Skip to main content

wasmtime/runtime/
store.rs

1//! Wasmtime's "store" type
2//!
3//! This module, and its submodules, contain the `Store` type and various types
4//! used to interact with it. At first glance this is a pretty confusing module
5//! where you need to know the difference between:
6//!
7//! * `Store<T>`
8//! * `StoreContext<T>`
9//! * `StoreContextMut<T>`
10//! * `AsContext`
11//! * `AsContextMut`
12//! * `StoreInner<T>`
13//! * `StoreOpaque`
14//! * `StoreData`
15//!
16//! There's... quite a lot going on here, and it's easy to be confused. This
17//! comment is ideally going to serve the purpose of clarifying what all these
18//! types are for and why they're motivated.
19//!
20//! First it's important to know what's "internal" and what's "external". Almost
21//! everything above is defined as `pub`, but only some of the items are
22//! reexported to the outside world to be usable from this crate. Otherwise all
23//! items are `pub` within this `store` module, and the `store` module is
24//! private to the `wasmtime` crate. Notably `Store<T>`, `StoreContext<T>`,
25//! `StoreContextMut<T>`, `AsContext`, and `AsContextMut` are all public
26//! interfaces to the `wasmtime` crate. You can think of these as:
27//!
28//! * `Store<T>` - an owned reference to a store, the "root of everything"
29//! * `StoreContext<T>` - basically `&StoreInner<T>`
30//! * `StoreContextMut<T>` - more-or-less `&mut StoreInner<T>` with caveats.
31//!   Explained later.
32//! * `AsContext` - similar to `AsRef`, but produces `StoreContext<T>`
33//! * `AsContextMut` - similar to `AsMut`, but produces `StoreContextMut<T>`
34//!
35//! Next comes the internal structure of the `Store<T>` itself. This looks like:
36//!
37//! * `Store<T>` - this type is just a pointer large. It's primarily just
38//!   intended to be consumed by the outside world. Note that the "just a
39//!   pointer large" is a load-bearing implementation detail in Wasmtime. This
40//!   enables it to store a pointer to its own trait object which doesn't need
41//!   to change over time.
42//!
43//! * `StoreInner<T>` - the first layer of the contents of a `Store<T>`, what's
44//!   stored inside the `Box`. This is the general Rust pattern when one struct
45//!   is a layer over another. The surprising part, though, is that this is
46//!   further subdivided. This structure only contains things which actually
47//!   need `T` itself. The downside of this structure is that it's always
48//!   generic and means that code is monomorphized into consumer crates. We
49//!   strive to have things be as monomorphic as possible in `wasmtime` so this
50//!   type is not heavily used.
51//!
52//! * `StoreOpaque` - this is the primary contents of the `StoreInner<T>` type.
53//!   Stored inline in the outer type the "opaque" here means that it's a
54//!   "store" but it doesn't have access to the `T`. This is the primary
55//!   "internal" reference that Wasmtime uses since `T` is rarely needed by the
56//!   internals of Wasmtime.
57//!
58//! * `StoreData` - this is a final helper struct stored within `StoreOpaque`.
59//!   All references of Wasm items into a `Store` are actually indices into a
60//!   table in this structure, and the `StoreData` being separate makes it a bit
61//!   easier to manage/define/work with. There's no real fundamental reason this
62//!   is split out, although sometimes it's useful to have separate borrows into
63//!   these tables than the `StoreOpaque`.
64//!
65//! A major caveat with these representations is that the internal `&mut
66//! StoreInner<T>` is never handed out publicly to consumers of this crate, only
67//! through a wrapper of `StoreContextMut<'_, T>`. The reason for this is that
68//! we want to provide mutable, but not destructive, access to the contents of a
69//! `Store`. For example if a `StoreInner<T>` were replaced with some other
70//! `StoreInner<T>` then that would drop live instances, possibly those
71//! currently executing beneath the current stack frame. This would not be a
72//! safe operation.
73//!
74//! This means, though, that the `wasmtime` crate, which liberally uses `&mut
75//! StoreOpaque` internally, has to be careful to never actually destroy the
76//! contents of `StoreOpaque`. This is an invariant that we, as the authors of
77//! `wasmtime`, must uphold for the public interface to be safe.
78
79use crate::RootSet;
80use crate::error::OutOfMemory;
81#[cfg(feature = "async")]
82use crate::fiber;
83use crate::module::{RegisterBreakpointState, RegisteredModuleId};
84use crate::prelude::*;
85#[cfg(feature = "gc")]
86use crate::runtime::vm::GcRootsList;
87#[cfg(feature = "stack-switching")]
88use crate::runtime::vm::VMContRef;
89use crate::runtime::vm::mpk::ProtectionKey;
90use crate::runtime::vm::{
91    self, ExportMemory, GcStore, Imports, InstanceAllocationRequest, InstanceAllocator,
92    InstanceHandle, Interpreter, InterpreterRef, ModuleRuntimeInfo, OnDemandInstanceAllocator,
93    SendSyncPtr, SignalHandler, StoreBox, Unwind, VMContext, VMFuncRef, VMGcRef, VMStore,
94    VMStoreContext,
95};
96use crate::trampoline::VMHostGlobalContext;
97#[cfg(feature = "debug")]
98use crate::{BreakpointState, DebugHandler, FrameDataCache};
99use crate::{Engine, Module, Val, ValRaw, module::ModuleRegistry};
100use crate::{Global, Instance, Table};
101use core::convert::Infallible;
102use core::fmt;
103#[cfg(any(feature = "async", feature = "gc"))]
104use core::future;
105use core::marker;
106use core::mem::{self, ManuallyDrop, MaybeUninit};
107use core::num::NonZeroU64;
108use core::ops::{Deref, DerefMut};
109use core::pin::Pin;
110use core::ptr::NonNull;
111#[cfg(any(feature = "async", feature = "gc"))]
112use core::task::Poll;
113use wasmtime_environ::{DefinedGlobalIndex, DefinedTableIndex, EntityRef, TripleExt};
114
115mod context;
116pub use self::context::*;
117mod data;
118pub use self::data::*;
119mod func_refs;
120use func_refs::FuncRefs;
121#[cfg(feature = "component-model-async")]
122mod token;
123#[cfg(feature = "component-model-async")]
124pub(crate) use token::StoreToken;
125#[cfg(feature = "async")]
126mod async_;
127#[cfg(all(feature = "async", feature = "call-hook"))]
128pub use self::async_::CallHookHandler;
129
130#[cfg(feature = "gc")]
131mod gc;
132
133/// A [`Store`] is a collection of WebAssembly instances and host-defined state.
134///
135/// All WebAssembly instances and items will be attached to and refer to a
136/// [`Store`]. For example instances, functions, globals, and tables are all
137/// attached to a [`Store`]. Instances are created by instantiating a
138/// [`Module`](crate::Module) within a [`Store`].
139///
140/// A [`Store`] is intended to be a short-lived object in a program. No form
141/// of GC is implemented at this time so once an instance is created within a
142/// [`Store`] it will not be deallocated until the [`Store`] itself is dropped.
143/// This makes [`Store`] unsuitable for creating an unbounded number of
144/// instances in it because [`Store`] will never release this memory. It's
145/// recommended to have a [`Store`] correspond roughly to the lifetime of a
146/// "main instance" that an embedding is interested in executing.
147///
148/// ## Type parameter `T`
149///
150/// Each [`Store`] has a type parameter `T` associated with it. This `T`
151/// represents state defined by the host. This state will be accessible through
152/// the [`Caller`](crate::Caller) type that host-defined functions get access
153/// to. This `T` is suitable for storing `Store`-specific information which
154/// imported functions may want access to.
155///
156/// The data `T` can be accessed through methods like [`Store::data`] and
157/// [`Store::data_mut`].
158///
159/// ## Stores, contexts, oh my
160///
161/// Most methods in Wasmtime take something of the form
162/// [`AsContext`](crate::AsContext) or [`AsContextMut`](crate::AsContextMut) as
163/// the first argument. These two traits allow ergonomically passing in the
164/// context you currently have to any method. The primary two sources of
165/// contexts are:
166///
167/// * `Store<T>`
168/// * `Caller<'_, T>`
169///
170/// corresponding to what you create and what you have access to in a host
171/// function. You can also explicitly acquire a [`StoreContext`] or
172/// [`StoreContextMut`] and pass that around as well.
173///
174/// Note that all methods on [`Store`] are mirrored onto [`StoreContext`],
175/// [`StoreContextMut`], and [`Caller`](crate::Caller). This way no matter what
176/// form of context you have you can call various methods, create objects, etc.
177///
178/// ## Stores and `Default`
179///
180/// You can create a store with default configuration settings using
181/// `Store::default()`. This will create a brand new [`Engine`] with default
182/// configuration (see [`Config`](crate::Config) for more information).
183///
184/// ## Cross-store usage of items
185///
186/// In `wasmtime` wasm items such as [`Global`] and [`Memory`] "belong" to a
187/// [`Store`]. The store they belong to is the one they were created with
188/// (passed in as a parameter) or instantiated with. This store is the only
189/// store that can be used to interact with wasm items after they're created.
190///
191/// The `wasmtime` crate will panic if the [`Store`] argument passed in to these
192/// operations is incorrect. In other words it's considered a programmer error
193/// rather than a recoverable error for the wrong [`Store`] to be used when
194/// calling APIs.
195///
196/// [`Memory`]: crate::Memory
197pub struct Store<T: 'static> {
198    // for comments about `ManuallyDrop`, see `Store::into_data`
199    inner: ManuallyDrop<Box<StoreInner<T>>>,
200}
201
202#[derive(Copy, Clone, Debug)]
203/// Passed to the argument of [`Store::call_hook`] to indicate a state transition in
204/// the WebAssembly VM.
205pub enum CallHook {
206    /// Indicates the VM is calling a WebAssembly function, from the host.
207    CallingWasm,
208    /// Indicates the VM is returning from a WebAssembly function, to the host.
209    ReturningFromWasm,
210    /// Indicates the VM is calling a host function, from WebAssembly.
211    CallingHost,
212    /// Indicates the VM is returning from a host function, to WebAssembly.
213    ReturningFromHost,
214}
215
216impl CallHook {
217    /// Indicates the VM is entering host code (exiting WebAssembly code)
218    pub fn entering_host(&self) -> bool {
219        match self {
220            CallHook::ReturningFromWasm | CallHook::CallingHost => true,
221            _ => false,
222        }
223    }
224    /// Indicates the VM is exiting host code (entering WebAssembly code)
225    pub fn exiting_host(&self) -> bool {
226        match self {
227            CallHook::ReturningFromHost | CallHook::CallingWasm => true,
228            _ => false,
229        }
230    }
231}
232
233/// Internal contents of a `Store<T>` that live on the heap.
234///
235/// The members of this struct are those that need to be generic over `T`, the
236/// store's internal type storage. Otherwise all things that don't rely on `T`
237/// should go into `StoreOpaque`.
238pub struct StoreInner<T: 'static> {
239    /// Generic metadata about the store that doesn't need access to `T`.
240    inner: StoreOpaque,
241
242    limiter: Option<ResourceLimiterInner<T>>,
243    call_hook: Option<CallHookInner<T>>,
244    #[cfg(target_has_atomic = "64")]
245    epoch_deadline_behavior:
246        Option<Box<dyn FnMut(StoreContextMut<T>) -> Result<UpdateDeadline> + Send + Sync>>,
247
248    /// The user's `T` data.
249    ///
250    /// Don't actually access it via this field, however! Use the
251    /// `Store{,Inner,Context,ContextMut}::data[_mut]` methods instead, to
252    /// preserve stacked borrows and provenance in the face of potential
253    /// direct-access of `T` from Wasm code (via unsafe intrinsics).
254    ///
255    /// The only exception to the above is when taking ownership of the value,
256    /// e.g. in `Store::into_data`, after which nothing can access this field
257    /// via raw pointers anymore so there is no more provenance to preserve.
258    ///
259    /// For comments about `ManuallyDrop`, see `Store::into_data`.
260    data_no_provenance: ManuallyDrop<T>,
261
262    /// The user's debug handler, if any. See [`crate::DebugHandler`]
263    /// for more documentation.
264    ///
265    /// We need this to be an `Arc` because the handler itself takes
266    /// `&self` and also the whole Store mutably (via
267    /// `StoreContextMut`); so we need to hold a separate reference to
268    /// it while invoking it.
269    #[cfg(feature = "debug")]
270    debug_handler: Option<Box<dyn StoreDebugHandler<T>>>,
271}
272
273/// Adapter around `DebugHandler` that gets monomorphized into an
274/// object-safe dyn trait to place in `store.debug_handler`.
275#[cfg(feature = "debug")]
276trait StoreDebugHandler<T: 'static>: Send + Sync {
277    fn handle<'a>(
278        self: Box<Self>,
279        store: StoreContextMut<'a, T>,
280        event: crate::DebugEvent<'a>,
281    ) -> Box<dyn Future<Output = ()> + Send + 'a>;
282}
283
284#[cfg(feature = "debug")]
285impl<D> StoreDebugHandler<D::Data> for D
286where
287    D: DebugHandler,
288    D::Data: Send,
289{
290    fn handle<'a>(
291        self: Box<Self>,
292        store: StoreContextMut<'a, D::Data>,
293        event: crate::DebugEvent<'a>,
294    ) -> Box<dyn Future<Output = ()> + Send + 'a> {
295        // Clone the underlying `DebugHandler` (the trait requires
296        // Clone as a supertrait), not the Box. The clone happens here
297        // rather than at the callsite because `Clone::clone` is not
298        // object-safe so needs to be in a monomorphized context.
299        let handler: D = (*self).clone();
300        // Since we temporarily took `self` off the store at the
301        // callsite, put it back now that we've cloned it.
302        store.0.debug_handler = Some(self);
303        Box::new(async move { handler.handle(store, event).await })
304    }
305}
306
307enum ResourceLimiterInner<T> {
308    Sync(Box<dyn (FnMut(&mut T) -> &mut dyn crate::ResourceLimiter) + Send + Sync>),
309    #[cfg(feature = "async")]
310    Async(Box<dyn (FnMut(&mut T) -> &mut dyn crate::ResourceLimiterAsync) + Send + Sync>),
311}
312
313/// Representation of a configured resource limiter for a store.
