Professional Documents
Culture Documents
It - (R22) - 2-2 - Automata and Compiler Design - Digital Notes - (2023-24)
It - (R22) - 2-2 - Automata and Compiler Design - Digital Notes - (2023-24)
ON
AUTOMATA AND COMPILER DESIGN
(R22A1201)
PREPARED BY
P. SWETHA
COURSE OBJECTIVES: -
1. To provide an understanding of automata, grammars, and language translators.
2. To learn the various techniques used in compiler construction
3. To have insight into the process of semantic analysis
4. To study the various code optimization techniques
5. To apprehend the code generation techniques
UNIT - I:
Formal Language and Regular Expressions: Languages, Definition Languages regular expressions,
Finite Automata – DFA, NFA. Conversion of regular expression to NFA, NFA to DFA. Context Free
grammars and parsing, derivation, parse trees, Application of Finite Automata.
UNIT - II:
Introduction To Compiler, Phases of Compilation, ambiguity LL(K) grammars and LL(1) parsing
Bottom up parsing handle pruning LR Grammar Parsing, LALR parsing, parsing ambiguous
grammars, YACC programming specification.
Semantics: Syntax directed translation, S-attributed and L-attributed grammars.
UNIT - III:
Intermediate code –abstract syntax tree, translation of simple statements and control flow
statements
Context Sensitive features – Chomsky hierarchy of languages and recognizers, type checking,
type conversions, equivalence of type expressions, overloading of functions and operations.
UNIT - IV:
Run time storage: Storage organization, storage allocation strategies scope access to non local
names.
Code optimization: Principal sources of optimization, optimization of basic blocks, peephole
optimization.
UNIT - V:
Code generation: Machine dependent code generation, object code forms, generic code generation
algorithm, Register allocation and assignment. Using DAG representation of Block.
TEXTBOOKS:
1. Introduction to Theory of computation.Sipser, 2nd Edition, Thomson.
2. Compilers Principles, Techniques and Tools Aho, Ullman, Ravisethi, Pearson Education.
REFERENCE BOOKS:
1. Modern Compiler Implementation in C- Andrew N. Apple, Cambridge University Press.
2. Lex & yacc – John R. Levine, Tony Mason, Doug Brown, O’reilly
3. Modern Compiler Design- Dick Grune, Henry E. Bal, Cariel T. H. Jacobs,Wiley dreamtech.
4. Engineering a Compiler-Cooper & Linda, Elsevier.
5. Compiler Construction, Louden, Thomson.
6. Introduction to Automat a Theory Languages and Computation”. Hopcroft H.E. and Ullman J.D.Pearson
Education.
1 NFA to DFA
4 15
2 Bottom-up parsing
7 22
3
12 Intermediate code 31
3
13 Abstract syntax tree 33
3
15 Chomsky hierarchy of languages and recognizers 36
3
17 Overloading of functions and operations 39
4 48
21 Principal sources of optimization, optimization of basic blocks
4 Peephole optimization 54
22
5 58
23 Machine dependent code generation, object code forms
5 60
24 Generic code generation algorithm
Fundamentals
Example: Σ = {0,1}
Σ* = {ε, 0, 1, 00, 01, 10, 11, 000, 001,…}
Σ+ = {0, 1, 00, 01, 10, 11, 000, 001,…}
A language is:
A set of strings from some alphabet (finite or infinite). In other words, Any
subset L ofΣ*
Examples:
Σ = {0,1}
L = {x | x is in Σ* and x contains an even number of 0‟s}
Σ = {0, 1, 2,…, 9, .}
L = {x |x is in Σ* and x forms a finite length real number}
Σ = {English words}
L = {x | x is in Σ* and x is a syntactically correct English sentence}
Regular Expression
• A regular expression is used to specify a language, and it does so precisely.
• Regular expressions are very intuitive.
• Regular expressions are very useful in a variety of contexts.
• Given a regular expression, an NFA-ε can be constructed from it automatically.
• Thus, so can an NFA, a DFA, and a corresponding program, all automatically.
Definition:
Let Σ be an alphabet. The regular expressions over Σare:
Ø Represents the empty set {}
Ε Represents the set{ε}
Represents the set {a}, for any symbol a inΣ
Let r and s be regular expressions that represent the sets R and S, respectively.
r+s Represents the set RUS (precedence3)
rs Represents the set RS (precedence2)
r* Represents the set R* (highest precedence)
(r) Represents the set R (not an op, provides precedence)
If r is a regular expression, then L(r) is used to denote the corresponding language.
