Skip to content

Instantly share code, notes, and snippets.

@rikkimax
Last active September 4, 2024 11:03
Show Gist options
  • Save rikkimax/0c1de705bf6d9dbc1869d60baee0fa81 to your computer and use it in GitHub Desktop.
Save rikkimax/0c1de705bf6d9dbc1869d60baee0fa81 to your computer and use it in GitHub Desktop.

Escape Analysis

Field Value
DIP: (number/id -- assigned by DIP Manager)
Author: Richard (Rikki) Andrew Cattermole firstname@lastname.co.nz
Implementation: (links to implementation PR if any)
Status: Draft

Abstract

The movement of pointers within a program graph easily escapes known points that own that memory within the call stack of a given thread. This logical error can result in program termination or undetected corruption of the program state. This proposal is a new attempt at preventing this corruption within the @safe code.

Contents

Rationale

In a review of the existing escape analysis solution implemented in D's reference compiler DIP1000, there is one major limitation of what it models and assumption growth to facilitate functionality.

The implementation of DIP1000 models a single output variable per function, this is the return value or if void the first parameter (could be the this pointer). In practice functions typically have more than one output, this includes mutable pointers in, ref and out function parameters.

int* /* output */ func();

struct S {
	int* /* output */ method1();
	void method2() /* output */;
}

The relationship between parameters is modelled using the return ref and return scope attributes. These communicate to the compiler the varying input and how it relates to the output for that parameter.

Needing two different attributes to determine the relationship status between parameters has been highly incommunicable to experienced programmers.

Due to it not being able to model multiple outputs, a lot of typical D code cannot be safely represented using DIP1000. The design does not protect you from extending past the modelled subset of the language.

To resolve both of these core issues in the existing design, an escape set must be modelled per parameter. While this resolves the callee's side, it does not protect the caller from misusing the callee. The design DIP1000 attempts to solve this by modelling the relationship between parameters using the two different attributes.

Another solution to this problem is to utilize the information provided by escapes and inverse it, given an output and given the inputs that form it, protect the inputs so that nothing can invalidate the output. This resulted in the proposal that was @live, an opt-in analysis that does not communicate to either the callee or caller any guarantees cross-function, making it functionally irrelevant to the guarantees of DIP1000.

An opt-in solution to ownership does not allow for reference counting to occur safely. To safely do this, the referenced counted owner must be pinned and made effectively read-only so that both a reference to it and the borrowed resource may be passed around. This was a blocker determined by Walter and Timon for adding reference counting to the language.

Furthermore without the entry point to escape analysis having analysis associated with it, there is no differentiation of what can constitute of a safe to borrow from source and what can't be. An example of this is with a global, in the case of a variable thread local storage, it is possible in fully @safe code with DIP1000 turned on to cause a segfault.

import std;

int* tlsGlobal;

@safe:

void main() {
    tlsGlobal = new int(2);
    assert(*tlsGlobal == 2);
    
    toCall();
    assert(*tlsGlobal == 2); // Segfault
}

void toCall() {
    tlsGlobal = null;
}

Prior Work

Escape analysis as a subject matter is primarily an analysis of graphs. How they are mutated and who owns them at what places. Modelling this can be an expensive set of operations in the form of data flow analysis. For sufficient and best experience, a full program analysis is needed with a full graph of manipulation and logic therein analysed.

Native programming languages do not align themselves to full program analysis, due to the separate compilation model. D is a native programming language that uses this model almost exclusively. For this reason, it cannot use a full program analysis and full program graph analysis for modelling escaping. Instead, a flattened view of the graph must be representable inside a function signature.

At the time of this proposal, a solution for escape analysis has been implemented in the D reference compiler that is commonly referred to by its DIP number, DIP1000. This does not cover memory ownership guarantees, instead @live as an opt-in attribute enables some localized to the given function guarantees.

In Rust ownership is a transfer based system, so that only one variable has any ownership of memory. In contrast to D, where this is modelled and attempting to enforce this would not match how garbage collected memory would be used. Further guarantees are given, in that when a borrow occurs from an owner, only one mutable borrow is allowed in a given scope. This complements the ownership transfer system as it guarantees nobody else has the potential for aliasing.

Description

This proposal introduces escape analysis, owner escape analysis along with a way to know if a variable associated with an argument has changed its value post function call.

What escape analysis and its complement owner escape analysis does, is it protects against invalidation of memory ownership whilst one or more borrows exist.