314///
315/// This is acquired with `resource_limiter_and_store_opaque` for example and is
316/// threaded through to growth operations on tables/memories. Note that this is
317/// passed around as `Option<&mut StoreResourceLimiter<'_>>` to make it
318/// efficient to pass around (nullable pointer) and it's also notably passed
319/// around as an `Option` to represent how this is optionally specified within a
320/// store.
321pub enum StoreResourceLimiter<'a> {
322    Sync(&'a mut dyn crate::ResourceLimiter),
323    #[cfg(feature = "async")]
324    Async(&'a mut dyn crate::ResourceLimiterAsync),
325}
326
327impl StoreResourceLimiter<'_> {
328    pub(crate) async fn memory_growing(
329        &mut self,
330        current: usize,
331        desired: usize,
332        maximum: Option<usize>,
333    ) -> Result<bool, Error> {
334        match self {
335            Self::Sync(s) => s.memory_growing(current, desired, maximum),
336            #[cfg(feature = "async")]
337            Self::Async(s) => s.memory_growing(current, desired, maximum).await,
338        }
339    }
340
341    pub(crate) fn memory_grow_failed(&mut self, error: crate::Error) -> Result<()> {
342        match self {
343            Self::Sync(s) => s.memory_grow_failed(error),
344            #[cfg(feature = "async")]
345            Self::Async(s) => s.memory_grow_failed(error),
346        }
347    }
348
349    pub(crate) async fn table_growing(
350        &mut self,
351        current: usize,
352        desired: usize,
353        maximum: Option<usize>,
354    ) -> Result<bool, Error> {
355        match self {
356            Self::Sync(s) => s.table_growing(current, desired, maximum),
357            #[cfg(feature = "async")]
358            Self::Async(s) => s.table_growing(current, desired, maximum).await,
359        }
360    }
361
362    pub(crate) fn table_grow_failed(&mut self, error: crate::Error) -> Result<()> {
363        match self {
364            Self::Sync(s) => s.table_grow_failed(error),
365            #[cfg(feature = "async")]
366            Self::Async(s) => s.table_grow_failed(error),
367        }
368    }
369}
370
371enum CallHookInner<T: 'static> {
372    #[cfg(feature = "call-hook")]
373    Sync(Box<dyn FnMut(StoreContextMut<'_, T>, CallHook) -> Result<()> + Send + Sync>),
374    #[cfg(all(feature = "async", feature = "call-hook"))]
375    Async(Box<dyn CallHookHandler<T> + Send + Sync>),
376    #[expect(
377        dead_code,
378        reason = "forcing, regardless of cfg, the type param to be used"
379    )]
380    ForceTypeParameterToBeUsed {
381        uninhabited: Infallible,
382        _marker: marker::PhantomData<T>,
383    },
384}
385
386/// What to do after returning from a callback when the engine epoch reaches
387/// the deadline for a Store during execution of a function using that store.
388#[non_exhaustive]
389pub enum UpdateDeadline {
390    /// Halt execution of WebAssembly, don't update the epoch deadline, and
391    /// raise a trap.
392    Interrupt,
393    /// Extend the deadline by the specified number of ticks.
394    Continue(u64),
395    /// Extend the deadline by the specified number of ticks after yielding to
396    /// the async executor loop.
397    ///
398    /// This can only be used when WebAssembly is invoked with `*_async`
399    /// methods. If WebAssembly was invoked with a synchronous method then
400    /// returning this variant will raise a trap.
401    #[cfg(feature = "async")]
402    Yield(u64),
403    /// Extend the deadline by the specified number of ticks after yielding to
404    /// the async executor loop.
405    ///
406    /// This can only be used when WebAssembly is invoked with `*_async`
407    /// methods. If WebAssembly was invoked with a synchronous method then
408    /// returning this variant will raise a trap.
409    ///
410    /// The yield will be performed by the future provided; when using `tokio`
411    /// it is recommended to provide [`tokio::task::yield_now`](https://docs.rs/tokio/latest/tokio/task/fn.yield_now.html)
412    /// here.
413    #[cfg(feature = "async")]
414    YieldCustom(
415        u64,
416        ::core::pin::Pin<Box<dyn ::core::future::Future<Output = ()> + Send>>,
417    ),
418}
419
420// Forward methods on `StoreOpaque` to also being on `StoreInner<T>`
421impl<T> Deref for StoreInner<T> {
422    type Target = StoreOpaque;
423    fn deref(&self) -> &Self::Target {
424        &self.inner
425    }
426}
427
428impl<T> DerefMut for StoreInner<T> {
429    fn deref_mut(&mut self) -> &mut Self::Target {
430        &mut self.inner
431    }
432}
433
434/// Monomorphic storage for a `Store<T>`.
435///
436/// This structure contains the bulk of the metadata about a `Store`. This is
437/// used internally in Wasmtime when dependence on the `T` of `Store<T>` isn't
438/// necessary, allowing code to be monomorphic and compiled into the `wasmtime`
439/// crate itself.
440pub struct StoreOpaque {
441    // This `StoreOpaque` structure has references to itself. These aren't
442    // immediately evident, however, so we need to tell the compiler that it
443    // contains self-references. This notably suppresses `noalias` annotations
444    // when this shows up in compiled code because types of this structure do
445    // indeed alias itself. An example of this is `default_callee` holds a
446    // `*mut dyn Store` to the address of this `StoreOpaque` itself, indeed
447    // aliasing!
448    //
449    // It's somewhat unclear to me at this time if this is 100% sufficient to
450    // get all the right codegen in all the right places. For example does
451    // `Store` need to internally contain a `Pin<Box<StoreInner<T>>>`? Do the
452    // contexts need to contain `Pin<&mut StoreInner<T>>`? I'm not familiar
453    // enough with `Pin` to understand if it's appropriate here (we do, for
454    // example want to allow movement in and out of `data: T`, just not movement
455    // of most of the other members). It's also not clear if using `Pin` in a
456    // few places buys us much other than a bunch of `unsafe` that we already
457    // sort of hand-wave away.
458    //
459    // In any case this seems like a good mid-ground for now where we're at
460    // least telling the compiler something about all the aliasing happening
461    // within a `Store`.
462    _marker: marker::PhantomPinned,
463
464    engine: Engine,
465    vm_store_context: VMStoreContext,
466
467    // Contains all continuations ever allocated throughout the lifetime of this
468    // store.
469    #[cfg(feature = "stack-switching")]
470    continuations: Vec<Box<VMContRef>>,
471
472    instances: TryPrimaryMap<InstanceId, StoreInstance>,
473
474    signal_handler: Option<SignalHandler>,
475    modules: ModuleRegistry,
476    func_refs: FuncRefs,
477    host_globals: TryPrimaryMap<DefinedGlobalIndex, StoreBox<VMHostGlobalContext>>,
478    // GC-related fields.
479    gc_store: Option<GcStore>,
480    gc_roots: RootSet,
481    #[cfg(feature = "gc")]
482    gc_roots_list: GcRootsList,
483    // Types for which the embedder has created an allocator for.
484    #[cfg(feature = "gc")]
485    gc_host_alloc_types: crate::hash_set::HashSet<crate::type_registry::RegisteredType>,
486    /// Pending exception, if any. This is also a GC root, because it
487    /// needs to be rooted somewhere between the time that a pending
488    /// exception is set and the time that the handling code takes the
489    /// exception object. We use this rooting strategy rather than a
490    /// root in an `Err` branch of a `Result` on the host side because
491    /// it is less error-prone with respect to rooting behavior. See
492    /// `throw()`, `take_pending_exception()`,
493    /// `peek_pending_exception()`, `has_pending_exception()`, and
494    /// `catch()`.
495    ///
496    /// Also note that the underlying reference here is a `VMExnRef`, a
497    /// refinement of `VMGcRef`, but rooting APIs right now make it difficult to
498    /// work with that directly so this is stored as `VMGcRef` instead.
499    #[cfg(feature = "gc")]
500    pending_exception: Option<VMGcRef>,
501
502    // Numbers of resources instantiated in this store, and their limits
503    instance_count: usize,
504    instance_limit: usize,
505    memory_count: usize,
506    memory_limit: usize,
507    table_count: usize,
508    table_limit: usize,
509    #[cfg(feature = "async")]
510    async_state: fiber::AsyncState,
511
512    // If fuel_yield_interval is enabled, then we store the remaining fuel (that isn't in
513    // runtime_limits) here. The total amount of fuel is the runtime limits and reserve added
514    // together. Then when we run out of gas, we inject the yield amount from the reserve
515    // until the reserve is empty.
516    fuel_reserve: u64,
517    pub(crate) fuel_yield_interval: Option<NonZeroU64>,
518    /// Indexed data within this `Store`, used to store information about
519    /// globals, functions, memories, etc.
520    store_data: StoreData,
521    traitobj: StorePtr,
522    default_caller_vmctx: SendSyncPtr<VMContext>,
523
524    /// Used to optimized wasm->host calls when the host function is defined with
525    /// `Func::new` to avoid allocating a new vector each time a function is
526    /// called.
527    hostcall_val_storage: Vec<Val>,
528    /// Same as `hostcall_val_storage`, but for the direction of the host
529    /// calling wasm.
530    wasm_val_raw_storage: TryVec<ValRaw>,
531
532    /// Keep track of what protection key is being used during allocation so
533    /// that the right memory pages can be enabled when entering WebAssembly
534    /// guest code.
535    pkey: Option<ProtectionKey>,
536
537    /// State related to the executor of wasm code.
538    ///
539    /// For example if Pulley is enabled and configured then this will store a
540    /// Pulley interpreter.
541    executor: Executor,
542
543    /// The debug breakpoint state for this store.
544    ///
545    /// When guest debugging is enabled, a given store may have a set
546    /// of breakpoints defined, denoted by module and Wasm PC within
547    /// that module. Or alternately, it may be in "single-step" mode,
548    /// where every possible breakpoint is logically enabled.
549    ///
550    /// When execution of any instance in this store hits any defined
551    /// breakpoint, a `Breakpoint` debug event is emitted and the
552    /// handler defined above, if any, has a chance to perform some
553    /// logic before returning to allow execution to resume.
554    #[cfg(feature = "debug")]
555    breakpoints: BreakpointState,
556
557    /// The debug PC-to-FrameData cache for this store.
558    ///
559    /// When guest debugging is enabled, we parse compiler metadata
560    /// and pass out `FrameHandle`s that represent Wasm guest
561    /// frames. These handles represent a specific frame within a
562    /// frozen stack and are invalidated upon further execution. In
563    /// order to keep these handles lightweight, and to avoid
564    /// redundant work when passing out *new* handles after further
565    /// execution, we cache the mapping from store-specific PCs to
566    /// parsed frame data. (This cache needs to be store-specific
567    /// rather than e.g. engine-specific because each store has its
568    /// own privately mapped copy of guest code when debugging is
569    /// enabled, so the key-space is unique for each store.)
570    #[cfg(feature = "debug")]
571    frame_data_cache: FrameDataCache,
572}
573
574/// Self-pointer to `StoreInner<T>` from within a `StoreOpaque` which is chiefly
575/// used to copy into instances during instantiation.
576///
577/// FIXME: ideally this type would get deleted and Wasmtime's reliance on it
578/// would go away.
579struct StorePtr(Option<NonNull<dyn VMStore>>);
580
581// We can't make `VMStore: Send + Sync` because that requires making all of
582// Wastime's internals generic over the `Store`'s `T`. So instead, we take care
583// in the whole VM layer to only use the `VMStore` in ways that are `Send`- and
584// `Sync`-safe and we have to have these unsafe impls.
585unsafe impl Send for StorePtr {}
586unsafe impl Sync for StorePtr {}
587
588/// Executor state within `StoreOpaque`.
589///
590/// Effectively stores Pulley interpreter state and handles conditional support
591/// for Cranelift at compile time.
592pub(crate) enum Executor {
593    Interpreter(Interpreter),
594    #[cfg(has_host_compiler_backend)]
595    Native,
596}
597
598impl Executor {
599    pub(crate) fn new(engine: &Engine) -> Result<Self, OutOfMemory> {
600        #[cfg(has_host_compiler_backend)]
601        if cfg!(feature = "pulley") && engine.target().is_pulley() {
602            Ok(Executor::Interpreter(Interpreter::new(engine)?))
603        } else {
604            Ok(Executor::Native)
605        }
606        #[cfg(not(has_host_compiler_backend))]
607        {
608            debug_assert!(engine.target().is_pulley());
609            Ok(Executor::Interpreter(Interpreter::new(engine)?))
610        }
611    }
612}
613
614/// A borrowed reference to `Executor` above.
615pub(crate) enum ExecutorRef<'a> {
616    Interpreter(InterpreterRef<'a>),
617    #[cfg(has_host_compiler_backend)]
618    Native,
619}
620
621/// An RAII type to automatically mark a region of code as unsafe for GC.
622#[doc(hidden)]
623pub struct AutoAssertNoGc<'a> {
624    store: &'a mut StoreOpaque,
625    entered: bool,
626}
627
628impl<'a> AutoAssertNoGc<'a> {
629    #[inline]
630    pub fn new(store: &'a mut StoreOpaque) -> Self {
631        let entered = if !cfg!(feature = "gc") {
632            false
633        } else if let Some(gc_store) = store.gc_store.as_mut() {
634            gc_store.gc_heap.enter_no_gc_scope();
635            true
636        } else {
637            false
638        };
639
640        AutoAssertNoGc { store, entered }
641    }
642
643    /// Creates an `AutoAssertNoGc` value which is forcibly "not entered" and
644    /// disables checks for no GC happening for the duration of this value.
645    ///
646    /// This is used when it is statically otherwise known that a GC doesn't
647    /// happen for the various types involved.
648    ///
649    /// # Unsafety
650    ///
651    /// This method is `unsafe` as it does not provide the same safety
652    /// guarantees as `AutoAssertNoGc::new`. It must be guaranteed by the
653    /// caller that a GC doesn't happen.
654    #[inline]
655    pub unsafe fn disabled(store: &'a mut StoreOpaque) -> Self {
656        if cfg!(debug_assertions) {
657            AutoAssertNoGc::new(store)
658        } else {
659            AutoAssertNoGc {
660                store,
661                entered: false,
662            }
663        }
664    }
665}
666
667impl core::ops::Deref for AutoAssertNoGc<'_> {
668    type Target = StoreOpaque;
669
670    #[inline]
671    fn deref(&self) -> &Self::Target {
672        &*self.store
673    }
674}
675
676impl core::ops::DerefMut for AutoAssertNoGc<'_> {
677    #[inline]
678    fn deref_mut(&mut self) -> &mut Self::Target {
679        &mut *self.store
680    }
681}
682
683impl Drop for AutoAssertNoGc<'_> {
684    #[inline]
685    fn drop(&mut self) {
686        if self.entered {
687            self.store.unwrap_gc_store_mut().gc_heap.exit_no_gc_scope();
688        }
689    }
690}
691
692/// Used to associate instances with the store.
