#llvm #safe #wrapper


Inkwell aims to help you pen your own programming languages by safely wrapping llvm-sys

4 releases

0.1.0-llvm8sample Mar 14, 2020
0.1.0-llvm10sample Jun 25, 2020
0.1.0-beta.2 Feb 1, 2021
0.1.0-beta.1 Jan 31, 2021
0.0.0 Jun 29, 2017

#11 in FFI

Download history 650/week @ 2021-01-13 735/week @ 2021-01-20 748/week @ 2021-01-27 475/week @ 2021-02-03 1012/week @ 2021-02-10 569/week @ 2021-02-17 770/week @ 2021-02-24 685/week @ 2021-03-03 544/week @ 2021-03-10 794/week @ 2021-03-17 397/week @ 2021-03-24 413/week @ 2021-03-31 924/week @ 2021-04-07 489/week @ 2021-04-14 808/week @ 2021-04-21 643/week @ 2021-04-28

2,869 downloads per month
Used in 20 crates (8 directly)




Crates.io Build Status codecov lines of code Join the chat at https://gitter.im/inkwell-rs/Lobby Minimum rustc 1.36

It's a New Kind of Wrapper for Exposing LLVM (Safely)

Inkwell aims to help you pen your own programming languages by safely wrapping llvm-sys. It provides a more strongly typed interface than the underlying LLVM API so that certain types of errors can be caught at compile time instead of at LLVM's runtime. This means we are trying to replicate LLVM IR's strong typing as closely as possible. The ultimate goal is to make LLVM safer from the rust end and a bit easier to learn (via documentation) and use.


  • Rust 1.36+
  • Rust Stable, Beta, or Nightly
  • LLVM 3.6, 3.7, 3.8, 3.9, 4.0, 5.0, 6.0, 7.0, or 8.0


You'll need to point your Cargo.toml to a branch corresponding to a supported LLVM version:

inkwell = { git = "https://github.com/TheDan64/inkwell", branch = "llvm3-7" }

Supported versions:

LLVM Version GitHub Branch
3.6.x llvm3-6
3.7.x llvm3-7
3.8.x llvm3-8
3.9.x llvm3-9
4.0.x llvm4-0
5.0.x llvm5-0
6.0.x llvm6-0
7.0.x llvm7-0
8.0.x llvm8-0


Documentation is automatically deployed here based on master. These docs are not yet 100% complete and only show the latest supported LLVM version due to a rustdoc issue. See #2 for more info.


Tari's llvm-sys example written in safe code1 with Inkwell:

use inkwell::OptimizationLevel;
use inkwell::builder::Builder;
use inkwell::context::Context;
use inkwell::execution_engine::{ExecutionEngine, JitFunction};
use inkwell::module::Module;
use inkwell::targets::{InitializationConfig, Target};
use std::error::Error;

/// Convenience type alias for the `sum` function.
/// Calling this is innately `unsafe` because there's no guarantee it doesn't
/// do `unsafe` operations internally.
type SumFunc = unsafe extern "C" fn(u64, u64, u64) -> u64;

struct CodeGen<'ctx> {
    context: &'ctx Context,
    module: Module<'ctx>,
    builder: Builder<'ctx>,
    execution_engine: ExecutionEngine<'ctx>,

impl<'ctx> CodeGen<'ctx> {
    fn jit_compile_sum(&self) -> Option<JitFunction<SumFunc>> {
        let i64_type = self.context.i64_type();
        let fn_type = i64_type.fn_type(&[i64_type.into(), i64_type.into(), i64_type.into()], false);
        let function = self.module.add_function("sum", fn_type, None);
        let basic_block = self.context.append_basic_block(function, "entry");


        let x = function.get_nth_param(0)?.into_int_value();
        let y = function.get_nth_param(1)?.into_int_value();
        let z = function.get_nth_param(2)?.into_int_value();

        let sum = self.builder.build_int_add(x, y, "sum");
        let sum = self.builder.build_int_add(sum, z, "sum");


        unsafe { self.execution_engine.get_function("sum").ok() }

fn main() -> Result<(), Box<dyn Error>> {
    let context = Context::create();
    let module = context.create_module("sum");
    let execution_engine = module.create_jit_execution_engine(OptimizationLevel::None)?;
    let codegen = CodeGen {
        context: &context,
        builder: context.create_builder(),

    let sum = codegen.jit_compile_sum().ok_or("Unable to JIT compile `sum`")?;

    let x = 1u64;
    let y = 2u64;
    let z = 3u64;

    unsafe {
        println!("{} + {} + {} = {}", x, y, z, sum.call(x, y, z));
        assert_eq!(sum.call(x, y, z), x + y + z);


1 There are two uses of unsafe in this example because the actual act of compiling and executing code on the fly is innately unsafe. For one, there is no way of verifying we are calling get_function() with the right function signature. It is also unsafe to call the function we get because there's no guarantee the code itself doesn't do unsafe things internally (the same reason you need unsafe when calling into C).

LLVM's Kaleidoscope Tutorial

Can be found in the examples directory.


Check out our Contributing Guide


~13K SLoC