Coverage Report

Created: 2025-07-01 06:28

/rust/registry/src/index.crates.io-6f17d22bba15001f/rand-0.9.1/src/rngs/thread.rs
Line
Count
Source (jump to first uncovered line)
1
// Copyright 2018 Developers of the Rand project.
2
//
3
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
4
// https://www.apache.org/licenses/LICENSE-2.0> or the MIT license
5
// <LICENSE-MIT or https://opensource.org/licenses/MIT>, at your
6
// option. This file may not be copied, modified, or distributed
7
// except according to those terms.
8
9
//! Thread-local random number generator
10
11
use core::cell::UnsafeCell;
12
use std::fmt;
13
use std::rc::Rc;
14
use std::thread_local;
15
16
use rand_core::{CryptoRng, RngCore};
17
18
use super::std::Core;
19
use crate::rngs::OsRng;
20
use crate::rngs::ReseedingRng;
21
22
// Rationale for using `UnsafeCell` in `ThreadRng`:
23
//
24
// Previously we used a `RefCell`, with an overhead of ~15%. There will only
25
// ever be one mutable reference to the interior of the `UnsafeCell`, because
26
// we only have such a reference inside `next_u32`, `next_u64`, etc. Within a
27
// single thread (which is the definition of `ThreadRng`), there will only ever
28
// be one of these methods active at a time.
29
//
30
// A possible scenario where there could be multiple mutable references is if
31
// `ThreadRng` is used inside `next_u32` and co. But the implementation is
32
// completely under our control. We just have to ensure none of them use
33
// `ThreadRng` internally, which is nonsensical anyway. We should also never run
34
// `ThreadRng` in destructors of its implementation, which is also nonsensical.
35
36
// Number of generated bytes after which to reseed `ThreadRng`.
37
// According to benchmarks, reseeding has a noticeable impact with thresholds
38
// of 32 kB and less. We choose 64 kB to avoid significant overhead.
39
const THREAD_RNG_RESEED_THRESHOLD: u64 = 1024 * 64;
40
41
/// A reference to the thread-local generator
42
///
43
/// This type is a reference to a lazily-initialized thread-local generator.
44
/// An instance can be obtained via [`rand::rng()`][crate::rng()] or via
45
/// [`ThreadRng::default()`].
46
/// The handle cannot be passed between threads (is not `Send` or `Sync`).
47
///
48
/// # Security
49
///
50
/// Security must be considered relative to a threat model and validation
51
/// requirements. The Rand project can provide no guarantee of fitness for
52
/// purpose. The design criteria for `ThreadRng` are as follows:
53
///
54
/// - Automatic seeding via [`OsRng`] and periodically thereafter (see
55
///   ([`ReseedingRng`] documentation). Limitation: there is no automatic
56
///   reseeding on process fork (see [below](#fork)).
57
/// - A rigorusly analyzed, unpredictable (cryptographic) pseudo-random generator
58
///   (see [the book on security](https://rust-random.github.io/book/guide-rngs.html#security)).
59
///   The currently selected algorithm is ChaCha (12-rounds).
60
///   See also [`StdRng`] documentation.
61
/// - Not to leak internal state through [`Debug`] or serialization
62
///   implementations.
63
/// - No further protections exist to in-memory state. In particular, the
64
///   implementation is not required to zero memory on exit (of the process or
65
///   thread). (This may change in the future.)
66
/// - Be fast enough for general-purpose usage. Note in particular that
67
///   `ThreadRng` is designed to be a "fast, reasonably secure generator"
68
///   (where "reasonably secure" implies the above criteria).
69
///
70
/// We leave it to the user to determine whether this generator meets their
71
/// security requirements. For an alternative, see [`OsRng`].
72
///
73
/// # Fork
74
///
75
/// `ThreadRng` is not automatically reseeded on fork. It is recommended to
76
/// explicitly call [`ThreadRng::reseed`] immediately after a fork, for example:
77
/// ```ignore
78
/// fn do_fork() {
79
///     let pid = unsafe { libc::fork() };
80
///     if pid == 0 {
81
///         // Reseed ThreadRng in child processes:
82
///         rand::rng().reseed();
83
///     }
84
/// }
85
/// ```
86
///
87
/// Methods on `ThreadRng` are not reentrant-safe and thus should not be called
88
/// from an interrupt (e.g. a fork handler) unless it can be guaranteed that no
89
/// other method on the same `ThreadRng` is currently executing.
90
///
91
/// [`ReseedingRng`]: crate::rngs::ReseedingRng
92
/// [`StdRng`]: crate::rngs::StdRng
93
#[derive(Clone)]
94
pub struct ThreadRng {
95
    // Rc is explicitly !Send and !Sync
96
    rng: Rc<UnsafeCell<ReseedingRng<Core, OsRng>>>,
97
}
98
99
impl ThreadRng {
100
    /// Immediately reseed the generator
101
    ///
102
    /// This discards any remaining random data in the cache.
103
0
    pub fn reseed(&mut self) -> Result<(), rand_core::OsError> {
104
0
        // SAFETY: We must make sure to stop using `rng` before anyone else
105
0
        // creates another mutable reference
106
0
        let rng = unsafe { &mut *self.rng.get() };
107
0
        rng.reseed()
108
0
    }
109
}
110
111
/// Debug implementation does not leak internal state
112
impl fmt::Debug for ThreadRng {
113
0
    fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result {
114
0
        write!(fmt, "ThreadRng {{ .. }}")
115
0
    }
116
}
117
118
thread_local!(
119
    // We require Rc<..> to avoid premature freeing when ThreadRng is used
120
    // within thread-local destructors. See #968.
121
    static THREAD_RNG_KEY: Rc<UnsafeCell<ReseedingRng<Core, OsRng>>> = {
122
        let rng = ReseedingRng::new(THREAD_RNG_RESEED_THRESHOLD,
123
                                    OsRng).unwrap_or_else(|err|
124
0
                panic!("could not initialize ThreadRng: {}", err));
125
        Rc::new(UnsafeCell::new(rng))
126
    }
127
);
128
129
/// Access a fast, pre-initialized generator
130
///
131
/// This is a handle to the local [`ThreadRng`].
132
///
133
/// See also [`crate::rngs`] for alternatives.
134
///
135
/// # Example
136
///
137
/// ```
138
/// use rand::prelude::*;
139
///
140
/// # fn main() {
141
///
142
/// let mut numbers = [1, 2, 3, 4, 5];
143
/// numbers.shuffle(&mut rand::rng());
144
/// println!("Numbers: {numbers:?}");
145
///
146
/// // Using a local binding avoids an initialization-check on each usage:
147
/// let mut rng = rand::rng();
148
///
149
/// println!("True or false: {}", rng.random::<bool>());
150
/// println!("A simulated die roll: {}", rng.random_range(1..=6));
151
/// # }
152
/// ```
153
///
154
/// # Security
155
///
156
/// Refer to [`ThreadRng#Security`].
157
0
pub fn rng() -> ThreadRng {
158
0
    let rng = THREAD_RNG_KEY.with(|t| t.clone());
159
0
    ThreadRng { rng }
160
0
}
161
162
impl Default for ThreadRng {
163
0
    fn default() -> ThreadRng {
164
0
        rng()
165
0
    }
166
}
167
168
impl RngCore for ThreadRng {
169
    #[inline(always)]
170
0
    fn next_u32(&mut self) -> u32 {
171
0
        // SAFETY: We must make sure to stop using `rng` before anyone else
172
0
        // creates another mutable reference
173
0
        let rng = unsafe { &mut *self.rng.get() };
174
0
        rng.next_u32()
175
0
    }
176
177
    #[inline(always)]
178
0
    fn next_u64(&mut self) -> u64 {
179
0
        // SAFETY: We must make sure to stop using `rng` before anyone else
180
0
        // creates another mutable reference
181
0
        let rng = unsafe { &mut *self.rng.get() };
182
0
        rng.next_u64()
183
0
    }
184
185
    #[inline(always)]
186
0
    fn fill_bytes(&mut self, dest: &mut [u8]) {
187
0
        // SAFETY: We must make sure to stop using `rng` before anyone else
188
0
        // creates another mutable reference
189
0
        let rng = unsafe { &mut *self.rng.get() };
190
0
        rng.fill_bytes(dest)
191
0
    }
192
}
193
194
impl CryptoRng for ThreadRng {}
195
196
#[cfg(test)]
197
mod test {
198
    #[test]
199
    fn test_thread_rng() {
200
        use crate::Rng;
201
        let mut r = crate::rng();
202
        r.random::<i32>();
203
        assert_eq!(r.random_range(0..1), 0);
204
    }
205
206
    #[test]
207
    fn test_debug_output() {
208
        // We don't care about the exact output here, but it must not include
209
        // private CSPRNG state or the cache stored by BlockRng!
210
        assert_eq!(std::format!("{:?}", crate::rng()), "ThreadRng { .. }");
211
    }
212
}