693///
694/// This is needed to track if the instance was allocated explicitly with the on-demand
695/// instance allocator.
696struct StoreInstance {
697    handle: InstanceHandle,
698    kind: StoreInstanceKind,
699}
700
701enum StoreInstanceKind {
702    /// An actual, non-dummy instance.
703    Real {
704        /// The id of this instance's module inside our owning store's
705        /// `ModuleRegistry`.
706        module_id: RegisteredModuleId,
707    },
708
709    /// This is a dummy instance that is just an implementation detail for
710    /// something else. For example, host-created memories internally create a
711    /// dummy instance.
712    ///
713    /// Regardless of the configured instance allocator for the engine, dummy
714    /// instances always use the on-demand allocator to deallocate the instance.
715    Dummy,
716}
717
718impl<T> Store<T> {
719    /// Creates a new [`Store`] to be associated with the given [`Engine`] and
720    /// `data` provided.
721    ///
722    /// The created [`Store`] will place no additional limits on the size of
723    /// linear memories or tables at runtime. Linear memories and tables will
724    /// be allowed to grow to any upper limit specified in their definitions.
725    /// The store will limit the number of instances, linear memories, and
726    /// tables created to 10,000. This can be overridden with the
727    /// [`Store::limiter`] configuration method.
728    pub fn new(engine: &Engine, data: T) -> Self {
729        Self::try_new(engine, data).expect(
730            "allocation failure during `Store::new` (use `Store::try_new` to handle such errors)",
731        )
732    }
733
734    /// Like `Store::new` but returns an error on allocation failure.
735    ///
736    /// # Errors
737    ///
738    /// This function will return an [`OutOfMemory`][crate::OutOfMemory] error when
739    /// memory allocation fails. See the `OutOfMemory` type's documentation for
740    /// details on Wasmtime's out-of-memory handling.
741    pub fn try_new(engine: &Engine, data: T) -> Result<Self> {
742        let store_data = StoreData::new(engine);
743        log::trace!("creating new store {:?}", store_data.id());
744
745        let pkey = engine.allocator().next_available_pkey();
746
747        let inner = StoreOpaque {
748            _marker: marker::PhantomPinned,
749            engine: engine.clone(),
750            vm_store_context: Default::default(),
751            #[cfg(feature = "stack-switching")]
752            continuations: Vec::new(),
753            instances: TryPrimaryMap::new(),
754            signal_handler: None,
755            gc_store: None,
756            gc_roots: RootSet::default(),
757            #[cfg(feature = "gc")]
758            gc_roots_list: GcRootsList::default(),
759            #[cfg(feature = "gc")]
760            gc_host_alloc_types: Default::default(),
761            #[cfg(feature = "gc")]
762            pending_exception: None,
763            modules: ModuleRegistry::default(),
764            func_refs: FuncRefs::default(),
765            host_globals: TryPrimaryMap::new(),
766            instance_count: 0,
767            instance_limit: crate::DEFAULT_INSTANCE_LIMIT,
768            memory_count: 0,
769            memory_limit: crate::DEFAULT_MEMORY_LIMIT,
770            table_count: 0,
771            table_limit: crate::DEFAULT_TABLE_LIMIT,
772            #[cfg(feature = "async")]
773            async_state: Default::default(),
774            fuel_reserve: 0,
775            fuel_yield_interval: None,
776            store_data,
777            traitobj: StorePtr(None),
778            default_caller_vmctx: SendSyncPtr::new(NonNull::dangling()),
779            hostcall_val_storage: Vec::new(),
780            wasm_val_raw_storage: TryVec::new(),
781            pkey,
782            executor: Executor::new(engine)?,
783            #[cfg(feature = "debug")]
784            breakpoints: Default::default(),
785            #[cfg(feature = "debug")]
786            frame_data_cache: FrameDataCache::new(),
787        };
788        let mut inner = try_new::<Box<_>>(StoreInner {
789            inner,
790            limiter: None,
791            call_hook: None,
792            #[cfg(target_has_atomic = "64")]
793            epoch_deadline_behavior: None,
794            data_no_provenance: ManuallyDrop::new(data),
795            #[cfg(feature = "debug")]
796            debug_handler: None,
797        })?;
798
799        let store_data =
800            <NonNull<ManuallyDrop<T>>>::from(&mut inner.data_no_provenance).cast::<()>();
801        inner.inner.vm_store_context.store_data = store_data.into();
802
803        inner.traitobj = StorePtr(Some(NonNull::from(&mut *inner)));
804
805        // Wasmtime uses the callee argument to host functions to learn about
806        // the original pointer to the `Store` itself, allowing it to
807        // reconstruct a `StoreContextMut<T>`. When we initially call a `Func`,
808        // however, there's no "callee" to provide. To fix this we allocate a
809        // single "default callee" for the entire `Store`. This is then used as
810        // part of `Func::call` to guarantee that the `callee: *mut VMContext`
811        // is never null.
812        let allocator = OnDemandInstanceAllocator::default();
813        let info = engine.empty_module_runtime_info();
814        allocator
815            .validate_module(info.env_module(), info.offsets())
816            .unwrap();
817
818        unsafe {
819            // Note that this dummy instance doesn't allocate tables or memories
820            // (also no limiter is passed in) so it won't have an async await
821            // point meaning that it should be ok to assert the future is
822            // always ready.
823            let result = vm::assert_ready(inner.allocate_instance(
824                None,
825                AllocateInstanceKind::Dummy {
826                    allocator: &allocator,
827                },
828                info,
829                Default::default(),
830            ));
831            let id = match result {
832                Ok(id) => id,
833                Err(e) => {
834                    if e.is::<OutOfMemory>() {
835                        return Err(e);
836                    }
837                    panic!("instance allocator failed to allocate default callee")
838                }
839            };
840            let default_caller_vmctx = inner.instance(id).vmctx();
841            inner.default_caller_vmctx = default_caller_vmctx.into();
842        }
843
844        Ok(Self {
845            inner: ManuallyDrop::new(inner),
846        })
847    }
848
849    /// Access the underlying `T` data owned by this `Store`.
850    #[inline]
851    pub fn data(&self) -> &T {
852        self.inner.data()
853    }
854
855    /// Access the underlying `T` data owned by this `Store`.
856    #[inline]
857    pub fn data_mut(&mut self) -> &mut T {
858        self.inner.data_mut()
859    }
860
861    fn run_manual_drop_routines(&mut self) {
862        StoreData::run_manual_drop_routines(StoreContextMut(&mut self.inner));
863
864        // Ensure all fiber stacks, even cached ones, are all flushed out to the
865        // instance allocator.
866        self.inner.flush_fiber_stack();
867    }
868
869    /// Consumes this [`Store`], destroying it, and returns the underlying data.
870    pub fn into_data(mut self) -> T {
871        self.run_manual_drop_routines();
872
873        // This is an unsafe operation because we want to avoid having a runtime
874        // check or boolean for whether the data is actually contained within a
875        // `Store`. The data itself is stored as `ManuallyDrop` since we're
876        // manually managing the memory here, and there's also a `ManuallyDrop`
877        // around the `Box<StoreInner<T>>`. The way this works though is a bit
878        // tricky, so here's how things get dropped appropriately:
879        //
880        // * When a `Store<T>` is normally dropped, the custom destructor for
881        //   `Store<T>` will drop `T`, then the `self.inner` field. The
882        //   rustc-glue destructor runs for `Box<StoreInner<T>>` which drops
883        //   `StoreInner<T>`. This cleans up all internal fields and doesn't
884        //   touch `T` because it's wrapped in `ManuallyDrop`.
885        //
886        // * When calling this method we skip the top-level destructor for
887        //   `Store<T>` with `mem::forget`. This skips both the destructor for
888        //   `T` and the destructor for `StoreInner<T>`. We do, however, run the
889        //   destructor for `Box<StoreInner<T>>` which, like above, will skip
890        //   the destructor for `T` since it's `ManuallyDrop`.
891        //
892        // In both cases all the other fields of `StoreInner<T>` should all get
893        // dropped, and the manual management of destructors is basically
894        // between this method and `Drop for Store<T>`. Note that this also
895        // means that `Drop for StoreInner<T>` cannot access `self.data`, so
896        // there is a comment indicating this as well.
897        unsafe {
898            let mut inner = ManuallyDrop::take(&mut self.inner);
899            core::mem::forget(self);
900            ManuallyDrop::take(&mut inner.data_no_provenance)
901        }
902    }
903
904    /// Configures the [`ResourceLimiter`] used to limit resource creation
905    /// within this [`Store`].
906    ///
907    /// Whenever resources such as linear memory, tables, or instances are
908    /// allocated the `limiter` specified here is invoked with the store's data
909    /// `T` and the returned [`ResourceLimiter`] is used to limit the operation
910    /// being allocated. The returned [`ResourceLimiter`] is intended to live
911    /// within the `T` itself, for example by storing a
912    /// [`StoreLimits`](crate::StoreLimits).
913    ///
914    /// Note that this limiter is only used to limit the creation/growth of
915    /// resources in the future, this does not retroactively attempt to apply
916    /// limits to the [`Store`].
917    ///
918    /// # Examples
919    ///
920    /// ```
921    /// use wasmtime::*;
922    ///
923    /// struct MyApplicationState {
924    ///     my_state: u32,
925    ///     limits: StoreLimits,
926    /// }
927    ///
928    /// let engine = Engine::default();
929    /// let my_state = MyApplicationState {
930    ///     my_state: 42,
931    ///     limits: StoreLimitsBuilder::new()
932    ///         .memory_size(1 << 20 /* 1 MB */)
933    ///         .instances(2)
934    ///         .build(),
935    /// };
936    /// let mut store = Store::new(&engine, my_state);
937    /// store.limiter(|state| &mut state.limits);
938    ///
939    /// // Creation of smaller memories is allowed
940    /// Memory::new(&mut store, MemoryType::new(1, None)).unwrap();
941    ///
942    /// // Creation of a larger memory, however, will exceed the 1MB limit we've
943    /// // configured
944    /// assert!(Memory::new(&mut store, MemoryType::new(1000, None)).is_err());
945    ///
946    /// // The number of instances in this store is limited to 2, so the third
947    /// // instance here should fail.
948    /// let module = Module::new(&engine, "(module)").unwrap();
949    /// assert!(Instance::new(&mut store, &module, &[]).is_ok());
950    /// assert!(Instance::new(&mut store, &module, &[]).is_ok());
951    /// assert!(Instance::new(&mut store, &module, &[]).is_err());
952    /// ```
953    ///
954    /// [`ResourceLimiter`]: crate::ResourceLimiter
955    pub fn limiter(
956        &mut self,
957        mut limiter: impl (FnMut(&mut T) -> &mut dyn crate::ResourceLimiter) + Send + Sync + 'static,
958    ) {
959        // Apply the limits on instances, tables, and memory given by the limiter:
960        let inner = &mut self.inner;
961        let (instance_limit, table_limit, memory_limit) = {
962            let l = limiter(inner.data_mut());
963            (l.instances(), l.tables(), l.memories())
964        };
965        let innermost = &mut inner.inner;
966        innermost.instance_limit = instance_limit;
967        innermost.table_limit = table_limit;
968        innermost.memory_limit = memory_limit;
969
970        // Save the limiter accessor function:
971        inner.limiter = Some(ResourceLimiterInner::Sync(Box::new(limiter)));
972    }
973
974    /// Configure a function that runs on calls and returns between WebAssembly
975    /// and host code.
976    ///
977    /// The function is passed a [`CallHook`] argument, which indicates which
978    /// state transition the VM is making.
979    ///
980    /// This function may return a [`Trap`]. If a trap is returned when an
981    /// import was called, it is immediately raised as-if the host import had
982    /// returned the trap. If a trap is returned after wasm returns to the host
983    /// then the wasm function's result is ignored and this trap is returned
984    /// instead.
985    ///
986    /// After this function returns a trap, it may be called for subsequent returns
987    /// to host or wasm code as the trap propagates to the root call.
988    ///
989    /// [`Trap`]: crate::Trap
990    #[cfg(feature = "call-hook")]
991    pub fn call_hook(
992        &mut self,
993        hook: impl FnMut(StoreContextMut<'_, T>, CallHook) -> Result<()> + Send + Sync + 'static,
994    ) {
995        self.inner.call_hook = Some(CallHookInner::Sync(Box::new(hook)));
996    }
997
998    /// Returns the [`Engine`] that this store is associated with.
999    pub fn engine(&self) -> &Engine {
1000        self.inner.engine()
1001    }
1002
1003    /// Returns the amount fuel in this [`Store`]. When fuel is enabled, it must
1004    /// be configured via [`Store::set_fuel`].
1005    ///
1006    /// # Errors
1007    ///
1008    /// This function will return an error if fuel consumption is not enabled
1009    /// via [`Config::consume_fuel`](crate::Config::consume_fuel).
1010    ///
1011    /// This function will return an [`OutOfMemory`][crate::OutOfMemory] error when
1012    /// memory allocation fails. See the `OutOfMemory` type's documentation for
1013    /// details on Wasmtime's out-of-memory handling.
1014    pub fn get_fuel(&self) -> Result<u64> {
1015        self.inner.get_fuel()
1016    }
1017
1018    /// Set the fuel to this [`Store`] for wasm to consume while executing.
1019    ///
1020    /// For this method to work fuel consumption must be enabled via
1021    /// [`Config::consume_fuel`](crate::Config::consume_fuel). By default a
1022    /// [`Store`] starts with 0 fuel for wasm to execute with (meaning it will
1023    /// immediately trap). This function must be called for the store to have
1024    /// some fuel to allow WebAssembly to execute.
1025    ///
1026    /// Most WebAssembly instructions consume 1 unit of fuel. Some
1027    /// instructions, such as `nop`, `drop`, `block`, and `loop`, consume 0
1028    /// units, as any execution cost associated with them involves other
1029    /// instructions which do consume fuel.
