File tree Expand file tree Collapse file tree 1 file changed +1
-4
lines changed Expand file tree Collapse file tree 1 file changed +1
-4
lines changed Original file line number Diff line number Diff line change @@ -13,7 +13,6 @@ pub fn hashmap_random_keys() -> (u64, u64) {
1313
1414#[ cfg( all( unix,
1515 not( target_os = "ios" ) ,
16- not( all( target_os = "macos" , miri) ) ,
1716 not( target_os = "openbsd" ) ,
1817 not( target_os = "freebsd" ) ,
1918 not( target_os = "fuchsia" ) ) ) ]
@@ -107,9 +106,7 @@ mod imp {
107106// once per thread in `hashmap_random_keys`. Therefore `SecRandomCopyBytes` is
108107// only used on iOS where direct access to `/dev/urandom` is blocked by the
109108// sandbox.
110- // HACK: However, we do use this when running in Miri on macOS; intercepting this is much
111- // easier than intercepting accesses to /dev/urandom.
112- #[ cfg( any( target_os = "ios" , all( target_os = "macos" , miri) ) ) ]
109+ #[ cfg( target_os = "ios" ) ]
113110mod imp {
114111 use crate :: io;
115112 use crate :: ptr;
You can’t perform that action at this time.
0 commit comments