wasmtime/runtime/memory.rs
1use crate::prelude::*;
2use crate::runtime::vm::{RuntimeLinearMemory, VMMemoryImport};
3use crate::store::{StoreData, StoreOpaque, Stored};
4use crate::trampoline::generate_memory_export;
5use crate::Trap;
6use crate::{AsContext, AsContextMut, Engine, MemoryType, StoreContext, StoreContextMut};
7use core::cell::UnsafeCell;
8use core::fmt;
9use core::ops::Range;
10use core::slice;
11use core::time::Duration;
12use wasmtime_environ::MemoryPlan;
13
14pub use crate::runtime::vm::WaitResult;
15
16/// Error for out of bounds [`Memory`] access.
17#[derive(Debug)]
18#[non_exhaustive]
19pub struct MemoryAccessError {
20 // Keep struct internals private for future extensibility.
21 _private: (),
22}
23
24impl fmt::Display for MemoryAccessError {
25 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
26 write!(f, "out of bounds memory access")
27 }
28}
29
30#[cfg(feature = "std")]
31impl std::error::Error for MemoryAccessError {}
32
33/// A WebAssembly linear memory.
34///
35/// WebAssembly memories represent a contiguous array of bytes that have a size
36/// that is always a multiple of the WebAssembly page size, currently 64
37/// kilobytes.
38///
39/// WebAssembly memory is used for global data (not to be confused with wasm
40/// `global` items), statics in C/C++/Rust, shadow stack memory, etc. Accessing
41/// wasm memory is generally quite fast.
42///
43/// Memories, like other wasm items, are owned by a [`Store`](crate::Store).
44///
45/// # `Memory` and Safety
46///
47/// Linear memory is a lynchpin of safety for WebAssembly. In Wasmtime there are
48/// safe methods of interacting with a [`Memory`]:
49///
50/// * [`Memory::read`]
51/// * [`Memory::write`]
52/// * [`Memory::data`]
53/// * [`Memory::data_mut`]
54///
55/// Note that all of these consider the entire store context as borrowed for the
56/// duration of the call or the duration of the returned slice. This largely
57/// means that while the function is running you'll be unable to borrow anything
58/// else from the store. This includes getting access to the `T` on
59/// [`Store<T>`](crate::Store), but it also means that you can't recursively
60/// call into WebAssembly for instance.
61///
62/// If you'd like to dip your toes into handling [`Memory`] in a more raw
63/// fashion (e.g. by using raw pointers or raw slices), then there's a few
64/// important points to consider when doing so:
65///
66/// * Any recursive calls into WebAssembly can possibly modify any byte of the
67/// entire memory. This means that whenever wasm is called Rust can't have any
68/// long-lived borrows live across the wasm function call. Slices like `&mut
69/// [u8]` will be violated because they're not actually exclusive at that
70/// point, and slices like `&[u8]` are also violated because their contents
71/// may be mutated.
72///
73/// * WebAssembly memories can grow, and growth may change the base pointer.
74/// This means that even holding a raw pointer to memory over a wasm function
75/// call is also incorrect. Anywhere in the function call the base address of
76/// memory may change. Note that growth can also be requested from the
77/// embedding API as well.
78///
79/// As a general rule of thumb it's recommended to stick to the safe methods of
80/// [`Memory`] if you can. It's not advised to use raw pointers or `unsafe`
81/// operations because of how easy it is to accidentally get things wrong.
82///
83/// Some examples of safely interacting with memory are:
84///
85/// ```rust
86/// use wasmtime::{Memory, Store, MemoryAccessError};
87///
88/// // Memory can be read and written safely with the `Memory::read` and
89/// // `Memory::write` methods.
90/// // An error is returned if the copy did not succeed.
91/// fn safe_examples(mem: Memory, store: &mut Store<()>) -> Result<(), MemoryAccessError> {
92/// let offset = 5;
93/// mem.write(&mut *store, offset, b"hello")?;
94/// let mut buffer = [0u8; 5];
95/// mem.read(&store, offset, &mut buffer)?;
96/// assert_eq!(b"hello", &buffer);
97///
98/// // Note that while this is safe care must be taken because the indexing
99/// // here may panic if the memory isn't large enough.
100/// assert_eq!(&mem.data(&store)[offset..offset + 5], b"hello");
101/// mem.data_mut(&mut *store)[offset..offset + 5].copy_from_slice(b"bye!!");
102///
103/// Ok(())
104/// }
105/// ```
106///
107/// It's worth also, however, covering some examples of **incorrect**,
108/// **unsafe** usages of `Memory`. Do not do these things!
109///
110/// ```rust
111/// # use anyhow::Result;
112/// use wasmtime::{Memory, Store};
113///
114/// // NOTE: All code in this function is not safe to execute and may cause
115/// // segfaults/undefined behavior at runtime. Do not copy/paste these examples
116/// // into production code!
117/// unsafe fn unsafe_examples(mem: Memory, store: &mut Store<()>) -> Result<()> {
118/// // First and foremost, any borrow can be invalidated at any time via the
119/// // `Memory::grow` function. This can relocate memory which causes any
120/// // previous pointer to be possibly invalid now.
121/// let pointer: &u8 = &*mem.data_ptr(&store);
122/// mem.grow(&mut *store, 1)?; // invalidates `pointer`!
123/// // println!("{}", *pointer); // FATAL: use-after-free
124///
125/// // Note that the use-after-free also applies to slices, whether they're
126/// // slices of bytes or strings.
127/// let mem_slice = std::slice::from_raw_parts(
128/// mem.data_ptr(&store),
129/// mem.data_size(&store),
130/// );
131/// let slice: &[u8] = &mem_slice[0x100..0x102];
132/// mem.grow(&mut *store, 1)?; // invalidates `slice`!
133/// // println!("{:?}", slice); // FATAL: use-after-free
134///
135/// // The `Memory` type may be stored in other locations, so if you hand
136/// // off access to the `Store` then those locations may also call
137/// // `Memory::grow` or similar, so it's not enough to just audit code for
138/// // calls to `Memory::grow`.