1030    ///
1031    /// Note that when fuel is entirely consumed it will cause wasm to trap.
1032    ///
1033    /// # Errors
1034    ///
1035    /// This function will return an error if fuel consumption is not enabled via
1036    /// [`Config::consume_fuel`](crate::Config::consume_fuel).
1037    ///
1038    /// This function will return an [`OutOfMemory`][crate::OutOfMemory] error when
1039    /// memory allocation fails. See the `OutOfMemory` type's documentation for
1040    /// details on Wasmtime's out-of-memory handling.
1041    pub fn set_fuel(&mut self, fuel: u64) -> Result<()> {
1042        self.inner.set_fuel(fuel)
1043    }
1044
1045    /// Configures a [`Store`] to yield execution of async WebAssembly code
1046    /// periodically.
1047    ///
1048    /// When a [`Store`] is configured to consume fuel with
1049    /// [`Config::consume_fuel`](crate::Config::consume_fuel) this method will
1050    /// configure WebAssembly to be suspended and control will be yielded back
1051    /// to the caller every `interval` units of fuel consumed. When using this
1052    /// method it requires further invocations of WebAssembly to use `*_async`
1053    /// entrypoints.
1054    ///
1055    /// The purpose of this behavior is to ensure that futures which represent
1056    /// execution of WebAssembly do not execute too long inside their
1057    /// `Future::poll` method. This allows for some form of cooperative
1058    /// multitasking where WebAssembly will voluntarily yield control
1059    /// periodically (based on fuel consumption) back to the running thread.
1060    ///
1061    /// Note that futures returned by this crate will automatically flag
1062    /// themselves to get re-polled if a yield happens. This means that
1063    /// WebAssembly will continue to execute, just after giving the host an
1064    /// opportunity to do something else.
1065    ///
1066    /// The `interval` parameter indicates how much fuel should be
1067    /// consumed between yields of an async future. When fuel runs out wasm will trap.
1068    ///
1069    /// # Error
1070    ///
1071    /// This method will error if fuel is not enabled or `interval` is
1072    /// `Some(0)`.
1073    #[cfg(feature = "async")]
1074    pub fn fuel_async_yield_interval(&mut self, interval: Option<u64>) -> Result<()> {
1075        self.inner.fuel_async_yield_interval(interval)
1076    }
1077
1078    /// Sets the epoch deadline to a certain number of ticks in the future.
1079    ///
1080    /// When the Wasm guest code is compiled with epoch-interruption
1081    /// instrumentation
1082    /// ([`Config::epoch_interruption()`](crate::Config::epoch_interruption)),
1083    /// and when the `Engine`'s epoch is incremented
1084    /// ([`Engine::increment_epoch()`](crate::Engine::increment_epoch))
1085    /// past a deadline, execution can be configured to either trap or
1086    /// yield and then continue.
1087    ///
1088    /// This deadline is always set relative to the current epoch:
1089    /// `ticks_beyond_current` ticks in the future. The deadline can
1090    /// be set explicitly via this method, or refilled automatically
1091    /// on a yield if configured via
1092    /// [`epoch_deadline_async_yield_and_update()`](Store::epoch_deadline_async_yield_and_update). After
1093    /// this method is invoked, the deadline is reached when
1094    /// [`Engine::increment_epoch()`] has been invoked at least
1095    /// `ticks_beyond_current` times.
1096    ///
1097    /// By default a store will trap immediately with an epoch deadline of 0
1098    /// (which has always "elapsed"). This method is required to be configured
1099    /// for stores with epochs enabled to some future epoch deadline.
1100    ///
1101    /// See documentation on
1102    /// [`Config::epoch_interruption()`](crate::Config::epoch_interruption)
1103    /// for an introduction to epoch-based interruption.
1104    #[cfg(target_has_atomic = "64")]
1105    pub fn set_epoch_deadline(&mut self, ticks_beyond_current: u64) {
1106        self.inner.set_epoch_deadline(ticks_beyond_current);
1107    }
1108
1109    /// Configures epoch-deadline expiration to trap.
1110    ///
1111    /// When epoch-interruption-instrumented code is executed on this
1112    /// store and the epoch deadline is reached before completion,
1113    /// with the store configured in this way, execution will
1114    /// terminate with a trap as soon as an epoch check in the
1115    /// instrumented code is reached.
1116    ///
1117    /// This behavior is the default if the store is not otherwise
1118    /// configured via
1119    /// [`epoch_deadline_trap()`](Store::epoch_deadline_trap),
1120    /// [`epoch_deadline_callback()`](Store::epoch_deadline_callback) or
1121    /// [`epoch_deadline_async_yield_and_update()`](Store::epoch_deadline_async_yield_and_update).
1122    ///
1123    /// This setting is intended to allow for coarse-grained
1124    /// interruption, but not a deterministic deadline of a fixed,
1125    /// finite interval. For deterministic interruption, see the
1126    /// "fuel" mechanism instead.
1127    ///
1128    /// Note that when this is used it's required to call
1129    /// [`Store::set_epoch_deadline`] or otherwise wasm will always immediately
1130    /// trap.
1131    ///
1132    /// See documentation on
1133    /// [`Config::epoch_interruption()`](crate::Config::epoch_interruption)
1134    /// for an introduction to epoch-based interruption.
1135    #[cfg(target_has_atomic = "64")]
1136    pub fn epoch_deadline_trap(&mut self) {
1137        self.inner.epoch_deadline_trap();
1138    }
1139
1140    /// Configures epoch-deadline expiration to invoke a custom callback
1141    /// function.
1142    ///
1143    /// When epoch-interruption-instrumented code is executed on this
1144    /// store and the epoch deadline is reached before completion, the
1145    /// provided callback function is invoked.
1146    ///
1147    /// This callback should either return an [`UpdateDeadline`], or
1148    /// return an error, which will terminate execution with a trap.
1149    ///
1150    /// The [`UpdateDeadline`] is a positive number of ticks to
1151    /// add to the epoch deadline, as well as indicating what
1152    /// to do after the callback returns. If the [`Store`] is
1153    /// configured with async support, then the callback may return
1154    /// [`UpdateDeadline::Yield`] or [`UpdateDeadline::YieldCustom`]
1155    /// to yield to the async executor before updating the epoch deadline.
1156    /// Alternatively, the callback may return [`UpdateDeadline::Continue`] to
1157    /// update the epoch deadline immediately.
1158    ///
1159    /// This setting is intended to allow for coarse-grained
1160    /// interruption, but not a deterministic deadline of a fixed,
1161    /// finite interval. For deterministic interruption, see the
1162    /// "fuel" mechanism instead.
1163    ///
1164    /// See documentation on
1165    /// [`Config::epoch_interruption()`](crate::Config::epoch_interruption)
1166    /// for an introduction to epoch-based interruption.
1167    #[cfg(target_has_atomic = "64")]
1168    pub fn epoch_deadline_callback(
1169        &mut self,
1170        callback: impl FnMut(StoreContextMut<T>) -> Result<UpdateDeadline> + Send + Sync + 'static,
1171    ) {
1172        self.inner.epoch_deadline_callback(Box::new(callback));
1173    }
1174
1175    /// Tests whether there is a pending exception.
1176    ///
1177    /// Ordinarily, a pending exception will be set on a store if and
1178    /// only if a host-side callstack is propagating a
1179    /// [`crate::ThrownException`] error. The final consumer that
1180    /// catches the exception takes it; it may re-place it to re-throw
1181    /// (using [`Self::throw`]) if it chooses not to actually handle the
1182    /// exception.
1183    ///
1184    /// This method is useful to tell whether a store is in this
1185    /// state, but should not be used as part of the ordinary
1186    /// exception-handling flow. For the most idiomatic handling, see
1187    /// [`StoreContextMut::throw`].
1188    pub fn has_pending_exception(&self) -> bool {
1189        self.inner.has_pending_exception()
1190    }
1191
1192    /// Return all breakpoints.
1193    #[cfg(feature = "debug")]
1194    pub fn breakpoints(&self) -> Option<impl Iterator<Item = crate::Breakpoint> + '_> {
1195        self.as_context().breakpoints()
1196    }
1197
1198    /// Indicate whether single-step mode is enabled.
1199    #[cfg(feature = "debug")]
1200    pub fn is_single_step(&self) -> bool {
1201        self.as_context().is_single_step()
1202    }
1203
1204    /// Set the debug callback on this store.
1205    ///
1206    /// See [`crate::DebugHandler`] for more documentation.
1207    ///
1208    /// # Panics
1209    ///
1210    /// - Will panic if guest-debug support was not enabled via
1211    ///   [`crate::Config::guest_debug`].
1212    #[cfg(feature = "debug")]
1213    pub fn set_debug_handler(&mut self, handler: impl DebugHandler<Data = T>)
1214    where
1215        // We require `Send` here because the debug handler becomes
1216        // referenced from a future: when `DebugHandler::handle` is
1217        // invoked, its `self` references the `handler` with the
1218        // user's state. Note that we are careful to keep this bound
1219        // constrained to debug-handler-related code only and not
1220        // propagate it outward to the store in general. The presence
1221        // of the trait implementation serves as a witness that `T:
1222        // Send`. This is required in particular because we will have
1223        // a `&mut dyn VMStore` on the stack when we pause a fiber
1224        // with `block_on` to run a debugger hook; that `VMStore` must
1225        // be a `Store<T> where T: Send`.
1226        T: Send,
1227    {
1228        // Debug hooks rely on async support, so async entrypoints are required.
1229        self.inner.set_async_required(Asyncness::Yes);
1230
1231        assert!(
1232            self.engine().tunables().debug_guest,
1233            "debug hooks require guest debugging to be enabled"
1234        );
1235        self.inner.debug_handler = Some(Box::new(handler));
1236    }
1237
1238    /// Clear the debug handler on this store. If any existed, it will
1239    /// be dropped.
1240    #[cfg(feature = "debug")]
1241    pub fn clear_debug_handler(&mut self) {
1242        self.inner.debug_handler = None;
1243    }
1244
1245    /// Register a [`Module`] with this store's module registry for
1246    /// debugging, without instantiating it.
1247    ///
1248    /// This makes the module visible to debuggers (via
1249    /// `debug_all_modules`) before the module is actually
1250    /// instantiated. This is useful for guest-debug workflows where
1251    /// the debugger needs to see modules to set breakpoints before
1252    /// the first Wasm instruction executes.
1253    #[cfg(feature = "debug")]
1254    pub fn debug_register_module(&mut self, module: &crate::Module) -> crate::Result<()> {
1255        let (modules, engine, breakpoints) = self.inner.modules_and_engine_and_breakpoints_mut();
1256        modules.register_module(module, engine, breakpoints)?;
1257        Ok(())
1258    }
1259
1260    /// Register all inner modules of a [`Component`](crate::component::Component)
1261    /// with this store's module registry for debugging, without instantiating
1262    /// the component.
1263    #[cfg(all(feature = "debug", feature = "component-model"))]
1264    pub fn debug_register_component(
1265        &mut self,
1266        component: &crate::component::Component,
1267    ) -> crate::Result<()> {
1268        for module in component.static_modules() {
1269            self.debug_register_module(module)?;
1270        }
1271        Ok(())
1272    }
1273}
1274
1275impl<'a, T> StoreContext<'a, T> {
1276    /// Returns the underlying [`Engine`] this store is connected to.
1277    pub fn engine(&self) -> &Engine {
1278        self.0.engine()
1279    }
1280
1281    /// Access the underlying data owned by this `Store`.
1282    ///
1283    /// Same as [`Store::data`].
1284    pub fn data(&self) -> &'a T {
1285        self.0.data()
1286    }
1287
1288    /// Returns the remaining fuel in this store.
1289    ///
1290    /// For more information see [`Store::get_fuel`].
1291    pub fn get_fuel(&self) -> Result<u64> {
1292        self.0.get_fuel()
1293    }
1294}
1295
1296impl<'a, T> StoreContextMut<'a, T> {
1297    /// Access the underlying data owned by this `Store`.
1298    ///
1299    /// Same as [`Store::data`].
1300    pub fn data(&self) -> &T {
1301        self.0.data()
1302    }
1303
1304    /// Access the underlying data owned by this `Store`.
1305    ///
1306    /// Same as [`Store::data_mut`].
1307    pub fn data_mut(&mut self) -> &mut T {
1308        self.0.data_mut()
1309    }
1310
1311    /// Returns the underlying [`Engine`] this store is connected to.
1312    pub fn engine(&self) -> &Engine {
1313        self.0.engine()
1314    }
1315
1316    /// Returns remaining fuel in this store.
1317    ///
1318    /// For more information see [`Store::get_fuel`]
1319    pub fn get_fuel(&self) -> Result<u64> {
1320        self.0.get_fuel()
1321    }
1322
1323    /// Set the amount of fuel in this store.
1324    ///
1325    /// For more information see [`Store::set_fuel`]
1326    pub fn set_fuel(&mut self, fuel: u64) -> Result<()> {
1327        self.0.set_fuel(fuel)
1328    }
1329
1330    /// Configures this `Store` to periodically yield while executing futures.
1331    ///
1332    /// For more information see [`Store::fuel_async_yield_interval`]
1333    #[cfg(feature = "async")]
1334    pub fn fuel_async_yield_interval(&mut self, interval: Option<u64>) -> Result<()> {
1335        self.0.fuel_async_yield_interval(interval)
1336    }
1337
1338    /// Sets the epoch deadline to a certain number of ticks in the future.
1339    ///
1340    /// For more information see [`Store::set_epoch_deadline`].
1341    #[cfg(target_has_atomic = "64")]
1342    pub fn set_epoch_deadline(&mut self, ticks_beyond_current: u64) {
1343        self.0.set_epoch_deadline(ticks_beyond_current);
1344    }
1345
1346    /// Configures epoch-deadline expiration to trap.
1347    ///
1348    /// For more information see [`Store::epoch_deadline_trap`].
1349    #[cfg(target_has_atomic = "64")]
1350    pub fn epoch_deadline_trap(&mut self) {
1351        self.0.epoch_deadline_trap();
1352    }
1353
1354    /// Tests whether there is a pending exception.
1355    ///
1356    /// See [`Store::has_pending_exception`] for more details.
