Andersen’s Points-to Analysis for CASH Compiler Framework
نویسندگان
چکیده
We present the design and results of our implementation of Andersen’s pointer analysis on the Pegasus intermediate representation. We use a constraint based formulation of this analysis and use the Banshee constraint solving framework to solve the generated constraints. The results of the pointer analysis are then used for analyzing the token dependencies between the various memory related operations in the Pegasus IR. Our experimental results indicate that significant percentage of token dependencies in Pegasus IR are redundant. These dependencies can be removed to increase the parallelism in the Pegasus IR.
منابع مشابه
Pointer Analysis in the Presence of Dynamic Class Loading ; CU-CS-966-03
Many compiler optimizations and software engineering tools need precise pointer analyses to be effective. Unfortunately, many Java features, such as dynamic class loading, reflection, and native methods, make pointer analyses difficult to develop. Hence, prior pointer analyses for Java either ignore those features or are overly conservative. We describe and evaluate a pointer analysis that deal...
متن کاملThe Flow-Insensitive Precision of Andersen's Analysis in Practice
We present techniques for determining the precision gap between Andersen’s points-to analysis and precise flow-insensitive points-to analysis in practice. While previous work has shown that such a gap may exist, no efficient algorithm for precise flow-insensitive analysis is known, making measurement of the gap on real-world programs difficult. We give an algorithm for precise flow-insensitive ...
متن کاملPoints-to and Side-Effect Analyses for Programs Built with Precompiled Libraries
Large programs are typically built from separate modules. Traditional whole-program analysis cannot be used in the context of such modular development. In this paper we consider analysis for programs that combine client modules with precompiled library modules. We define separate analyses that allow library modules and client modules to be analyzed separately from each other. Our target analyse...
متن کاملCompiling Application-Specific Hardware
In this paper we describe ASH, an architectural framework for implementing Application-Specific Hardware. ASH is based on automatic hardware synthesis from high-level languages. The generated circuits use only localized computation structures; in consequence, we expect these circuits to be fast, to use little power and to scale well with program complexity. We present in detail CASH, a scalable...
متن کاملThe Flow-Insensitive Precision of Andersen's Analysis in Practice ; CU-CS-1083-11
We present techniques for determining the precision gap between Andersen’s points-to analysis and precise flow-insensitive points-to analysis in practice. While previous work has shown that such a gap may exist, no efficient algorithm for precise flow-insensitive analysis is known, making measurement of the gap on real-world programs difficult. We give an algorithm for precise flow-insensitive ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005