Skip to content

Commit 32d7c44

Browse files
committed
fix
1 parent c8581a0 commit 32d7c44

File tree

2 files changed

+2
-3
lines changed

2 files changed

+2
-3
lines changed

src/backends.rs

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,6 @@ cfg_if! {
128128
all(target_os = "horizon", target_arch = "arm"),
129129
))] {
130130
mod getrandom;
131-
#[cfg(any(target_os = "android", target_os = "linux"))]
132131
pub use getrandom::*;
133132
} else if #[cfg(target_os = "solaris")] {
134133
mod solaris;

src/impl_utils.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ macro_rules! impl_utils {
9797
/// For example, if the backend partially fills the output buffer in chunks,
9898
/// each chunk should be unpoisoned individually. This way, the correctness of
9999
/// the chunking logic can be validated (in part) using MSAN.
100-
unsafe fn unpoison(buf: &mut [MaybeUninit<u8>]) {
100+
unsafe fn unpoison(buf: &mut [core::mem::MaybeUninit<u8>]) {
101101
cfg_if! {
102102
if #[cfg(getrandom_msan)] {
103103
unsafe extern "C" {
@@ -132,7 +132,7 @@ macro_rules! impl_utils {
132132
/// ((SI_LINUX && __GLIBC_PREREQ(2, 25)) || SI_FREEBSD || SI_SOLARIS)
133133
/// ```
134134
/// So, effectively, we have to assume that it is never intercepted on Linux.
135-
unsafe fn unpoison_linux_getrandom_result(buf: &mut [MaybeUninit<u8>], ret: isize) {
135+
unsafe fn unpoison_linux_getrandom_result(buf: &mut [core::mem::MaybeUninit<u8>], ret: isize) {
136136
$crate::impl_utils!(unpoison);
137137

138138
if let Ok(bytes_written) = usize::try_from(ret) {

0 commit comments

Comments
 (0)