Examples:
Let Σ = {0,1}
(0 +1)* All strings of0‟s and1‟s0(0 +1)* All strings of 0‟s and 1‟s, beginning witha0(0
+1)*1 All strings of 0‟s and 1‟s, ending with a1
(0 + 1)*0(0+1)* All strings of 0‟s and 1‟s containing at least one 0 (0 + 1)*0(0 + 1)*0(0+1)* All strings
of 0‟s and 1‟s containing at least two
0‟s (0+1)*01*01* All strings of 0‟s and 1‟s containing at least two
0‟s (101*0)* All strings of 0‟s and 1‟s containing an even number of 0‟s
1*(01*01*)* All strings of 0‟s and 1‟s containing an even number of 0‟s
(1*01*0)*1* All strings of0‟s and 1‟s containing an even number of0‟s
Identities:
3. Ø* =ε
4. ε* =ε
5. u+v =v+u
7. u+u=u
8. u* =(u*)*
9. u(v+w) =uv+uw
=u*(u+v)*
=(u+vu*)*
= (u*v*)*
=u*(vu*)*
=(u*v)*u*
A finite state machine has a set of states and two functions called the next-state
function and the output function
The set of states correspond to all the possible combinations of the internal storage
If there are n bits of storage, there are 2n possible states
The next state function is a combinational logic function that given the inputs and the
current state, determines the next state of the system
The output function produces a set of outputs from the current state and the inputs
Finite Automata
While NFA‟s are more expressive than DFA‟s, we will see that adding
nondeterminism does not let us define any language that cannot be
defined by a DFA.
One way to think of this is we might write a program using a NFA, but
then when it is “compiled” we turn the NFA into an equivalent DFA.
Notes:
• A DFA M = (Q, Σ, δ,q0,F) partitions the set Σ* into two sets:
L(M)and Σ* -L(M).
δ: (Q x Σ)->2Q -2Q is the power set of Q, the set of all subsets of Q δ(q,s) -The set of
all states p such that there is a transition
labeled s from q to p δ(q,s) is a function from Q x S to 2Q (but not to Q)
Let M = (Q, Σ, δ,q0,F) be an NFA and let w be in Σ*. Then w is accepted by
M iff δ({q0}, w) contains at least one state inF.
Let M = (Q, Σ, δ,q0,F) be an NFA. Then the language accepted by M is the
set: L(M) = {w | w is in Σ* and δ({q0},w) contains at least one state in F}
Another equivalent definition:
L(M) = {w | w is in Σ* and w is accepted by M}
Step 1: Q‟ = ɸ Step 2:
Q‟ = {q0}
Step 3: For each state in Q‟, find the states for each input symbol.
Currently, state in Q‟ is q0, find moves from q0 on input symbol a and b using transition function of
NFA and update the transition table of DFA
δ‟ (Transition Function of DFA)
Now { q0, q1 } will be considered as a single state. As its entry is not in Q‟, add it to Q‟. So Q‟ =
{ q0, { q0, q1 } }
Now, moves from state { q0, q1 } on different input symbols are not present in transition table of
DFA, we will calculate it like:
δ‟ ( { q0, q1 }, a ) = δ ( q0, a ) 𝖴 δ ( q1, a ) = { q0, q1 }
δ‟ ( { q0, q1 }, b ) = δ ( q0, b ) 𝖴 δ ( q1, b ) = { q0, q2 }
Now we will update the transition table of DFA.
Now { q0, q2 } will be considered as a single state. As its entry is not in Q‟, add it to Q‟. So Q‟ =
{ q0, { q0, q1 }, { q0, q2 } }
Now, moves from state {q0, q2} on different input symbols are not present in transition table of
DFA, we will calculate it like:
δ‟ ( { q0, q2 }, a ) = δ ( q0, a ) 𝖴 δ ( q2, a ) = { q0, q1 }
δ‟ ( { q0, q2 }, b ) = δ ( q0, b ) 𝖴 δ ( q2, b ) = { q0 } Now
we will update the transition table of DFA.
δ‟ (Transition Function of DFA)
As there is no new state generated, we are done with the conversion. Final state of DFA will be state
which has q2 as its component i.e., { q0, q2 }
Following are the various parameters for DFA. Q‟
= { q0, { q0, q1 }, { q0, q2 } }
∑ = ( a, b )
F = { { q0, q2 } } and transition function δ‟ as shown above. The final DFA for above NFA has been
shown in Figure 2.
Note : Sometimes, it is not easy to convert regular expression to DFA. First you can convert regular
expression to NFA and then NFA to DFA
CONTEXT FREE-GRAMMAR
Example :CFG:
For the constructed table., fill with synch for rest of the input symbols of FOLLOW set and then
fill the rest of the columns with error term.
Terminals A –> X1, X2,…, Xn
must be a production in P
The first L stands for “Left-to-right scan of input”. The second L stands for “Left-most
derivation”. The „1‟
LL (1) Grammar:
• If a vertex has label ε, then that vertex is a leaf and the only child of its‟parent
• More Generally, a derivation tree can be defined with any non-terminal as the root.