139/// let pointer: &u8 = &*mem.data_ptr(&store);
140/// some_other_function(store); // may invalidate `pointer` through use of `store`
141/// // println!("{:?}", pointer); // FATAL: maybe a use-after-free
142///
143/// // An especially subtle aspect of accessing a wasm instance's memory is
144/// // that you need to be extremely careful about aliasing. Anyone at any
145/// // time can call `data_unchecked()` or `data_unchecked_mut()`, which
146/// // means you can easily have aliasing mutable references:
147/// let ref1: &u8 = &*mem.data_ptr(&store).add(0x100);
148/// let ref2: &mut u8 = &mut *mem.data_ptr(&store).add(0x100);
149/// // *ref2 = *ref1; // FATAL: violates Rust's aliasing rules
150///
151/// Ok(())
152/// }
153/// # fn some_other_function(store: &mut Store<()>) {}
154/// ```
155///
156/// Overall there's some general rules of thumb when unsafely working with
157/// `Memory` and getting raw pointers inside of it:
158///
159/// * If you never have a "long lived" pointer into memory, you're likely in the
160/// clear. Care still needs to be taken in threaded scenarios or when/where
161/// data is read, but you'll be shielded from many classes of issues.
162/// * Long-lived pointers must always respect Rust'a aliasing rules. It's ok for
163/// shared borrows to overlap with each other, but mutable borrows must
164/// overlap with nothing.
165/// * Long-lived pointers are only valid if they're not invalidated for their
166/// lifetime. This means that [`Store`](crate::Store) isn't used to reenter
167/// wasm or the memory itself is never grown or otherwise modified/aliased.
168///
169/// At this point it's worth reiterating again that unsafely working with
170/// `Memory` is pretty tricky and not recommended! It's highly recommended to
171/// use the safe methods to interact with [`Memory`] whenever possible.
172///
173/// ## `Memory` Safety and Threads
174///
175/// Currently the `wasmtime` crate does not implement the wasm threads proposal,
176/// but it is planned to do so. It may be interesting to readers to see how this
177/// affects memory safety and what was previously just discussed as well.
178///
179/// Once threads are added into the mix, all of the above rules still apply.
180/// There's an additional consideration that all reads and writes can happen
181/// concurrently, though. This effectively means that any borrow into wasm
182/// memory are virtually never safe to have.
183///
184/// Mutable pointers are fundamentally unsafe to have in a concurrent scenario
185/// in the face of arbitrary wasm code. Only if you dynamically know for sure
186/// that wasm won't access a region would it be safe to construct a mutable
187/// pointer. Additionally even shared pointers are largely unsafe because their
188/// underlying contents may change, so unless `UnsafeCell` in one form or
189/// another is used everywhere there's no safety.
190///
191/// One important point about concurrency is that while [`Memory::grow`] can
192/// happen concurrently it will never relocate the base pointer. Shared
193/// memories must always have a maximum size and they will be preallocated such
194/// that growth will never relocate the base pointer. The current size of the
195/// memory may still change over time though.
196///
197/// Overall the general rule of thumb for shared memories is that you must
198/// atomically read and write everything. Nothing can be borrowed and everything
199/// must be eagerly copied out. This means that [`Memory::data`] and
200/// [`Memory::data_mut`] won't work in the future (they'll probably return an
201/// error) for shared memories when they're implemented. When possible it's
202/// recommended to use [`Memory::read`] and [`Memory::write`] which will still
203/// be provided.
204#[derive(Copy, Clone, Debug)]
205#[repr(transparent)] // here for the C API
206pub struct Memory(Stored<crate::runtime::vm::ExportMemory>);
207
208impl Memory {
209 /// Creates a new WebAssembly memory given the configuration of `ty`.
210 ///
211 /// The `store` argument will be the owner of the returned [`Memory`]. All
212 /// WebAssembly memory is initialized to zero.
213 ///
214 /// # Panics
215 ///
216 /// This function will panic if the [`Store`](`crate::Store`) has a
217 /// [`ResourceLimiterAsync`](`crate::ResourceLimiterAsync`) (see also:
218 /// [`Store::limiter_async`](`crate::Store::limiter_async`)). When
219 /// using an async resource limiter, use [`Memory::new_async`] instead.
220 ///
221 /// # Examples
222 ///
223 /// ```
224 /// # use wasmtime::*;
225 /// # fn main() -> anyhow::Result<()> {
226 /// let engine = Engine::default();
227 /// let mut store = Store::new(&engine, ());
228 ///
229 /// let memory_ty = MemoryType::new(1, None);
230 /// let memory = Memory::new(&mut store, memory_ty)?;
231 ///
232 /// let module = Module::new(&engine, "(module (memory (import \"\" \"\") 1))")?;
233 /// let instance = Instance::new(&mut store, &module, &[memory.into()])?;
234 /// // ...
235 /// # Ok(())
236 /// # }
237 /// ```
238 pub fn new(mut store: impl AsContextMut, ty: MemoryType) -> Result<Memory> {
239 Self::_new(store.as_context_mut().0, ty)
240 }
241
242 /// Async variant of [`Memory::new`]. You must use this variant with
243 /// [`Store`](`crate::Store`)s which have a
244 /// [`ResourceLimiterAsync`](`crate::ResourceLimiterAsync`).
245 ///
246 /// # Panics
247 ///
248 /// This function will panic when used with a non-async
249 /// [`Store`](`crate::Store`).
250 #[cfg(feature = "async")]
251 pub async fn new_async<T>(
252 mut store: impl AsContextMut<Data = T>,
253 ty: MemoryType,
254 ) -> Result<Memory>
255 where
256 T: Send,
257 {
258 let mut store = store.as_context_mut();
259 assert!(
260 store.0.async_support(),
261 "cannot use `new_async` without enabling async support on the config"
262 );
263 store.on_fiber(|store| Self::_new(store.0, ty)).await?
