We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 31a75a1 commit 54aefc6Copy full SHA for 54aefc6
src/libstd/sys/unix/rand.rs
@@ -13,6 +13,7 @@ pub fn hashmap_random_keys() -> (u64, u64) {
13
14
#[cfg(all(unix,
15
not(target_os = "ios"),
16
+ not(all(target_os = "macos", miri)),
17
not(target_os = "openbsd"),
18
not(target_os = "freebsd"),
19
not(target_os = "fuchsia")))]
@@ -106,7 +107,9 @@ mod imp {
106
107
// once per thread in `hashmap_random_keys`. Therefore `SecRandomCopyBytes` is
108
// only used on iOS where direct access to `/dev/urandom` is blocked by the
109
// sandbox.
-#[cfg(target_os = "ios")]
110
+// HACK: However, we do use this when running in Miri on macOS; intercepting this is much
111
+// easier than intercepting accesses to /dev/urandom.
112
+#[cfg(any(target_os = "ios", all(target_os = "macos", miri)))]
113
mod imp {
114
use crate::io;
115
use crate::ptr;
0 commit comments