Struct wasmtime_jit::CompiledModule
source · pub struct CompiledModule { /* private fields */ }
Expand description
A compiled wasm module, ready to be instantiated.
Implementations§
source§impl CompiledModule
impl CompiledModule
sourcepub fn from_artifacts(
code_memory: Arc<CodeMemory>,
info: CompiledModuleInfo,
profiler: &dyn ProfilingAgent,
id_allocator: &CompiledModuleIdAllocator
) -> Result<Self>
pub fn from_artifacts(
code_memory: Arc<CodeMemory>,
info: CompiledModuleInfo,
profiler: &dyn ProfilingAgent,
id_allocator: &CompiledModuleIdAllocator
) -> Result<Self>
Creates CompiledModule
directly from a precompiled artifact.
The code_memory
argument is expected to be the result of a previous
call to ObjectBuilder::finish
above. This is an ELF image, at this
time, which contains all necessary information to create a
CompiledModule
from a compilation.
This method also takes info
, an optionally-provided deserialization
of the artifacts’ compilation metadata section. If this information is
not provided then the information will be
deserialized from the image of the compilation artifacts. Otherwise it
will be assumed to be what would otherwise happen if the section were
to be deserialized.
The profiler
argument here is used to inform JIT profiling runtimes
about new code that is loaded.
sourcepub fn unique_id(&self) -> CompiledModuleId
pub fn unique_id(&self) -> CompiledModuleId
Get this module’s unique ID. It is unique with respect to a single allocator (which is ordinarily held on a Wasm engine).
sourcepub fn mmap(&self) -> &MmapVec
pub fn mmap(&self) -> &MmapVec
Returns the underlying memory which contains the compiled module’s image.
Examples found in repository?
420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626
fn register_debug_and_profiling(&mut self, profiler: &dyn ProfilingAgent) -> Result<()> {
// Register GDB JIT images; initialize profiler and load the wasm module.
if self.meta.native_debug_info_present {
let text = self.text();
let bytes = create_gdbjit_image(self.mmap().to_vec(), (text.as_ptr(), text.len()))
.context("failed to create jit image for gdb")?;
profiler.module_load(self, Some(&bytes));
let reg = GdbJitImageRegistration::register(bytes);
self.dbg_jit_registration = Some(reg);
} else {
profiler.module_load(self, None);
}
Ok(())
}
/// Get this module's unique ID. It is unique with respect to a
/// single allocator (which is ordinarily held on a Wasm engine).
pub fn unique_id(&self) -> CompiledModuleId {
self.unique_id
}
/// Returns the underlying memory which contains the compiled module's
/// image.
pub fn mmap(&self) -> &MmapVec {
self.code_memory.mmap()
}
/// Returns the underlying owned mmap of this compiled image.
pub fn code_memory(&self) -> &Arc<CodeMemory> {
&self.code_memory
}
/// Returns the text section of the ELF image for this compiled module.
///
/// This memory should have the read/execute permissions.
pub fn text(&self) -> &[u8] {
self.code_memory.text()
}
/// Return a reference-counting pointer to a module.
pub fn module(&self) -> &Arc<Module> {
&self.module
}
/// Looks up the `name` section name for the function index `idx`, if one
/// was specified in the original wasm module.
pub fn func_name(&self, idx: FuncIndex) -> Option<&str> {
// Find entry for `idx`, if present.
let i = self.func_names.binary_search_by_key(&idx, |n| n.idx).ok()?;
let name = &self.func_names[i];
// Here we `unwrap` the `from_utf8` but this can theoretically be a
// `from_utf8_unchecked` if we really wanted since this section is
// guaranteed to only have valid utf-8 data. Until it's a problem it's
// probably best to double-check this though.
let data = self.code_memory().func_name_data();
Some(str::from_utf8(&data[name.offset as usize..][..name.len as usize]).unwrap())
}
/// Return a reference to a mutable module (if possible).
pub fn module_mut(&mut self) -> Option<&mut Module> {
Arc::get_mut(&mut self.module)
}
/// Returns an iterator over all functions defined within this module with
/// their index and their body in memory.
