ssa form ssa form
play

SSA form SSA form Michel Schinz SSA form Straight-line code - PDF document

SSA form SSA form Michel Schinz SSA form Straight-line code Transforming a piece of straight-line code i.e. without branches to SSA is trivial: each definition of a given name gives rise to a new version of that name, identified by a


  1. SSA form SSA form Michel Schinz SSA form Straight-line code Transforming a piece of straight-line code – i.e. without branches – to SSA is trivial: each definition of a given name gives rise to a new version of that name, identified by a Static single-assignment (or SSA ) form is an intermediate subscript: representation in which each variable has only one definition in the program. x � 12 x 1 � 12 That single definition can be executed many times when y � 15 y 1 � 15 the program is run – if it is inside a loop – hence the x � x+y x 2 � x 1 +y 1 qualifier static . to SSA y � x+4 y 2 � x 2 +4 SSA form is interesting because it simplifies several z � x+y z 1 � x 2 +y 2 optimisations and analysis, as we will see. y � y+1 y 3 � y 2 +1 3 4 � -functions � -functions example x 1 � 12 x � 12 y 1 � 15 Join-points in the CFG – nodes with more than one y � 15 if x 1 <y 1 predecessors – are more problematic, as each predecessor if x<y can bring its own version of a given name. To reconcile those different versions, a fictional � -function y 2 � x 1 to SSA y 3 � x 1 +1 is introduced at the join point. That function takes as x 2 � x 1 +1 y � x y � x+1 argument all the versions of the variable to reconcile, and x � x+1 automatically selects the right one depending on the flow of control. x 3 = � (x 2 ,x 1 ) z � x*y y 4 = � (y 2 ,y 3 ) z � x 3 *y 4 5 6

  2. (Naïve) building of SSA form (Naïve) building of SSA form CFG After phase 1 After phase 2 x � 1 x � 1 x 1 � 1 Naïve technique to build SSA form: y � 2 y � 2 y 1 � 2 z � x+y z � x+y z 1 � x 1 +y 1 • for each variable x of the CFG, at each join point n , insert a � -function of the form x = � ( x ,…, x ) with as many parameters as n has predecessors, y � y-1 y � y+1 y � y-1 y � y+1 y 2 � y 1 -1 y 3 � y 1 +1 • compute reaching definitions, and use that information x � x+y x � y x � x+y x � y x 2 � x 1 +y 2 x 3 � y 3 to rename any use of a variable according to the – now unique – definition reaching it. y � x*2 x �� (x,x) x 4 �� (x 2 ,x 3 ) dead z � z+x y �� (y,y) y 4 �� (y 2 ,y 3 ) redundant z �� (z,z) z 2 �� (z 1 ,z 1 ) y � x*2 y 5 � x 4 *2 z � z+x z 3 � z 2 +x 4 7 8 Smarter building of SSA form The naïve technique just presented works, in the sense that the resulting program is in SSA form and is equivalent to the original one. However, it introduces too many � -functions – some dead, Dominance some redundant – to be useful in practice. It builds the maximal SSA form. We will examine better techniques later, but to understand them we must first introduce the notion of dominance in a CFG. 9 Dominance Dominance examples CFG Dominance Node Dominators 0 In a control-flow graph, a node n 1 dominates a node n 2 if 0 { 0 } all paths from the start node to n 2 pass through n 1 . 1 1 { 0 , 1 } By definition, the domination relation is reflexive, that is a 2 3 2 { 0, 1 , 2 } node n always dominates itself. We then say that node n 1 strictly dominates n 2 if n 1 dominates n 2 and n 1 � n 2 . 3 { 0, 1 , 3 } 4 5 The immediate dominator of a node n is the strict 4 { 0, 1, 3 , 4 } 6 dominator of n closest to n . 5 { 0, 1, 3 , 5 } 7 6 { 0, 1, 3 , 6 } 7 { 0, 1 , 7 } 11 12

