1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209
// This file is part of Substrate. // Copyright (C) 2018-2021 Parity Technologies (UK) Ltd. // SPDX-License-Identifier: Apache-2.0 // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. //! This crate provides means to instantiate and execute wasm modules. //! //! It works even when the user of this library executes from //! inside the wasm VM. In this case the same VM is used for execution //! of both the sandbox owner and the sandboxed module, without compromising security //! and without the performance penalty of full wasm emulation inside wasm. //! //! This is achieved by using bindings to the wasm VM, which are published by the host API. //! This API is thin and consists of only a handful functions. It contains functions for instantiating //! modules and executing them, but doesn't contain functions for inspecting the module //! structure. The user of this library is supposed to read the wasm module. //! //! When this crate is used in the `std` environment all these functions are implemented by directly //! calling the wasm VM. //! //! Examples of possible use-cases for this library are not limited to the following: //! //! - implementing smart-contract runtimes that use wasm for contract code //! - executing a wasm substrate runtime inside of a wasm parachain #![warn(missing_docs)] #![cfg_attr(not(feature = "std"), no_std)] use sp_std::prelude::*; pub use sp_core::sandbox::HostError; pub use sp_wasm_interface::{ReturnValue, Value}; mod imp { #[cfg(feature = "std")] include!("../with_std.rs"); #[cfg(not(feature = "std"))] include!("../without_std.rs"); } /// Error that can occur while using this crate. #[derive(sp_core::RuntimeDebug)] pub enum Error { /// Module is not valid, couldn't be instantiated. Module, /// Access to a memory or table was made with an address or an index which is out of bounds. /// /// Note that if wasm module makes an out-of-bounds access then trap will occur. OutOfBounds, /// Failed to invoke the start function or an exported function for some reason. Execution, } impl From<Error> for HostError { fn from(_e: Error) -> HostError { HostError } } /// Function pointer for specifying functions by the /// supervisor in [`EnvironmentDefinitionBuilder`]. /// /// [`EnvironmentDefinitionBuilder`]: struct.EnvironmentDefinitionBuilder.html pub type HostFuncType<T> = fn(&mut T, &[Value]) -> Result<ReturnValue, HostError>; /// Reference to a sandboxed linear memory, that /// will be used by the guest module. /// /// The memory can't be directly accessed by supervisor, but only /// through designated functions [`get`](Memory::get) and [`set`](Memory::set). #[derive(Clone)] pub struct Memory { inner: imp::Memory, } impl Memory { /// Construct a new linear memory instance. /// /// The memory allocated with initial number of pages specified by `initial`. /// Minimal possible value for `initial` is 0 and maximum possible is `65536`. /// (Since maximum addressable memory is 2<sup>32</sup> = 4GiB = 65536 * 64KiB). /// /// It is possible to limit maximum number of pages this memory instance can have by specifying /// `maximum`. If not specified, this memory instance would be able to allocate up to 4GiB. /// /// Allocated memory is always zeroed. pub fn new(initial: u32, maximum: Option<u32>) -> Result<Memory, Error> { Ok(Memory { inner: imp::Memory::new(initial, maximum)? }) } /// Read a memory area at the address `ptr` with the size of the provided slice `buf`. /// /// Returns `Err` if the range is out-of-bounds. pub fn get(&self, ptr: u32, buf: &mut [u8]) -> Result<(), Error> { self.inner.get(ptr, buf) } /// Write a memory area at the address `ptr` with contents of the provided slice `buf`. /// /// Returns `Err` if the range is out-of-bounds. pub fn set(&self, ptr: u32, value: &[u8]) -> Result<(), Error> { self.inner.set(ptr, value) } } /// Struct that can be used for defining an environment for a sandboxed module. /// /// The sandboxed module can access only the entities which were defined and passed /// to the module at the instantiation time. pub struct EnvironmentDefinitionBuilder<T> { inner: imp::EnvironmentDefinitionBuilder<T>, } impl<T> EnvironmentDefinitionBuilder<T> { /// Construct a new `EnvironmentDefinitionBuilder`. pub fn new() -> EnvironmentDefinitionBuilder<T> { EnvironmentDefinitionBuilder { inner: imp::EnvironmentDefinitionBuilder::new() } } /// Register a host function in this environment definition. /// /// NOTE that there is no constraints on type of this function. An instance /// can import function passed here with any signature it wants. It can even import /// the same function (i.e. with same `module` and `field`) several times. It's up to /// the user code to check or constrain the types of signatures. pub fn add_host_func<N1, N2>(&mut self, module: N1, field: N2, f: HostFuncType<T>) where N1: Into<Vec<u8>>, N2: Into<Vec<u8>>, { self.inner.add_host_func(module, field, f); } /// Register a memory in this environment definition. pub fn add_memory<N1, N2>(&mut self, module: N1, field: N2, mem: Memory) where N1: Into<Vec<u8>>, N2: Into<Vec<u8>>, { self.inner.add_memory(module, field, mem.inner); } } /// Sandboxed instance of a wasm module. /// /// This instance can be used for invoking exported functions. pub struct Instance<T> { inner: imp::Instance<T>, } impl<T> Instance<T> { /// Instantiate a module with the given [`EnvironmentDefinitionBuilder`]. It will /// run the `start` function (if it is present in the module) with the given `state`. /// /// Returns `Err(Error::Module)` if this module can't be instantiated with the given /// environment. If execution of `start` function generated a trap, then `Err(Error::Execution)` will /// be returned. /// /// [`EnvironmentDefinitionBuilder`]: struct.EnvironmentDefinitionBuilder.html pub fn new( code: &[u8], env_def_builder: &EnvironmentDefinitionBuilder<T>, state: &mut T, ) -> Result<Instance<T>, Error> { Ok(Instance { inner: imp::Instance::new(code, &env_def_builder.inner, state)? }) } /// Invoke an exported function with the given name. /// /// # Errors /// /// Returns `Err(Error::Execution)` if: /// /// - An export function name isn't a proper utf8 byte sequence, /// - This module doesn't have an exported function with the given name, /// - If types of the arguments passed to the function doesn't match function signature /// then trap occurs (as if the exported function was called via call_indirect), /// - Trap occurred at the execution time. pub fn invoke( &mut self, name: &str, args: &[Value], state: &mut T, ) -> Result<ReturnValue, Error> { self.inner.invoke(name, args, state) } /// Get the value from a global with the given `name`. /// /// Returns `Some(_)` if the global could be found. pub fn get_global_val(&self, name: &str) -> Option<Value> { self.inner.get_global_val(name) } }