264 }
265
266 /// Helper function for attaching the memory to a "frankenstein" instance
267 fn _new(store: &mut StoreOpaque, ty: MemoryType) -> Result<Memory> {
268 unsafe {
269 let export = generate_memory_export(store, &ty, None)?;
270 Ok(Memory::from_wasmtime_memory(export, store))
271 }
272 }
273
274 /// Returns the underlying type of this memory.
275 ///
276 /// # Panics
277 ///
278 /// Panics if this memory doesn't belong to `store`.
279 ///
280 /// # Examples
281 ///
282 /// ```
283 /// # use wasmtime::*;
284 /// # fn main() -> anyhow::Result<()> {
285 /// let engine = Engine::default();
286 /// let mut store = Store::new(&engine, ());
287 /// let module = Module::new(&engine, "(module (memory (export \"mem\") 1))")?;
288 /// let instance = Instance::new(&mut store, &module, &[])?;
289 /// let memory = instance.get_memory(&mut store, "mem").unwrap();
290 /// let ty = memory.ty(&store);
291 /// assert_eq!(ty.minimum(), 1);
292 /// # Ok(())
293 /// # }
294 /// ```
295 pub fn ty(&self, store: impl AsContext) -> MemoryType {
296 let store = store.as_context();
297 let ty = &store[self.0].memory.memory;
298 MemoryType::from_wasmtime_memory(&ty)
299 }
300
301 /// Safely reads memory contents at the given offset into a buffer.
302 ///
303 /// The entire buffer will be filled.
304 ///
305 /// If `offset + buffer.len()` exceed the current memory capacity, then the
306 /// buffer is left untouched and a [`MemoryAccessError`] is returned.
307 ///
308 /// # Panics
309 ///
310 /// Panics if this memory doesn't belong to `store`.
311 pub fn read(
312 &self,
313 store: impl AsContext,
314 offset: usize,
315 buffer: &mut [u8],
316 ) -> Result<(), MemoryAccessError> {
317 let store = store.as_context();
318 let slice = self
319 .data(&store)
320 .get(offset..)
321 .and_then(|s| s.get(..buffer.len()))
322 .ok_or(MemoryAccessError { _private: () })?;
323 buffer.copy_from_slice(slice);
324 Ok(())
325 }
326
327 /// Safely writes contents of a buffer to this memory at the given offset.
328 ///
329 /// If the `offset + buffer.len()` exceeds the current memory capacity, then
330 /// none of the buffer is written to memory and a [`MemoryAccessError`] is
331 /// returned.
332 ///
333 /// # Panics
334 ///
335 /// Panics if this memory doesn't belong to `store`.
336 pub fn write(
337 &self,
338 mut store: impl AsContextMut,
339 offset: usize,
340 buffer: &[u8],
341 ) -> Result<(), MemoryAccessError> {
342 let mut context = store.as_context_mut();
343 self.data_mut(&mut context)
344 .get_mut(offset..)
345 .and_then(|s| s.get_mut(..buffer.len()))
346 .ok_or(MemoryAccessError { _private: () })?
347 .copy_from_slice(buffer);
348 Ok(())
349 }
350
351 /// Returns this memory as a native Rust slice.
352 ///
353 /// Note that this method will consider the entire store context provided as
354 /// borrowed for the duration of the lifetime of the returned slice.
355 ///
356 /// # Panics
357 ///
358 /// Panics if this memory doesn't belong to `store`.
359 pub fn data<'a, T: 'a>(&self, store: impl Into<StoreContext<'a, T>>) -> &'a [u8] {
360 unsafe {
361 let store = store.into();
362 let definition = &*store[self.0].definition;
363 debug_assert!(!self.ty(store).is_shared());
364 slice::from_raw_parts(definition.base, definition.current_length())
365 }
366 }
367
368 /// Returns this memory as a native Rust mutable slice.
369 ///
370 /// Note that this method will consider the entire store context provided as
371 /// borrowed for the duration of the lifetime of the returned slice.
372 ///
373 /// # Panics
374 ///
375 /// Panics if this memory doesn't belong to `store`.
376 pub fn data_mut<'a, T: 'a>(&self, store: impl Into<StoreContextMut<'a, T>>) -> &'a mut [u8] {
377 unsafe {
378 let store = store.into();
379 let definition = &*store[self.0].definition;
380 debug_assert!(!self.ty(store).is_shared());
381 slice::from_raw_parts_mut(definition.base, definition.current_length())
382 }
383 }
384
385 /// Same as [`Memory::data_mut`], but also returns the `T` from the
386 /// [`StoreContextMut`].
387 ///
388 /// This method can be used when you want to simultaneously work with the
389 /// `T` in the store as well as the memory behind this [`Memory`]. Using
390 /// [`Memory::data_mut`] would consider the entire store borrowed, whereas
391 /// this method allows the Rust compiler to see that the borrow of this
392 /// memory and the borrow of `T` are disjoint.
393 ///
394 /// # Panics
395 ///
396 /// Panics if this memory doesn't belong to `store`.
397 pub fn data_and_store_mut<'a, T: 'a>(
398 &self,
399 store: impl Into<StoreContextMut<'a, T>>,
400 ) -> (&'a mut [u8], &'a mut T) {
401 // Note the unsafety here. Our goal is to simultaneously borrow the
402 // memory and custom data from `store`, and the store it's connected
403 // to. Rust will not let us do that, however, because we must call two
404 // separate methods (both of which borrow the whole `store`) and one of
405 // our borrows is mutable (the custom data).
406 //
407 // This operation, however, is safe because these borrows do not overlap
408 // and in the process of borrowing them mutability doesn't actually
409 // touch anything. This is akin to mutably borrowing two indices in an
410 // array, which is safe so long as the indices are separate.
