Another example p := &x; *p := 5 y := x + 1;. Another example p := &x; *p := 5 y := x + 1; x := 5; *p := 3 y := x + 1; ???

Slides:



Advertisements
Similar presentations
Data-Flow Analysis II CS 671 March 13, CS 671 – Spring Data-Flow Analysis Gather conservative, approximate information about what a program.
Advertisements

School of EECS, Peking University “Advanced Compiler Techniques” (Fall 2011) SSA Guo, Yao.
Course Outline Traditional Static Program Analysis –Theory Compiler Optimizations; Control Flow Graphs Data-flow Analysis – today’s class –Classic analyses.
Lecture 11: Code Optimization CS 540 George Mason University.
1 CS 201 Compiler Construction Lecture 3 Data Flow Analysis.
Course Outline Traditional Static Program Analysis –Theory Compiler Optimizations; Control Flow Graphs Data-flow Analysis – today’s class –Classic analyses.
Data-Flow Analysis Framework Domain – What kind of solution is the analysis looking for? Ex. Variables have not yet been defined – Algorithm assigns a.
CS412/413 Introduction to Compilers Radu Rugina Lecture 37: DU Chains and SSA Form 29 Apr 02.
Components of representation Control dependencies: sequencing of operations –evaluation of if & then –side-effects of statements occur in right order Data.
Program Representations. Representing programs Goals.
Example in SSA X := Y op Z in out F X := Y op Z (in) = in [ { X ! Y op Z } X :=  (Y,Z) in 0 out F X :=   (in 0, in 1 ) = (in 0 Å in 1 ) [ { X ! E |
6/9/2015© Hal Perkins & UW CSEU-1 CSE P 501 – Compilers SSA Hal Perkins Winter 2008.
Common Sub-expression Elim Want to compute when an expression is available in a var Domain:
Recap from last time We were trying to do Common Subexpression Elimination Compute expressions that are available at each program point.
Representing programs Goals. Representing programs Primary goals –analysis is easy and effective just a few cases to handle directly link related things.
Recap from last time Saw several examples of optimizations –Constant folding –Constant Prop –Copy Prop –Common Sub-expression Elim –Partial Redundancy.
CS 536 Spring Global Optimizations Lecture 23.
Administrative info Subscribe to the class mailing list –instructions are on the class web page, click on “Course Syllabus” –if you don’t subscribe by.
From last time: live variables Set D = 2 Vars Lattice: (D, v, ?, >, t, u ) = (2 Vars, µ, ;,Vars, [, Å ) x := y op z in out F x := y op z (out) = out –
Global optimization. Data flow analysis To generate better code, need to examine definitions and uses of variables beyond basic blocks. With use- definition.
Administrative info Subscribe to the class mailing list –instructions are on the class web page, which is accessible from my home page, which is accessible.
From last time: reaching definitions For each use of a variable, determine what assignments could have set the value being read from the variable Information.
4/25/08Prof. Hilfinger CS164 Lecture 371 Global Optimization Lecture 37 (From notes by R. Bodik & G. Necula)
Constraints for reaching definitions Using may-point-to information: out = in [ { x ! s | x 2 may-point-to(p) } Using must-point-to aswell: out = in –
X := 11; if (x == 11) { DoSomething(); } else { DoSomethingElse(); x := x + 1; } y := x; // value of y? Phase ordering problem Optimizations can interact.
1 CS 201 Compiler Construction Lecture 3 Data Flow Analysis.
Data Flow Analysis Compiler Design October 5, 2004 These slides live on the Web. I obtained them from Jeff Foster and he said that he obtained.
Loop invariant detection using SSA An expression is invariant in a loop L iff: (base cases) –it’s a constant –it’s a variable use, all of whose single.