The grammar changes for the new function are described here, removal of DIP1000 and @live are done in its own heading Removal of Existing Language Elements.

AtAttribute:
+    @ EscapeAttribute
+    @ move

ParameterAttributes:
+    @ EscapeAttribute

+ EscapeAttribute:
+    escape ( Identifiers )
+    escape ( )
+    escape

FuncAttr:
+    FuncAttrMove

+ FuncAttrMove:
+    No

The semantic analysis for both analysis, is done at the same time as they are guarantees provided in complement of each other and do not exist in isolation. A switch should be provided to disable this analysis should a use case is required to not perform it in the form of --disable-memorysafety. If it is not set, it will be enabled for a given edition and above by default. For any edition below this will include the inferring of @escape and @move attribute, however no errors will be generated for either attribute.

There is some potential for the escape set on a parameter to be explosive in nature for mangling. At this time no specific mangling scheme is suggested, but it is allowed in this proposal for one to be implemented.

Relationships

An expression is said to have a set of relationships between its inputs and outputs, with some kind of transformation applied to the inputs to get the outputs. This is described using the formula T(inputs...) = (outputs...).

A function prototype, or function pointer declares this relationship, without providing the transformation function. An example of a transformation in the form of an identity function is given:

int* identity(/* has relationship to return */ int* input) => input;

The return value of the identity function is the output and has a relationship to the input parameter.

Each relationship of an input to its outputs can be described as having a strength. These strengths are:

  • No relationship
  • Weak, comes from input and influences output
  • Strong, requires the input to be valid for the output to be valid

For example, to get a strong relationship you can take a pointer to stack memory:

int input;
/*has a strong relationship*/ int* output = &var;

In this example, the variable input must outlive the variable output, if you don't you will get stack corruption.

Another way you can get a strong relationship is to assign a copy of the value that is stored in an already strong relationship variable.

/*has a strong relationship*/ int* input = ...;
int* output = var; // has a strong relationship

The way to explicitly establish the link between a variable and its initializer as strong is to annotate it with scope.

scope int* input = ...;
int* output = var; // has a strong relationship

These three behaviors of establishing a relationship between two variables also applies when a containing type is in play:

struct Input {
	int* ptr;
	int field;
}

Input input1 = ...;
int* output1 = &input1.field; // has a strong relationship between `output1` and `input1`

scope Input input2 = ...;
int* output2 = input2.ptr; // has a strong relationship between `output2` and `input2`

The default relationship of a function's outputs to its inputs is weak, unless the argument for a given input has a strong relationship. In the following example the input variable has a strong relationship to the stack. So when it gets the output from the identity function call it has a strong relationship to its input too.

scope input = new int;
int* output = identity(input);
// `output` variable has a strong relationship to `input` variable

A way to require that a given input has a strong relationship to its outputs is by marking a function parameter as scope.

int* strongIdentity(/* has relationship to return */ scope int* input) => input;

Now you can take an input that does not have a strong relationship, and require the output has a strong relationship to it!

int* input = new int;
int* output = strongIdentity(input);
// `output` variable has a strong relationship to `input` variable

A weak relationship between an input and output, does not limit the output. It only establishes that there is an relationship to be had. This can be quite useful to composed types like tuples and static arrays:

int* transformation(int* input) {
	int*[2] array;
	array[0] = input; // `array` has a weak relationship to `input`
	array[1] = new int; // GC allocation has no relationships without a constructor call or initializer to form one
	return array[0];
}

In the above example, the output value of the function will not be constrained by the variable array. But the weak relationship from the array variable to input parameter, will be inherited by the return value, giving the following prototype:

int* transformation(/* has relationship to return */ int* input);

Setting up a relationship within a function body is one thing, but to do it within a function signature? That is much harder. In the following example, a weak relationship is established where an input pointer is stored inside an output static array.

void assignElement(ref int*[2] output, /* has a relationship to output */ int* input) {
	output[0] = input;
	output[1] = new int;
}

The previous examples in this heading used a raw pointer int* to establish relationships, the full list of types that affect the formation of relationships are:

  • Slices: T[]
  • Raw pointers: T*
  • Associative arrays: T[U]
  • Pointer-containing fields or elements:
    • Structs
    • Unions
    • Static arrays
    • Tuples
  • Any by-ref input parameter or variable will have an implicitly strong relationship to its output if it is also by-ref.

