The restrict
keyword's behavior is defined in C99 by 6.7.3.1:
Let D be a declaration of an ordinary identifier that provides a means of designating an object P as a restrict-qualified pointer to type T.
If D appears inside a block and does not have storage class extern, let B denote the block. If D appears in the list of parameter declarations of a function definition, let B denote the associated block. Otherwise, let B denote the block of main (or the block of whatever function is called at program startup in a freestanding environment).
In what follows, a pointer expression E is said to be based on object P if (at some sequence point in the execution of B prior to the evaluation of E) modifying P to point to a copy of the array object into which it formerly pointed would change the value of E.119) Note that ''based'' is defined only for expressions with pointer types.
During each execution of B, let L be any lvalue that has &L based on P. If L is used to access the value of the object X that it designates, and X is also modified (by any means), then the following requirements apply: T shall not be const-qualified. Every other lvalue used to access the value of X shall also have its address based on P. Every access that modifies X shall be considered also to modify P, for the purposes of this subclause. If P is assigned the value of a pointer expression E that is based on another restricted pointer object P2, associated with block B2, then either the execution of B2 shall begin before the execution of B, or the execution of B2 shall end prior to the assignment. If these requirements are not met, then the behavior is undefined.
Like just about everybody else, I have a hard time understanding all the intricacies of this definition. As an answer to this question, I'd like to see a set of good examples, for each requirement in the 4th paragraph, of usages that would violate the requirement. This article:
does a good job of presenting the rules in terms of "a compiler may assume..."; expanding on that pattern and tying in the assumptions the compiler can make, and how they fail to hold, with each example would be great.
Below, I will refer to the usecases from the Sun paper linked to in the question.
The (relatively) obvious case would be the mem_copy() case, which falls under the 2nd usecase category in the Sun paper (the
f1()
function). Let's say we have the following two implementations:Because we know there is no overlap between the two arrays pointed to by s1 and s2, the code for the 1st function would be straight forward:
s2 = '....................1234567890abcde' <- s2 before the naive copy
s1 = '1234567890abcde....................' <- s1 after the naive copy
s2 = '....................1234567890abcde' <- s2 after the naive copy
OTOH, in the 2nd function, there may be an overlap. In this case, we need to check whether the source array is located before the destination or vice-versa, and choose the loop index boundaries accordingly.
For example, say
s1 = 100
ands2 = 105
. Then, ifn=15
, after the copy the newly copieds1
array will overrun the first 10 bytes of the sources2
array. We need to make sure we copied the lower bytes first.s2 = '.....1234567890abcde' <- s2 before the naive copy
s1 = '1234567890abcde.....' <- s1 after the naive copy
s2 = '.....67890abcdeabcde' <- s2 after the naive copy
However, if,
s1 = 105
ands2 = 100
, then writing the lower bytes first will overrun the last 10 bytes of the sources2
, and we end up with an erroneous copy.s2 = '1234567890abcde.....' <- s2 before the naive copy
s1 = '.....123451234512345' <- s1 after the naive copy - not what we wanted
s2 = '123451234512345.....' <- s2 after the naive copy
In this case, we need to copy the last bytes of the array first, possibly stepping backwards. The code will look something like:
It is easy to see how the
restrict
modifier gives a chance for better speed optimization, eliminating extra code, and an if-else decision.At the same time, this situation is hazardous to the incautious programmer, who passes overlapping arrays to the
restrict
-ed function. In this case, no guards are there for ensuring the proper copying of the array. Depending on the optimization path chosen by the compiler, the result is undefined.The 1st usecase (the
init()
function) can be seen as a variation on the 2nd one, described above. Here, two arrays are created with a single dynamic memory allocation call.Designating the two pointers as
restrict
-ed enables optimization in which the instructions order would matter otherwise. For example, if we have the code:then the optimizer can reorder these statements if it finds it useful.
OTOH, if the pointers are not
restrict
-ed, then it is important that the 1st assignment will be performed before the second one. This is because there is a possibility thata1[5]
anda2[3]
are actually the same memory location! It is easy to see that when this is the case, then the end value there should be 8. If we reorder the instructions, then the end value will be 4!Again, if non-disjoint pointers are given to this
restrict
-ed assumed code, the result is undefined.