#[inline]
pub fn finished_functions(
&self,
) -> impl ExactSizeIterator<Item = (DefinedFuncIndex, &[u8])> + '_ {
self.funcs
.iter()
.map(move |(i, _)| (i, self.finished_function(i)))
}
/// Returns the body of the function that `index` points to.
#[inline]
pub fn finished_function(&self, index: DefinedFuncIndex) -> &[u8] {
let (_, loc) = &self.funcs[index];
&self.text()[loc.start as usize..][..loc.length as usize]
}
/// Returns the per-signature trampolines for this module.
pub fn trampolines(&self) -> impl Iterator<Item = (SignatureIndex, VMTrampoline, usize)> + '_ {
let text = self.text();
self.trampolines.iter().map(move |(signature, loc)| {
(
*signature,
unsafe {
let ptr = &text[loc.start as usize];
std::mem::transmute::<*const u8, VMTrampoline>(ptr)
},
loc.length as usize,
)
})
}
/// Returns the stack map information for all functions defined in this
/// module.
///
/// The iterator returned iterates over the span of the compiled function in
/// memory with the stack maps associated with those bytes.
pub fn stack_maps(&self) -> impl Iterator<Item = (&[u8], &[StackMapInformation])> {
self.finished_functions()
.map(|(_, f)| f)
.zip(self.funcs.values().map(|f| &f.0.stack_maps[..]))
}
/// Lookups a defined function by a program counter value.
///
/// Returns the defined function index and the relative address of
/// `text_offset` within the function itself.
pub fn func_by_text_offset(&self, text_offset: usize) -> Option<(DefinedFuncIndex, u32)> {
let text_offset = u32::try_from(text_offset).unwrap();
let index = match self
.funcs
.binary_search_values_by_key(&text_offset, |(_, loc)| {
debug_assert!(loc.length > 0);
// Return the inclusive "end" of the function
loc.start + loc.length - 1
}) {
Ok(k) => {
// Exact match, pc is at the end of this function
k
}
Err(k) => {
// Not an exact match, k is where `pc` would be "inserted"
// Since we key based on the end, function `k` might contain `pc`,
// so we'll validate on the range check below
k
}
};
let (_, loc) = self.funcs.get(index)?;
let start = loc.start;
let end = loc.start + loc.length;
if text_offset < start || end < text_offset {
return None;
}
Some((index, text_offset - loc.start))
}
/// Gets the function location information for a given function index.
pub fn func_loc(&self, index: DefinedFuncIndex) -> &FunctionLoc {
&self
.funcs
.get(index)
.expect("defined function should be present")
.1
}
/// Gets the function information for a given function index.
pub fn wasm_func_info(&self, index: DefinedFuncIndex) -> &WasmFunctionInfo {
&self
.funcs
.get(index)
.expect("defined function should be present")
.0
}
/// Creates a new symbolication context which can be used to further
/// symbolicate stack traces.
///
/// Basically this makes a thing which parses debuginfo and can tell you
/// what filename and line number a wasm pc comes from.
pub fn symbolize_context(&self) -> Result<Option<SymbolizeContext<'_>>> {
use gimli::EndianSlice;
if !self.meta.has_wasm_debuginfo {
return Ok(None);
}
let dwarf = gimli::Dwarf::load(|id| -> Result<_> {
let data = self.code_memory().dwarf_section(id);
Ok(EndianSlice::new(data, gimli::LittleEndian))
})?;
let cx = addr2line::Context::from_dwarf(dwarf)
.context("failed to create addr2line dwarf mapping context")?;
Ok(Some(SymbolizeContext {
inner: cx,
code_section_offset: self.meta.code_section_offset,
}))
}
/// Returns whether the original wasm module had unparsed debug information
/// based on the tunables configuration.
pub fn has_unparsed_debuginfo(&self) -> bool {
self.meta.has_unparsed_debuginfo
}
/// Indicates whether this module came with n address map such that lookups
/// via `wasmtime_environ::lookup_file_pos` will succeed.
///
/// If this function returns `false` then `lookup_file_pos` will always
/// return `None`.
pub fn has_address_map(&self) -> bool {
!self.code_memory.address_map_data().is_empty()
}
/// Returns the bounds, in host memory, of where this module's compiled
/// image resides.
pub fn image_range(&self) -> Range<usize> {
let base = self.mmap().as_ptr() as usize;
let len = self.mmap().len();
base..base + len
}
sourcepub fn code_memory(&self) -> &Arc<CodeMemory>
pub fn code_memory(&self) -> &Arc<CodeMemory>
Returns the underlying owned mmap of this compiled image.
Examples found in repository?
466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603
pub fn func_name(&self, idx: FuncIndex) -> Option<&str> {
// Find entry for `idx`, if present.
let i = self.func_names.binary_search_by_key(&idx, |n| n.idx).ok()?;
let name = &self.func_names[i];
// Here we `unwrap` the `from_utf8` but this can theoretically be a
// `from_utf8_unchecked` if we really wanted since this section is
// guaranteed to only have valid utf-8 data. Until it's a problem it's
// probably best to double-check this though.
let data = self.code_memory().func_name_data();
Some(str::from_utf8(&data[name.offset as usize..][..name.len as usize]).unwrap())
}
/// Return a reference to a mutable module (if possible).
pub fn module_mut(&mut self) -> Option<&mut Module> {
Arc::get_mut(&mut self.module)
}
/// Returns an iterator over all functions defined within this module with
/// their index and their body in memory.
#[inline]
pub fn finished_functions(
&self,
) -> impl ExactSizeIterator<Item = (DefinedFuncIndex, &[u8])> + '_ {
self.funcs
.iter()
.map(move |(i, _)| (i, self.finished_function(i)))
}
/// Returns the body of the function that `index` points to.
#[inline]
pub fn finished_function(&self, index: DefinedFuncIndex) -> &[u8] {
let (_, loc) = &self.funcs[index];
&self.text()[loc.start as usize..][..loc.length as usize]
}
/// Returns the per-signature trampolines for this module.
pub fn trampolines(&self) -> impl Iterator<Item = (SignatureIndex, VMTrampoline, usize)> + '_ {
let text = self.text();
self.trampolines.iter().map(move |(signature, loc)| {
(
*signature,
unsafe {
let ptr = &text[loc.start as usize];
std::mem::transmute::<*const u8, VMTrampoline>(ptr)
},
loc.length as usize,
)
})
}
/// Returns the stack map information for all functions defined in this
/// module.
///
/// The iterator returned iterates over the span of the compiled function in
/// memory with the stack maps associated with those bytes.
pub fn stack_maps(&self) -> impl Iterator<Item = (&[u8], &[StackMapInformation])> {
self.finished_functions()
.map(|(_, f)| f)
.zip(self.funcs.values().map(|f| &f.0.stack_maps[..]))
}
/// Lookups a defined function by a program counter value.
///
/// Returns the defined function index and the relative address of
/// `text_offset` within the function itself.
pub fn func_by_text_offset(&self, text_offset: usize) -> Option<(DefinedFuncIndex, u32)> {
let text_offset = u32::try_from(text_offset).unwrap();
let index = match self
.funcs
.binary_search_values_by_key(&text_offset, |(_, loc)| {
debug_assert!(loc.length > 0);
// Return the inclusive "end" of the function
loc.start + loc.length - 1
}) {
Ok(k) => {
// Exact match, pc is at the end of this function
k
}
Err(k) => {
// Not an exact match, k is where `pc` would be "inserted"
// Since we key based on the end, function `k` might contain `pc`,
// so we'll validate on the range check below
k
}
};
let (_, loc) = self.funcs.get(index)?;
let start = loc.start;
let end = loc.start + loc.length;
if text_offset < start || end < text_offset {
return None;
}
Some((index, text_offset - loc.start))
}
/// Gets the function location information for a given function index.
pub fn func_loc(&self, index: DefinedFuncIndex) -> &FunctionLoc {
&self
.funcs
.get(index)
.expect("defined function should be present")
.1
}
/// Gets the function information for a given function index.
pub fn wasm_func_info(&self, index: DefinedFuncIndex) -> &WasmFunctionInfo {
&self
.funcs
.get(index)
.expect("defined function should be present")
.0
}
/// Creates a new symbolication context which can be used to further
/// symbolicate stack traces.
///
/// Basically this makes a thing which parses debuginfo and can tell you
/// what filename and line number a wasm pc comes from.
pub fn symbolize_context(&self) -> Result<Option<SymbolizeContext<'_>>> {
use gimli::EndianSlice;
if !self.meta.has_wasm_debuginfo {
return Ok(None);
}
let dwarf = gimli::Dwarf::load(|id| -> Result<_> {
let data = self.code_memory().dwarf_section(id);
Ok(EndianSlice::new(data, gimli::LittleEndian))
})?;
let cx = addr2line::Context::from_dwarf(dwarf)
.context("failed to create addr2line dwarf mapping context")?;
Ok(Some(SymbolizeContext {
inner: cx,
code_section_offset: self.meta.code_section_offset,
}))
}
sourcepub fn text(&self) -> &[u8] ⓘ
pub fn text(&self) -> &[u8] ⓘ
Returns the text section of the ELF image for this compiled module.
This memory should have the read/execute permissions.
Examples found in repository?
420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515
fn register_debug_and_profiling(&mut self, profiler: &dyn ProfilingAgent) -> Result<()> {
// Register GDB JIT images; initialize profiler and load the wasm module.
if self.meta.native_debug_info_present {
let text = self.text();
let bytes = create_gdbjit_image(self.mmap().to_vec(), (text.as_ptr(), text.len()))
.context("failed to create jit image for gdb")?;
profiler.module_load(self, Some(&bytes));
let reg = GdbJitImageRegistration::register(bytes);
self.dbg_jit_registration = Some(reg);
} else {
profiler.module_load(self, None);
}
Ok(())
}
/// Get this module's unique ID. It is unique with respect to a
/// single allocator (which is ordinarily held on a Wasm engine).
pub fn unique_id(&self) -> CompiledModuleId {
self.unique_id
}
/// Returns the underlying memory which contains the compiled module's
/// image.
pub fn mmap(&self) -> &MmapVec {
self.code_memory.mmap()
}
/// Returns the underlying owned mmap of this compiled image.
pub fn code_memory(&self) -> &Arc<CodeMemory> {
&self.code_memory
}
/// Returns the text section of the ELF image for this compiled module.
///
/// This memory should have the read/execute permissions.
pub fn text(&self) -> &[u8] {
self.code_memory.text()
}
/// Return a reference-counting pointer to a module.
pub fn module(&self) -> &Arc<Module> {
&self.module
}
/// Looks up the `name` section name for the function index `idx`, if one
/// was specified in the original wasm module.
pub fn func_name(&self, idx: FuncIndex) -> Option<&str> {
// Find entry for `idx`, if present.
let i = self.func_names.binary_search_by_key(&idx, |n| n.idx).ok()?;
let name = &self.func_names[i];
// Here we `unwrap` the `from_utf8` but this can theoretically be a
// `from_utf8_unchecked` if we really wanted since this section is
// guaranteed to only have valid utf-8 data. Until it's a problem it's
// probably best to double-check this though.
let data = self.code_memory().func_name_data();
Some(str::from_utf8(&data[name.offset as usize..][..name.len as usize]).unwrap())
}
/// Return a reference to a mutable module (if possible).
pub fn module_mut(&mut self) -> Option<&mut Module> {
Arc::get_mut(&mut self.module)
}
/// Returns an iterator over all functions defined within this module with
/// their index and their body in memory.
#[inline]
pub fn finished_functions(
&self,
) -> impl ExactSizeIterator<Item = (DefinedFuncIndex, &[u8])> + '_ {
self.funcs
.iter()
.map(move |(i, _)| (i, self.finished_function(i)))
}
/// Returns the body of the function that `index` points to.