Other types, that behave as a value type like int are unaffected and do not establish a relationship. This means that they may be interacted with without establishing a relationship.

Escape set

Previously this proposal has limited the terminology to establishing a relationship between a given input to its outputs. In this heading the method for describing this relationship in code is presented.

A new attribute is provided, @escape(...), within the brackets an escape set is provided using the following identifiers as elements within it:

  • Nothing
  • return
  • this, also applies to the context pointer of a delegate.
  • __unknown, for exceptions, and globals.
  • __parameters, for all parameters, except the current one.
  • Any function parameter names.

This attribute may be placed on function parameters and on the function which is represents the this pointer.

When the attribute is missing its escape set, it defaults the escape set to @escape(return, this, __unknown, __parameters). When the annotation is missing, this will indicate that it is to be inferred.

alias D = T delegate(@escape U input1, @escape(return) V input2) @escape(return);

T freeFunction(@escape U input1, @escape(return) V input2);

class C {
	T method(@escape U input1, @escape(return) V input2) @escape(return);
}

The escape set only applies to types that are pointers. Non-pointers do not have an escape set, and therefore no @escape attribute. Function parameters that are non-pointers will have their attribute removed if it is specified. The this pointer is always a pointer type, even for structs.

When a function pointer or delegate does not have an annotation for an escape set, it is assumed to be the empty set. This is a safe assumption thanks to the type system enforcing it.

alias F = int* function(int*);

int* identity(@escape(return) int* input){
	return input;
}

F func = &identity; // Error: Variable `func` has type `int* function(int*)` and cannot be assigned `int* function(@escape(return) int*)`

Functions that are @trusted have their function signatures inferred for escapes, but will not error within the body or when the body does not match the signature. For @safe functions these are inferred but will error within the body and when the signature does not match the body. Lastly @system functions will not be analysed for escapes and any annotation of escapes upon its signature will be ignored.

The compiler has no way to assume what an escape set contains for a function declaration without a body. To verify it there is an implicit assumption that the linker will catch it by comparing symbol names with the help of mangling. To prevent accidental assumptions creeping into @safe code, any function without a body that is not fully annotated for the escape sets, will be downgraded to @system. The following function declaration would be treated as if it wasn't annotated as @safe.

int* someFunction(int*, @escape() int*) @safe;

But this will be @safe:

int* someFunction(@escape() int*, @escape() int*) @safe;

Not all ABI's support name mangling of escape sets. By taking the responsibility of escape annotation requirement off the linker, this guarantees the compiler is able to provide stronger guarantees for memory safety analysis without the linker providing a backdoor using innocuous looking code.

When scope is placed upon a variable, it requires that when a variable is converged to not escape into unknown locations. This means that __unknown is not allowed to appear in the escape set. This also applies when a weak relationship parameter is upgraded to strong by the argument.

void func1(@escape(__unknown) scope int* ptr); // Error the parameter `ptr` cannot have an escape set that includes `__unknown` and be marked as having a strong relationship `scope`
void func2(@escape(__unknown) int* ptr);

scope int* ptr;
func2(ptr); // Error variable `ptr` has a strong relation and cannot be escaped out through a `__unknown` parameter

Overriden methods in classes must have an escape set per parameter that is less than or equal to the parent method's set.

class Parent {
	int* method() @escape(return);
}

class Child : Parent {
	override int* method() @escape(return, __unknown); // Error: the escape set for the `this` pointer on `method` must be equal or lesser than the parent which is `return` not `return, __unknown`
}

An Input Changed its Known Value

Sometimes an argument will have its value changed from the input. This is quite important for by-ref parameters who may have its value being tracked. To indicate to the compiler that it should not consider the value prior to a call is the same as the one after, the attribute @move on a parameter will indicate it will have changed. Common functions that demonstrate this behavior are swap and move.

T move(T)(@move @escape(return) T input) {
	return input;
}

At most one escape in the escape set of a parameter, to an output that has only one input may be used to allow the compiler to track movement of a given value between function calls.

void swap(T)(@move @escape(input2) ref T input1,
			 @move @escape(input1) ref T input2) {
	T temp = input1;
	input1 = input2;
	input2 = temp;
}

int* a, b;
swap(a, b);
// Compiler can see that b is in a
// Compiler can see that a is in b

All out parameters will have @move applied to it automatically and need not be programmer applied.

If the @move attribute is applied to a parameter that is not by-ref, templated or the parameter type does not have move constructors it is an error.

As an attribute @move may be inferred if the compiler can see that the input was changed for a given parameter at the end of the called function's body.

struct Unique {
	int* ptr;

	this(/*@move*/ ref Unique other) {
		this.ptr = other.ptr;
		other = Unique.init; // the input into `other` was changed
	}
}

Analysis

The goal of escape analysis, is to have an accurate accounting of where inputs go to their outputs and how to converge it between scopes. It provides protection from false assumptions on lifetimes creeping into @safe code.

An example of two scopes, whereupon assignment resets the escape set of an inner variable:

int* outer;

{
	int* inner = ...;
	outer = inner;
	// @escape(outer) inner
	
	// Converge `outer` with any owners of `inner` lifetimes
	inner = ...;
	// @escape() inner
}

When converging on multiple sets instead of taking the minimum set and erroring, the analysis will take the maximum set of all the scopes:

int* func(int* input) {
	if (input is null) {
		return new int;
		// @escape() input
	} else {
		return input;
		// @escape(return) input
	}
	// @escape(return) input
}

Elements in an array, fields in a class/struct/union are conflated with the variable that stores them in. Supporting awareness and the differentiation of each of these cases is not included in this proposal but a subset coudl be done.

struct S {
	int* field;
}

void handle(int* ptr) {
	S s;
	s.field = ptr;
	// @escape(s) ptr
}

The point of convergence matters for lifetime analysis. It occurs like regular function destructor cleanup for a given scope. It happens in reverse order of the declarations. This has consequences, it allows a variable that has a strong relationship, to grow its escape set during its scope, but be a lot smaller at the end.

struct S {
    int* field;
}

int* acquire(ref S s) @safe {
    return s.field;
}

void caller() @safe {
    int x = 2;
    S s = S(&x);
    
    *acquire(s) = 3;
}

Is equivalent to:

struct S {
    int* field;
    
    this(@escape(this) int* field) @safe {
        this.field = field;
    }
}

int* acquire(@escape(return) ref S s) @safe {
    return s.field;
}

void caller() @safe {
    int x = 2;

    scope xPtr = &x;
    // @escape(xPtr) x, escape set cannot grow

    S s = S(xPtr);
    // @escape(s) xPtr
    
    int* fooReturn = acquire(s);
    // @escape(fooReturn) s
    
    *fooReturn = 3;

    __cleanup(fooReturn); // Cleanup code from compiler such as destructors get injected here
    // @escape() s
    __cleanup(s); // Cleanup code from compiler such as destructors get injected here
    // @escape() xPtr
    __cleanup(xPtr); // Cleanup code from compiler such as destructors get injected here
    // @escape() x
    __cleanup(x); // Cleanup code from compiler such as destructors get injected here
    // x escape set is empty, therefore ok
}

The attribute scope is not transitive. Instead it relies upon cross-function analysis to make guarantees for fields access/mutation and function calls. If any expression causes an output to exist, this will inherently have a strong relationship and therefore can be typed as scope.

Owner Escape Analysis

Owner escape analysis only turns on when one of three situations occurs:

  1. Taking a pointer to stack memory
  2. Taking a pointer to heap memory
  3. Explicit request by annotating scope

In other situations it should not activate, allowing garbage collected memory to be freely transfered around without impedance.

Seeing what variable contributes to another (or becomes), is one thing, but that does not provide guarantees in of itself. For guarantees to be made the relationship between variables must be made inversely. This inverse relationship describes an output variable as being a borrow to one or more owner input variables.

To establish a borrow, a variable must have one or more relationships to it that are strong.

int owner;
int* borrowed = &owner;
// `borrowed` has a strong relationship to `owner`

Function calls:

int* identity(/*@escape(return)*/ int* input) {
	return input;
}

int owner;
int* borrowed = identity(&owner); // Due to `&owner` `borrowed` has a strong relationship to `owner`

Borrowed memory is only ever valid, as long as the owners are not mutated. Mutation of the owners could unmap the borrowed memory, or change it in such a way that the program becomes corrupted. When a borrow is seen, the compiler protects the owner from mutation by requiring it to be "effectively const" as long as borrows exist. It cannot be assigned to, or be passed to methods or functions mutably.