411 unsafe {
412 let mut store = store.into();
413 let data = &mut *(store.data_mut() as *mut T);
414 (self.data_mut(store), data)
415 }
416 }
417
418 /// Returns the base pointer, in the host's address space, that the memory
419 /// is located at.
420 ///
421 /// For more information and examples see the documentation on the
422 /// [`Memory`] type.
423 ///
424 /// # Panics
425 ///
426 /// Panics if this memory doesn't belong to `store`.
427 pub fn data_ptr(&self, store: impl AsContext) -> *mut u8 {
428 unsafe { (*store.as_context()[self.0].definition).base }
429 }
430
431 /// Returns the byte length of this memory.
432 ///
433 /// WebAssembly memories are made up of a whole number of pages, so the byte
434 /// size returned will always be a multiple of this memory's page size. Note
435 /// that different Wasm memories may have different page sizes. You can get
436 /// a memory's page size via the [`Memory::page_size`] method.
437 ///
438 /// By default the page size is 64KiB (aka `0x10000`, `2**16`, `1<<16`, or
439 /// `65536`) but [the custom-page-sizes proposal] allows a memory to opt
440 /// into a page size of `1`. Future extensions might allow any power of two
441 /// as a page size.
442 ///
443 /// [the custom-page-sizes proposal]: https://github.com/WebAssembly/custom-page-sizes
444 ///
445 /// For more information and examples see the documentation on the
446 /// [`Memory`] type.
447 ///
448 /// # Panics
449 ///
450 /// Panics if this memory doesn't belong to `store`.
451 pub fn data_size(&self, store: impl AsContext) -> usize {
452 self.internal_data_size(store.as_context().0)
453 }
454
455 pub(crate) fn internal_data_size(&self, store: &StoreOpaque) -> usize {
456 unsafe { (*store[self.0].definition).current_length() }
457 }
458
459 /// Returns the size, in units of pages, of this Wasm memory.
460 ///
461 /// WebAssembly memories are made up of a whole number of pages, so the byte
462 /// size returned will always be a multiple of this memory's page size. Note
463 /// that different Wasm memories may have different page sizes. You can get
464 /// a memory's page size via the [`Memory::page_size`] method.
465 ///
466 /// By default the page size is 64KiB (aka `0x10000`, `2**16`, `1<<16`, or
467 /// `65536`) but [the custom-page-sizes proposal] allows a memory to opt
468 /// into a page size of `1`. Future extensions might allow any power of two
469 /// as a page size.
470 ///
471 /// [the custom-page-sizes proposal]: https://github.com/WebAssembly/custom-page-sizes
472 ///
473 /// # Panics
474 ///
475 /// Panics if this memory doesn't belong to `store`.
476 pub fn size(&self, store: impl AsContext) -> u64 {
477 self.internal_size(store.as_context().0)
478 }
479
480 pub(crate) fn internal_size(&self, store: &StoreOpaque) -> u64 {
481 let byte_size = self.internal_data_size(store);
482 let page_size = usize::try_from(self._page_size(store)).unwrap();
483 u64::try_from(byte_size / page_size).unwrap()
484 }
485
486 /// Returns the size of a page, in bytes, for this memory.
487 ///
488 /// WebAssembly memories are made up of a whole number of pages, so the byte
489 /// size (as returned by [`Memory::data_size`]) will always be a multiple of
490 /// their page size. Different Wasm memories may have different page sizes.
491 ///
492 /// By default this is 64KiB (aka `0x10000`, `2**16`, `1<<16`, or `65536`)
493 /// but [the custom-page-sizes proposal] allows opting into a page size of
494 /// `1`. Future extensions might allow any power of two as a page size.
495 ///
496 /// [the custom-page-sizes proposal]: https://github.com/WebAssembly/custom-page-sizes
497 pub fn page_size(&self, store: impl AsContext) -> u64 {
498 self._page_size(store.as_context().0)
499 }
500
501 pub(crate) fn _page_size(&self, store: &StoreOpaque) -> u64 {
502 store[self.0].memory.memory.page_size()
503 }
504
505 /// Returns the log2 of this memory's page size, in bytes.
506 ///
507 /// WebAssembly memories are made up of a whole number of pages, so the byte
508 /// size (as returned by [`Memory::data_size`]) will always be a multiple of
509 /// their page size. Different Wasm memories may have different page sizes.
510 ///
511 /// By default the page size is 64KiB (aka `0x10000`, `2**16`, `1<<16`, or
512 /// `65536`) but [the custom-page-sizes proposal] allows opting into a page
513 /// size of `1`. Future extensions might allow any power of two as a page
514 /// size.
515 ///
516 /// [the custom-page-sizes proposal]: https://github.com/WebAssembly/custom-page-sizes
517 pub fn page_size_log2(&self, store: impl AsContext) -> u8 {
518 self._page_size_log2(store.as_context().0)
519 }
520
521 pub(crate) fn _page_size_log2(&self, store: &StoreOpaque) -> u8 {
522 store[self.0].memory.memory.page_size_log2
523 }
524
525 /// Grows this WebAssembly memory by `delta` pages.
526 ///
527 /// This will attempt to add `delta` more pages of memory on to the end of
528 /// this `Memory` instance. If successful this may relocate the memory and
529 /// cause [`Memory::data_ptr`] to return a new value. Additionally any
530 /// unsafely constructed slices into this memory may no longer be valid.
531 ///
532 /// On success returns the number of pages this memory previously had
533 /// before the growth succeeded.
534 ///
535 /// Note that, by default, a WebAssembly memory's page size is 64KiB (aka
536 /// 65536 or 2<sup>16</sup>). The [custom-page-sizes proposal] allows Wasm
537 /// memories to opt into a page size of one byte (and this may be further
538 /// relaxed to any power of two in a future extension).
539 ///
540 /// [custom-page-sizes proposal]: https://github.com/WebAssembly/custom-page-sizes
541 ///
542 /// # Errors
543 ///
544 /// Returns an error if memory could not be grown, for example if it exceeds
545 /// the maximum limits of this memory. A
546 /// [`ResourceLimiter`](crate::ResourceLimiter) is another example of
547 /// preventing a memory to grow.
548 ///
549 /// # Panics
550 ///
551 /// Panics if this memory doesn't belong to `store`.
552 ///
553 /// This function will panic if the [`Store`](`crate::Store`) has a
554 /// [`ResourceLimiterAsync`](`crate::ResourceLimiterAsync`) (see also:
555 /// [`Store::limiter_async`](`crate::Store::limiter_async`). When using an
556 /// async resource limiter, use [`Memory::grow_async`] instead.
557 ///
558 /// # Examples
559 ///
560 /// ```
561 /// # use wasmtime::*;
562 /// # fn main() -> anyhow::Result<()> {
563 /// let engine = Engine::default();
564 /// let mut store = Store::new(&engine, ());
565 /// let module = Module::new(&engine, "(module (memory (export \"mem\") 1 2))")?;
566 /// let instance = Instance::new(&mut store, &module, &[])?;
567 /// let memory = instance.get_memory(&mut store, "mem").unwrap();
568 ///
569 /// assert_eq!(memory.size(&store), 1);
570 /// assert_eq!(memory.grow(&mut store, 1)?, 1);
571 /// assert_eq!(memory.size(&store), 2);
572 /// assert!(memory.grow(&mut store, 1).is_err());
573 /// assert_eq!(memory.size(&store), 2);
574 /// assert_eq!(memory.grow(&mut store, 0)?, 2);
575 /// # Ok(())
576 /// # }
577 /// ```
578 pub fn grow(&self, mut store: impl AsContextMut, delta: u64) -> Result<u64> {
579 let store = store.as_context_mut().0;
580 let mem = self.wasmtime_memory(store);
581 unsafe {
582 match (*mem).grow(delta, Some(store))? {
583 Some(size) => {
584 let vm = (*mem).vmmemory();
585 *store[self.0].definition = vm;
586 let page_size = (*mem).page_size();
587 Ok(u64::try_from(size).unwrap() / page_size)
588 }
589 None => bail!("failed to grow memory by `{}`", delta),
590 }
591 }
592 }
593
594 /// Async variant of [`Memory::grow`]. Required when using a
595 /// [`ResourceLimiterAsync`](`crate::ResourceLimiterAsync`).
596 ///
597 /// # Panics
598 ///
599 /// This function will panic when used with a non-async
600 /// [`Store`](`crate::Store`).
601 #[cfg(feature = "async")]
602 pub async fn grow_async<T>(
603 &self,
604 mut store: impl AsContextMut<Data = T>,
605 delta: u64,
606 ) -> Result<u64>
607 where
608 T: Send,
609 {
610 let mut store = store.as_context_mut();
611 assert!(
612 store.0.async_support(),
613 "cannot use `grow_async` without enabling async support on the config"
614 );
615 store.on_fiber(|store| self.grow(store, delta)).await?
616 }
617
618 fn wasmtime_memory(&self, store: &mut StoreOpaque) -> *mut crate::runtime::vm::Memory {
619 unsafe {
620 let export = &store[self.0];
621 crate::runtime::vm::Instance::from_vmctx(export.vmctx, |handle| {
622 handle.get_defined_memory(export.index)
623 })
624 }
625 }
626
627 pub(crate) unsafe fn from_wasmtime_memory(
628 wasmtime_export: crate::runtime::vm::ExportMemory,
629 store: &mut StoreOpaque,
630 ) -> Memory {
631 Memory(store.store_data_mut().insert(wasmtime_export))
632 }
633
634 pub(crate) fn wasmtime_ty<'a>(&self, store: &'a StoreData) -> &'a wasmtime_environ::Memory {
635 &store[self.0].memory.memory
636 }
637
638 pub(crate) fn vmimport(&self, store: &StoreOpaque) -> crate::runtime::vm::VMMemoryImport {
639 let export = &store[self.0];
640 crate::runtime::vm::VMMemoryImport {
641 from: export.definition,
642 vmctx: export.vmctx,
643 index: export.index,
644 }
645 }
646
647 pub(crate) fn comes_from_same_store(&self, store: &StoreOpaque) -> bool {
648 store.store_data().contains(self.0)
649 }
650
651 /// Get a stable hash key for this memory.
652 ///
653 /// Even if the same underlying memory definition is added to the
654 /// `StoreData` multiple times and becomes multiple `wasmtime::Memory`s,
655 /// this hash key will be consistent across all of these memories.
656 pub(crate) fn hash_key(&self, store: &StoreOpaque) -> impl core::hash::Hash + Eq {
657 store[self.0].definition as usize
658 }
659}
660
661/// A linear memory. This trait provides an interface for raw memory buffers
662/// which are used by wasmtime, e.g. inside ['Memory']. Such buffers are in
663/// principle not thread safe. By implementing this trait together with
664/// MemoryCreator, one can supply wasmtime with custom allocated host managed
665/// memory.
666///
667/// # Safety
668///
669/// The memory should be page aligned and a multiple of page size.
670/// To prevent possible silent overflows, the memory should be protected by a
671/// guard page. Additionally the safety concerns explained in ['Memory'], for
672/// accessing the memory apply here as well.
673///
674/// Note that this is a relatively new and experimental feature and it is
675/// recommended to be familiar with wasmtime runtime code to use it.
676pub unsafe trait LinearMemory: Send + Sync + 'static {
677 /// Returns the number of allocated bytes which are accessible at this time.
678 fn byte_size(&self) -> usize;
679
680 /// Returns the maximum number of bytes the memory can grow to.
681 ///
682 /// Returns `None` if the memory is unbounded, or `Some` if memory cannot
683 /// grow beyond a specified limit.
684 fn maximum_byte_size(&self) -> Option<usize>;
685
686 /// Grows this memory to have the `new_size`, in bytes, specified.
687 ///
688 /// Returns `Err` if memory can't be grown by the specified amount
689 /// of bytes. The error may be downcastable to `std::io::Error`.
690 /// Returns `Ok` if memory was grown successfully.
691 fn grow_to(&mut self, new_size: usize) -> Result<()>;
692
693 /// Return the allocated memory as a mutable pointer to u8.
694 fn as_ptr(&self) -> *mut u8;
695
696 /// Returns the range of native addresses that WebAssembly can natively
697 /// access from this linear memory, including guard pages.
698 fn wasm_accessible(&self) -> Range<usize>;
699}
700
701/// A memory creator. Can be used to provide a memory creator
702/// to wasmtime which supplies host managed memory.
703///
704/// # Safety
705///
706/// This trait is unsafe, as the memory safety depends on proper implementation
707/// of memory management. Memories created by the MemoryCreator should always be
708/// treated as owned by wasmtime instance, and any modification of them outside
709/// of wasmtime invoked routines is unsafe and may lead to corruption.
710///
711/// Note that this is a relatively new and experimental feature and it is
712/// recommended to be familiar with wasmtime runtime code to use it.
713pub unsafe trait MemoryCreator: Send + Sync {
714 /// Create a new `LinearMemory` object from the specified parameters.
715 ///
716 /// The type of memory being created is specified by `ty` which indicates
717 /// both the minimum and maximum size, in wasm pages. The minimum and
718 /// maximum sizes, in bytes, are also specified as parameters to avoid
719 /// integer conversion if desired.
720 ///
721 /// The `reserved_size_in_bytes` value indicates the expected size of the
722 /// reservation that is to be made for this memory. If this value is `None`
723 /// than the implementation is free to allocate memory as it sees fit. If
724 /// the value is `Some`, however, then the implementation is expected to
725 /// reserve that many bytes for the memory's allocation, plus the guard
726 /// size at the end. Note that this reservation need only be a virtual
727 /// memory reservation, physical memory does not need to be allocated
728 /// immediately. In this case `grow` should never move the base pointer and
729 /// the maximum size of `ty` is guaranteed to fit within
730 /// `reserved_size_in_bytes`.
731 ///
732 /// The `guard_size_in_bytes` parameter indicates how many bytes of space,
733 /// after the memory allocation, is expected to be unmapped. JIT code will
734 /// elide bounds checks based on the `guard_size_in_bytes` provided, so for
735 /// JIT code to work correctly the memory returned will need to be properly
736 /// guarded with `guard_size_in_bytes` bytes left unmapped after the base
737 /// allocation.
738 ///
739 /// Note that the `reserved_size_in_bytes` and `guard_size_in_bytes` options
740 /// are tuned from the various [`Config`](crate::Config) methods about
741 /// memory sizes/guards. Additionally these two values are guaranteed to be
742 /// multiples of the system page size.
743 ///
744 /// Memory created from this method should be zero filled.
745 fn new_memory(
746 &self,
747 ty: MemoryType,
748 minimum: usize,
749 maximum: Option<usize>,
750 reserved_size_in_bytes: Option<usize>,
751 guard_size_in_bytes: usize,
752 ) -> Result<Box<dyn LinearMemory>, String>;
753}
754
755/// A constructor for externally-created shared memory.
756///
757/// The [threads proposal] adds the concept of "shared memory" to WebAssembly.
758/// This is much the same as a Wasm linear memory (i.e., [`Memory`]), but can be
759/// used concurrently by multiple agents. Because these agents may execute in
760/// different threads, [`SharedMemory`] must be thread-safe.
761///
762/// When the threads proposal is enabled, there are multiple ways to construct
763/// shared memory:
764/// 1. for imported shared memory, e.g., `(import "env" "memory" (memory 1 1
765/// shared))`, the user must supply a [`SharedMemory`] with the
766/// externally-created memory as an import to the instance--e.g.,
767/// `shared_memory.into()`.
768/// 2. for private or exported shared memory, e.g., `(export "env" "memory"
769/// (memory 1 1 shared))`, Wasmtime will create the memory internally during
770/// instantiation--access using `Instance::get_shared_memory()`.
771///
772/// [threads proposal]:
773/// https://github.com/WebAssembly/threads/blob/master/proposals/threads/Overview.md
774///
775/// # Examples
776///
777/// ```
778/// # use wasmtime::*;
779/// # fn main() -> anyhow::Result<()> {
780/// let mut config = Config::new();
781/// config.wasm_threads(true);
782/// let engine = Engine::new(&config)?;
783/// let mut store = Store::new(&engine, ());
784///
785/// let shared_memory = SharedMemory::new(&engine, MemoryType::shared(1, 2))?;
786/// let module = Module::new(&engine, r#"(module (memory (import "" "") 1 2 shared))"#)?;
787/// let instance = Instance::new(&mut store, &module, &[shared_memory.into()])?;
788/// // ...
789/// # Ok(())
790/// # }
791/// ```
792#[derive(Clone)]
793pub struct SharedMemory {
794 vm: crate::runtime::vm::SharedMemory,
795 engine: Engine,
796 page_size_log2: u8,
797}
798
799impl SharedMemory {
800 /// Construct a [`SharedMemory`] by providing both the `minimum` and
801 /// `maximum` number of 64K-sized pages. This call allocates the necessary
802 /// pages on the system.
803 #[cfg(feature = "threads")]
804 pub fn new(engine: &Engine, ty: MemoryType) -> Result<Self> {
805 if !ty.is_shared() {
806 bail!("shared memory must have the `shared` flag enabled on its memory type")
807 }
808 debug_assert!(ty.maximum().is_some());
809
810 let tunables = engine.tunables();
811 let plan = MemoryPlan::for_memory(*ty.wasmtime_memory(), tunables);
812 let page_size_log2 = plan.memory.page_size_log2;
813 let memory = crate::runtime::vm::SharedMemory::new(plan)?;
814
815 Ok(Self {
816 vm: memory,
817 engine: engine.clone(),
818 page_size_log2,
819 })
820 }
821
822 /// Return the type of the shared memory.
823 pub fn ty(&self) -> MemoryType {
824 MemoryType::from_wasmtime_memory(&self.vm.ty())
825 }
826
827 /// Returns the size, in WebAssembly pages, of this wasm memory.
828 pub fn size(&self) -> u64 {
829 let byte_size = u64::try_from(self.data_size()).unwrap();
830 let page_size = u64::from(self.page_size());
831 byte_size / page_size
832 }
833
834 /// Returns the size of a page, in bytes, for this memory.
835 ///
836 /// By default this is 64KiB (aka `0x10000`, `2**16`, `1<<16`, or `65536`)
837 /// but [the custom-page-sizes proposal] allows opting into a page size of
838 /// `1`. Future extensions might allow any power of two as a page size.
839 ///
840 /// [the custom-page-sizes proposal]: https://github.com/WebAssembly/custom-page-sizes
841 pub fn page_size(&self) -> u32 {
842 debug_assert!(self.page_size_log2 == 0 || self.page_size_log2 == 16);
843 1 << self.page_size_log2
844 }
845
846 /// Returns the byte length of this memory.
847 ///
848 /// The returned value will be a multiple of the wasm page size, 64k.
849 ///
850 /// For more information and examples see the documentation on the
851 /// [`Memory`] type.
852 pub fn data_size(&self) -> usize {
853 self.vm.byte_size()
854 }
855
856 /// Return access to the available portion of the shared memory.
857 ///
858 /// The slice returned represents the region of accessible memory at the
859 /// time that this function was called. The contents of the returned slice
860 /// will reflect concurrent modifications happening on other threads.
861 ///
862 /// # Safety
863 ///
864 /// The returned slice is valid for the entire duration of the lifetime of
865 /// this instance of [`SharedMemory`]. The base pointer of a shared memory
866 /// does not change. This [`SharedMemory`] may grow further after this
867 /// function has been called, but the slice returned will not grow.
868 ///
869 /// Concurrent modifications may be happening to the data returned on other
870 /// threads. The `UnsafeCell<u8>` represents that safe access to the
871 /// contents of the slice is not possible through normal loads and stores.
872 ///
873 /// The memory returned must be accessed safely through the `Atomic*` types
874 /// in the [`std::sync::atomic`] module. Casting to those types must
875 /// currently be done unsafely.
876 pub fn data(&self) -> &[UnsafeCell<u8>] {
877 unsafe {
878 let definition = &*self.vm.vmmemory_ptr();
879 slice::from_raw_parts(definition.base.cast(), definition.current_length())
880 }
881 }
882
883 /// Grows this WebAssembly memory by `delta` pages.
884 ///
885 /// This will attempt to add `delta` more pages of memory on to the end of
886 /// this `Memory` instance. If successful this may relocate the memory and
887 /// cause [`Memory::data_ptr`] to return a new value. Additionally any
888 /// unsafely constructed slices into this memory may no longer be valid.
889 ///
890 /// On success returns the number of pages this memory previously had
891 /// before the growth succeeded.
892 ///
893 /// # Errors
894 ///
895 /// Returns an error if memory could not be grown, for example if it exceeds
896 /// the maximum limits of this memory. A
897 /// [`ResourceLimiter`](crate::ResourceLimiter) is another example of
898 /// preventing a memory to grow.
899 pub fn grow(&self, delta: u64) -> Result<u64> {
900 match self.vm.grow(delta, None)? {
901 Some((old_size, _new_size)) => {
902 // For shared memory, the `VMMemoryDefinition` is updated inside
903 // the locked region.
904 Ok(u64::try_from(old_size).unwrap() / u64::from(self.page_size()))
905 }
906 None => bail!("failed to grow memory by `{}`", delta),
907 }
908 }
909
910 /// Equivalent of the WebAssembly `memory.atomic.notify` instruction for
911 /// this shared memory.
912 ///
913 /// This method allows embedders to notify threads blocked on the specified
914 /// `addr`, an index into wasm linear memory. Threads could include
915 /// wasm threads blocked on a `memory.atomic.wait*` instruction or embedder
916 /// threads blocked on [`SharedMemory::atomic_wait32`], for example.
917 ///
918 /// The `count` argument is the number of threads to wake up.
919 ///
920 /// This function returns the number of threads awoken.
921 ///
922 /// # Errors
923 ///
924 /// This function will return an error if `addr` is not within bounds or
925 /// not aligned to a 4-byte boundary.
926 pub fn atomic_notify(&self, addr: u64, count: u32) -> Result<u32, Trap> {
927 self.vm.atomic_notify(addr, count)
928 }
929
930 /// Equivalent of the WebAssembly `memory.atomic.wait32` instruction for
931 /// this shared memory.
932 ///
933 /// This method allows embedders to block the current thread until notified
934 /// via the `memory.atomic.notify` instruction or the
935 /// [`SharedMemory::atomic_notify`] method, enabling synchronization with
936 /// the wasm guest as desired.
937 ///
938 /// The `expected` argument is the expected 32-bit value to be stored at
939 /// the byte address `addr` specified. The `addr` specified is an index
940 /// into this linear memory.
941 ///
942 /// The optional `timeout` argument is the maximum amount of time to block
943 /// the current thread. If not specified the thread may sleep indefinitely.
944 ///
945 /// This function returns one of three possible values:
946 ///
947 /// * `WaitResult::Ok` - this function, loaded the value at `addr`, found
948 /// it was equal to `expected`, and then blocked (all as one atomic
949 /// operation). The thread was then awoken with a `memory.atomic.notify`
950 /// instruction or the [`SharedMemory::atomic_notify`] method.
951 /// * `WaitResult::Mismatch` - the value at `addr` was loaded but was not
952 /// equal to `expected` so the thread did not block and immediately
953 /// returned.
954 /// * `WaitResult::TimedOut` - all the steps of `Ok` happened, except this
955 /// thread was woken up due to a timeout.
956 ///
957 /// This function will not return due to spurious wakeups.
958 ///
959 /// # Errors
960 ///
961 /// This function will return an error if `addr` is not within bounds or
962 /// not aligned to a 4-byte boundary.
963 pub fn atomic_wait32(
964 &self,
965 addr: u64,
966 expected: u32,
967 timeout: Option<Duration>,
968 ) -> Result<WaitResult, Trap> {
969 self.vm.atomic_wait32(addr, expected, timeout)
970 }
971
972 /// Equivalent of the WebAssembly `memory.atomic.wait64` instruction for
973 /// this shared memory.
974 ///
975 /// For more information see [`SharedMemory::atomic_wait32`].
976 ///
977 /// # Errors
978 ///
979 /// Returns the same error as [`SharedMemory::atomic_wait32`] except that
980 /// the specified address must be 8-byte aligned instead of 4-byte aligned.
981 pub fn atomic_wait64(
982 &self,
983 addr: u64,
984 expected: u64,
985 timeout: Option<Duration>,
986 ) -> Result<WaitResult, Trap> {
987 self.vm.atomic_wait64(addr, expected, timeout)
988 }
989
990 /// Return a reference to the [`Engine`] used to configure the shared
991 /// memory.
992 pub(crate) fn engine(&self) -> &Engine {
993 &self.engine
994 }
995
996 /// Construct a single-memory instance to provide a way to import
997 /// [`SharedMemory`] into other modules.
998 pub(crate) fn vmimport(&self, store: &mut StoreOpaque) -> crate::runtime::vm::VMMemoryImport {
999 let export_memory = generate_memory_export(store, &self.ty(), Some(&self.vm)).unwrap();
1000 VMMemoryImport {
1001 from: export_memory.definition,
1002 vmctx: export_memory.vmctx,
1003 index: export_memory.index,
1004 }
1005 }
1006
1007 /// Create a [`SharedMemory`] from an [`ExportMemory`] definition. This
1008 /// function is available to handle the case in which a Wasm module exports
1009 /// shared memory and the user wants host-side access to it.
1010 pub(crate) unsafe fn from_wasmtime_memory(
1011 wasmtime_export: crate::runtime::vm::ExportMemory,
1012 store: &mut StoreOpaque,
1013 ) -> Self {
1014 #[cfg_attr(not(feature = "threads"), allow(unused_variables, unreachable_code))]
1015 crate::runtime::vm::Instance::from_vmctx(wasmtime_export.vmctx, |handle| {
1016 let memory_index = handle.module().memory_index(wasmtime_export.index);
1017 let page_size = handle.memory_page_size(memory_index);
1018 debug_assert!(page_size.is_power_of_two());
1019 let page_size_log2 = u8::try_from(page_size.ilog2()).unwrap();
1020
1021 let memory = handle
1022 .get_defined_memory(wasmtime_export.index)
1023 .as_mut()
1024 .unwrap();
1025 match memory.as_shared_memory() {
1026 Some(mem) => Self {
1027 vm: mem.clone(),
1028 engine: store.engine().clone(),
1029 page_size_log2,
1030 },
1031 None => panic!("unable to convert from a shared memory"),
1032 }
1033 })
1034 }
1035}
1036
1037impl fmt::Debug for SharedMemory {
1038 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
1039 f.debug_struct("SharedMemory").finish_non_exhaustive()
1040 }
1041}
1042
1043#[cfg(test)]
1044mod tests {
1045 use crate::*;
1046
1047 // Assert that creating a memory via `Memory::new` respects the limits/tunables
1048 // in `Config`.
1049 #[test]
1050 fn respect_tunables() {
1051 let mut cfg = Config::new();
1052 cfg.static_memory_maximum_size(0)
1053 .dynamic_memory_guard_size(0);
1054 let mut store = Store::new(&Engine::new(&cfg).unwrap(), ());
1055 let ty = MemoryType::new(1, None);
1056 let mem = Memory::new(&mut store, ty).unwrap();
1057 let store = store.as_context();
1058 assert_eq!(store[mem.0].memory.offset_guard_size, 0);
1059 match &store[mem.0].memory.style {
1060 wasmtime_environ::MemoryStyle::Dynamic { .. } => {}
1061 other => panic!("unexpected style {other:?}"),
1062 }
1063 }
1064
1065 #[test]
1066 fn hash_key_is_stable_across_duplicate_store_data_entries() -> Result<()> {
1067 let mut store = Store::<()>::default();
1068 let module = Module::new(
1069 store.engine(),
1070 r#"
1071 (module
1072 (memory (export "m") 1 1)
1073 )
1074 "#,
1075 )?;
1076 let instance = Instance::new(&mut store, &module, &[])?;
1077
1078 // Each time we `get_memory`, we call `Memory::from_wasmtime` which adds
1079 // a new entry to `StoreData`, so `g1` and `g2` will have different
1080 // indices into `StoreData`.
1081 let m1 = instance.get_memory(&mut store, "m").unwrap();
1082 let m2 = instance.get_memory(&mut store, "m").unwrap();
1083
1084 // That said, they really point to the same memory.
1085 assert_eq!(m1.data(&store)[0], 0);
1086 assert_eq!(m2.data(&store)[0], 0);
1087 m1.data_mut(&mut store)[0] = 42;
1088 assert_eq!(m1.data(&mut store)[0], 42);
1089 assert_eq!(m2.data(&mut store)[0], 42);
1090
1091 // And therefore their hash keys are the same.
1092 assert!(m1.hash_key(&store.as_context().0) == m2.hash_key(&store.as_context().0));
1093
1094 // But the hash keys are different from different memories.
1095 let instance2 = Instance::new(&mut store, &module, &[])?;
1096 let m3 = instance2.get_memory(&mut store, "m").unwrap();
1097 assert!(m1.hash_key(&store.as_context().0) != m3.hash_key(&store.as_context().0));
1098
1099 Ok(())
1100 }
1101}