CS 412/413 Spring 2007Introduction to Compilers1 Lecture 29: Control Flow Analysis 9 Apr 07 CS412/413 Introduction to Compilers Tim Teitelbaum.
Class canceled next Tuesday. Recap: Components of IR Control dependencies: sequencing of operations –evaluation of if & then –side-effects of statements.
Constraints for reaching definitions Using may-point-to information: out = in [ { x ! s | x 2 may-point-to(p) } Using must-point-to aswell: out = in –
San Diego October 4-7, 2006 Over 1,000 women in computing Events for undergraduates considering careers and graduate school Events for graduate students.
Prof. Fateman CS 164 Lecture 221 Global Optimization Lecture 22.
From last lecture x := y op z in out F x := y op z (in) = in [ x ! in(y) op in(z) ] where a op b =
Direction of analysis Although constraints are not directional, flow functions are All flow functions we have seen so far are in the forward direction.
Common Sub-expression Elim Want to compute when an expression is available in a var Domain:
Recap from last time We saw various different issues related to program analysis and program transformations You were not expected to know all of these.
Projects. Dataflow analysis Dataflow analysis: what is it? A common framework for expressing algorithms that compute information about a program Why.
Recap from last time: live variables x := 5 y := x + 2 x := x + 1 y := x y...
Machine-Independent Optimizations Ⅰ CS308 Compiler Theory1.
From last time: reaching definitions For each use of a variable, determine what assignments could have set the value being read from the variable Information.
Global optimization. Data flow analysis To generate better code, need to examine definitions and uses of variables beyond basic blocks. With use- definition.
From last lecture We want to find a fixed point of F, that is to say a map m such that m = F(m) Define ?, which is ? lifted to be a map: ? = e. ? Compute.
Schedule Midterm out tomorrow, due by next Monday Final during finals week Project updates next week.
Direction of analysis Although constraints are not directional, flow functions are All flow functions we have seen so far are in the forward direction.
Composing Dataflow Analyses and Transformations Sorin Lerner (University of Washington) David Grove (IBM T.J. Watson) Craig Chambers (University of Washington)
Recap from last time We saw various different issues related to program analysis and program transformations You were not expected to know all of these.
Prof. Bodik CS 164 Lecture 16, Fall Global Optimization Lecture 16.
Precision Going back to constant prop, in what cases would we lose precision?
Example x := read() v := a + b x := x + 1 w := x + 1 a := w v := a + b z := x + 1 t := a + b.
Program Representations. Representing programs Goals.
CS412/413 Introduction to Compilers Radu Rugina Lecture 18: Control Flow Graphs 29 Feb 02.
1 Control Flow Graphs. 2 Optimizations Code transformations to improve program –Mainly: improve execution time –Also: reduce program size Can be done.
CS412/413 Introduction to Compilers and Translators April 2, 1999 Lecture 24: Introduction to Optimization.
Optimization Simone Campanoni
Code Optimization More Optimization Techniques. More Optimization Techniques  Loop optimization  Code motion  Strength reduction for induction variables.
Code Optimization Overview and Examples
Code Optimization.
Data Flow Analysis Suman Jana
Dataflow analysis.
Program Representations
Machine-Independent Optimization
University Of Virginia
Another example: constant prop
Dataflow analysis.
Code Optimization Overview and Examples Control Flow Graph
Tour of common optimizations
Tour of common optimizations
CSE P 501 – Compilers SSA Hal Perkins Autumn /31/2019
Tour of common optimizations
Presentation transcript:

