Difference between revisions of "DIP74"
(→Defining a type that can be used both with RC and GC) |
|||
Line 62: | Line 62: | ||
function(ref x, y) { | function(ref x, y) { | ||
if (y) y.opAddRef(); | if (y) y.opAddRef(); | ||
− | scope(failure) y.opRelease(); | + | scope(failure) if (y) y.opRelease(); |
if (x) x.opRelease(); | if (x) x.opRelease(); | ||
x = y; | x = y; |
Revision as of 17:45, 27 February 2015
Title: | Reference Counted Class Objects |
---|---|
DIP: | 74 |
Version: | 1 |
Status: | Draft |
Created: | 2015-02-23 |
Last Modified: | 2015-02-27 |
Author: | Walter Bright and Andrei Alexandrescu |
Abstract
This DIP proposes @safe reference counted class objects (including exceptions) and interfaces for D.
Description
DIP25 allows defining struct types that own data and expose references to it, @safely, whilst controlling lifetime of that data. This proposal allows defining class objects that are safe yet use deterministic destruction for themselves and resources they own.
The compiler detects automatically and treats specially all classes and interfaces that define the following two methods:
class Widget {
T1 opAddRef();
T2 opRelease();
...
}
T1 and T2 may be any types (usually void or an integral type). The methods may or may not be final, virtual, or inherited from a supertype. Any attributes are allowed on these methods. (If practical, nothrow and final are suggested for performance.) They must be public. UFCS-expanded calls are not acceptable. If these two methods exist, the compiler categorizes this class or interface type as a reference counted object (RCO).
Rules
RCOs are handled as follows:
- @safe code may not issue explicit calls to opAddRef/opRelease.
- Whenever a new reference to an object is created (e.g. auto a = b;), compiler inserts a call to opAddRef in the generated code. Call is evaluated only if the reference is not null. The lowering of auto a = lvalExpr; to pre-DIP74 code is conceptually as follows:
auto a = function(x) { if (x) x.opAddRef(); return x; }(lvalExpr);
- If a new reference is created from an rvalue (including a call to new or the result of a function), no call to opAddRef is inserted. As a consequence, there is no call inserted for the first reference created via a constructor (i.e. it is assumed the constructor already puts the object in the appropriate state). For example the lowering of auto a = new Widget; does not insert a call to opAddRef.
- Whenever a reference to an object is assigned (e.g. a = b), first b.opAddRef() is called and then a.opRelease() is called, followed by the reference assignment itself. Calls are only made if the respective objects are not null. So the lowering of e.g. lvalExprA = lvalExprB; to pre-DIP74 code is:
function(ref x, y) {
if (y) y.opAddRef();
scope(failure) if (y) y.opRelease();
if (x) x.opRelease();
x = y;
}(lvalExprA, lvalExprB);
The complexity of this code underlies the importance of making opAddRef and especially opRelease nothrow. In that case the scope(failure) statement may be elided.
- Whenever a reference to an object goes out of scope, the compiler inserts an implicit call to opRelease. Call is evaluated only if the reference is not null.
- struct, class, and closure types that have RCO members accommodate calls to opRelease during their destruction.
- The pass-by-value protocol for RCOs is as follows: the caller calls opAddRef and the callee calls opRelease. These calls are sequenced and handled the same as copy constructor calls and destructor calls, respectively, for struct objects. Example:
struct A {
this(this);
~this();
}
void fun(A x, Widget y, A z) {
}
In the code above, calling fun entails the sequence:
- All parameters are memcpy'd
- Postblit call for x
- y.opAddRef()
- Postblit call for z
- Function is entered
- Destructor call for z
- y.opRelease()
- Destructor call for x
- Function returns
The lowering of a call fun(exprA, exprB, exprC) to pre-DIP74 code is:
fun(exprA, function(x) { if (x) x.opAddRef(); return x; }(exprB), exprC);
However, this translation is approximate. If exprC throws an exception (causing fun to not be entered), the compiler inserts code for calling opRelease() against the second argument. A more accurate lowering is:
{
typeof(exprB) t;
return fun(
exprA,
function(x) { t = x; if (t) t.opAddRef(); return t; }(exprB),
(){ scope(failure) if (t) t.opRelease(); return exprC; }
);
}()
This lowering assumes left-to-right evaluation of function parameters. If fun itself throws, it is responsible for calling opRelease against its second argument.
- No opAddRef or opRelease calls are issued for the implicit this parameter.
- A function that returns a local RCO calls neither opAddRef nor opRelease against that value. Example:
Widget fun() {
auto a = new Widget;
return a; // no calls inserted
}
Note: this is not an optimization. The compiler does not have the discretion to insert additional opAddRef/opRelease calls.
- A function that returns an RCO rvalue calls neither opAddRef nor opRelease against that value. Example:
Widget fun() {
return new Widget; // no calls inserted
}
Note: this is not an optimization. The compiler does not have the discretion to insert additional opAddRef/opRelease calls.
- Functions that return an RCO (other than the two cases above) call opAddRef against the returned reference. Example:
Widget fun(ref Widget a) {
return a; // opAddRef inserted
}
- The compiler considers that opRelease is the inverse of opAddRef, and therefore is at liberty to elide pairs of calls to opAddRef/opRelease. Example:
Widget fun() {
auto a = new Widget;
auto b = a;
return b;
}
Applying the rules defined above would have fun's lowering insert one call to opAddRef (for creating b) and one call to opRelease (when a goes out of scope). However, these calls may be elided.
- Implicit conversion to supertypes (class or interface) is allowed ONLY if the supertype is also a reference counted type. It follows that reference counted types cannot be converted to Object (unless Object itself defines the two methods).
- Explicit casting to or from void* does not entail a call to opAddRef.
- Typechecking methods of reference counted types is done the same as for structs. This is important because it limits what reference counted types can do. Consider:
@safe class Widget1 {
private int data;
ref int getData() { return data; } // fine
...
}
@safe class Widget2 {
private int data;
ref int getData1() { return data; } // ERROR
ref int getData2() return { return data; } // fine
ulong opAddRef();
ulong opRelease();
...
}
This is because it is safe for a garbage collected object to escape references to its internal state. The same is not allowed for reference counted objects because they are expected to be deallocated in a deterministic manner (same as e.g. struct objects on the stack).
Idioms and How-Tos
Defining a non-copyable reference type
Using @disable this(this); is a known idiom for creating struct objects that can be created and moved but not copied. The same is achievable with RCOs by means of @disable opAddRef(); (the declaration must still be present in order for the type to qualify as RCO, and implemented if not final).
Defining a reference counted object with deallocation
Classic reference counting techniques can be used with opAddRef and opRelease.
class Widget {
private uint _refs = 1;
void opAddRef() {
++_refs;
}
void opRelease() {
if (_refs > 1) {
--_refs;
} else {
this.destroy();
GC.free(cast(void*) this);
}
}
...
}
Usually such approaches also use private constructors and object factories to ensure the same allocation method is used during creation and destruction of the object.
If the object only needs to free this (and no other owned resources), the typechecking ensured by the compiler is enough to verify safety (however, @trusted needs to be applied to the call that frees this).
Defining a type that owns resources
RCOs that own references are defined similarly to structs that own references. Attention must be paid to annotate all functions returning references to owned data with return.
class Widget {
private uint _refs = 1;
private int[] _payload; // owned
ref int opIndex(size_t n) return { // mark this as a non-escape reference
return _payload[n];
}
void opAddRef() {
++_refs;
}
void opRelease() {
if (_refs > 1) {
--_refs;
} else {
GC.free(_payload.ptr);
_payload = null;
this.destroy();
GC.free(cast(void*) this);
}
}
...
}
Relinquishing an owned resource
Consider that Widget in the example above wants to give away its _payload to user code. It can do so with a method that effects a destructive read:
class Widget {
...
int[] releasePayload() {
auto result = _payload;
_payload = null;
return result;
}
}
The method is correctly not annotated with return because the slice it returns is not scoped by this. Note that if the implementer of Widget forgets the assignment _payload = null, user code may end up with a dangling reference.
Defining a type that can be used both with RC and GC
The simplest way to define a type that works with both RC and GC (subject to e.g. a configuration option) is to simply always define opAddRef and opRelease and rig them to be no-op in the GC case. There are instances in which this approach is not desirable:
- RCOs objects are subject to additional limitations compared to their GC counterparts:
- No conversion to Object or interfaces that are not reference counted
- Cannot escape pointers and references to direct members in @safe code
- If the stubbed opAddRef and opRelease are not final, efficiency may be a concern: the compiler may be unable to detect the functions do nothing and still insert virtual calls to them.
Another possibility is to make RC vs. GC a policy choice instructing the class being defined:
enum MMPolicy { GC, RC }
class Widget(MMPolicy pol) {
static if (pol == MMPolicy.RC) {
void opAddRef() { ... }
void opRelease() { ... }
}
...
}
Such a class may benefit of the full benefits of each policy, selectable by appropriate use of static if.
Unittests should make sure that the class works as expected with both approaches.
Qualified Types
TODO
Aftermath
This DIP allows defining reference counted class objects that are usable in @safe code. However, it does not enforce safety.
Explicitly freeing memory associated with an object remains the responsibility of the user. If the user decides to annotate calls such as free or GC.free etc. as @trusted, it is the user's responsibility to make sure the class was designed to insert return annotations for all references to owned objects made accessible by the class.
In short, this DIP makes it possible to write @safe objects with deterministic memory deallocation, but does not enforce it.
Copyright
This document has been placed in the Public Domain.