1357    pub fn has_pending_exception(&self) -> bool {
1358        self.0.inner.has_pending_exception()
1359    }
1360}
1361
1362impl<T> StoreInner<T> {
1363    #[inline]
1364    fn data(&self) -> &T {
1365        // We are actually just accessing `&self.data_no_provenance` but we must
1366        // do so with the `VMStoreContext::store_data` pointer's provenance. If
1367        // we did otherwise, i.e. directly accessed the field, we would
1368        // invalidate that pointer, which would in turn invalidate any direct
1369        // `T` accesses that Wasm code makes via unsafe intrinsics.
1370        let data: *const ManuallyDrop<T> = &raw const self.data_no_provenance;
1371        let provenance = self.inner.vm_store_context.store_data.as_ptr().cast::<T>();
1372        let ptr = provenance.with_addr(data.addr());
1373
1374        // SAFETY: The pointer is non-null, points to our `T` data, and is valid
1375        // to access because of our `&self` borrow.
1376        debug_assert_ne!(ptr, core::ptr::null_mut());
1377        debug_assert_eq!(ptr.addr(), (&raw const self.data_no_provenance).addr());
1378        unsafe { &*ptr }
1379    }
1380
1381    #[inline]
1382    fn data_limiter_and_opaque(
1383        &mut self,
1384    ) -> (
1385        &mut T,
1386        Option<&mut ResourceLimiterInner<T>>,
1387        &mut StoreOpaque,
1388    ) {
1389        // See the comments about provenance in `StoreInner::data` above.
1390        let data: *mut ManuallyDrop<T> = &raw mut self.data_no_provenance;
1391        let provenance = self.inner.vm_store_context.store_data.as_ptr().cast::<T>();
1392        let ptr = provenance.with_addr(data.addr());
1393
1394        // SAFETY: The pointer is non-null, points to our `T` data, and is valid
1395        // to access because of our `&mut self` borrow.
1396        debug_assert_ne!(ptr, core::ptr::null_mut());
1397        debug_assert_eq!(ptr.addr(), (&raw const self.data_no_provenance).addr());
1398        let data = unsafe { &mut *ptr };
1399
1400        let limiter = self.limiter.as_mut();
1401
1402        (data, limiter, &mut self.inner)
1403    }
1404
1405    #[inline]
1406    fn data_mut(&mut self) -> &mut T {
1407        self.data_limiter_and_opaque().0
1408    }
1409
1410    #[inline]
1411    pub fn call_hook(&mut self, s: CallHook) -> Result<()> {
1412        if self.inner.pkey.is_none() && self.call_hook.is_none() {
1413            Ok(())
1414        } else {
1415            self.call_hook_slow_path(s)
1416        }
1417    }
1418
1419    fn call_hook_slow_path(&mut self, s: CallHook) -> Result<()> {
1420        if let Some(pkey) = &self.inner.pkey {
1421            let allocator = self.engine().allocator();
1422            match s {
1423                CallHook::CallingWasm | CallHook::ReturningFromHost => {
1424                    allocator.restrict_to_pkey(*pkey)
1425                }
1426                CallHook::ReturningFromWasm | CallHook::CallingHost => allocator.allow_all_pkeys(),
1427            }
1428        }
1429
1430        // Temporarily take the configured behavior to avoid mutably borrowing
1431        // multiple times.
1432        if let Some(mut call_hook) = self.call_hook.take() {
1433            let result = self.invoke_call_hook(&mut call_hook, s);
1434            self.call_hook = Some(call_hook);
1435            return result;
1436        }
1437
1438        Ok(())
1439    }
1440
1441    fn invoke_call_hook(&mut self, call_hook: &mut CallHookInner<T>, s: CallHook) -> Result<()> {
1442        match call_hook {
1443            #[cfg(feature = "call-hook")]
1444            CallHookInner::Sync(hook) => hook((&mut *self).as_context_mut(), s),
1445
1446            #[cfg(all(feature = "async", feature = "call-hook"))]
1447            CallHookInner::Async(handler) => {
1448                if !self.can_block() {
1449                    bail!("couldn't grab async_cx for call hook")
1450                }
1451                return (&mut *self)
1452                    .as_context_mut()
1453                    .with_blocking(|store, cx| cx.block_on(handler.handle_call_event(store, s)))?;
1454            }
1455
1456            CallHookInner::ForceTypeParameterToBeUsed { uninhabited, .. } => {
1457                let _ = s;
1458                match *uninhabited {}
1459            }
1460        }
1461    }
1462
1463    #[cfg(not(feature = "async"))]
1464    fn flush_fiber_stack(&mut self) {
1465        // noop shim so code can assume this always exists.
1466    }
1467
1468    /// Splits this `StoreInner<T>` into a `limiter`/`StoreOpaque` borrow while
1469    /// validating that an async limiter is not configured.
1470    ///
1471    /// This is used for sync entrypoints which need to fail if an async limiter
1472    /// is configured as otherwise the async entrypoint must be used instead.
1473    pub(crate) fn validate_sync_resource_limiter_and_store_opaque(
1474        &mut self,
1475    ) -> Result<(Option<StoreResourceLimiter<'_>>, &mut StoreOpaque)> {
1476        let (limiter, store) = self.resource_limiter_and_store_opaque();
1477        if !matches!(limiter, None | Some(StoreResourceLimiter::Sync(_))) {
1478            bail!(
1479                "when using an async resource limiter `*_async` functions must \
1480             be used instead"
1481            );
1482        }
1483        Ok((limiter, store))
1484    }
1485}
1486
1487fn get_fuel(injected_fuel: i64, fuel_reserve: u64) -> u64 {
1488    fuel_reserve.saturating_add_signed(-injected_fuel)
1489}
1490
1491// Add remaining fuel from the reserve into the active fuel if there is any left.
1492fn refuel(
1493    injected_fuel: &mut i64,
1494    fuel_reserve: &mut u64,
1495    yield_interval: Option<NonZeroU64>,
1496) -> bool {
1497    let fuel = get_fuel(*injected_fuel, *fuel_reserve);
1498    if fuel > 0 {
1499        set_fuel(injected_fuel, fuel_reserve, yield_interval, fuel);
1500        true
1501    } else {
1502        false
1503    }
1504}
1505
1506fn set_fuel(
1507    injected_fuel: &mut i64,
1508    fuel_reserve: &mut u64,
1509    yield_interval: Option<NonZeroU64>,
1510    new_fuel_amount: u64,
1511) {
1512    let interval = yield_interval.unwrap_or(NonZeroU64::MAX).get();
1513    // If we're yielding periodically we only store the "active" amount of fuel into consumed_ptr
1514    // for the VM to use.
1515    let injected = core::cmp::min(interval, new_fuel_amount);
1516    // Fuel in the VM is stored as an i64, so we have to cap the amount of fuel we inject into the
1517    // VM at once to be i64 range.
1518    let injected = core::cmp::min(injected, i64::MAX as u64);
1519    // Add whatever is left over after injection to the reserve for later use.
1520    *fuel_reserve = new_fuel_amount - injected;
1521    // Within the VM we increment to count fuel, so inject a negative amount. The VM will halt when
1522    // this counter is positive.
1523    *injected_fuel = -(injected as i64);
1524}
1525
1526#[doc(hidden)]
1527impl StoreOpaque {
1528    pub fn id(&self) -> StoreId {
1529        self.store_data.id()
1530    }
1531
1532    pub fn bump_resource_counts(&mut self, module: &Module) -> Result<()> {
1533        fn bump(slot: &mut usize, max: usize, amt: usize, desc: &str) -> Result<()> {
1534            let new = slot.saturating_add(amt);
1535            if new > max {
1536                bail!("resource limit exceeded: {desc} count too high at {new}");
1537            }
1538            *slot = new;
1539            Ok(())
1540        }
1541
1542        let module = module.env_module();
1543        let memories = module.num_defined_memories();
1544        let tables = module.num_defined_tables();
1545
1546        bump(&mut self.instance_count, self.instance_limit, 1, "instance")?;
1547        bump(
1548            &mut self.memory_count,
1549            self.memory_limit,
1550            memories,
1551            "memory",
1552        )?;
1553        bump(&mut self.table_count, self.table_limit, tables, "table")?;
1554
1555        Ok(())
1556    }
1557
1558    #[inline]
1559    pub fn engine(&self) -> &Engine {
1560        &self.engine
1561    }
1562
1563    #[inline]
1564    pub fn store_data(&self) -> &StoreData {
1565        &self.store_data
1566    }
1567
1568    #[inline]
1569    pub fn store_data_mut(&mut self) -> &mut StoreData {
1570        &mut self.store_data
1571    }
1572
1573    pub fn store_data_mut_and_registry(&mut self) -> (&mut StoreData, &ModuleRegistry) {
1574        (&mut self.store_data, &self.modules)
1575    }
1576
1577    #[cfg(feature = "debug")]
1578    pub(crate) fn breakpoints_and_registry_mut(
1579        &mut self,
1580    ) -> (&mut BreakpointState, &mut ModuleRegistry) {
1581        (&mut self.breakpoints, &mut self.modules)
1582    }
1583
1584    #[cfg(feature = "debug")]
1585    pub(crate) fn breakpoints_and_registry(&self) -> (&BreakpointState, &ModuleRegistry) {
1586        (&self.breakpoints, &self.modules)
1587    }
1588
1589    #[cfg(feature = "debug")]
1590    pub(crate) fn frame_data_cache_mut_and_registry(
1591        &mut self,
1592    ) -> (&mut FrameDataCache, &ModuleRegistry) {
1593        (&mut self.frame_data_cache, &self.modules)
1594    }
1595
1596    #[inline]
1597    pub(crate) fn modules(&self) -> &ModuleRegistry {
1598        &self.modules
1599    }
1600
1601    #[inline]
1602    pub(crate) fn modules_and_engine_and_breakpoints_mut(
1603        &mut self,
1604    ) -> (&mut ModuleRegistry, &Engine, RegisterBreakpointState<'_>) {
1605        #[cfg(feature = "debug")]
1606        let breakpoints = RegisterBreakpointState(&self.breakpoints);
1607        #[cfg(not(feature = "debug"))]
1608        let breakpoints = RegisterBreakpointState(core::marker::PhantomData);
1609
1610        (&mut self.modules, &self.engine, breakpoints)
1611    }
1612
1613    pub(crate) fn func_refs_and_modules(&mut self) -> (&mut FuncRefs, &ModuleRegistry) {
1614        (&mut self.func_refs, &self.modules)
1615    }
1616
1617    pub(crate) fn host_globals(
1618        &self,
1619    ) -> &TryPrimaryMap<DefinedGlobalIndex, StoreBox<VMHostGlobalContext>> {
1620        &self.host_globals
1621    }
1622
1623    pub(crate) fn host_globals_mut(
1624        &mut self,
1625    ) -> &mut TryPrimaryMap<DefinedGlobalIndex, StoreBox<VMHostGlobalContext>> {
1626        &mut self.host_globals
1627    }
1628
1629    pub fn module_for_instance(&self, instance: StoreInstanceId) -> Option<&'_ Module> {
1630        instance.store_id().assert_belongs_to(self.id());
1631        match self.instances[instance.instance()].kind {
1632            StoreInstanceKind::Dummy => None,
1633            StoreInstanceKind::Real { module_id } => {
1634                let module = self
1635                    .modules()
1636                    .module_by_id(module_id)
1637                    .expect("should always have a registered module for real instances");
1638                Some(module)
1639            }
1640        }
1641    }
1642
1643    /// Accessor from `InstanceId` to `&vm::Instance`.
1644    ///
1645    /// Note that if you have a `StoreInstanceId` you should use
1646    /// `StoreInstanceId::get` instead. This assumes that `id` has been
1647    /// validated to already belong to this store.
1648    #[inline]
1649    pub fn instance(&self, id: InstanceId) -> &vm::Instance {
1650        self.instances[id].handle.get()
1651    }
1652
1653    /// Accessor from `InstanceId` to `Pin<&mut vm::Instance>`.
1654    ///
1655    /// Note that if you have a `StoreInstanceId` you should use
1656    /// `StoreInstanceId::get_mut` instead. This assumes that `id` has been
1657    /// validated to already belong to this store.
1658    #[inline]
1659    pub fn instance_mut(&mut self, id: InstanceId) -> Pin<&mut vm::Instance> {
1660        self.instances[id].handle.get_mut()
1661    }
1662
1663    /// Accessor from `InstanceId` to both `Pin<&mut vm::Instance>`
1664    /// and `&ModuleRegistry`.
1665    #[inline]
1666    pub fn instance_and_module_registry_mut(
1667        &mut self,
1668        id: InstanceId,
1669    ) -> (Pin<&mut vm::Instance>, &ModuleRegistry) {
1670        (self.instances[id].handle.get_mut(), &self.modules)
1671    }
1672
1673    /// Access multiple instances specified via `ids`.
1674    ///
1675    /// # Panics
1676    ///
1677    /// This method will panic if any indices in `ids` overlap.
1678    ///
1679    /// # Safety
1680    ///
1681    /// This method is not safe if the returned instances are used to traverse
1682    /// "laterally" between other instances. For example accessing imported
1683    /// items in an instance may traverse laterally to a sibling instance thus
1684    /// aliasing a returned value here. The caller must ensure that only defined
1685    /// items within the instances themselves are accessed.
1686    #[inline]
1687    pub unsafe fn optional_gc_store_and_instances_mut<const N: usize>(
1688        &mut self,
1689        ids: [InstanceId; N],
1690    ) -> (Option<&mut GcStore>, [Pin<&mut vm::Instance>; N]) {
1691        let instances = self
1692            .instances
1693            .get_disjoint_mut(ids)
1694            .unwrap()
1695            .map(|h| h.handle.get_mut());
1696        (self.gc_store.as_mut(), instances)
1697    }
1698
1699    /// Pair of `Self::optional_gc_store_mut` and `Self::instance_mut`
1700    pub fn optional_gc_store_and_instance_mut(
1701        &mut self,
1702        id: InstanceId,
1703    ) -> (Option<&mut GcStore>, Pin<&mut vm::Instance>) {
1704        (self.gc_store.as_mut(), self.instances[id].handle.get_mut())
1705    }
1706
1707    /// Tuple of `Self::optional_gc_store_mut`, `Self::modules`, and
1708    /// `Self::instance_mut`.
1709    pub fn optional_gc_store_and_registry_and_instance_mut(
1710        &mut self,
1711        id: InstanceId,
1712    ) -> (
1713        Option<&mut GcStore>,
1714        &ModuleRegistry,
1715        Pin<&mut vm::Instance>,
1716    ) {
1717        (
1718            self.gc_store.as_mut(),
1719            &self.modules,
1720            self.instances[id].handle.get_mut(),
1721        )
1722    }
1723
1724    /// Get all instances (ignoring dummy instances) within this store.
