multi-memory VS WASI

Compare multi-memory vs WASI and see what are their differences.

multi-memory

Multiple per-module memories for Wasm (by WebAssembly)

WASI

WebAssembly System Interface (by WebAssembly)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
multi-memory WASI
6 45
115 4,604
7.0% 2.9%
3.7 6.9
10 months ago 4 days ago
WebAssembly Rust
GNU General Public License v3.0 or later GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

multi-memory

Posts with mentions or reviews of multi-memory. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-13.
  • Top 8 Recent V8 Updates
    5 projects | dev.to | 13 Mar 2024
    Support for multi-memory to deal with multiple memories in Wasm.
  • WASI Support in Go
    7 projects | news.ycombinator.com | 13 Sep 2023
    > You can do attacks that most people haven't been able to do for 20+ years.

    This is a bad and roundabout way to say that vulnerabilities in WebAssembly modules may cause a corruption in their linear memory. Which is absolutely true, but those attacks still matter today (not everyone turns ASLR on) and similar defences also apply. In the future multiple memories [1] should make it much easier to guard against remaining issues. WebAssembly is a lucrative target only because it is so widespread, not because it has horrible security (you don't know what the actually horrible security looks like).

    [1] https://github.com/WebAssembly/multi-memory/blob/main/propos...

  • WASI: WebAssembly System Interface
    6 projects | news.ycombinator.com | 5 Aug 2023
    Thanks! These claims are really interesting.

    - WASM has no ASLR.

    So I guess if a buffer overrun lets you modify a function pointer, you could replace that function pointer with another pointer to execute different code. As you say, this is hard in native linux programs because ASLR and NX. You need a pointer to some code thats loaded in memory and you need to know where it is. In wasm, the "pointer" isn't a pointer at all. indirect_call takes an index into the jump table. Yes, this makes it easier to find other valid function pointers. But wasm also has some advantages here. Unlike in native code, you can't "call" arbitrary locations in memory. And indirect_call is also runtime typechecked. So you can't call functions with an unexpected type signature. Also (I think) the jump table itself can't be edited by the running wasm module. So there's no way to inject code into the module and run it.

    I could be wrong, but I wouldn't be surprised if on balance wasm still ends up safer than native code here. I'm sure there will be more than zero wasm sandbox escapes made by abusing this, but I haven't heard of any so far.

    Docs: https://developer.mozilla.org/en-US/docs/WebAssembly/Underst...

    - WASM allows writing to 0x0.

    You're probably right about this. To be clear, it means if pointers are set to 0 then dereferenced, the program might continue before crashing. And the memory around 0 may be overwritten by an attacker. How bad this is in practice depends on the prevelance of use-after-free bugs (common in C / C++) and what ends up near 0 in memory. In rust, these sort of software bugs seem incredibly rare. And I wouldn't be surprised if wasm compilers for C/C++ start making a memory deadzone here - if they aren't doing that already.

    - wasm can easily overflow buffers

    Sure, but so can native C code. And unlike native code, wasm can't overflow buffers outside of the data section. So you can't overwrite methods or modify the memory of any other loaded modules. So on net, wasm is still marginally safer than native code here. If you're worried about buffer overflows, use a safer language.

    - wasm doesn't have the concept of read-only memory

    Interesting! I can see this definitely being useful for system libraries like mmap. This would definitely be nice to have, and it looks like the wasm authors agree with you.

    https://github.com/WebAssembly/multi-memory/issues/15

  • Accessing WebAssembly reference-typed arrays from C++
    2 projects | news.ycombinator.com | 23 Aug 2022
    There are stray references to the concept of multiple address spaces (or 'memories') in the wasm spec at present, and I recall at one point you may have always been passing 'memory #0' to your load/store opcodes. It looks like people are still working on that as the solution.

    https://github.com/WebAssembly/multi-memory

  • WebAssembly and C++
    6 projects | news.ycombinator.com | 27 Jun 2022
    It's not segmented, so no... or rather, not yet.

    The wasm spec already accommodates to some extent the notion of multiple "memories" (i.e. distinct flat heaps), although it only allows for one in practice:

    https://webassembly.github.io/spec/core/syntax/modules.html#...

    And there's an active proposal to allow for multiple memories:

    https://github.com/WebAssembly/multi-memory/blob/main/propos...

    In an environment like that, you'd need full-fledged pointers to carry both the memory index and the offset; and then you might want a non-fat "pointer to same memory" alternative for perf. Might as well call them far and near.

  • WebAssembly 2.0 Working Draft
    21 projects | news.ycombinator.com | 19 Apr 2022

WASI

Posts with mentions or reviews of WASI. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-26.
  • WASI 0.2.0 and Why It Matters
    8 projects | news.ycombinator.com | 26 Jan 2024
    WASI Co-chair here. Nothing in WASI is "somehow blocked by Google", or indeed blocked by anyone at all. Graphics support in WASI hasn't been developed simply because nobody has put energy into developing graphics support in WASI.

    At the end of 2023 we counted around 40 contributors who have been working on WASI specifications and implementations: https://github.com/WebAssembly/meetings/blob/main/wasi/2023/... . That is a great growth for our project from a few years ago when that issue was filed, but as you can see from what people are working on, its all much more foundational pieces than a graphics interface. Also, if you look at who is employing those contributors, its largely vendors who are interested in WASI in the context of serverless. That doesn't mean WASI is limited to only serverless, but that has been the focus from contributors so far.

    By rolling out WASI on top of the WASM Component Model we have built a sound foundation for creating WASI proposals that support more problem domains, such as embedded systems (@mc_woods and his colleagues are helping with this), or graphics if someone is interested in putting in the work. Our guide to how to create proposals is found here: https://github.com/WebAssembly/WASI/blob/main/Contributing.m... .

  • WASI Launching Preview 2
    1 project | news.ycombinator.com | 25 Jan 2024
  • Missing the Point of WebAssembly
    2 projects | news.ycombinator.com | 9 Jan 2024
    > As I understand it, it's not even really possible today to make WebAssembly do anything meaningful in the browser without trampolining back out to JavaScript anyway, which seems like a remarkable missed opportunity.

    That's the underlying messy API it's built on. There are specs to make the API more standardized like https://github.com/WebAssembly/WASI

    But overall, yeah, it feels like a shiny new toy everyone is excited about and wants to use. Some toys can be fun to play with, but it doesn't mean we have to rewrite production systems in it. Sometimes, or most of the time, toys don't become useful tools.

  • Running WASI binaries from your HTML using Web Components
    4 projects | news.ycombinator.com | 28 Aug 2023
    Snapshot Preview 1 is the standard all tools are building to right now. The specification is available here: https://github.com/WebAssembly/WASI/blob/main/legacy/preview...

    It's pretty unreadable though!

    Preview 2 looks like it will be a big change, and is just being finalised at the moment. I'd expect that when preview 2 is available there will be an improvement in the quality of documentation. I'm not sure how long it will take after release for tools to start switching to it. I'd expect Preview 1 will still be the main target at least for the rest of this year.

  • WASI: WebAssembly System Interface
    1 project | /r/hackernews | 7 Aug 2023
    1 project | /r/hypeurls | 7 Aug 2023
    6 projects | news.ycombinator.com | 5 Aug 2023
    > Like WTF does this mean? The repo tells me nothing

    Directly above the sentence you quoted:

    "Interposition in the context of WASI interfaces is the ability for a Webassembly instance to implement a given WASI interface, and for a consumer WebAssembly instance to be able to use this implementation transparently. This can be used to adapt or attenuate the functionality of a WASI API without changing the code using it."

    > and I've still yet to see a clear write-up about what WASI is.

    In the same document: [0]

    > WTF is wit?

    The first link in that document ("Starting in Preview2, WASI APIs are defined using the Wit IDL.") is [1].

    > I click on "legacy" and I see preview0 and preview1, which are basically unreadable proto-specs.

    The README for the legacy directory [2] clearly explains what they are.

    > Where's a single well-written WASI spec?

    "Development of each API happens in its own repo, which you can access from the proposals list." [3]

    > Whatever WASI is doing, I don't like it.

    Clearly not - you've gone out of your way to ignore all of the documentation that answers your questions.

    > And neither does AssemblyScript team apparently

    The AssemblyScript team have a bone to pick with WASI based on their misunderstanding of what WASI is for (it is not intended for use on the web) and WASI's disinterest in supporting UTF-16 strings. You can see for yourself in [4].

    [0]: https://github.com/WebAssembly/WASI/tree/main#wasi-high-leve...

  • A Gentle Introduction to WebAssembly
    1 project | dev.to | 3 May 2023
    The Bytecode Alliance initiated a sub-project called the WebAssembly System Interface (WASI). WASI is an API that allows WebAssembly access to system features such as files, filesystems, Berkeley sockets, clocks, and random numbers. WASI acts as a system-level interface for WebAssembly, so incorporating a runtime into a host environment and building a platform is easier.
  • Spin 1.0 — The Developer Tool for Serverless WebAssembly
    17 projects | dev.to | 28 Mar 2023
    We are excited to contribute back to Wasmtime and the component model, as well as to new projects and proposals emerging in this space (such as new Wasm proposals, like WASI Preview 2, wasi-keyvalue, wasi-sql or wasi-cloud).
  • The Tug-of-War over Server-Side WebAssembly
    12 projects | news.ycombinator.com | 24 Mar 2023
    I've been reading the following repositories.

    https://github.com/WebAssembly/WASI/blob/main/Proposals.md

What are some alternatives?

When comparing multi-memory and WASI you can also consider the following projects:

wajic - WebAssembly JavaScript Interface Creator

.NET Runtime - .NET is a cross-platform runtime for cloud, mobile, desktop, and IoT apps.

memory-control - A proposal to introduce finer grained control of WebAssembly memory.

webgpu-wgsl-hello-triangle - An example of how to render a triangle with WebGPU using WebGPU Shading Language - the "Hello world!" of computer graphics.

reference-crdts - Simple, tiny spec-compliant reference implementations of Yjs and Automerge's list types.

threads - Threads and Atomics in WebAssembly

uwm-masters-thesis - My thesis for my Master's in Computer Science degree from the University of Wisconsin - Milwaukee.

wasi-libc - WASI libc implementation for WebAssembly

sdk - The Dart SDK, including the VM, dart2js, core libraries, and more.

node-sqlite3 - SQLite3 bindings for Node.js

proposals - Tracking WebAssembly proposals

gpuweb - Where the GPU for the Web work happens!