#[inline]
pub fn finished_function(&self, index: DefinedFuncIndex) -> &[u8] {
let (_, loc) = &self.funcs[index];
&self.text()[loc.start as usize..][..loc.length as usize]
}
/// Returns the per-signature trampolines for this module.
pub fn trampolines(&self) -> impl Iterator<Item = (SignatureIndex, VMTrampoline, usize)> + '_ {
let text = self.text();
self.trampolines.iter().map(move |(signature, loc)| {
(
*signature,
unsafe {
let ptr = &text[loc.start as usize];
std::mem::transmute::<*const u8, VMTrampoline>(ptr)
},
loc.length as usize,
)
})
}
sourcepub fn func_name(&self, idx: FuncIndex) -> Option<&str>
pub fn func_name(&self, idx: FuncIndex) -> Option<&str>
Looks up the name
section name for the function index idx
, if one
was specified in the original wasm module.
sourcepub fn module_mut(&mut self) -> Option<&mut Module>
pub fn module_mut(&mut self) -> Option<&mut Module>
Return a reference to a mutable module (if possible).
sourcepub fn finished_functions(
&self
) -> impl ExactSizeIterator<Item = (DefinedFuncIndex, &[u8])> + '_
pub fn finished_functions(
&self
) -> impl ExactSizeIterator<Item = (DefinedFuncIndex, &[u8])> + '_
Returns an iterator over all functions defined within this module with their index and their body in memory.
sourcepub fn finished_function(&self, index: DefinedFuncIndex) -> &[u8] ⓘ
pub fn finished_function(&self, index: DefinedFuncIndex) -> &[u8] ⓘ
Returns the body of the function that index
points to.
sourcepub fn trampolines(
&self
) -> impl Iterator<Item = (SignatureIndex, VMTrampoline, usize)> + '_
pub fn trampolines(
&self
) -> impl Iterator<Item = (SignatureIndex, VMTrampoline, usize)> + '_
Returns the per-signature trampolines for this module.
sourcepub fn stack_maps(
&self
) -> impl Iterator<Item = (&[u8], &[StackMapInformation])>
pub fn stack_maps(
&self
) -> impl Iterator<Item = (&[u8], &[StackMapInformation])>
Returns the stack map information for all functions defined in this module.
The iterator returned iterates over the span of the compiled function in memory with the stack maps associated with those bytes.
sourcepub fn func_by_text_offset(
&self,
text_offset: usize
) -> Option<(DefinedFuncIndex, u32)>
pub fn func_by_text_offset(
&self,
text_offset: usize
) -> Option<(DefinedFuncIndex, u32)>
Lookups a defined function by a program counter value.
Returns the defined function index and the relative address of
text_offset
within the function itself.
sourcepub fn func_loc(&self, index: DefinedFuncIndex) -> &FunctionLoc
pub fn func_loc(&self, index: DefinedFuncIndex) -> &FunctionLoc
Gets the function location information for a given function index.
sourcepub fn wasm_func_info(&self, index: DefinedFuncIndex) -> &WasmFunctionInfo
pub fn wasm_func_info(&self, index: DefinedFuncIndex) -> &WasmFunctionInfo
Gets the function information for a given function index.
sourcepub fn symbolize_context(&self) -> Result<Option<SymbolizeContext<'_>>>
pub fn symbolize_context(&self) -> Result<Option<SymbolizeContext<'_>>>
Creates a new symbolication context which can be used to further symbolicate stack traces.
Basically this makes a thing which parses debuginfo and can tell you what filename and line number a wasm pc comes from.
sourcepub fn has_unparsed_debuginfo(&self) -> bool
pub fn has_unparsed_debuginfo(&self) -> bool
Returns whether the original wasm module had unparsed debug information based on the tunables configuration.
sourcepub fn has_address_map(&self) -> bool
pub fn has_address_map(&self) -> bool
Indicates whether this module came with n address map such that lookups
via wasmtime_environ::lookup_file_pos
will succeed.
If this function returns false
then lookup_file_pos
will always
return None
.
sourcepub fn image_range(&self) -> Range<usize>
pub fn image_range(&self) -> Range<usize>
Returns the bounds, in host memory, of where this module’s compiled image resides.