1725    pub fn all_instances<'a>(&'a mut self) -> impl ExactSizeIterator<Item = Instance> + 'a {
1726        let instances = self
1727            .instances
1728            .iter()
1729            .filter_map(|(id, inst)| {
1730                if let StoreInstanceKind::Dummy = inst.kind {
1731                    None
1732                } else {
1733                    Some(id)
1734                }
1735            })
1736            .collect::<Vec<_>>();
1737        instances
1738            .into_iter()
1739            .map(|i| Instance::from_wasmtime(i, self))
1740    }
1741
1742    /// Get all memories (host- or Wasm-defined) within this store.
1743    pub fn all_memories<'a>(&'a self) -> impl Iterator<Item = ExportMemory> + 'a {
1744        // NB: Host-created memories have dummy instances. Therefore, we can get
1745        // all memories in the store by iterating over all instances (including
1746        // dummy instances) and getting each of their defined memories.
1747        let id = self.id();
1748        self.instances
1749            .iter()
1750            .flat_map(move |(_, instance)| instance.handle.get().defined_memories(id))
1751    }
1752
1753    /// Iterate over all tables (host- or Wasm-defined) within this store.
1754    pub fn for_each_table(&mut self, mut f: impl FnMut(&mut Self, Table)) {
1755        // NB: Host-created tables have dummy instances. Therefore, we can get
1756        // all tables in the store by iterating over all instances (including
1757        // dummy instances) and getting each of their defined memories.
1758        for id in self.instances.keys() {
1759            let instance = StoreInstanceId::new(self.id(), id);
1760            for table in 0..self.instance(id).env_module().num_defined_tables() {
1761                let table = DefinedTableIndex::new(table);
1762                f(self, Table::from_raw(instance, table));
1763            }
1764        }
1765    }
1766
1767    /// Iterate over all globals (host- or Wasm-defined) within this store.
1768    pub fn for_each_global(&mut self, mut f: impl FnMut(&mut Self, Global)) {
1769        // First enumerate all the host-created globals.
1770        for global in self.host_globals.keys() {
1771            let global = Global::new_host(self, global);
1772            f(self, global);
1773        }
1774
1775        // Then enumerate all instances' defined globals.
1776        for id in self.instances.keys() {
1777            for index in 0..self.instance(id).env_module().num_defined_globals() {
1778                let index = DefinedGlobalIndex::new(index);
1779                let global = Global::new_instance(self, id, index);
1780                f(self, global);
1781            }
1782        }
1783    }
1784
1785    #[cfg(all(feature = "std", any(unix, windows)))]
1786    pub fn set_signal_handler(&mut self, handler: Option<SignalHandler>) {
1787        self.signal_handler = handler;
1788    }
1789
1790    #[inline]
1791    pub fn vm_store_context(&self) -> &VMStoreContext {
1792        &self.vm_store_context
1793    }
1794
1795    #[inline]
1796    pub fn vm_store_context_mut(&mut self) -> &mut VMStoreContext {
1797        &mut self.vm_store_context
1798    }
1799
1800    /// Performs a lazy allocation of the `GcStore` within this store, returning
1801    /// the previous allocation if it's already present.
1802    ///
1803    /// This method will, if necessary, allocate a new `GcStore` -- linear
1804    /// memory and all. This is a blocking operation due to
1805    /// `ResourceLimiterAsync` which means that this should only be executed
1806    /// in a fiber context at this time.
1807    #[inline]
1808    pub(crate) async fn ensure_gc_store(
1809        &mut self,
1810        limiter: Option<&mut StoreResourceLimiter<'_>>,
1811    ) -> Result<&mut GcStore> {
1812        if self.gc_store.is_some() {
1813            return Ok(self.gc_store.as_mut().unwrap());
1814        }
1815        self.allocate_gc_store(limiter).await
1816    }
1817
1818    #[inline(never)]
1819    async fn allocate_gc_store(
1820        &mut self,
1821        limiter: Option<&mut StoreResourceLimiter<'_>>,
1822    ) -> Result<&mut GcStore> {
1823        log::trace!("allocating GC heap for store {:?}", self.id());
1824
1825        assert!(self.gc_store.is_none());
1826        assert_eq!(
1827            self.vm_store_context.gc_heap.base.as_non_null(),
1828            NonNull::dangling(),
1829        );
1830        assert_eq!(self.vm_store_context.gc_heap.current_length(), 0);
1831
1832        let gc_store = allocate_gc_store(self, limiter).await?;
1833        self.vm_store_context.gc_heap = gc_store.vmmemory_definition();
1834        return Ok(self.gc_store.insert(gc_store));
1835
1836        #[cfg(feature = "gc")]
1837        async fn allocate_gc_store(
1838            store: &mut StoreOpaque,
1839            limiter: Option<&mut StoreResourceLimiter<'_>>,
1840        ) -> Result<GcStore> {
1841            use wasmtime_environ::packed_option::ReservedValue;
1842
1843            let engine = store.engine();
1844            let mem_ty = engine.tunables().gc_heap_memory_type();
1845            ensure!(
1846                engine.features().gc_types(),
1847                "cannot allocate a GC store when GC is disabled at configuration time"
1848            );
1849
1850            // First, allocate the memory that will be our GC heap's storage.
1851            let mut request = InstanceAllocationRequest {
1852                id: InstanceId::reserved_value(),
1853                runtime_info: engine.empty_module_runtime_info(),
1854                imports: vm::Imports::default(),
1855                store,
1856                limiter,
1857            };
1858
1859            let (mem_alloc_index, mem) = engine
1860                .allocator()
1861                .allocate_memory(
1862                    &mut request,
1863                    &mem_ty,
1864                    None,
1865                    wasmtime_environ::MemoryKind::GcHeap,
1866                )
1867                .await?;
1868
1869            // Then, allocate the actual GC heap, passing in that memory
1870            // storage.
1871            let gc_runtime = engine
1872                .gc_runtime()
1873                .context("no GC runtime: GC disabled at compile time or configuration time")?;
1874            let (index, heap) =
1875                engine
1876                    .allocator()
1877                    .allocate_gc_heap(engine, &**gc_runtime, mem_alloc_index, mem)?;
1878
1879            let mut gc_store = GcStore::new(index, heap, engine.tunables().gc_zeal_alloc_counter);
1880
1881            // Eagerly register trace info for any host-created types (via
1882            // StructRefPre/ArrayRefPre) that were created before this GC
1883            // store was allocated.
1884            for ty in &store.gc_host_alloc_types {
1885                gc_store.ensure_trace_info(ty.index());
1886            }
1887
1888            Ok(gc_store)
1889        }
1890
1891        #[cfg(not(feature = "gc"))]
1892        async fn allocate_gc_store(
1893            _: &mut StoreOpaque,
1894            _: Option<&mut StoreResourceLimiter<'_>>,
1895        ) -> Result<GcStore> {
1896            bail!("cannot allocate a GC store: the `gc` feature was disabled at compile time")
1897        }
1898    }
1899
1900    /// Attempts to access the GC store that has been previously allocated.
1901    ///
1902    /// This method will return `Some` if the GC store was previously allocated.
1903    /// A `None` return value means either that the GC heap hasn't yet been
1904    /// allocated or that it does not need to be allocated for this store. Note
1905    /// that to require a GC store in a particular situation it's recommended to
1906    /// use [`Self::require_gc_store_mut`] instead.
1907    #[inline]
1908    pub(crate) fn optional_gc_store_mut(&mut self) -> Option<&mut GcStore> {
1909        if cfg!(not(feature = "gc")) || !self.engine.features().gc_types() {
1910            debug_assert!(self.gc_store.is_none());
1911            None
1912        } else {
1913            self.gc_store.as_mut()
1914        }
1915    }
1916
1917    /// Helper to assert that a GC store was previously allocated and is
1918    /// present.
1919    ///
1920    /// # Panics
1921    ///
1922    /// This method will panic if the GC store has not yet been allocated. This
1923    /// should only be used in a context where there's an existing GC reference,
1924    /// for example, or if `ensure_gc_store` has already been called.
1925    #[inline]
1926    #[track_caller]
1927    pub(crate) fn unwrap_gc_store(&self) -> &GcStore {
1928        self.gc_store
1929            .as_ref()
1930            .expect("attempted to access the store's GC heap before it has been allocated")
1931    }
1932
1933    /// Same as [`Self::unwrap_gc_store`], but mutable.
1934    #[inline]
1935    #[track_caller]
1936    pub(crate) fn unwrap_gc_store_mut(&mut self) -> &mut GcStore {
1937        self.gc_store
1938            .as_mut()
1939            .expect("attempted to access the store's GC heap before it has been allocated")
1940    }
1941
1942    /// Returns a mutable reference to the GC store if it has been allocated.
1943    #[inline]
1944    #[cfg(any(feature = "gc-drc", feature = "gc-copying"))]
1945    pub(crate) fn try_gc_store_mut(&mut self) -> Option<&mut GcStore> {
1946        self.gc_store.as_mut()
1947    }
1948
1949    #[inline]
1950    pub(crate) fn gc_roots(&self) -> &RootSet {
1951        &self.gc_roots
1952    }
1953
1954    #[inline]
1955    #[cfg(feature = "gc")]
1956    pub(crate) fn gc_roots_mut(&mut self) -> &mut RootSet {
1957        &mut self.gc_roots
1958    }
1959
1960    #[inline]
1961    pub(crate) fn exit_gc_lifo_scope(&mut self, scope: usize) {
1962        self.gc_roots.exit_lifo_scope(self.gc_store.as_mut(), scope);
1963    }
1964
1965    /// Helper function execute a `init_gc_ref` when placing `gc_ref` in `dest`.
1966    ///
1967    /// This avoids allocating `GcStore` where possible.
1968    pub(crate) fn init_gc_ref(
1969        &mut self,
1970        dest: &mut MaybeUninit<Option<VMGcRef>>,
1971        gc_ref: Option<&VMGcRef>,
1972    ) {
1973        if GcStore::needs_init_barrier(gc_ref) {
1974            self.unwrap_gc_store_mut().init_gc_ref(dest, gc_ref)
1975        } else {
1976            dest.write(gc_ref.map(|r| r.copy_i31()));
1977        }
1978    }
1979
1980    /// Helper function execute a write barrier when placing `gc_ref` in `dest`.
1981    ///
1982    /// This avoids allocating `GcStore` where possible.
1983    pub(crate) fn write_gc_ref(&mut self, dest: &mut Option<VMGcRef>, gc_ref: Option<&VMGcRef>) {
1984        GcStore::write_gc_ref_optional_store(self.optional_gc_store_mut(), dest, gc_ref)
1985    }
1986
1987    /// Helper function to clone `gc_ref` notably avoiding allocating a
1988    /// `GcStore` where possible.
1989    pub(crate) fn clone_gc_ref(&mut self, gc_ref: &VMGcRef) -> VMGcRef {
1990        if gc_ref.is_i31() {
1991            gc_ref.copy_i31()
1992        } else {
1993            self.unwrap_gc_store_mut().clone_gc_ref(gc_ref)
1994        }
1995    }
1996
1997    pub fn get_fuel(&self) -> Result<u64> {
1998        crate::ensure!(
1999            self.engine().tunables().consume_fuel,
2000            "fuel is not configured in this store"
2001        );
2002        let injected_fuel = unsafe { *self.vm_store_context.fuel_consumed.get() };
2003        Ok(get_fuel(injected_fuel, self.fuel_reserve))
2004    }
2005
2006    pub(crate) fn refuel(&mut self) -> bool {
2007        let injected_fuel = unsafe { &mut *self.vm_store_context.fuel_consumed.get() };
2008        refuel(
2009            injected_fuel,
2010            &mut self.fuel_reserve,
2011            self.fuel_yield_interval,
2012        )
2013    }
2014
2015    pub fn set_fuel(&mut self, fuel: u64) -> Result<()> {
2016        crate::ensure!(
2017            self.engine().tunables().consume_fuel,
2018            "fuel is not configured in this store"
2019        );
2020        let injected_fuel = unsafe { &mut *self.vm_store_context.fuel_consumed.get() };
2021        set_fuel(
2022            injected_fuel,
2023            &mut self.fuel_reserve,
2024            self.fuel_yield_interval,
2025            fuel,
2026        );
2027        Ok(())
2028    }
2029
2030    #[cfg(feature = "async")]
2031    pub fn fuel_async_yield_interval(&mut self, interval: Option<u64>) -> Result<()> {
2032        crate::ensure!(
2033            self.engine().tunables().consume_fuel,
2034            "fuel is not configured in this store"
2035        );
2036        crate::ensure!(
2037            interval != Some(0),
2038            "fuel_async_yield_interval must not be 0"
2039        );
2040
2041        // All future entrypoints must be async to handle the case that fuel
2042        // runs out and an async yield is needed.
2043        self.set_async_required(Asyncness::Yes);
2044
2045        self.fuel_yield_interval = interval.and_then(|i| NonZeroU64::new(i));
2046        // Reset the fuel active + reserve states by resetting the amount.
2047        self.set_fuel(self.get_fuel()?)
2048    }
2049
2050    #[inline]
2051    pub fn signal_handler(&self) -> Option<*const SignalHandler> {
2052        let handler = self.signal_handler.as_ref()?;
2053        Some(handler)
2054    }
2055
2056    #[inline]
2057    pub fn vm_store_context_ptr(&self) -> NonNull<VMStoreContext> {
2058        NonNull::from(&self.vm_store_context)
2059    }
2060
2061    #[inline]
2062    pub fn default_caller(&self) -> NonNull<VMContext> {
2063        self.default_caller_vmctx.as_non_null()
2064    }
2065
2066    #[inline]
2067    pub fn traitobj(&self) -> NonNull<dyn VMStore> {
2068        self.traitobj.0.unwrap()
2069    }
2070
2071    /// Takes the cached `Vec<Val>` stored internally across hostcalls to get
2072    /// used as part of calling the host in a `Func::new` method invocation.
2073    #[inline]
2074    pub fn take_hostcall_val_storage(&mut self) -> Vec<Val> {
2075        mem::take(&mut self.hostcall_val_storage)
2076    }
2077
2078    /// Restores the vector previously taken by `take_hostcall_val_storage`
2079    /// above back into the store, allowing it to be used in the future for the
2080    /// next wasm->host call.
