diff options
| author | Youngsuk Kim <joseph942010@gmail.com> | 2020-04-14 09:29:39 -0400 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2020-04-14 09:29:39 -0400 |
| commit | de143312f8c7c137f09418878045a48331463d19 (patch) | |
| tree | 62762e3bb71ce6612bbcdc0e38e4300ff125a5e6 /src/libstd | |
| parent | ba72b15666b2491415aec703a02c2364fe5e2790 (diff) | |
| download | rust-de143312f8c7c137f09418878045a48331463d19.tar.gz rust-de143312f8c7c137f09418878045a48331463d19.zip | |
Add missing comma
Diffstat (limited to 'src/libstd')
| -rw-r--r-- | src/libstd/sys/windows/ext/fs.rs | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/libstd/sys/windows/ext/fs.rs b/src/libstd/sys/windows/ext/fs.rs index d508a333484..f85120d170f 100644 --- a/src/libstd/sys/windows/ext/fs.rs +++ b/src/libstd/sys/windows/ext/fs.rs @@ -224,7 +224,7 @@ pub trait OpenOptionsExt { /// opening a named pipe, to control to which degree a server process can /// act on behalf of a client process (security impersonation level). /// - /// When `security_qos_flags` is not set a malicious program can gain the + /// When `security_qos_flags` is not set, a malicious program can gain the /// elevated privileges of a privileged Rust process when it allows opening /// user-specified paths, by tricking it into opening a named pipe. So /// arguably `security_qos_flags` should also be set when opening arbitrary |