struct Top {
	int* field;
}

void func(ref Top owner) @safe {
	int** field = &owner.field;
	// owner is now effectively const, it cannot be mutated
	
	owner = Top.init; // Error: The variable `owner` has a borrow and cannot be mutated
	owner.field = null; // Error: The variable `owner` has a borrow and cannot be mutated

	if (field !is null) {
		writeln(**field);
		**field = 2; // ok, fully mutable
	}
}

When converging between multiple scopes, the borrowed variables must have the same value in it.

int owner;
int* borrowed;

if (random() > 0.5) {
	borrowed = &owner;
} else {

}
// Error: Variable `borrowed` has two different values in it, it can be owned by `owner` and be null

Side effects from method calls must be prevented, otherwise it will be possible to invalidate a borrow unknowingly. An existing language element for this is for checking against mutability, whereby mutable is disallowed but non-mutable allowed.

struct S {
	int field;

@safe:

	bool isNull() const {
		return false;
	}

	void makeNull() {
	}
}

S s;
int* field = &s.field;

writeln(s.isNull); // ok
s.makeNull(); // Error: Variable `s` has a borrow and may not be mutated by calling `makeNull`.

Protection of an owning array for the sake of this proposal conflates the lifetimes of its elements of an array/tuple, and for fields of a struct/class/union. So in the following example, by applying a strong relationship into an element of the static array will pin the static array so it cannot be returned.

int* transformation(int* input) {
	int value;

	int*[3] array;
	array[0] = input; // `array` has a weak relationship to `input`
	array[1] = new int; // GC allocation has no relationships without a constructor call or initializer to form one
	array[2] = &value;
	return array[0]; // Error: Variable `array` is owned by the stack due to the variable `value` and cannot be returned
}

The attribute @move indicates that a function call will mutate the input, and therefore if there are borrows from that variable to error.

void someConsumer(@move scope ref int* input);

int* owner = ...;
int** borrowed = &owner;
someConsumer(owner); // Error: Variable `owner` has a borrow and cannot be moved into the parameter as it would invalidate the borrows

Global Variables

Not all variables can be tracked throughout a program's lifecycle. Global variables including those in thread local storage, can appear in any point in the call stack multiple times. Pinning of specific values into existance cannot occur for a global for this reason. It can be changed out from under you with no way to prevent it in @safe code.

Loading a value that is a pointer (including structs with pointer fields), into another will apply a flag onto that variable to say it contains global memory. This corresponds with the __unknown relationship argument.

int* global;

void func() {
	int* ptr = global;
	// is a global `ptr`
}

This is useful information to have, as it informs any memory that tries to contribute to it, that it will be escaped out through __unknown lifetime.

int** global;

void func() {
	int** globalPtr = global;
	// is a global `globalPtr`

	int value;
	int* ptr = &value;
	// Variable `ptr` is owned by the stack

	*globalPtr = ptr; // Error: variable `ptr` which has a shorter lifetime cannot be placed into globally accessible memory in `globalPtr`
}

It isn't limited to a single call frame, it can protect against cross-function scopes as well.

int** global;

void caller() {
	int** globalPtr = global;
	// is a global `globalPtr`

	int value;
	int* ptr = &value;
	// Variable `ptr` is owned by the stack

	called(globalPtr, ptr); // Error: Variable `ptr` which is owned by the stack would escape into a longer lifetime memory that is globally accessible `globalPtr`
}

void called(@escape() int** globalPtr, @escape(globalPtr) int* ptr) {
	*globalPtr = ptr;
}

Removal of Existing Language Elements

The language design elements that are being removed are DIP1000 and @live. Together these attempted to do this proposal but in a non-integrated way that has shown minimal adoption.

Attribute:
-   return

AtAttribute:
-    @ live

FuncAttr:
- FuncAttrReturn
- FuncAttrLive

- FuncAttrReturn:
-	Nj

- FuncAttrLive:
-	Nm

No timeline is specified for removal.

Breaking Changes and Deprecations

DIP1000 will not be able to be turned on at the same time as this proposal. Any syntax specific (such as return attribute) to DIP1000 will break.

Any new semantic analysis would only cause errors to be applied to a new edition and would not affect the base D2 language.

During the transition period from DIP1000 to this proposal, the attributes from each proposal that is not active do not contribute to mangling. This enables attributes from each proposal to live side by side to keep a code base compiling.

Reference

Copyright & License

Copyright (c) 2024 by the D Language Foundation

Licensed under Creative Commons Zero 1.0

History

The DIP Manager will supplement this section with links to forum discussions and a summary of the formal assessment.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment