assume

A macro for stating unsafe assumptions in Rust.

Using this macro, one can supply assumptions to the compiler for use in optimization. These assumptions are checked in debug_assertion configurations, and are unchecked (but still present) otherwise.

This is an inherently unsafe operation. It lives in the space between regular assert! and pure unsafe accesses - it relies heavily on an optimizing compiler's ability to track unreachable paths to eliminate unnecessary asserts.

toml [dependencies] assume = "0.5"

Examples

```rust use assume::assume;

let v = vec![1, 2, 3];

// Some computed index that, per invariants, is always in bounds. let i = get_index();

assume!( unsafe: i < v.len(), "index {} is beyond vec length {}", i, v.len(), ); let element = v[i]; // Bounds check optimized out per assumption. ```

```rust use assume::assume;

let items: HashMap = populate_items();

// Some item that, per invariants, always exists. let itemzeroopt: Option<&String> = items.get(&0);

assume!( unsafe: itemzeroopt.issome(), "item zero missing from items map", ); let itemzero = itemzeroopt.unwrap(); // Panic check optimized out per assumption. ```

```rust use assume::assume;

enum Choices { This, That, Other, }

// Some choice that, per invariants, is never Other. let choice = get_choice();

match choice { Choices::This => { /* ... / }, Choices::That => { / ... */ }, Choices::Other => { // This case optimized out entirely, no panic emitted. assume!( unsafe: @unreachable, "choice was other", ); }, } ```

```rust use assume::assume;

[inline(always)]

fn computevalue() -> usize { let result = computevalue_internal();

// Can also be used to provide hints to the caller,
// after the optimizer inlines this assumption.
assume!(
    unsafe: result < 12,
    "result is invalid: {}",
    result,
);
result

}

fn computevalueinternal() -> usize { /* ... */ }

fn processdata(data: &[f64; 100]) { // Bounds check elided per implementation's assumption. let value = data[computevalue()]; }

```

Motivation

Programs often have invariants that cannot be expressed in the type system. Rust is safe by default, and in such cases asserts are made at runtime to verify these invariants. A common example of this is bounds checking for slices.

Consider the following (somewhat convoluted) example:

``rust pub struct ValuesWithEvens { values: Vec<u32>, // Some integers. evens: Vec<usize>, // Indices of even integers invalues`. }

impl ValuesWithEvens { pub fn new(values: Vec) -> Self { let evens = values .iter() .enumerate() .filter_map( |(index, value)| { if value % 2 == 0 { Some(index) } else { None } } ) .collect();

    Self { values, evens }
}

pub fn pop_even(&mut self) -> Option<u32> {
    let index = self.evens.pop()?;

    // We know this index is valid by construction,
    // but a bounds check is performed anyway.
    let value = self.values[index];

    Some(value)
}

}

fn main() { let mut vwe = ValuesWithEvens::new(vec![1, 2, 3, 4]);

println!("{:?}", vwe.pop_even());

} ```

By construction, indices contained within evens are always valid indices into values. However, this cannot be expressed in the type system and there is a bounds check on the line:

rust let value = self.values[index];

This ensures a bug in the program does not result in an out of bounds access. For example, if another method were introduced that modified values but forgot to update evens, it could invalidate the indices - this would not result in undefined behavior thanks to bounds checking.

However, if this is a hot-spot in the program we may need to remove this check. Rust offers unsafe access:

```rust pub fn pop_even(&mut self) -> Option { let index = self.evens.pop()?;

    let value = unsafe { *self.values.get_unchecked(index) };

    Some(value)
}

```

This has no bounds check, but we've removed any scrutiny around the access. We can improve this with a debug-only assertion:

```rust pub fn pop_even(&mut self) -> Option { let index = self.evens.pop()?;

    debug_assert!(index < self.evens.len());
    let value = unsafe { *self.values.get_unchecked(index) };

    Some(value)
}

```

Can you spot the bug? We've asserted against the wrong vector! This should be:

rust debug_assert!(index < self.values.len()); // ^^^^^^

The decoupling of assertion to optimization is error-prone.

The assume! macro relies on the optimizer's ability to leverage stated assumptions. An incorrect assumption leaves the bounds check alone, but a correct assumption removes it:

```rust pub fn pop_even(&mut self) -> Option { let index = self.evens.pop()?;

    assume!(
        unsafe: index < self.values.len(),
        "even index {} beyond values vec length {}",
        index,
        self.values.len(),
    );
    let value = self.values[index];

    Some(value)
}

```

The optimizer considers the bounds check dead code per the assumption, so it is removed. Furthermore, this will assert our condition holds in debug_assertion configurations such as in tests.

Assumptions can also be provided to the caller's context by the implementation:

```rust #[inline(always)] pub fn popeven(&mut self) -> Option { let value = self.popeven_internal()?;

    assume!(
        unsafe: value % 2 == 0,
        "popped value {} is not even",
        value,
    );
    value
}

fn pop_even_internal(&mut self) -> Option<u32> {
    /* ... */
}

```

The caller now receives optimizations "for free". For example:

```rust fn computesomething(vwe: &mut ValuesWithEvens) -> Option { let value = vwe.popeven()?;

perform_common_task(value)

}

fn performcommontask(value: u32) -> Option { if value % 2 == 0 { /* ... */ } else { // This branch is now considered dead code when the // function is called from the compute_something path. } } ```

When not to use

Do not use this macro.

Rely on assert! to check program invariants.

Rely on unreachable! to state that some code path should never be taken.

When to use

Okay - once you:

Then you should consider assume! instead.

This is not a beginner-friendly macro; you must verify the desired optimizations are taking place. You should also have a suite of tests that build with debug_assertion enabled in order to catch violations of the invariant.

Gotchas

See Also

The underlying mechanism for the macro is std::hint::unreachable_unchecked.

License

Licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.