Another example p := &x; *p := 5 y := x + 1;

Another example p := &x; *p := 5 y := x + 1; x := 5; *p := 3 y := x + 1; ???

Another example for j := 1 to N for i := 1 to M a[i] := a[i] + b[j]

Another example for j := 1 to N for i := 1 to M a[i] := a[i] + b[j]

Another example area(h,w) { return h * w } h :=...; w := 4; a := area(h,w)

Another example area(h,w) { return h * w } h :=...; w := 4; a := area(h,w)

Optimization themes Don’t compute if you don’t have to –unused assignment elimination Compute at compile-time if possible –constant folding, loop unrolling, inlining Compute it as few times as possible –CSE, PRE, PDE, loop invariant code motion Compute it as cheaply as possible –strength reduction Enable other optimizations –constant and copy prop, pointer analysis Compute it with as little code space as possible –unreachable code elimination

Dataflow analysis

Dataflow analysis: what is it? A common framework for expressing algorithms that compute information about a program Why is such a framework useful?

Dataflow analysis: what is it? A common framework for expressing algorithms that compute information about a program Why is such a framework useful? Provides a common language, which makes it easier to: –communicate your analysis to others –compare analyses –adapt techniques from one analysis to another –reuse implementations (eg: dataflow analysis frameworks)

Control Flow Graphs For now, we will use a Control Flow Graph representation of programs –each statement becomes a node –edges between nodes represent control flow Later we will see other program representations –variations on the CFG (eg CFG with basic blocks) –other graph based representations

x :=... y :=... p :=... if (...) {... x... x := y... } else {... x... x :=... *p :=... }... x y... y :=... p := x... x := y x... x :=... *p := x... y :=... if (...) Example CFG

An example DFA: reaching definitions For each use of a variable, determine what assignments could have set the value being read from the variable Information useful for: –performing constant and copy prop –detecting references to undefined variables –presenting “def/use chains” to the programmer –building other representations, like the DFG Let’s try this out on an example

1: x :=... 2: y :=... 3: y :=... 4: p := x... 5: x := y x... 6: x :=... 7: *p := x y... 8: y :=... x :=... y :=... p := x... x := y x... x :=... *p := x... y :=... if (...) Visual sugar

1: x :=... 2: y :=... 3: y :=... 4: p := x... 5: x := y x... 6: x :=... 7: *p := x y... 8: y :=...

1: x :=... 2: y :=... 3: y :=... 4: p := x... 5: x := y x... 6: x :=... 7: *p := x y... 8: y :=...

Safety When is computed info safe? Recall intended use of this info: –performing constant and copy prop –detecting references to undefined variables –presenting “def/use chains” to the programmer –building other representations, like the DFG Safety: –can have more bindings than the “true” answer, but can’t miss any

Reaching definitions generalized DFA framework is geared towards computing information at each program point (edge) in the CFG –So generalize the reaching definitions problem by stating what should be computed at each program point For each program point in the CFG, compute the set of definitions (statements) that may reach that point Notion of safety remains the same

Reaching definitions generalized Computed information at a program point is a set of var ! stmt bindings –eg: { x ! s 1, x ! s 2, y ! s 3 } How do we get the previous info we wanted? –if a var x is used in a stmt whose incoming info is in, then:

Reaching definitions generalized Computed information at a program point is a set of var ! stmt bindings –eg: { x ! s 1, x ! s 2, y ! s 3 } How do we get the previous info we wanted? –if a var x is used in a stmt whose incoming info is in, then: { s | (x ! s) 2 in } This is a common pattern –generalize the problem to define what information should be computed at each program point –use the computed information at the program points to get the original info we wanted

1: x :=... 2: y :=... 3: y :=... 4: p := x... 5: x := y x... 6: x :=... 7: *p := x y... 8: y :=...

1: x :=... 2: y :=... 3: y :=... 4: p := x... 5: x := y x... 6: x :=... 7: *p := x y... 8: y :=...

Using constraints to formalize DFA Now that we’ve gone through some examples, let’s try to precisely express the algorithms for computing dataflow information We’ll model DFA as solving a system of constraints Each node in the CFG will impose constraints relating information at predecessor and successor points Solution to constraints is result of analysis

Constraints for reaching definitions s: x :=... in out s: *p :=... in out

Constraints for reaching definitions Using may-point-to information: out = in [ { x ! s | x 2 may-point-to(p) } Using must-point-to aswell: out = in – { x ! s’ | x 2 must-point-to(p) Æ s’ 2 stmts } [ { x ! s | x 2 may-point-to(p) } s: x :=... in out s: *p :=... in out out = in – { x ! s’ | s’ 2 stmts } [ { x ! s }

Constraints for reaching definitions s: if (...) in out[0]out[1] merge out in[0]in[1]

Constraints for reaching definitions s: if (...) in out[0]out[1] more generally: 8 i. out [ i ] = in out [ 0 ] = in Æ out [ 1 ] = in merge out in[0]in[1] more generally: out =  i in [ i ] out = in [ 0 ] [ in [ 1 ]

Flow functions The constraint for a statement kind s often have the form: out = F s (in) F s is called a flow function –other names for it: dataflow function, transfer function Given information in before statement s, F s (in) returns information after statement s Other formulations have the statement s as an explicit parameter to F: given a statement s and some information in, F(s,in) returns the outgoing information after statement s

Flow functions, some issues Issue: what does one do when there are multiple input edges to a node? Issue: what does one do when there are multiple outgoing edges to a node?

Flow functions, some issues Issue: what does one do when there are multiple input edges to a node? –the flow functions takes as input a tuple of values, one value for each incoming edge Issue: what does one do when there are multiple outgoing edges to a node? –the flow function returns a tuple of values, one value for each outgoing edge –can also have one flow function per outgoing edge

Flow functions Flow functions are a central component of a dataflow analysis They state constraints on the information flowing into and out of a statement This version of the flow functions is local –it applies to a particular statement kind –we’ll see global flow functions shortly...

Summary of flow functions Flow functions: Given information in before statement s, F s (in) returns information after statement s Flow functions are a central component of a dataflow analysis They state constraints on the information flowing into and out of a statement

1: x :=... 2: y :=... 3: y :=... 4: p :=... if(...)... x... 5: x := y x... 6: x :=... 7: *p :=... merge... x y... 8: y :=... d0d0 d1d1 d2d2 d3d3 d5d5 d6d6 d7d7 d9d9 d 10 d 11 d 13 d 14 d 15 d 16 d 12 d4d4 d8d8 Back to example d 1 = F a (d 0 ) d 2 = F b (d 1 ) d 3 = F c (d 2 ) d 4 = F d (d 3 ) d 5 = F e (d 4 ) d 6 = F g (d 5 ) d 7 = F h (d 6 ) d 8 = F i (d 7 ) d 10 = F j (d 9 ) d 11 = F k (d 10 ) d 12 = F l (d 11 ) d 9 = F f (d 5 ) d 13 = F m (d 12, d 8 ) d 14 = F n (d 13 ) d 15 = F o (d 14 ) d 16 = F p (d 15 ) How to find solutions for d i ?

This is a forward problem –given information flowing in to a node, can determine using the flow function the info flow out of the node To solve, simply propagate information forward through the control flow graph, using the flow functions What are the problems with this approach?

1: x :=... 2: y :=... 3: y :=... 4: p :=... if(...)... x... 5: x := y x... 6: x :=... 7: *p :=... merge... x y... 8: y :=... d0d0 d1d1 d2d2 d3d3 d5d5 d6d6 d7d7 d9d9 d 10 d 11 d 13 d 14 d 15 d 16 d 12 d4d4 d8d8 First problem d 1 = F a (d 0 ) d 2 = F b (d 1 ) d 3 = F c (d 2 ) d 4 = F d (d 3 ) d 5 = F e (d 4 ) d 6 = F g (d 5 ) d 7 = F h (d 6 ) d 8 = F i (d 7 ) d 10 = F j (d 9 ) d 11 = F k (d 10 ) d 12 = F l (d 11 ) d 9 = F f (d 5 ) d 13 = F m (d 12, d 8 ) d 14 = F n (d 13 ) d 15 = F o (d 14 ) d 16 = F p (d 15 ) What about the incoming information?

First problem What about the incoming information? –d 0 is not constrained –so where do we start? Need to constrain d 0 Two options: –explicitly state entry information –have an entry node whose flow function sets the information on entry (doesn’t matter if entry node has an incoming edge, its flow function ignores any input)

Entry node s: entry out out = { x ! s | x 2 Formals }

1: x :=... 2: y :=... 3: y :=... 4: p :=... if(...)... x... 5: x := y x... 6: x :=... 7: *p :=... merge... x y... 8: y :=... d0d0 d1d1 d2d2 d3d3 d5d5 d6d6 d7d7 d9d9 d 10 d 11 d 13 d 14 d 15 d 16 d 12 d4d4 d8d8 Second problem d 1 = F a (d 0 ) d 2 = F b (d 1 ) d 3 = F c (d 2 ) d 4 = F d (d 3 ) d 5 = F e (d 4 ) d 6 = F g (d 5 ) d 7 = F h (d 6 ) d 8 = F i (d 7 ) d 10 = F j (d 9 ) d 11 = F k (d 10 ) d 12 = F l (d 11 ) d 9 = F f (d 5 ) d 13 = F m (d 12, d 8 ) d 14 = F n (d 13 ) d 15 = F o (d 14 ) d 16 = F p (d 15 ) d 0 = F entry () Which order to process nodes in?

Second problem Which order to process nodes in? Sort nodes in topological order –each node appears in the order after all of its predecessors Just run the flow functions for each of the nodes in the topological order What’s the problem now?

Second problem, prime When there are loops, there is no topological order! What to do? Let’s try and see what we can do

1: x :=... 2: y :=... 3: y :=... 4: p := x... 5: x := y x... 6: x :=... 7: *p := x y... 8: y :=...

1: x :=... 2: y :=... 3: y :=... 4: p := x... 5: x := y x... 6: x :=... 7: *p := x y... 8: y :=...