Notes:
• Root can be any non-terminal
• Leaf nodes can be terminals or non-terminals
If there were no multiple entries in the Recursive decent parser table, the given grammar is LL
(1).
If the grammar G is ambiguous, left recursive then the recursive decent table will have atleast one
multiply defined entry.
The weakness of LL(1) (Top-down, predictive) parsing is that, must predict which production to use.
Phases of a Compilation
LL(k)
LL(k) grammar performs a top-down, leftmost parse after reading the string from left-to-right
Here, kk is the number of look-aheads allowed.
With the knowledge of kk look-aheads, we
calculate FIRSTkFIRSTk and FOLLOWkFOLLOWk where:
If the parser looks up entry in the table as synch, then the non terminal on top of the stack is
popped in an attempt to resume parsing. If the token on top of the stack does not match the input
symbol, then pop the token from the stack.
The moves of a parser and error recovery on the erroneous input) id*+id is as follows:
FIRSTkFIRSTk: kk terminals that can be at the beginning of a derived non-terminal
FOLLOWkFOLLOWk: kk terminals that can come after a derived non-terminal
The basic idea is to create a lookup table using this information from which the parser can then
simply go and check what derivation is to be made given a certain input token.
The class of LL(1)LL(1) grammars are so easily parsed because it is strong. The strong
LL(kLL(k) grammars are a subset of the LL(k)LL(k) grammars that can be parsed without
knowledge of the left-context of the parse. That is, each parsing decision is based only on the
next k tokens of the input for the current nonterminal that is being expanded.
Formally,
A grammar (G=N,T,P,S)(G=N,T,P,S) is strong if for any two distinct A-productions in the grammar:
A→αA→α
A→βA→β
FIRSTk(αFOLLOWk(A))∩FIRSTk(βFOLLOWk(A))=∅ FIRSTk(αFOLLOWk(A))∩FIRSTk(βFOL
LOWk(A))=∅
That looks complicated so we‟ll see it another way. Let‟s take a textbook example to understand,
instead, when is some grammar “weak” or when exactly would we need to know the left -context of the
parse.
S→aAaS→aAa
S→bAbaS→bAba
A→bA→b A→ϵA→ϵ
Here, you‟ll notice that for an LL(2)LL(2) instance, baba could result from either of
the SSproductions. So the parser needs some left-context to decide whether baba is produced by
S→aAaS→aAa or S→bAbaS→bAba.
Such a grammar is therefore “weak” as opposed to being a strong LL(k)LL( k) grammar.
1rnsentence Bottom-up
Assuming the production A, to reduce ri ri-1 match some RHS against ri then replace with its
corresponding LHS, A.In terms of the parse tree, this is working from leaves to root.
Example – 1:
E then S Clse
If S
While E do S
|
true
if E then S elseS
lm
if id then SelseS
lm
if id then while E do S elseS
lm
if id then while true do S elseS
lm
if id then while true do print elseS
lm
HANDLE PRUNING:
Keep removing handles, replacing them with corresponding LHS of production, until we reach S.
Example:
EE+E/E*E/(E)/id
a+b*c A Eid
E+b*c B Eid
E+E*C C Eid
The grammar is ambiguous, so there are actually two handles at next-to-last step. We can use parser-
generators that compute the handles for us
LR PARSING INTRODUCTION:
The "L" is for left-to-right scanning of the input and the "R" is for constructing a
right most derivation in reverse.
3. The class of grammars that can be parsed using LR methods is a proper subset of
4,AnLR parser can detect a syntactic error as soon as it is possible to do so on a left- to-
right scan of theinput.
The disadvantage is that it takes too much work to constuct an LR parser by hand
for a typical programming-language grammar. But there are lots of LR parser
generators available to make this task easy.
LR-PARSERS:
LR(k) parsers are most general non-backtracking shift-reduce parsers. Two cases of interest are k=0
and k=1. LR(1) is of practical relevance.
K‟ standsfor number of input s ymb ols of look-a-head that are used in making pars ing decisions.When
(K) is omitted, „K‟is assumed to be 1.
LR(1) parsers are table-driven, shift-reduce parsers that use a limited right context (1 token) for
handle recognition.
Sr0r1r2- - - rn-1rnsentence.
We can isolate the handle of each right-sentential form ri and determine the production by which
to reduce, by scanning ri from left-to-right, going atmost 1 symbol beyond the right end of the
handle of ri.
Parser accepts input when stack contains only the start symbol and no remaining input symbol
areleft.
LR(0)item:(no lookahead)
Grammar rule combined with a dot that indicates a position in its RHS.
Ex– 1: SI .S$
S.
x S.(L)
LALR PARSING:
Example:
Io S36 S47 1 2
1 Accept
2 S36 S47 5
36 S36 S47 89
47 r3 r3
5 r1
89 r2 r2 r2
Ambiguous grammar:
A CFG is said to ambiguous if there exists more than one derivation tree for the given input string i.e.,
more than one Left Most Derivation Tree (LMDT) or Right Most Derivation Tree (RMDT).
Definition: G = (V,T,P,S) is a CFG is said to be ambiguous if and only if there exist a string in T* that
has more than on parse tree.
where V is a finite set of variables.
T is a finite set of terminals.
P is a finite set of productions of the form, A -> α, where A is a variable and α ∈ (V 𝖴 T)* S is a
designated variable called the start symbol.
For Example:
YACC PROGRAMMING
A parser generator is a program that takes as input a specification of a syntax, and produces as
output a procedure for recognizing that language. Historically, they are also called compiler-
compilers.
YACC (yet another compiler-compiler) is an LALR(1) (LookAhead, Left-to-right, Rightmost
derivation producer with 1 look ahead token) parser generator. YACC was originally designed for
being complemented by Lex.
Input File:
YACC input file is divided in three parts.
/* definitions */
....
%%
/* rules */
....
%%
/* auxiliary routines */
....
Input File: Definition Part:
The definition part includes information about the tokens used in the syntax definition:
%token NUMBER
Semantics
Syntax Directed Translation:
• A formalist called as syntax directed definition is used fort specifying translations for
programming languageconstructs.
• A syntax directed definition is a generalization of a context free grammar in which each
grammar symbol has associated set of attributes and each and each productions is
associated with a set of semantic rules
• SDD is a generalization of CFG in which each grammar productions X->α is associated with it a set of
semantic rules of the form
a: = f(b1,b2…..bk)
• This setof attributes for a grammar symbol is partitioned into two subsets called
synthesized and inherited attributes of that grammar symbol.
Inherited attribute:(↑,→)
An inherited attribute is one whose value at parse tree node is determined in terms of attributes at
the parent and | or siblings of thatnode.
The attribute can be string, a number, a type, a, memory location or anything else.
The parse tree showing the value of attributes at each node is called an annotated
parse tree.
The process of computing the attribute values at the node is called annotating or decorating the
parse tree.Terminals can have synthesized attributes, but not inherited attributes.
• The process of computing the attributes values at the nodes is called annotating(or
decorating) of the parse tree.
• Of course, the order of these computations depends on the dependency graph induced by
the semantic rules.
Ex1:1) Synthesized Attributes : Ex: Consider the CFG :
S→ EN
E→E+T
E→E-T
E→ T
T→ T*F
T→T/F
T→F
F→(E)
F→digit N→;
S→EN S.val=E.val
E→E1+T E.val =E1.val +T.val
E→E1-T E.val = E1.val –T.val
E→T E.val=T.val
T→T*F T.val = T.val *F.val
T→T|F T.val =T.val | F.val
F→ (E) F.val=E.val
T→F T.val=F.val
F→digit F.val =digit.lexval
N→; can be ignored by lexical Analyzer as;I
is terminating symbol
For the Non-terminals E,T and F the values can be obtained using the attribute “Val”.
In S→EN, symbol S is the start symbol. This rule is to print the final answer of expressed.
Write the SDD using the appropriate semantic actions for corresponding production rule of the
given Grammar.
The annotated parse tree is generated and attribute values are computed. The Computation is done in
bottom up manner.
L-attributed SDT
This form of SDT uses both synthesized and inherited attributes with restriction of not taking values
from right siblings.
In L-attributed SDTs, a non-terminal can get values from its parent, child, and sibling nodes. As in the
following production
S → ABC
S can take values from A, B, and C (synthesized). A can take values from S only. B can take values
from S and A. C can get values from S, A, and B. No non-terminal can get values from the sibling
to its right.
Attributes in L-attributed SDTs are evaluated by depth-first and left-to-right parsing manner.
Intermediate Code
An intermediate code form of source program is an internal form of a program created by the
compiler while translating the program created by the compiler while translating the program from
a high –level language to assembly code(or)object code(machine code).an intermediate source form
represents a more attractive form of target code than does assembly. An optimizing Compiler
performs optimizations on the intermediate source form and produces an object module.
Analysis + syntheses=translation
In the analysis –synthesis model of a compiler, the front-end translates a source program into an
intermediate representation from which the back-end generates target code, in many compilers
the source code is translated into a language which is intermediate in complexity between a HLL
and machine code .the usual intermediate code introduces symbols to stand for various temporary
quantities.
We assume that the source program has already been parsed and statically checked..the various intermediate
code forms are:
a) Polishnotation
b) Abstract syntax trees(or)syntaxtrees
c) Quadruples
d) Triples three address code
e) Indirecttriples
f) Abstract machinecode(or)pseudocopde
postfix notation:
In general, if e1 and e2 are any postfix expressions, and Ø to the values denoted by e1 and e2 is
indicated in postfix notation nby e1e2Ø.no parentheses are needed in postfix notation because the
position and priority (number of arguments) of the operators permits only one way to decode a
postfixexpression.
SDD is a generalization of CFG in which each grammar productions X->α is associated with it a set
of semantic rules of the form
a: = f(b1,b2…..bk)
Where a is an attributes obtained from the function f.
This set of attributes for a grammar symbol is partitioned into two subsets called
synthesized and inherited attributes of that grammar symbol.
• A parse tree showing the values of attributes at each node is called an Annotated parse tree.
• The process of computing the attributes values at the nodes is called annotating(or
decorating) of the parse tree.Of course, the order of these computations depends on the
dependency graph induced by the
ASSIGNMENT STATEMENTS
Suppose that the context in which an assignment appears is given by the following grammar. P M
D
M ɛ
D D ; D | id : T | proc id ; N D ; S
N ɛ
Nonterminal P becomes the new start symbol when these productions are added to those in the
translation scheme shown below.
E E1 + E2 { E.place : = newtemp;
E E1 * E2 { E.place : = newtemp;
emit(E.place ‘: =’ E1.place ‘ * ‘ E2.place
) }
E - E1 { E.place : = newtemp;
emit ( E.place ‘: =’ ‘uminus’ E1 .place ) }
E ( E1 ) { E.place : = E1.place }
E id { p : = lookup ( id.name);
ifp≠nil then
E.place : = p
elseerror }
Flow-of-Control Statements
We now consider the translation of boolean expressions into three-address code in the context of if- then,
if-then-else, and while-do statements such as those generated by the following grammar:
S if E then S1
if E then S1 else
| S2
| while E do S1
In each of these productions, E is the Boolean expression to be translated. In the translation, we
assume that a three-address statement can be symbolically labeled, and that the function newlabel
returns a new symbolic label each time it is called.
• E.true is the label to which control flows if E is true, and E.false is the label to which control
flows if E is false.
• The semantic rules for translating a flow-of-control statement S allow control to flow from
the translation S.code to the three-address instruction immediately following S.code.
• S.nextis a label that is attached to the first three-address instruction to be executed after the
code for Code for if-then , if-then-else, and while-do statements
(a) if-then
E.false:
. .
.
S.next . . .
:
(b) if-then-else
to E.false
E.true: S1.code
gotoS.begin
E.false: . . .
(c) while-do
For example,
Sab –>ba
A –> S.
Here, Variables are S, A and Terminals a, b.
For Example,
S –> AB
AB –>abc
B –> b
In Type 2,
1. First of all it should be Type 1.
2. Left hand side of production can have only one variable.
alpha= 1.
For example,
S –> AB
A –> a
B –> b
for example :
S –> ab.
Type Checking:
• A compiler has to do semantic checks in addition to syntactic checks.
• Semantic Checks
• Static –done during compilation
• Dynamic –done during run-time
• Type checking is one of these static checking operations.
• we may not do all type checking at compile-time.
• Some systems also use dynamic type checking too.
• A type system is a collection of rules for assigning type expressions to the parts of a program.
• A type checker implements a type system.
• A sound type system eliminates run-time type checking for type errors.
• A programming language is strongly-typed, if every program its compiler accepts will
execute without type errors.
• In practice, some of type checking operations is done at run-time (so, most of the
programming languages are not strongly typed).
• –Ex: int x[100]; … x[i] most of the compilers cannot guarantee that i will be between 0 and
99
Type Expression:
• The type of a language construct is denoted by a type expression.
–A basic type
• void: no type
• arrays: If T is a type expression, then array (I,T)is a type expression where I denotes index
range. Ex: array(0..99,int)
• products: If T1and T2 are type expressions, then their Cartesian product T1 x T2 is a type
expression. Ex: int xint
• pointers: If T is a type expression, then pointer (T) is a type expression. Ex: pointer(int)
S.type=type- error
else E.type=type-error}
f: double x char->int
andsequiv(s2,t2))
and sequiv(s2,t2))
In some programming languages, we give a name to a type expression, and we use that name as a
type expression afterwards.
varr,s : ↑cell
The second step in resolving the overloading of operators and functions in the expression E'
consists of determining if a unique type can be assigned to each subexpression E of E' and
generating the code for evaluating each subexpression E of E'.
This is done by assigning an inherited attribute E.unique to each subexpression E of E' such that
either E can be assigned a unique type and E.unique is this type,or E cannot be assigned a unique
type and E.unique is $ \bf type\_error$.assigning a synthesized attribute E.code which is the target
code for evaluating Eand executing the following translation scheme (where the attributes E.types have
already been computed).