  3. Dominator tree Dominator tree example CFG Dominator tree 0 0 The dominator tree is a tree representing the dominance 1 1 relation. 2 3 2 3 The nodes of the tree are the nodes of the CFG, and a node n 1 is a parent of a node n 2 if and only if n 1 is the immediate 4 5 4 5 dominator of n 2 . 6 6 7 7 13 14 Computing dominance Dominance frontier Dominance can be computed using data-flow analysis. The dominance frontier of a node n – written To each node n of the CFG we attach a variable v n giving DF( n ) – is the set of all nodes m such that n dominates a the set of nodes that dominate n . The value of v n is given by predecessor of m , but does not strictly dominates m itself. the following equation: Informally, the dominance frontier of n contains the first v n = { n } ∪ ( v p1 ∩ v p2 ∩ … ∩ v pk ) nodes which are reachable from n but which are not strictly dominated by n . where p 1 , …, p k are the predecessors of n . 15 16 Dominance frontier example CFG Dominance frontier 0 0 nodes dominated by 3 1 1 Building SSA form 2 3 2 3 4 5 4 5 6 6 7 7 dominance frontier of 3={7} 17

  4. Minimal SSA form Improving on minimal SSA The naïve technique to build SSA form presented earlier The naïve technique to build SSA form presented at the inserts � -functions for every variable at the beginning of beginning computes maximal SSA form. every join point. The better technique just presented computes minimal SSA Using dominance information, it is possible to do better, form. and compute minimal SSA form: for each definition of a Unfortunately, minimal SSA form is not necessarily optimal, variable x in a node n , insert a � -function for x in all nodes and can contain dead � -functions. To solve that problem, of DF( n ). improved techniques have been developed to build semi- Notice that the inserted � -functions are definitions, and pruned – which is still not optimal – and pruned SSA form. can therefore force the insertion of more � -functions. 19 20 Semi-pruned SSA form Building semi-pruned SSA form Observation: a variable that is only live in a single node Like the naïve technique to build maximal SSA form, the can never have a live � -function. algorithm to build semi-pruned SSA form is composed of Therefore, the minimal technique can be further refined by two phases: first computing the set of global names – defined as the 1. � -functions are inserted for global names, according names that are live across more than one node – and to dominance information, producing � -functions for these names only. 2. variables are renamed. This is called semi-pruned SSA form . 21 22 Phase 1: inserting � -functions Phase 2: renaming variables Before inserting � -functions, the set G of global names Renaming is done by a pre-order traversal of the dominator must be computed. Once this is done, insertion of � - tree. functions is done as follows: For each visited node n , the following is done: for each name x in G • definitions and uses of variables occurring in n are work list � all nodes in which x is defined for each node n in work list renamed, for each node m in DF( n ) • the parameter corresponding to n in all � -functions of insert a � -function for x in m all successors of n in the CFG is renamed. work list � work list ∪ { m } 23 24

  5. Example Generating code from (see blackboard) SSA form Generating code from SSA Removing � -functions A � -function of the form x i �� ( x 1 ,…, x n ) can be removed by After the program has been turned into SSA form and the inserting appropriate assignments to x i in all predecessors of various optimisations performed on that representation, it the node containing that function. must be transformed into executable form. This will introduce many assignments of the form x i � x j This implies in particular that � -functions must be (that is, move instructions), but most of them will be removed, as they cannot be implemented on standard removed later during register allocation, thanks to machines. coalescing. 27 28 Removing � -functions Critical edges x 1 � 12 x 1 � 12 y 1 � 15 y 1 � 15 if x 1 <a 1 if x 1 <a 1 CFG edges that go from a node with multiple successors to a node with multiple predecessors are called critical edges . While removing � -functions, the presence of a critical edge y 2 � x 1 � -function y 2 � x 1 y 3 � x 1 +1 from n 1 to n 2 leads to the insertion of redundant move y 3 � x 1 +1 x 2 � x 1 +1 removal x 2 � x 1 +1 instructions in n 1 , corresponding to the � -functions of n 2 . x 3 � x 1 x 3 � x 2 Ideally, they should be executed only if control reaches n 2 y 4 � y 3 y 4 � y 2 later, but this is not certain when n 1 executes. x 3 = � (x 2 ,x 1 ) y 4 = � (y 2 ,y 3 ) z � x 3 *y 4 z � x 3 *y 4 29 30

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend