wasmtime/lib.rs
1//! # Wasmtime's embedding API
2//!
3//! Wasmtime is a WebAssembly engine for JIT-compiled or ahead-of-time compiled
4//! WebAssembly modules and components. More information about the Wasmtime
5//! project as a whole can be found [in the documentation
6//! book](https://docs.wasmtime.dev) whereas this documentation mostly focuses
7//! on the API reference of the `wasmtime` crate itself.
8//!
9//! This crate contains an API used to interact with [WebAssembly modules] or
10//! [WebAssembly components]. For example you can compile WebAssembly, create
11//! instances, call functions, etc. As an embedder of WebAssembly you can also
12//! provide guests functionality from the host by creating host-defined
13//! functions, memories, globals, etc, which can do things that WebAssembly
14//! cannot (such as print to the screen).
15//!
16//! [WebAssembly modules]: https://webassembly.github.io/spec
17//! [WebAssembly components]: https://component-model.bytecodealliance.org
18//!
19//! The `wasmtime` crate is designed to be safe, efficient, and ergonomic.
20//! This enables executing WebAssembly without the embedder needing to use
21//! `unsafe` code, meaning that you're guaranteed there is no undefined behavior
22//! or segfaults in either the WebAssembly guest or the host itself.
23//!
24//! The `wasmtime` crate can roughly be thought of as being split into two
25//! halves:
26//!
27//! * One half of the crate is similar to the [JS WebAssembly
28//! API](https://developer.mozilla.org/en-US/docs/WebAssembly) as well as the
29//! [proposed C API](https://github.com/webassembly/wasm-c-api) and is
30//! intended for working with [WebAssembly modules]. This API resides in the
31//! root of the `wasmtime` crate's namespace, for example
32//! [`wasmtime::Module`](`Module`).
33//!
34//! * The second half of the crate is for use with the [WebAssembly Component
35//! Model]. The implementation of the component model is present in
36//! [`wasmtime::component`](`component`) and roughly mirrors the structure for
37//! core WebAssembly, for example [`component::Func`] mirrors [`Func`].
38//!
39//! [WebAssembly Component Model]: https://component-model.bytecodealliance.org
40//!
41//! An example of using Wasmtime to run a core WebAssembly module looks like:
42//!
43//! ```
44//! use wasmtime::*;
45//!
46//! fn main() -> wasmtime::Result<()> {
47//! let engine = Engine::default();
48//!
49//! // Modules can be compiled through either the text or binary format
50//! let wat = r#"
51//! (module
52//! (import "host" "host_func" (func $host_hello (param i32)))
53//!
54//! (func (export "hello")
55//! i32.const 3
56//! call $host_hello)
57//! )
58//! "#;
59//! let module = Module::new(&engine, wat)?;
60//!
61//! // Host functionality can be arbitrary Rust functions and is provided
62//! // to guests through a `Linker`.
63//! let mut linker = Linker::new(&engine);
64//! linker.func_wrap("host", "host_func", |caller: Caller<'_, u32>, param: i32| {
65//! println!("Got {} from WebAssembly", param);
66//! println!("my host state is: {}", caller.data());
67//! })?;
68//!
69//! // All wasm objects operate within the context of a "store". Each
70//! // `Store` has a type parameter to store host-specific data, which in
71//! // this case we're using `4` for.
72//! let mut store: Store<u32> = Store::new(&engine, 4);
73//!
74//! // Instantiation of a module requires specifying its imports and then
75//! // afterwards we can fetch exports by name, as well as asserting the
76//! // type signature of the function with `get_typed_func`.
77//! let instance = linker.instantiate(&mut store, &module)?;
78//! let hello = instance.get_typed_func::<(), ()>(&mut store, "hello")?;
79//!
80//! // And finally we can call the wasm!
81//! hello.call(&mut store, ())?;
82//!
83//! Ok(())
84//! }
85//! ```
86//!
87//! ## Core Concepts
88//!
89//! There are a number of core types and concepts that are important to be aware
90//! of when using the `wasmtime` crate:
91//!
92//! * [`Engine`] - a global compilation and runtime environment for WebAssembly.
93//! An [`Engine`] is an object that can be shared concurrently across threads
94//! and is created with a [`Config`] with many knobs for configuring
95//! behavior. Compiling or executing any WebAssembly requires first
96//! configuring and creating an [`Engine`]. All [`Module`]s and
97//! [`Component`](component::Component)s belong to an [`Engine`], and
98//! typically there's one [`Engine`] per process.
99//!
100//! * [`Store`] - container for all information related to WebAssembly objects
101//! such as functions, instances, memories, etc. A [`Store<T>`][`Store`]
102//! allows customization of the `T` to store arbitrary host data within a
103//! [`Store`]. This host data can be accessed through host functions via the
104//! [`Caller`] function parameter in host-defined functions. A [`Store`] is
105//! required for all WebAssembly operations, such as calling a wasm function.
106//! The [`Store`] is passed in as a "context" to methods like [`Func::call`].
107//! Dropping a [`Store`] will deallocate all memory associated with
108//! WebAssembly objects within the [`Store`]. A [`Store`] is cheap to create
109//! and destroy and does not GC objects such as unused instances internally,
110//! so it's intended to be short-lived (or no longer than the instances it
111//! contains).
112//!
113//! * [`Linker`] (or [`component::Linker`]) - host functions are defined within
114//! a linker to provide them a string-based name which can be looked up when
115//! instantiating a WebAssembly module or component. Linkers are traditionally
116//! populated at startup and then reused for all future instantiations of all
117//! instances, assuming the set of host functions does not change over time.
118//! Host functions are `Fn(..) + Send + Sync` and typically do not close over
119//! mutable state. Instead it's recommended to store mutable state in the `T`
120//! of [`Store<T>`] which is accessed through [`Caller<'_,
121//! T>`](crate::Caller) provided to host functions.
122//!
123//! * [`Module`] (or [`Component`](component::Component)) - a compiled
124//! WebAssembly module or component. These structures contain compiled
125//! executable code from a WebAssembly binary which is ready to execute after
126//! being instantiated. These are expensive to create as they require
127//! compilation of the input WebAssembly. Modules and components are safe to
128//! share across threads, however. Modules and components can additionally be
129//! [serialized into a list of bytes](crate::Module::serialize) to later be
130//! [deserialized](crate::Module::deserialize) quickly. This enables JIT-style
131//! compilation through constructors such as [`Module::new`] and AOT-style
132//! compilation by having the compilation process use [`Module::serialize`]
133//! and the execution process use [`Module::deserialize`].
134//!
135//! * [`Instance`] (or [`component::Instance`]) - an instantiated WebAssembly
136//! module or component. An instance is where you can actually acquire a
137//! [`Func`] (or [`component::Func`]) from, for example, to call.
138//!
139//! * [`Func`] (or [`component::Func`]) - a WebAssembly function. This can be
140//! acquired as the export of an [`Instance`] to call WebAssembly functions,
141//! or it can be created via functions like [`Func::wrap`] to wrap
142//! host-defined functionality and give it to WebAssembly. Functions also have
143//! typed views as [`TypedFunc`] or [`component::TypedFunc`] for a more
144//! efficient calling convention.
145//!
146//! * [`Table`], [`Global`], [`Memory`], [`component::Resource`] - other
147//! WebAssembly objects which can either be defined on the host or in wasm
148//! itself (via instances). These all have various ways of being interacted
149//! with like [`Func`].
150//!
151//! All "store-connected" types such as [`Func`], [`Memory`], etc, require the
152//! store to be passed in as a context to each method. Methods in wasmtime
153//! frequently have their first parameter as either [`impl
154//! AsContext`][`AsContext`] or [`impl AsContextMut`][`AsContextMut`]. These
155//! traits are implemented for a variety of types, allowing you to, for example,
156//! pass the following types into methods:
157//!
158//! * `&Store<T>`
159//! * `&mut Store<T>`
160//! * `&Caller<'_, T>`
161//! * `&mut Caller<'_, T>`
162//! * `StoreContext<'_, T>`
163//! * `StoreContextMut<'_, T>`
164//!
165//! A [`Store`] is the sole owner of all WebAssembly internals. Types like
166//! [`Func`] point within the [`Store`] and require the [`Store`] to be provided
167//! to actually access the internals of the WebAssembly function, for instance.
168//!
169//! ## WASI
170//!
171//! The `wasmtime` crate does not natively provide support for WASI, but you can
172//! use the [`wasmtime-wasi`] crate for that purpose. With [`wasmtime-wasi`] all
173//! WASI functions can be added to a [`Linker`] and then used to instantiate
174//! WASI-using modules. For more information see the [WASI example in the
175//! documentation](https://docs.wasmtime.dev/examples-rust-wasi.html).
176//!
177//! [`wasmtime-wasi`]: https://crates.io/crates/wasmtime-wasi
178//!
179//! ## Async
180//!
181//! Wasmtime supports executing WebAssembly guests through Rust-level `async`
182//! functions. This enables Wasmtime to block the guest without blocking the
183//! host, interrupt infinite loops or long-running CPU-bound guests, and
184//! integrate with Rust host functions that are themselves `async`.
185//!
186//! Many functions in the embedding API have a sync variant and an async
187//! variant, for example [`Func::call`] and [`Func::call_async`]. Embedders
188//! may decide which is most appropriate for their use case, but if certain
189//! features of Wasmtime are configured then `*_async` variants of functions are
190//! required. If any of these features are used, for example, then `*_async`
191//! must be used:
192//!
193//! * Async core wasm host functions, for example via [`Linker::func_wrap_async`]
194//! * Async component host functions, for example via [`component::LinkerInstance::func_wrap_async`]
195//! * Async resource limiters, via [`Store::limiter_async`]
196//! * Async yields with fuel via [`Store::fuel_async_yield_interval`]
197//! * Async yields via epochs via [`Store::epoch_deadline_async_yield_and_update`]
198//!
199//! This is not an exhaustive list, but if any of these configurations/APIs are
200//! used then all `*_async` APIs must be used in Wasmtime. If synchronous APIs
201//! are used instead they will return an error.
202//!
203//! #### Asynchronous Wasm
204//!
205//! Core WebAssembly and synchronous WIT functions (e.g. WASIp2-and-prior)
206//! require that all imported functions appear synchronous from the perspective
207//! of the guest. Host functions which perform I/O and block, however, are often
208//! defined with `async` in Rust. Wasmtime's async support bridges this gap with
209//! asynchronous wasm execution.
210//!
211//! When using `*_async` APIs to execute WebAssembly Wasmtime will always
212//! represent its computation as a [`Future`]. The `poll` method of the futures
213//! returned by Wasmtime will perform the actual work of calling the
214//! WebAssembly. Wasmtime won't manage its own thread pools or similar, that's
215//! left up to the embedder.
216//!
217//! To implement futures in a way that WebAssembly sees asynchronous host
218//! functions as synchronous, all async Wasmtime futures will execute on a
219//! separately allocated native stack from the thread otherwise executing
220//! Wasmtime. This separate native stack can then be switched to and from.
221//! Using this whenever an `async` host function returns a future that
222//! resolves to `Pending` we switch away from the temporary stack back to
223//! the main stack and propagate the `Pending` status.
224//!
225//! #### Execution in `poll`
226//!
227//! The [`Future::poll`] method is the main driving force behind Rust's futures.
228//! That method's own documentation states "an implementation of `poll` should
229//! strive to return quickly, and should not block". This, however, can be at
230//! odds with executing WebAssembly code as part of the `poll` method itself. If
231//! your WebAssembly is untrusted then this could allow the `poll` method to
232//! take arbitrarily long in the worst case, likely blocking all other
233//! asynchronous tasks.
234//!
235//! To remedy this situation you have a few possible ways to solve this:
236//!
237//! * The most efficient solution is to enable
238//! [`Config::epoch_interruption`] in conjunction with
239//! [`crate::Store::epoch_deadline_async_yield_and_update`]. Coupled with
240//! periodic calls to [`crate::Engine::increment_epoch`] this will cause
241//! executing WebAssembly to periodically yield back according to the
242//! epoch configuration settings. This enables [`Future::poll`] to take at
243//! most a certain amount of time according to epoch configuration
244//! settings and when increments happen. The benefit of this approach is
245//! that the instrumentation in compiled code is quite lightweight, but a
246//! downside can be that the scheduling is somewhat nondeterministic since
247//! increments are usually timer-based which are not always deterministic.
248//!
249//! Note that to prevent infinite execution of wasm it's recommended to
250//! place a timeout on the entire future representing executing wasm code
251//! and the periodic yields with epochs should ensure that when the
252//! timeout is reached it's appropriately recognized.
253//!
254//! * Alternatively you can enable the
255//! [`Config::consume_fuel`](crate::Config::consume_fuel) method as well
256//! as [`crate::Store::fuel_async_yield_interval`] When doing so this will
257//! configure Wasmtime futures to yield periodically while they're
258//! executing WebAssembly code. After consuming the specified amount of
259//! fuel wasm futures will return `Poll::Pending` from their `poll`
260//! method, and will get automatically re-polled later. This enables the
261//! `Future::poll` method to take roughly a fixed amount of time since
262//! fuel is guaranteed to get consumed while wasm is executing. Unlike
263//! epoch-based preemption this is deterministic since wasm always
264//! consumes a fixed amount of fuel per-operation. The downside of this
265//! approach, however, is that the compiled code instrumentation is
266//! significantly more expensive than epoch checks.
267//!
268//! Note that to prevent infinite execution of wasm it's recommended to
269//! place a timeout on the entire future representing executing wasm code
270//! and the periodic yields with epochs should ensure that when the
271//! timeout is reached it's appropriately recognized.
272//!
273//! In all cases special care needs to be taken when integrating
274//! asynchronous wasm into your application. You should carefully plan where
275//! WebAssembly will execute and what compute resources will be allotted to
276//! it. If Wasmtime doesn't support exactly what you'd like just yet, please
277//! feel free to open an issue!
278//!
279//! ## Crate Features
280//!
281//! The `wasmtime` crate comes with a number of compile-time features that can
282//! be used to customize what features it supports. Some of these features are
283//! just internal details, but some affect the public API of the `wasmtime`
284//! crate. Wasmtime APIs gated behind a Cargo feature should be indicated as
285//! such in the documentation.
286//!
287//! * `runtime` - Enabled by default, this feature enables executing
288//! WebAssembly modules and components. If a compiler is not available (such
289//! as `cranelift`) then [`Module::deserialize`] must be used, for example, to
290//! provide an ahead-of-time compiled artifact to execute WebAssembly.
291//!
292//! * `cranelift` - Enabled by default, this features enables using Cranelift at
293//! runtime to compile a WebAssembly module to native code. This feature is
294//! required to process and compile new WebAssembly modules and components.
295//!
296//! * `cache` - Enabled by default, this feature adds support for wasmtime to
297//! perform internal caching of modules in a global location. This must still
298//! be enabled explicitly through [`Config::cache`].
299//!
300//! * `wat` - Enabled by default, this feature adds support for accepting the
301//! text format of WebAssembly in [`Module::new`] and
302//! [`Component::new`](component::Component::new). The text format will be
303//! automatically recognized and translated to binary when compiling a
304//! module.
305//!
306//! * `parallel-compilation` - Enabled by default, this feature enables support
307//! for compiling functions in parallel with `rayon`.
308//!
309//! * `async` - Enabled by default, this feature enables APIs and runtime
310//! support for defining asynchronous host functions and calling WebAssembly
311//! asynchronously. For more information see [async documentation](#async)
312//!
313//! * `profiling` - Enabled by default, this feature compiles in support for
314//! profiling guest code via a number of possible strategies. See
315//! [`Config::profiler`] for more information.
316//!
317//! * `all-arch` - Not enabled by default. This feature compiles in support for
318//! all architectures for both the JIT compiler and the `wasmtime compile` CLI
319//! command. This can be combined with [`Config::target`] to precompile
320//! modules for a different platform than the host.
321//!
322//! * `pooling-allocator` - Enabled by default, this feature adds support for
323//! [`PoolingAllocationConfig`] to pass to [`Config::allocation_strategy`].
324//! The pooling allocator can enable efficient reuse of resources for
325//! high-concurrency and high-instantiation-count scenarios.
326//!
327//! * `demangle` - Enabled by default, this will affect how backtraces are
328//! printed and whether symbol names from WebAssembly are attempted to be
329//! demangled. Rust and C++ demanglings are currently supported.
330//!
331//! * `coredump` - Enabled by default, this will provide support for generating
332//! a core dump when a trap happens. This can be configured via
333//! [`Config::coredump_on_trap`].
334//!
335//! * `addr2line` - Enabled by default, this feature configures whether traps
336//! will attempt to parse DWARF debug information and convert WebAssembly
337//! addresses to source filenames and line numbers.
338//!
339//! * `debug-builtins` - Enabled by default, this feature includes some built-in
340//! debugging utilities and symbols for native debuggers such as GDB and LLDB
341//! to attach to the process Wasmtime is used within. The intrinsics provided
342//! will enable debugging guest code compiled to WebAssembly. This must also
343//! be enabled via [`Config::debug_info`] as well for guests.
344//!
345//! * `component-model` - Enabled by default, this enables support for the
346//! [`wasmtime::component`](component) API for working with components.
347//!
348//! * `gc` - Enabled by default, this enables support for a number of
349//! WebAssembly proposals such as `reference-types`, `function-references`,
350//! and `gc`. Note that the implementation of the `gc` proposal itself is not
351//! yet complete at this time.
352//!
353//! * `threads` - Enabled by default, this enables compile-time support for the
354//! WebAssembly `threads` proposal, notably shared memories.
355//!
356//! * `call-hook` - Disabled by default, this enables support for the
357//! [`Store::call_hook`] API. This incurs a small overhead on all
358//! entries/exits from WebAssembly and may want to be disabled by some
359//! embedders.
360//!
361//! * `memory-protection-keys` - Disabled by default, this enables support for
362//! the [`PoolingAllocationConfig::memory_protection_keys`] API. This feature
363//! currently only works on x64 Linux and can enable compacting the virtual
364//! memory allocation for linear memories in the pooling allocator. This comes
365//! with the same overhead as the `call-hook` feature where entries/exits into
366//! WebAssembly will have more overhead than before.
367//!
368//! * `signals-based-traps` - Enabled by default, this enables support for using
369//! host signal handlers to implement WebAssembly traps. For example virtual
370//! memory is used to catch out-of-bounds accesses in WebAssembly that result
371//! in segfaults. This is implicitly enabled by the `std` feature and is the
372//! best way to get high-performance WebAssembly.
373//!
374//! More crate features can be found in the [manifest] of Wasmtime itself for
375//! seeing what can be enabled and disabled.
376//!
377//! [manifest]: https://github.com/bytecodealliance/wasmtime/blob/main/crates/wasmtime/Cargo.toml
378
379#![deny(missing_docs)]
380#![doc(test(attr(deny(warnings))))]
381#![doc(test(attr(allow(dead_code, unused_variables, unused_mut))))]
382#![cfg_attr(docsrs, feature(doc_cfg))]
383// NB: this list is currently being burned down to remove all features listed
384// here to get warnings in all configurations of Wasmtime.
385#![cfg_attr(
386 any(not(feature = "runtime"), not(feature = "std")),
387 expect(dead_code, unused_imports, reason = "list not burned down yet")
388)]
389// Allow broken links when the default features is disabled because most of our
390// documentation is written for the "one build" of the `main` branch which has
391// most features enabled. This will present warnings in stripped-down doc builds
392// and will prevent the doc build from failing.
393#![cfg_attr(feature = "default", warn(rustdoc::broken_intra_doc_links))]
394#![no_std]
395// Wasmtime liberally uses #[cfg]'d definitions of structures to uninhabited
396// types to reduce the total amount of #[cfg], but rustc warns that much usage
397// of these structures, rightfully, leads to unreachable code. This unreachable
398// code is only conditional, however, so it's generally just annoying to deal
399// with. Disable the `unreachable_code` lint in situations like this when some
400// major features are disabled. If all the features are enabled, though, we
401// still want to get warned about this.
402#![cfg_attr(
403 any(not(feature = "threads"), not(feature = "gc",)),
404 allow(unreachable_code, reason = "see comment")
405)]
406
407#[cfg(feature = "std")]
408#[macro_use]
409extern crate std;
410extern crate alloc;
411
412// Internal `use` statement which isn't used in this module but enable
413// `use crate::prelude::*;` everywhere else within this crate, for example.
414use wasmtime_environ::prelude;
415
416// FIXME(#12069) should transition to OOM-handling versions of these collections
417// for all internal usage instead of using abort-on-OOM versions. Once that's
418// done this can be removed and the collections should be directly imported from
419// `wasmtime_environ::collections::*`.
420#[allow(
421 unused_imports,
422 reason = "not all build configs use these; easier to allow than to precisely `cfg`"
423)]
424use wasmtime_environ::collections::oom_abort::{hash_map, hash_set};
425
426/// A helper macro to safely map `MaybeUninit<T>` to `MaybeUninit<U>` where `U`
427/// is a field projection within `T`.
428///
429/// This is intended to be invoked as:
430///
431/// ```ignore
432/// struct MyType {
433/// field: u32,
434/// }
435///
436/// let initial: &mut MaybeUninit<MyType> = ...;
437/// let field: &mut MaybeUninit<u32> = map_maybe_uninit!(initial.field);
438/// ```
439///
440/// Note that array accesses are also supported:
441///
442/// ```ignore
443///
444/// let initial: &mut MaybeUninit<[u32; 2]> = ...;
445/// let element: &mut MaybeUninit<u32> = map_maybe_uninit!(initial[1]);
446/// ```
447#[doc(hidden)]
448#[macro_export]
449macro_rules! map_maybe_uninit {
450 ($maybe_uninit:ident $($field:tt)*) => ({
451 #[allow(unused_unsafe, reason = "macro-generated code")]
452 {
453 unsafe {
454 use $crate::MaybeUninitExt;
455
456 let m: &mut core::mem::MaybeUninit<_> = $maybe_uninit;
457 // Note the usage of `&raw` here which is an attempt to "stay
458 // safe" here where we never accidentally create `&mut T` where `T` is
459 // actually uninitialized, hopefully appeasing the Rust unsafe
460 // guidelines gods.
461 m.map(|p| &raw mut (*p)$($field)*)
462 }
463 }
464 })
465}
466
467#[doc(hidden)]
468pub trait MaybeUninitExt<T> {
469 /// Maps `MaybeUninit<T>` to `MaybeUninit<U>` using the closure provided.
470 ///
471 /// # Safety
472 ///
473 /// Requires that `*mut U` is a field projection from `*mut T`. Use
474 /// `map_maybe_uninit!` above instead.
475 unsafe fn map<U>(&mut self, f: impl FnOnce(*mut T) -> *mut U)
476 -> &mut core::mem::MaybeUninit<U>;
477}
478
479impl<T> MaybeUninitExt<T> for core::mem::MaybeUninit<T> {
480 unsafe fn map<U>(
481 &mut self,
482 f: impl FnOnce(*mut T) -> *mut U,
483 ) -> &mut core::mem::MaybeUninit<U> {
484 let new_ptr = f(self.as_mut_ptr());
485 // SAFETY: the memory layout of these two types are the same, and
486 // asserting that it's a safe reference with the same lifetime as `self`
487 // is a requirement of this function itself.
488 unsafe { core::mem::transmute::<*mut U, &mut core::mem::MaybeUninit<U>>(new_ptr) }
489 }
490}
491
492#[cfg(feature = "runtime")]
493mod runtime;
494#[cfg(feature = "runtime")]
495pub use runtime::*;
496
497#[cfg(any(feature = "cranelift", feature = "winch"))]
498mod compile;
499#[cfg(any(feature = "cranelift", feature = "winch"))]
500pub use compile::{CodeBuilder, CodeHint};
501
502mod config;
503mod engine;
504mod profiling_agent;
505
506pub use crate::config::*;
507pub use crate::engine::*;
508
509#[cfg(feature = "std")]
510mod sync_std;
511#[cfg(feature = "std")]
512use sync_std as sync;
513
514mod sync_nostd;
515#[cfg(not(feature = "std"))]
516use sync_nostd as sync;
517
518#[doc(inline)]
519pub use wasmtime_environ::error;
520
521#[cfg(feature = "anyhow")]
522pub use wasmtime_environ::ToWasmtimeResult;
523
524// Only for use in `bindgen!`-generated code.
525#[doc(hidden)]
526#[cfg(feature = "anyhow")]
527pub use wasmtime_environ::anyhow;
528
529pub use self::error::{Error, Result, bail, ensure, format_err};
530
531/// A re-exported instance of Wasmtime's `wasmparser` dependency.
532///
533/// This may be useful for embedders that also use `wasmparser`
534/// directly: it allows embedders to ensure that they are using the same
535/// version as Wasmtime, both to eliminate redundant dependencies on
536/// multiple versions of the library, and to ensure compatibility in
537/// validation and feature support.
538///
539/// Note that this re-export is *not subject to semver*: we reserve the
540/// right to make patch releases of Wasmtime that bump the version of
541/// wasmparser used, and hence the version re-exported, in
542/// semver-incompatible ways. This is the tradeoff that the embedder
543/// needs to opt into: in order to stay exactly in sync with an internal
544/// detail of Wasmtime, the cost is visibility into potential internal
545/// version changes.
546#[cfg(feature = "reexport-wasmparser")]
547pub use wasmparser;
548
549fn _assert_send_and_sync<T: Send + Sync>() {}
550
551fn _assertions_lib() {
552 _assert_send_and_sync::<Engine>();
553 _assert_send_and_sync::<Config>();
554}
555
556#[cfg(feature = "runtime")]
557#[doc(hidden)]
558pub mod _internal {
559 // Exported just for the CLI.
560 pub use crate::runtime::vm::MmapVec;
561}