File tree Expand file tree Collapse file tree 2 files changed +2
-3
lines changed
Expand file tree Collapse file tree 2 files changed +2
-3
lines changed Original file line number Diff line number Diff line change @@ -128,7 +128,6 @@ cfg_if! {
128128 all( target_os = "horizon" , target_arch = "arm" ) ,
129129 ) ) ] {
130130 mod getrandom;
131- #[ cfg( any( target_os = "android" , target_os = "linux" ) ) ]
132131 pub use getrandom:: * ;
133132 } else if #[ cfg( target_os = "solaris" ) ] {
134133 mod solaris;
Original file line number Diff line number Diff line change @@ -97,7 +97,7 @@ macro_rules! impl_utils {
9797 /// For example, if the backend partially fills the output buffer in chunks,
9898 /// each chunk should be unpoisoned individually. This way, the correctness of
9999 /// the chunking logic can be validated (in part) using MSAN.
100- unsafe fn unpoison( buf: & mut [ MaybeUninit <u8 >] ) {
100+ unsafe fn unpoison( buf: & mut [ core :: mem :: MaybeUninit <u8 >] ) {
101101 cfg_if! {
102102 if #[ cfg( getrandom_msan) ] {
103103 unsafe extern "C" {
@@ -132,7 +132,7 @@ macro_rules! impl_utils {
132132 /// ((SI_LINUX && __GLIBC_PREREQ(2, 25)) || SI_FREEBSD || SI_SOLARIS)
133133 /// ```
134134 /// So, effectively, we have to assume that it is never intercepted on Linux.
135- unsafe fn unpoison_linux_getrandom_result( buf: & mut [ MaybeUninit <u8 >] , ret: isize ) {
135+ unsafe fn unpoison_linux_getrandom_result( buf: & mut [ core :: mem :: MaybeUninit <u8 >] , ret: isize ) {
136136 $crate:: impl_utils!( unpoison) ;
137137
138138 if let Ok ( bytes_written) = usize :: try_from( ret) {
You can’t perform that action at this time.
0 commit comments