstd/sys/windows/ext/fs.rs2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/libstd/sys/windows/ext/fs.rs b/src/libstd/sys/windows/ext/fs.rs
index d508a333484..f85120d170f 100644
--- a/src/libstd/sys/windows/ext/fs.rs
+++ b/src/libstd/sys/windows/ext/fs.rs
@@ -224,7 +224,7 @@ pub trait OpenOptionsExt {
     /// opening a named pipe, to control to which degree a server process can
     /// act on behalf of a client process (security impersonation level).
     ///
-    /// When `security_qos_flags` is not set a malicious program can gain the
+    /// When `security_qos_flags` is not set, a malicious program can gain the
     /// elevated privileges of a privileged Rust process when it allows opening
     /// user-specified paths, by tricking it into opening a named pipe. So
     /// arguably `security_qos_flags` should also be set when opening arbitrary