Most languages, including Algol, Ada, C, Pascal, Scheme, and Haskell, are statically scoped. A block defines a
new scope. Variables can be declared in that scope, and aren't visible from the outside. However, variables outside
the scope -- in enclosing scopes -- are visible unless they are overridden. In Algol, Pascal, Haskell, and Scheme
(but not C or Ada) these scope rules also apply to the names of functions and procedures.
begin
integer m, n;
procedure hardy;
begin
print("in hardy -- n = ", n);
end;
m := 50;
n := 100;
print("in main program -- n = ", n);
laurel(1);
hardy;
end;
The output is:
in main program -- n = 100
in laurel -- m = 50
in laurel -- n = 1
in hardy -- n = 100 /* note that here hardy is called from laurel */
in hardy -- n = 100 /* here hardy is called from the main program */
11.5
in hardy -- n = 1 ;; NOTE DIFFERENCE -- here hardy is called from
laurel in hardy -- n = 100 ;; here hardy is called from the main program
Static Scoping with Nested Procedures
begin
integer m,
n;
procedure laurel(n:
integer); begin
m := 50;
n := 100;
print("in main program -- n =
", n); laurel(1);
The code produced by the straight forward compiling algorithms can often be made to run faster
or take less space, or both. This improvement is achieved by program transformations that are
traditionally called optimizations. Compilers that apply code- improving transformations are
called optimizing compilers.
• Simply stated, the best program transformations are those that yield the most benefit for
the leasteffort.
• The transformation must preserve the meaning of programs. That is, the optimization must
not change the output produced by a program for a given input, or cause an error such as
division by zero, that was not present in the original source program. At all times we take
the “safe” approach of missing an opportunity to apply a transformation rather than risk
changing what the program does.
• The transformation must be worth the effort. It does not make sense for a compiler writer
Function-Preserving Transformations
• There are a number of ways in which a compiler can improve a program without
changing the function it computes.
• The transformations
o Common sub expressione limination,
o Copy propagation,
o Dead-code elimination,and
o Constant folding, are common examples of such function-preserving
transformations. The other transformations come up primarily when global
optimizations are performed.
• Frequently, a program will include several calculations of the same value, such as an
offset in an array. Some of the duplicate calculations cannot be avoided by the
programmer because they lie below the level of detail accessible within the source
language.
Common Sub expressions elimination:
• An occurrence of an expression E is called a common sub-expression if E was
previously computed, and the values of variables in E have not changed since the
previous computation. We can avoid recomputing the expression if we can usethe
previously computedvalue.
Forexample
t1: =4*i
t2: =a [t1]
t3: =4*j
t4:=4*i
t5:=n
t 6: =b [t 4] +t 5
The above code can be optimized using the common sub-expression eliminationas t1:=4*i
t2:=a
[t1]t3:=4*j
t5:=n
t6: =b [t1] +t5
The common sub expression t 4: =4*i is eliminated as its computation is already in t1. And
value of i is not been changed from definition to use.
…… A=x*r*r;
The optimization using copy propagation can be done as follows: A=Pi*r*r; Here the
variable x is eliminated
Dead-Code Eliminations:
A variable is live at a point in a program if its value can be used subsequently; otherwise, it is
dead at that point. A related idea is dead or useless code, statements that compute values that
never get used. While the programmer is unlikely to introduce any dead code intentionally, it
may appear as the result of previous transformations. An optimization can be done by
eliminating deadcode.
Example: i=0;
if(i=1)
{
a=b+5;
}
Here ,„if‟s tate me n t is dea d code b eca usethis co n ditio n will nev er get satisfie d.
Constant folding:
• We can eliminate both the test and printing from the object code. More generally,
deducing at compile time that the value of an expression is a constant and using the
constant instead is known as constant folding.
• One advantage of copy propagation is that it often turns the copy statement into deadcode.
Forexample,
a=3.14157/2 can be replaced by
a=1.570 there byeliminating a division operation.
Loop Optimizations
• We now give a brief introduction to a very important place for optimizations, namely
loops, especially the inner loops where programs tend to spend the bulk of their time. The
running time of a program may be improved if we decrease the number of instructions in
an inner loop, even if we increase the amount of code outside that loop.
• Three techniques are important for loop optimization:
code motion, which moves code outside aloop;
Induction -variable elimination, which we apply to replace variables from inner loop.
Reduction in strength, which replaces and expensive operation by a cheaper one, such as a
multiplication by an addition
Code Motion:
An important modification that decreases the amount of code in a loop is code motion. This
transformation takes an expression that yields the same result independent of the number of times
a loop is executed ( a loop-invariant computation) and places the expression before the loop. Note
Induction Variables
• Loops are usually processed inside out. For example consider the loop around B3.
• Note that the values of j and t4 remain in lock-step; every time the value of j decreases by
1, that of t4 decreases by 4 because 4*j is assigned to t4. Such identifiers are called
induction variables.
• When there are two or more induction variables in a loop, it may be possible to get rid of
all but one, by the process of induction-variable elimination. For the inner loop around
B3 in Fig. we cannot get rid of either j or t4 completely; t4 is used in B3 and j in B4.
• However, we can illustrate reduction in strength and illustrate a part of the process of
induction-variable elimination. Eventually j will be eliminated when the outer loop of B2
- B5 is considered.
LOOPS IN FLOWGRAPH
• A graph representation of three-address statements, called a flow graph, is useful for
understanding code-generation algorithms, even if the graph is not explicitly constructed
by a code-generation algorithm. Nodes in the flow graph represent computations, and the
edges represent the flow of control.
Dominators:
In a flow graph, a node d dominates node n, if every path from initial node of the flow graph to n goes
through d. This will be denoted by d dom n. Every initial node dominates all the remaining nodes in
the flow graph and the entry of a loop dominates all nodes in the loop. Similarly every node
dominates itself.
Example:
• In the flow graph below,
• Initial node,node1 dominates every node. *node 2 dominates itself
• node 3 dominates all but 1 and 2. *node 4 dominates all but 1,2 and 3.
• node 5 and 6 dominates only themselves,since flow of control can skip around either by
going through the other.
• node 7 dominates 7,8 ,9 and 10. *node 8 dominates 8,9 and 10.
D(1)={1}
D(2)={1,2}
D(3)={1,3}
D(4)={1,3,4}
D(5)={1,3,4,5}
(6)={1,3,4,6}
D(7)={1,3,4,7}
D(8)={1,3,4,7,8}
D(10)={1,3,4,7,8,10}
NaturalLoop
o A loop must have a single entry point, called the header. This entry point-
dominates all nodes in the loop, or it would not be the sole entry to theloop.
o There must be at least one wayto iterate the loop(i.e.)at least one path back
to the header.
One way to find all the loops in a flow graph is to search for edges in the flow graph whose heads
dominate their tails. If a→b is an edge, b is the head and a is the tail. These types of edges are
called as backedge.
Example:
In the above graph,
7→4 4 DOM7
0 →7 7 DOM10
4→3
8→3
9 →1
LOOP:
If we use the natural loops as “the loops”, then we have the useful property that
unless two loops have the same header, they are either disjointed or one is entirely
contained in the other. Thus, neglecting loops with the same header for the
moment, we have a natural notion of inner loop: one that contains no otherloop.
When two natural loops have the same header, but neither is nested within the
other, they are combined and treated as asingleloop.
Pre-Headers:
Several transformations require us to move statements “before the header”.
Therefore begin treatment of a loop L by creating a new block, called thepreheater.
Redundant-instructionselimination
Flow-of-control optimizations
Algebraics implifications
Use of machine idioms
Unreachable Code
After compilation of the source code, the object code is generated, which not only contains machine level
instructions but also information about hardware registers, memory address of some segment of the run-time
memory (RAM), information about system resources, read-write permissions ..etc.
1. The programmer decides which segment of the memorywould be used during running of the programme.
For doing this he passes memory address symbols or hex symbols in the programme.
2. Dynamic allocation by the linker, allocation of memory to the subroutines wherever, linker finds space for
them. This is something called relocatable machine code. i.e it doesn’t have a static memory address for
running.
Assembly Language is a low-level programming language. It helps in understanding the programming language to
machine code. In computer, there is assembler that helps in converting the assembly code into machine code
executable. Assembly language is designed to understand the instruction and provide to machine language for
further processing. It mainly depends on the architecture of the system whether it is the operating system or
computer architecture.
Assembly Language mainly consists of mnemonic processor instructions or data, and other statements or
instructions. It is produced with the help of compiling the high-level language source code like C, C++. Assembly
Language helps in fine-tuning the program.
While the details are dependent on the target language and the operating system, issues such as
memory management, instruction selection, register allocation, and evaluation order are inherent
in almost all code generation problems.
INPUT TO THE CODE GENERATOR
The input to the code generator consists of the intermediate representation of the source program
produced by the front end, together with information in the symbol table that is used to determine
the run time addresses of the data objects denoted by the names in the intermediate
representation.
There are several choices for the intermediate language, including: linear representations such as
postfix notation, three address representations such as quadruples, virtual machine representations
such as syntax trees and dags.
We assume that prior to code generation the front end has scanned, parsed, and translated the
source program into a reasonably detailed intermediate representation, so the values of names
appearing in the intermediate language can be represented by quantities that the target machine
can directly manipulate (bits, integers, reals, pointers, etc.). We also assume that the necessary
type checking has take place, so type conversion operators have been inserted wherever necessary
and obvious semantic errors (e.g., attempting to index an array by a floating point number) have
already been detected. The code generation phase can therefore proceed on the assumption that its
input is free of errors. In some compilers, this kind of semantic checking is done together with
code generation.
The output of the code generator is the target program. The output may take on a variety of
forms: absolute machine language, relocatable machine language, or assembly language.
Producing an absolute machine language program as output has the advantage that it can be
placed in a location in memory and immediately executed. A small program can be compiled and
executed quickly. A number of “student-job” compilers, such as WATFIV and PL/C, produce
absolute code.
Because producing assembly code does not duplicate the entire task of the assembler, this choice
is another reasonable alternative, especially for a machine with a small memory, where a
compiler must uses several passes.
A code-generation algorithm:
The algorithm takes as input a sequence of three-address statements constituting a basic block. For
each three-address statement of the form x : = y op z, perform the following actions:
Invoke a function getreg to determine the location L where the result of the computation y op z
should be stored.
Consult the address descriptor for y to determine y, the current location of y. Prefer the register
for y if the value of y is currently both in memory and a register. If the value of y is not already
in L, generate the instruction MOV y, L to place a copy of y in L.
If the current values of y or z have no next uses, are not live on exit from the block, and are in
registers, alter the register descriptor to indicate that, after execution of x : = y op z , those
registers will no longer contain y or z.
The assignment d : = (a-b) + (a-c) + (a-c) might be translated into the following three-
address code sequence:
t := a – b
u:= a–c
v:=t+ u
d := v+ u
with d live at the end.
Code sequence for the example is:
Statements Code Generated Register descriptor Address descriptor
Register empty
t := a – b MOV a, R0 R0 contains t t in R0
SUB b, R0
u := a – c MOV a , R1 R0 contains t t in R0
SUB c , R1 R1 contains u u in R1
R
d := v+ u ADD R1, R0 0 contains d d in R0
d in R0 and memory
MOV R0, d
The table shows the code sequences generated for the indexed assignment statements
a : = b [ i ] and a [ i ] : = b
The table shows the code sequences generated for the pointer assignments
a : = *p and *p : = a
a : = *p MOV *Rp, a 2
*p : = a MOV a, *Rp 2
REGISTER ALLOCATION
Instructions involving register operands are usually shorter and faster than those involving operands in memory.
Therefore, efficient utilization of register is particularly important in generating good code. The use of registers is
often subdivided into two sub problems:
1. During register allocation, we select the set of variables that will reside in registers at a
point in theprogram.
2. During a subsequent register assignment phase, we pick the specific register that a
variable will reside in.
Finding an optimal assignment of registers to variables is difficult, even with single register
values. Mathematically, the problem is NP-complete. The problem is further complicated because
the hardware and/or the operating system of the target machine may require that certain register
usage conventions be observed.
Certain machines require register pairs (an even and next odd numbered register) for some
operands and results. For example, in the IBM System/370 machines integer multiplication and
integer division involve register pairs. The multiplication instruction is of the form
M x,y
where the 64-bit dividend occupies an even/odd register pair whose even register is x; yrepresents the
divisor. After division, the even register holds the remainder and the odd register the quotient.
Now consider the two three address code sequences (a) and (b) in which the only difference is the
operator in the second statement. The shortest assembly sequence for (a) and (b) are given in(c).
Ri stands for register i. L, ST and A stand for load, store and add respectively. The optimal choice for
the register into which “a‟ is to be loaded depends on what will u ltimately happen to e.
t := a+b t := a +b
t := t* c t := t +c
t := t/ d t := t / d
(a) fig. 2 Two three address code sequences
L R1, a L R0, a
M R0, c A R0, c
A DAG for a basic block is a directed acyclic graph with the following labels on nodes:
Leaves are labeled by unique identifiers, either variable names or constants.
Interior nodes are labeled by an operator symbol.
Nodes are also optionally given a sequence of identifiers for labels to store the
computed values.
DAGs are useful data structures for implementing transformations on basic blocks.
It gives a picture of how the value computed by a statement is used in subsequent
statements.
It provides a good way of determining common sub - expressions
Input: A basic block
Output: A DAG for the basic block containing the following information:
A label for each node. For leaves, the label is an identifier. For interior nodes, an
operator symbol.
For each node a list of attached identifiers to hold the computed values.
Case (i) x : = y OP z
Case (ii) x : = OP y
Case (iii) x : = y
Method:
Step 2: For the case(i), create a node(OP) whose left child is node(y) and right child is
For case(ii), determine whether there is node(OP) with one child node(y). If not create such
a node.
For case(iii), node n will be node(y).
Step 3: Delete x from the list of identifiers for node(x). Append x to the listof attached identifiers for the
t1 := 4* i
t2 := a[t1]
t3 := 4* i
t4 := b[t3]
t5 := t2*t4
t6 := prod+t5
prod := t6
t7 := i+1
i := t7
if i<=20 goto (1)
The advantage of generating code for a basic block from its dag representation is that, from a dag
we can easily see how to rearrange the order of the final computation sequence than we can starting from
a linear sequence of three-address statements or quadruples.