2081    #[inline]
2082    pub fn save_hostcall_val_storage(&mut self, storage: Vec<Val>) {
2083        if storage.capacity() > self.hostcall_val_storage.capacity() {
2084            self.hostcall_val_storage = storage;
2085        }
2086    }
2087
2088    /// Same as `take_hostcall_val_storage`, but for the direction of the host
2089    /// calling wasm.
2090    #[inline]
2091    pub fn take_wasm_val_raw_storage(&mut self) -> TryVec<ValRaw> {
2092        mem::take(&mut self.wasm_val_raw_storage)
2093    }
2094
2095    /// Same as `save_hostcall_val_storage`, but for the direction of the host
2096    /// calling wasm.
2097    #[inline]
2098    pub fn save_wasm_val_raw_storage(&mut self, storage: TryVec<ValRaw>) {
2099        if storage.capacity() > self.wasm_val_raw_storage.capacity() {
2100            self.wasm_val_raw_storage = storage;
2101        }
2102    }
2103
2104    /// Translates a WebAssembly fault at the native `pc` and native `addr` to a
2105    /// WebAssembly-relative fault.
2106    ///
2107    /// This function may abort the process if `addr` is not found to actually
2108    /// reside in any linear memory. In such a situation it means that the
2109    /// segfault was erroneously caught by Wasmtime and is possibly indicative
2110    /// of a code generator bug.
2111    ///
2112    /// This function returns `None` for dynamically-bounds-checked-memories
2113    /// with spectre mitigations enabled since the hardware fault address is
2114    /// always zero in these situations which means that the trapping context
2115    /// doesn't have enough information to report the fault address.
2116    pub(crate) fn wasm_fault(&self, pc: usize, addr: usize) -> Option<vm::WasmFault> {
2117        // There are a few instances where a "close to zero" pointer is loaded
2118        // and we expect that to happen:
2119        //
2120        // * Explicitly bounds-checked memories with spectre-guards enabled will
2121        //   cause out-of-bounds accesses to get routed to address 0, so allow
2122        //   wasm instructions to fault on the null address.
2123        // * `call_indirect` when invoking a null function pointer may load data
2124        //   from the a `VMFuncRef` whose address is null, meaning any field of
2125        //   `VMFuncRef` could be the address of the fault.
2126        //
2127        // In these situations where the address is so small it won't be in any
2128        // instance, so skip the checks below.
2129        if addr <= mem::size_of::<VMFuncRef>() {
2130            const _: () = {
2131                // static-assert that `VMFuncRef` isn't too big to ensure that
2132                // it lives solely within the first page as we currently only
2133                // have the guarantee that the first page of memory is unmapped,
2134                // no more.
2135                assert!(mem::size_of::<VMFuncRef>() <= 512);
2136            };
2137            return None;
2138        }
2139
2140        // Search all known instances in this store for this address. Note that
2141        // this is probably not the speediest way to do this. Traps, however,
2142        // are generally not expected to be super fast and additionally stores
2143        // probably don't have all that many instances or memories.
2144        //
2145        // If this loop becomes hot in the future, however, it should be
2146        // possible to precompute maps about linear memories in a store and have
2147        // a quicker lookup.
2148        let mut fault = None;
2149        for (_, instance) in self.instances.iter() {
2150            if let Some(f) = instance.handle.get().wasm_fault(addr) {
2151                assert!(fault.is_none());
2152                fault = Some(f);
2153            }
2154        }
2155        if fault.is_some() {
2156            return fault;
2157        }
2158
2159        cfg_if::cfg_if! {
2160            if #[cfg(feature = "std")] {
2161                // With the standard library a rich error can be printed here
2162                // to stderr and the native abort path is used.
2163                eprintln!(
2164                    "\
2165Wasmtime caught a segfault for a wasm program because the faulting instruction
2166is allowed to segfault due to how linear memories are implemented. The address
2167that was accessed, however, is not known to any linear memory in use within this
2168Store. This may be indicative of a critical bug in Wasmtime's code generation
2169because all addresses which are known to be reachable from wasm won't reach this
2170message.
2171
2172    pc:      0x{pc:x}
2173    address: 0x{addr:x}
2174
2175This is a possible security issue because WebAssembly has accessed something it
2176shouldn't have been able to. Other accesses may have succeeded and this one just
2177happened to be caught. The process will now be aborted to prevent this damage
2178from going any further and to alert what's going on. If this is a security
2179issue please reach out to the Wasmtime team via its security policy
2180at https://bytecodealliance.org/security.
2181"
2182                );
2183                std::process::abort();
2184            } else if #[cfg(panic = "abort")] {
2185                // Without the standard library but with `panic=abort` then
2186                // it's safe to panic as that's known to halt execution. For
2187                // now avoid the above error message as well since without
2188                // `std` it's probably best to be a bit more size-conscious.
2189                let _ = pc;
2190                panic!("invalid fault");
2191            } else {
2192                // Without `std` and with `panic = "unwind"` there's no
2193                // dedicated API to abort the process portably, so manufacture
2194                // this with a double-panic.
2195                let _ = pc;
2196
2197                struct PanicAgainOnDrop;
2198
2199                impl Drop for PanicAgainOnDrop {
2200                    fn drop(&mut self) {
2201                        panic!("panicking again to trigger a process abort");
2202                    }
2203
2204                }
2205
2206                let _bomb = PanicAgainOnDrop;
2207
2208                panic!("invalid fault");
2209            }
2210        }
2211    }
2212
2213    /// Retrieve the store's protection key.
2214    #[inline]
2215    #[cfg(feature = "pooling-allocator")]
2216    pub(crate) fn get_pkey(&self) -> Option<ProtectionKey> {
2217        self.pkey
2218    }
2219
2220    #[cfg(feature = "async")]
2221    pub(crate) fn fiber_async_state_mut(&mut self) -> &mut fiber::AsyncState {
2222        &mut self.async_state
2223    }
2224
2225    #[cfg(feature = "async")]
2226    pub(crate) fn has_pkey(&self) -> bool {
2227        self.pkey.is_some()
2228    }
2229
2230    pub(crate) fn executor(&mut self) -> ExecutorRef<'_> {
2231        match &mut self.executor {
2232            Executor::Interpreter(i) => ExecutorRef::Interpreter(i.as_interpreter_ref()),
2233            #[cfg(has_host_compiler_backend)]
2234            Executor::Native => ExecutorRef::Native,
2235        }
2236    }
2237
2238    #[cfg(feature = "async")]
2239    pub(crate) fn swap_executor(&mut self, executor: &mut Executor) {
2240        mem::swap(&mut self.executor, executor);
2241    }
2242
2243    pub(crate) fn unwinder(&self) -> &'static dyn Unwind {
2244        match &self.executor {
2245            Executor::Interpreter(i) => i.unwinder(),
2246            #[cfg(has_host_compiler_backend)]
2247            Executor::Native => &vm::UnwindHost,
2248        }
2249    }
2250
2251    /// Allocates a new continuation. Note that we currently don't support
2252    /// deallocating them. Instead, all continuations remain allocated
2253    /// throughout the store's lifetime.
2254    #[cfg(feature = "stack-switching")]
2255    pub fn allocate_continuation(&mut self) -> Result<*mut VMContRef> {
2256        // FIXME(frank-emrich) Do we need to pin this?
2257        let mut continuation = Box::new(VMContRef::empty());
2258        let stack_size = self.engine.config().async_stack_size;
2259        let stack = crate::vm::VMContinuationStack::new(stack_size)?;
2260        continuation.stack = stack;
2261        let ptr = continuation.deref_mut() as *mut VMContRef;
2262        self.continuations.push(continuation);
2263        Ok(ptr)
2264    }
2265
2266    /// Constructs and executes an `InstanceAllocationRequest` and pushes the
2267    /// returned instance into the store.
2268    ///
2269    /// This is a helper method for invoking
2270    /// `InstanceAllocator::allocate_module` with the appropriate parameters
2271    /// from this store's own configuration. The `kind` provided is used to
2272    /// distinguish between "real" modules and dummy ones that are synthesized
2273    /// for embedder-created memories, globals, tables, etc. The `kind` will
2274    /// also use a different instance allocator by default, the one passed in,
2275    /// rather than the engine's default allocator.
2276    ///
2277    /// This method will push the instance within `StoreOpaque` onto the
2278    /// `instances` array and return the `InstanceId` which can be use to look
2279    /// it up within the store.
2280    ///
2281    /// # Safety
2282    ///
2283    /// The `imports` provided must be correctly sized/typed for the module
2284    /// being allocated.
2285    pub(crate) async unsafe fn allocate_instance(
2286        &mut self,
2287        limiter: Option<&mut StoreResourceLimiter<'_>>,
2288        kind: AllocateInstanceKind<'_>,
2289        runtime_info: &ModuleRuntimeInfo,
2290        imports: Imports<'_>,
2291    ) -> Result<InstanceId> {
2292        self.instances.reserve(1)?;
2293
2294        let id = self.instances.next_key();
2295
2296        let allocator = match kind {
2297            AllocateInstanceKind::Module(_) => self.engine().allocator(),
2298            AllocateInstanceKind::Dummy { allocator } => allocator,
2299        };
2300        // SAFETY: this function's own contract is the same as
2301        // `allocate_module`, namely the imports provided are valid.
2302        let handle = unsafe {
2303            allocator
2304                .allocate_module(InstanceAllocationRequest {
2305                    id,
2306                    runtime_info,
2307                    imports,
2308                    store: self,
2309                    limiter,
2310                })
2311                .await?
2312        };
2313
2314        let actual = match kind {
2315            AllocateInstanceKind::Module(module_id) => {
2316                log::trace!(
2317                    "Adding instance to store: store={:?}, module={module_id:?}, instance={id:?}",
2318                    self.id()
2319                );
2320                self.instances
2321                    .push(StoreInstance {
2322                        handle,
2323                        kind: StoreInstanceKind::Real { module_id },
2324                    })
2325                    .expect("capacity was reserved above")
2326            }
2327            AllocateInstanceKind::Dummy { .. } => {
2328                log::trace!(
2329                    "Adding dummy instance to store: store={:?}, instance={id:?}",
2330                    self.id()
2331                );
2332                self.instances
2333                    .push(StoreInstance {
2334                        handle,
2335                        kind: StoreInstanceKind::Dummy,
2336                    })
2337                    .expect("capacity was reserved above")
2338            }
2339        };
2340
2341        // double-check we didn't accidentally allocate two instances and our
2342        // prediction of what the id would be is indeed the id it should be.
2343        assert_eq!(id, actual);
2344
2345        Ok(id)
2346    }
2347
2348    /// Tests whether there is a pending exception.
2349    pub fn has_pending_exception(&self) -> bool {
2350        #[cfg(feature = "gc")]
2351        {
2352            self.pending_exception.is_some()
2353        }
2354        #[cfg(not(feature = "gc"))]
2355        {
2356            false
2357        }
2358    }
2359
2360    #[cfg(target_has_atomic = "64")]
2361    pub(crate) fn set_epoch_deadline(&mut self, delta: u64) {
2362        // Set a new deadline based on the "epoch deadline delta".
2363        //
2364        // Also, note that when this update is performed while Wasm is
2365        // on the stack, the Wasm will reload the new value once we
2366        // return into it.
2367        let current_epoch = self.engine().current_epoch();
2368        let epoch_deadline = self.vm_store_context.epoch_deadline.get_mut();
2369        *epoch_deadline = current_epoch + delta;
2370    }
2371
2372    pub(crate) fn get_epoch_deadline(&mut self) -> u64 {
2373        *self.vm_store_context.epoch_deadline.get_mut()
2374    }
2375
2376    #[inline]
2377    pub(crate) fn validate_sync_call(&self) -> Result<()> {
2378        #[cfg(feature = "async")]
2379        if self.async_state.async_required {
2380            bail!("store configuration requires that `*_async` functions are used instead");
2381        }
2382        Ok(())
2383    }
2384
2385    /// Returns whether this store is presently on a fiber and is allowed to
2386    /// block via `block_on` with fibers.
2387    pub(crate) fn can_block(&mut self) -> bool {
2388        #[cfg(feature = "async")]
2389        if true {
2390            return self.fiber_async_state_mut().can_block();
2391        }
2392
2393        false
2394    }
2395
2396    #[cfg(not(feature = "async"))]
2397    pub(crate) fn set_async_required(&mut self, asyncness: Asyncness) {
2398        match asyncness {
2399            Asyncness::No => {}
2400        }
2401    }
2402
2403    #[cfg(any(feature = "async", feature = "gc"))]
2404    pub(crate) async fn yield_now(&self) {
2405        // TODO: Once `Config` has an optional `AsyncFn` field for yielding to the
2406        // current async runtime (e.g. `tokio::task::yield_now`), use that if set;
2407        // otherwise fall back to the runtime-agnostic code.
2408        yield_now().await
2409    }
2410}
2411
2412#[cfg(any(feature = "async", feature = "gc"))]
2413async fn yield_now() {
2414    let mut yielded = false;
2415    future::poll_fn(move |cx| {
2416        if yielded {
2417            Poll::Ready(())
2418        } else {
2419            yielded = true;
2420            cx.waker().wake_by_ref();
2421            Poll::Pending
2422        }
2423    })
2424    .await;
2425}
2426
2427/// Helper parameter to [`StoreOpaque::allocate_instance`].
2428pub(crate) enum AllocateInstanceKind<'a> {
2429    /// An embedder-provided module is being allocated meaning that the default
2430    /// engine's allocator will be used.
2431    Module(RegisteredModuleId),
2432
2433    /// Add a dummy instance that to the store.
2434    ///
2435    /// These are instances that are just implementation details of something
2436    /// else (e.g. host-created memories that are not actually defined in any
2437    /// Wasm module) and therefore shouldn't show up in things like core dumps.
2438    ///
2439    /// A custom, typically OnDemand-flavored, allocator is provided to execute
2440    /// the allocation.
2441    Dummy {
2442        allocator: &'a dyn InstanceAllocator,
2443    },
2444}
2445
2446unsafe impl<T> VMStore for StoreInner<T> {
2447    #[cfg(feature = "component-model-async")]
2448    fn component_async_store(
2449        &mut self,
2450    ) -> &mut dyn crate::runtime::component::VMComponentAsyncStore {
2451        self
2452    }
2453
2454    #[cfg(feature = "component-model")]
2455    fn component_task_state_mut(&mut self) -> &mut crate::component::store::ComponentTaskState {
2456        StoreOpaque::component_task_state_mut(self)
2457    }
2458
2459    fn store_opaque(&self) -> &StoreOpaque {
2460        &self.inner
2461    }
2462
2463    fn store_opaque_mut(&mut self) -> &mut StoreOpaque {
2464        &mut self.inner
2465    }
2466
2467    fn resource_limiter_and_store_opaque(
2468        &mut self,
2469    ) -> (Option<StoreResourceLimiter<'_>>, &mut StoreOpaque) {
2470        let (data, limiter, opaque) = self.data_limiter_and_opaque();
2471
2472        let limiter = limiter.map(|l| match l {
2473            ResourceLimiterInner::Sync(s) => StoreResourceLimiter::Sync(s(data)),
2474            #[cfg(feature = "async")]
2475            ResourceLimiterInner::Async(s) => StoreResourceLimiter::Async(s(data)),
2476        });
2477
2478        (limiter, opaque)
2479    }
2480
2481    #[cfg(target_has_atomic = "64")]
2482    fn new_epoch_updated_deadline(&mut self) -> Result<UpdateDeadline> {
2483        // Temporarily take the configured behavior to avoid mutably borrowing
2484        // multiple times.
2485        let mut behavior = self.epoch_deadline_behavior.take();
2486        let update = match &mut behavior {
2487            Some(callback) => callback((&mut *self).as_context_mut()),
2488            None => Ok(UpdateDeadline::Interrupt),
2489        };
2490
2491        // Put back the original behavior which was replaced by `take`.
2492        self.epoch_deadline_behavior = behavior;
2493        update
2494    }
2495
2496    #[cfg(feature = "debug")]
2497    fn block_on_debug_handler(&mut self, event: crate::DebugEvent<'_>) -> crate::Result<()> {
2498        if let Some(handler) = self.debug_handler.take() {
2499            if !self.can_block() {
2500                bail!("could not invoke debug handler without async context");
2501            }
2502            log::trace!("about to raise debug event {event:?}");
2503            StoreContextMut(self).with_blocking(|store, cx| {
2504                cx.block_on(Pin::from(handler.handle(store, event)).as_mut())
2505            })
2506        } else {
2507            Ok(())
2508        }
2509    }
2510}
2511
2512impl<T> StoreInner<T> {
2513    #[cfg(target_has_atomic = "64")]
2514    fn epoch_deadline_trap(&mut self) {
2515        self.epoch_deadline_behavior = None;
2516    }
2517
2518    #[cfg(target_has_atomic = "64")]
2519    fn epoch_deadline_callback(
2520        &mut self,
2521        callback: Box<dyn FnMut(StoreContextMut<T>) -> Result<UpdateDeadline> + Send + Sync>,
2522    ) {
2523        self.epoch_deadline_behavior = Some(callback);
2524    }
2525}
2526
2527impl<T: Default> Default for Store<T> {
2528    fn default() -> Store<T> {
2529        Store::new(&Engine::default(), T::default())
2530    }
2531}
2532
2533impl<T: fmt::Debug> fmt::Debug for Store<T> {
2534    fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
2535        let inner = &**self.inner as *const StoreInner<T>;
2536        f.debug_struct("Store")
2537            .field("inner", &inner)
2538            .field("data", self.inner.data())
2539            .finish()
2540    }
2541}
2542
2543impl<T> Drop for Store<T> {
2544    fn drop(&mut self) {
2545        self.run_manual_drop_routines();
2546
2547        // For documentation on this `unsafe`, see `into_data`.
2548        unsafe {
2549            ManuallyDrop::drop(&mut self.inner.data_no_provenance);
2550            ManuallyDrop::drop(&mut self.inner);
2551        }
2552    }
2553}
2554
2555impl Drop for StoreOpaque {
2556    fn drop(&mut self) {
2557        // NB it's important that this destructor does not access `self.data`.
2558        // That is deallocated by `Drop for Store<T>` above.
2559
2560        unsafe {
2561            let allocator = self.engine.allocator();
2562            let ondemand = OnDemandInstanceAllocator::default();
2563            let store_id = self.id();
2564
2565            #[cfg(feature = "gc")]
2566            if let Some(gc_store) = self.gc_store.take() {
2567                let gc_alloc_index = gc_store.allocation_index;
2568                log::trace!("store {store_id:?} is deallocating GC heap {gc_alloc_index:?}");
2569                debug_assert!(self.engine.features().gc_types());
2570                let (mem_alloc_index, mem) =
2571                    allocator.deallocate_gc_heap(gc_alloc_index, gc_store.gc_heap);
2572                allocator.deallocate_memory(None, mem_alloc_index, mem);
2573            }
2574
2575            for (id, instance) in self.instances.iter_mut() {
2576                log::trace!("store {store_id:?} is deallocating {id:?}");
2577                let allocator = match instance.kind {
2578                    StoreInstanceKind::Dummy => &ondemand,
2579                    _ => allocator,
2580                };
2581                allocator.deallocate_module(&mut instance.handle);
2582            }
2583
2584            self.store_data.decrement_allocator_resources(allocator);
2585        }
2586    }
2587}
2588
2589#[cfg_attr(
2590    not(any(feature = "gc", feature = "async")),
2591    // NB: Rust 1.89, current stable, does not fire this lint. Rust 1.90,
2592    // however, does, so use #[allow] until our MSRV is 1.90.
2593    allow(dead_code, reason = "don't want to put #[cfg] on all impls below too")
2594)]
2595pub(crate) trait AsStoreOpaque {
2596    fn as_store_opaque(&mut self) -> &mut StoreOpaque;
2597}
2598
2599impl AsStoreOpaque for StoreOpaque {
2600    fn as_store_opaque(&mut self) -> &mut StoreOpaque {
2601        self
2602    }
2603}
2604
2605impl AsStoreOpaque for dyn VMStore {
2606    fn as_store_opaque(&mut self) -> &mut StoreOpaque {
2607        self
2608    }
2609}
2610
2611impl<T: 'static> AsStoreOpaque for Store<T> {
2612    fn as_store_opaque(&mut self) -> &mut StoreOpaque {
2613        &mut self.inner.inner
2614    }
2615}
2616
2617impl<T: 'static> AsStoreOpaque for StoreInner<T> {
2618    fn as_store_opaque(&mut self) -> &mut StoreOpaque {
2619        self
2620    }
2621}
2622
2623impl<T: AsStoreOpaque + ?Sized> AsStoreOpaque for &mut T {
2624    fn as_store_opaque(&mut self) -> &mut StoreOpaque {
2625        T::as_store_opaque(self)
2626    }
2627}
2628
2629/// Helper enum to indicate, in some function contexts, whether `async` should
2630/// be taken advantage of or not.
2631///
2632/// This is used throughout Wasmtime where internal functions are all `async`
2633/// but external functions might be either sync or `async`. If the external
2634/// function is sync, then internally Wasmtime shouldn't yield as it won't do
2635/// anything. If the external function is `async`, however, yields are fine.
2636///
2637/// An example of this is GC. Right now GC will cooperatively yield after phases
2638/// of GC have passed, but this cooperative yielding is only enabled with
2639/// `Asyncness::Yes`.
2640///
2641/// This enum is additionally conditionally defined such that `Yes` is only
2642/// present in `async`-enabled builds. That ensures that this compiles down to a
2643/// zero-sized type in `async`-disabled builds in case that interests embedders.
2644#[derive(PartialEq, Eq, Copy, Clone)]
2645pub enum Asyncness {
2646    /// Don't do async things, don't yield, etc. It's ok to execute an `async`
2647    /// function, but it should be validated ahead of time that when doing so a
2648    /// yield isn't possible (e.g. `validate_sync_*` methods on Store.
2649    No,
2650
2651    /// Async things is OK. This should only be used when the API entrypoint is
2652    /// itself `async`.
2653    #[cfg(feature = "async")]
2654    Yes,
2655}
2656
2657impl core::ops::BitOr for Asyncness {
2658    type Output = Self;
2659
2660    fn bitor(self, rhs: Self) -> Self::Output {
2661        match (self, rhs) {
2662            (Asyncness::No, Asyncness::No) => Asyncness::No,
2663            #[cfg(feature = "async")]
2664            (Asyncness::Yes, _) | (_, Asyncness::Yes) => Asyncness::Yes,
2665        }
2666    }
2667}
2668
2669#[cfg(test)]
2670mod tests {
2671    use super::*;
2672
2673    struct FuelTank {
2674        pub consumed_fuel: i64,
2675        pub reserve_fuel: u64,
2676        pub yield_interval: Option<NonZeroU64>,
2677    }
2678
2679    impl FuelTank {
2680        fn new() -> Self {
2681            FuelTank {
2682                consumed_fuel: 0,
2683                reserve_fuel: 0,
2684                yield_interval: None,
2685            }
2686        }
2687        fn get_fuel(&self) -> u64 {
2688            get_fuel(self.consumed_fuel, self.reserve_fuel)
2689        }
2690        fn refuel(&mut self) -> bool {
2691            refuel(
2692                &mut self.consumed_fuel,
2693                &mut self.reserve_fuel,
2694                self.yield_interval,
2695            )
2696        }
2697        fn set_fuel(&mut self, fuel: u64) {
2698            set_fuel(
2699                &mut self.consumed_fuel,
2700                &mut self.reserve_fuel,
2701                self.yield_interval,
2702                fuel,
2703            );
2704        }
2705    }
2706
2707    #[test]
2708    fn smoke() {
2709        let mut tank = FuelTank::new();
2710        tank.set_fuel(10);
2711        assert_eq!(tank.consumed_fuel, -10);
2712        assert_eq!(tank.reserve_fuel, 0);
2713
2714        tank.yield_interval = NonZeroU64::new(10);
2715        tank.set_fuel(25);
2716        assert_eq!(tank.consumed_fuel, -10);
2717        assert_eq!(tank.reserve_fuel, 15);
2718    }
2719
2720    #[test]
2721    fn does_not_lose_precision() {
2722        let mut tank = FuelTank::new();
2723        tank.set_fuel(u64::MAX);
2724        assert_eq!(tank.get_fuel(), u64::MAX);
2725
2726        tank.set_fuel(i64::MAX as u64);
2727        assert_eq!(tank.get_fuel(), i64::MAX as u64);
2728
2729        tank.set_fuel(i64::MAX as u64 + 1);
2730        assert_eq!(tank.get_fuel(), i64::MAX as u64 + 1);
2731    }
2732
2733    #[test]
2734    fn yielding_does_not_lose_precision() {
2735        let mut tank = FuelTank::new();
2736
2737        tank.yield_interval = NonZeroU64::new(10);
2738        tank.set_fuel(u64::MAX);
2739        assert_eq!(tank.get_fuel(), u64::MAX);
2740        assert_eq!(tank.consumed_fuel, -10);
2741        assert_eq!(tank.reserve_fuel, u64::MAX - 10);
2742
2743        tank.yield_interval = NonZeroU64::new(u64::MAX);
2744        tank.set_fuel(u64::MAX);
2745        assert_eq!(tank.get_fuel(), u64::MAX);
2746        assert_eq!(tank.consumed_fuel, -i64::MAX);
2747        assert_eq!(tank.reserve_fuel, u64::MAX - (i64::MAX as u64));
2748
2749        tank.yield_interval = NonZeroU64::new((i64::MAX as u64) + 1);
2750        tank.set_fuel(u64::MAX);
2751        assert_eq!(tank.get_fuel(), u64::MAX);
2752        assert_eq!(tank.consumed_fuel, -i64::MAX);
2753        assert_eq!(tank.reserve_fuel, u64::MAX - (i64::MAX as u64));
2754    }
2755
2756    #[test]
2757    fn refueling() {
2758        // It's possible to fuel to have consumed over the limit as some instructions can consume
2759        // multiple units of fuel at once. Refueling should be strict in it's consumption and not
2760        // add more fuel than there is.
2761        let mut tank = FuelTank::new();
2762
2763        tank.yield_interval = NonZeroU64::new(10);
2764        tank.reserve_fuel = 42;
2765        tank.consumed_fuel = 4;
2766        assert!(tank.refuel());
2767        assert_eq!(tank.reserve_fuel, 28);
2768        assert_eq!(tank.consumed_fuel, -10);
2769
2770        tank.yield_interval = NonZeroU64::new(1);
2771        tank.reserve_fuel = 8;
2772        tank.consumed_fuel = 4;
2773        assert_eq!(tank.get_fuel(), 4);
2774        assert!(tank.refuel());
2775        assert_eq!(tank.reserve_fuel, 3);
2776        assert_eq!(tank.consumed_fuel, -1);
2777        assert_eq!(tank.get_fuel(), 4);
2778
2779        tank.yield_interval = NonZeroU64::new(10);
2780        tank.reserve_fuel = 3;
2781        tank.consumed_fuel = 4;
2782        assert_eq!(tank.get_fuel(), 0);
2783        assert!(!tank.refuel());
2784        assert_eq!(tank.reserve_fuel, 3);
2785        assert_eq!(tank.consumed_fuel, 4);
2786        assert_eq!(tank.get_fuel(), 0);
2787    }
2788
2789    #[test]
2790    fn store_data_provenance() {
2791        // Test that we juggle pointer provenance and all that correctly, and
2792        // miri is happy with everything, while allowing both Rust code and
2793        // "Wasm" to access and modify the store's `T` data. Note that this is
2794        // not actually Wasm mutating the store data here because compiling Wasm
2795        // under miri is way too slow.
2796
2797        unsafe fn run_wasm(store: &mut Store<u32>) {
2798            let ptr = store
2799                .inner
2800                .inner
2801                .vm_store_context
2802                .store_data
2803                .as_ptr()
2804                .cast::<u32>();
2805            unsafe { *ptr += 1 }
2806        }
2807
2808        let engine = Engine::default();
2809        let mut store = Store::new(&engine, 0_u32);
2810
2811        assert_eq!(*store.data(), 0);
2812        *store.data_mut() += 1;
2813        assert_eq!(*store.data(), 1);
2814        unsafe { run_wasm(&mut store) }
2815        assert_eq!(*store.data(), 2);
2816        *store.data_mut() += 1;
2817        assert_eq!(*store.data(), 3);
2818    }
2819}