Compare commits
6104 Commits
unlabeled-
...
default
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
52ad82f8b9 | ||
|
|
b1d1b5e1f8 | ||
|
|
8c94b1316c | ||
|
|
56e13e24e0 | ||
|
|
1b8df04e58 | ||
|
|
95ad06849b | ||
|
|
de2f99dc1a | ||
|
|
ea4142daee | ||
|
|
ff9bf5b08a | ||
|
|
de7023dd61 | ||
|
|
f67c98e239 | ||
|
|
612e38f1c6 | ||
|
|
96e7447bfa | ||
|
|
2b6d251dec | ||
|
|
2a95b1c5e3 | ||
|
|
5bae29a00c | ||
|
|
08823a172c | ||
|
|
84ee7c9cc4 | ||
|
|
2b2bd93e44 | ||
|
|
44b6421519 | ||
|
|
671bf250f5 | ||
|
|
918f300513 | ||
|
|
1b66b63eae | ||
|
|
3584ddb6e9 | ||
|
|
a4f136f999 | ||
|
|
03a0b182c4 | ||
|
|
1a7b4f8729 | ||
|
|
53c9731036 | ||
|
|
856eb120b3 | ||
|
|
edee22510b | ||
|
|
52eaf753b6 | ||
|
|
f561b94b49 | ||
|
|
204f932ed2 | ||
|
|
23e8d5af5a | ||
|
|
46bd70380c | ||
|
|
420c47c386 | ||
|
|
7b8d9e2d0e | ||
|
|
870489c8b0 | ||
|
|
53f043ff40 | ||
|
|
38c6a87ed5 | ||
|
|
8b24b0247b | ||
|
|
a42939df50 | ||
|
|
2dab95eced | ||
|
|
4d24666432 | ||
|
|
38fa6941d5 | ||
|
|
fb2a42a2db | ||
|
|
3df4906d52 | ||
|
|
b549980af2 | ||
|
|
f253b6a169 | ||
|
|
262c5fedcf | ||
|
|
10746f8b97 | ||
|
|
e0b8bd221d | ||
|
|
e770d09dc8 | ||
|
|
00c67fcc0e | ||
|
|
dbf8332bf0 | ||
|
|
8e869b56e7 | ||
|
|
08b7c4aaae | ||
|
|
7c60c27302 | ||
|
|
b592c88bdf | ||
|
|
a200a2fb53 | ||
|
|
3ce4e53aa9 | ||
|
|
c213602a02 | ||
|
|
0d77cb8279 | ||
|
|
b50dc4214a | ||
|
|
5e84be70fd | ||
|
|
b2bb4ce3b2 | ||
|
|
363d13cc2f | ||
|
|
c6292642c6 | ||
|
|
f9c77fca03 | ||
|
|
cdeea836f2 | ||
|
|
a8a9d1bbfa | ||
|
|
bff5c4019c | ||
|
|
2770a83837 | ||
|
|
1fdc69fb97 | ||
|
|
05e3cf286f | ||
|
|
b7720c298b | ||
|
|
2d2497c318 | ||
|
|
523374c36b | ||
|
|
bcf3408e36 | ||
|
|
cdbd605803 | ||
|
|
f70c12fad5 | ||
|
|
60edd08390 | ||
|
|
90764320bb | ||
|
|
c8711628ab | ||
|
|
7f7005bac5 | ||
|
|
d805052205 | ||
|
|
1978867fd2 | ||
|
|
2af8568cc3 | ||
|
|
09554cb324 | ||
|
|
605651776e | ||
|
|
a04dbf33f3 | ||
|
|
015804afce | ||
|
|
f47bb49c1f | ||
|
|
fcc5a878ae | ||
|
|
8082ef16a7 | ||
|
|
f4449e3f97 | ||
|
|
79f7c0ad23 | ||
|
|
b7d2b9c3cf | ||
|
|
14ccf7151e | ||
|
|
cb0111b290 | ||
|
|
df1372ab35 | ||
|
|
d0bfee142b | ||
|
|
ffc03090ea | ||
|
|
059073e56c | ||
|
|
45f0cb3c0d | ||
|
|
6db95dc81e | ||
|
|
ca981a2f6a | ||
|
|
73ade9cbcf | ||
|
|
82399d86ae | ||
|
|
88bd7ce126 | ||
|
|
9d620ad1c2 | ||
|
|
4b3c1a2d07 | ||
|
|
f24658181d | ||
|
|
7ee4dcde7b | ||
|
|
ef8e6e25e0 | ||
|
|
fd7e9f9046 | ||
|
|
391cb0f2cd | ||
|
|
863b610144 | ||
|
|
b7b449cec3 | ||
|
|
7e964dd25e | ||
|
|
88e13ecce3 | ||
|
|
e85991ec86 | ||
|
|
436db46f48 | ||
|
|
ff0c78cc78 | ||
|
|
4c5eb9a602 | ||
|
|
5e9f79db05 | ||
|
|
f07c6e4d6a | ||
|
|
ff774212be | ||
|
|
171f16d7b8 | ||
|
|
62cc636f10 | ||
|
|
44b5d01525 | ||
|
|
b146d2641c | ||
|
|
98ea849d03 | ||
|
|
9f23fbbe6a | ||
|
|
c5018d7088 | ||
|
|
3d5e72e20b | ||
|
|
2271bcd0a7 | ||
|
|
6a340ea1bd | ||
|
|
e36d739fa4 | ||
|
|
8b6951dac0 | ||
|
|
edb174da8d | ||
|
|
29af6f1adb | ||
|
|
2b3f95de0b | ||
|
|
c72eaef8ee | ||
|
|
d94c1c8150 | ||
|
|
2be811bac2 | ||
|
|
fd2360be0f | ||
|
|
55be35a68a | ||
|
|
052dd9bfc0 | ||
|
|
eaf4339cd6 | ||
|
|
bbd4b46850 | ||
|
|
ed6c4a85d1 | ||
|
|
3e0123ca03 | ||
|
|
aacabba165 | ||
|
|
86c6fa2f1e | ||
|
|
d5a112dbfd | ||
|
|
2054618e75 | ||
|
|
d273497077 | ||
|
|
074b42aa97 | ||
|
|
f522aba4af | ||
|
|
69953d016c | ||
|
|
d3e3e72860 | ||
|
|
6fff2d45fe | ||
|
|
e0c121d6e6 | ||
|
|
1f36370d87 | ||
|
|
ae993b1eb2 | ||
|
|
38e4726f5c | ||
|
|
ef25c53c9c | ||
|
|
e01f00e320 | ||
|
|
366cd10194 | ||
|
|
510888e6d5 | ||
|
|
6284512b37 | ||
|
|
bd9497be77 | ||
|
|
308d41e083 | ||
|
|
e299cc3bcf | ||
|
|
8c21a2ef9b | ||
|
|
6a672d5e96 | ||
|
|
3b07fee160 | ||
|
|
b6680a48cc | ||
|
|
d7efb0a32c | ||
|
|
2ee79ab0b2 | ||
|
|
ec25fec145 | ||
|
|
472f778342 | ||
|
|
98e745d04c | ||
|
|
98a51732ab | ||
|
|
2c7ee27206 | ||
|
|
6cbe6e1c4e | ||
|
|
8f338f9b44 | ||
|
|
7537c85e0a | ||
|
|
b5e5df4a63 | ||
|
|
cdce394b6c | ||
|
|
9e556d8b7b | ||
|
|
0068952bd1 | ||
|
|
6b5316dcfa | ||
|
|
08c4334224 | ||
|
|
72542288cd | ||
|
|
f904465e9c | ||
|
|
5e9102955c | ||
|
|
1312fe298b | ||
|
|
92817a6ad7 | ||
|
|
877e06ed89 | ||
|
|
6cdea73e84 | ||
|
|
d6565f4d5b | ||
|
|
e5341e4167 | ||
|
|
970f2bae62 | ||
|
|
5082b2a5d7 | ||
|
|
11890026db | ||
|
|
76ba0bf6b3 | ||
|
|
61bff18082 | ||
|
|
80f85001fa | ||
|
|
a46ee91859 | ||
|
|
4f15423d63 | ||
|
|
80afe75c9b | ||
|
|
febe8ca937 | ||
|
|
fc2833d456 | ||
|
|
fc1b3672a3 | ||
|
|
c18a82ec40 | ||
|
|
26877d3c4f | ||
|
|
5378e3fe53 | ||
|
|
5b4aa07dee | ||
|
|
9a513e8ef3 | ||
|
|
e7c2029c9c | ||
|
|
32ebc502c8 | ||
|
|
e5f6d5acfa | ||
|
|
f70f78b6e4 | ||
|
|
84f81a442c | ||
|
|
24ef1627ec | ||
|
|
11377070fd | ||
|
|
8fbce949f5 | ||
|
|
aaa3f14a79 | ||
|
|
e9233b4712 | ||
|
|
f6c43b95ef | ||
|
|
66aebcdd91 | ||
|
|
a6ebaeabd0 | ||
|
|
d5f0107746 | ||
|
|
a68b117e96 | ||
|
|
07453d184a | ||
|
|
442306d557 | ||
|
|
81778b603f | ||
|
|
af0dedeb6e | ||
|
|
b0c238eb5d | ||
|
|
c1aca7dae5 | ||
|
|
d89f172841 | ||
|
|
d91a1dc1a6 | ||
|
|
b9b808e01a | ||
|
|
99d7f513f2 | ||
|
|
bcfb3d802f | ||
|
|
8e2d027c49 | ||
|
|
8d0261473d | ||
|
|
c93cb69959 | ||
|
|
c8fdcff960 | ||
|
|
dccecc5d45 | ||
|
|
0fc7fd5d33 | ||
|
|
4349d702fa | ||
|
|
2beb3646a7 | ||
|
|
7ef9b79c11 | ||
|
|
3dcc3bd1cf | ||
|
|
e7c79415b5 | ||
|
|
0131ca4d46 | ||
|
|
be234ea759 | ||
|
|
8bf34937f1 | ||
|
|
99eb12a282 | ||
|
|
96ea0a5903 | ||
|
|
800d4ae032 | ||
|
|
6ea172d0d9 | ||
|
|
1072a8797e | ||
|
|
2483e5723d | ||
|
|
58613009f8 | ||
|
|
b6dfaefeff | ||
|
|
eb0b730607 | ||
|
|
45ee287136 | ||
|
|
075cb488a3 | ||
|
|
a33473e0a5 | ||
|
|
7292b538bc | ||
|
|
a8ecb11013 | ||
|
|
085f346f8c | ||
|
|
c326f3c6a3 | ||
|
|
a0c67da261 | ||
|
|
293f34fa9b | ||
|
|
da6111328d | ||
|
|
7273130b4c | ||
|
|
9d2d5606ea | ||
|
|
5147166810 | ||
|
|
e537bcc321 | ||
|
|
5a872eed38 | ||
|
|
51b41f72f8 | ||
|
|
ee72886e54 | ||
|
|
2c54f8c742 | ||
|
|
481bcd8a8b | ||
|
|
fc44fe2185 | ||
|
|
4dd1ff6d80 | ||
|
|
58e5e12ead | ||
|
|
54ce3f451b | ||
|
|
663f4f2fb5 | ||
|
|
78777e802b | ||
|
|
df088c184b | ||
|
|
868b8c5075 | ||
|
|
eb4ea1e761 | ||
|
|
494d9a3e4a | ||
|
|
6127ddf024 | ||
|
|
9d0f0a8fdd | ||
|
|
c9d7f7ef23 | ||
|
|
a7323e1a8b | ||
|
|
3a4147a37d | ||
|
|
be8baf3da6 | ||
|
|
013f58f94e | ||
|
|
0d8578410c | ||
|
|
7f266d6b4e | ||
|
|
440d6faadd | ||
|
|
24ea8aee3d | ||
|
|
bc5ccee8d5 | ||
|
|
bfeb736c35 | ||
|
|
740940c9fc | ||
|
|
f6085fb234 | ||
|
|
b8e1348f2a | ||
|
|
413880c52d | ||
|
|
ae9ac25f45 | ||
|
|
f471d2e618 | ||
|
|
67c4f3de87 | ||
|
|
9b920e59cb | ||
|
|
9710c14c93 | ||
|
|
921c55968c | ||
|
|
1c83baa702 | ||
|
|
b66d66b597 | ||
|
|
2a367fa192 | ||
|
|
f4e37e1319 | ||
|
|
400c475c03 | ||
|
|
b500b1a7b7 | ||
|
|
201c66879d | ||
|
|
04860c08a8 | ||
|
|
daee8da3c4 | ||
|
|
4428647786 | ||
|
|
d77b4ce97c | ||
|
|
2d80c1d2c8 | ||
|
|
6a0dd9377d | ||
|
|
a4e52740bb | ||
|
|
8da0d38b6d | ||
|
|
17b0c36f69 | ||
|
|
040151dd76 | ||
|
|
9170d09462 | ||
|
|
415e7e14fc | ||
|
|
d85e045ae6 | ||
|
|
b046c21d7f | ||
|
|
3dd11c674d | ||
|
|
b611731ec3 | ||
|
|
6d58210806 | ||
|
|
0f16e7540d | ||
|
|
903796a817 | ||
|
|
0974fa0e28 | ||
|
|
6e509e22dd | ||
|
|
f6a41864cf | ||
|
|
f05f9de3ed | ||
|
|
877dc01422 | ||
|
|
880e3eade8 | ||
|
|
681e2e0432 | ||
|
|
d2c505ad6b | ||
|
|
26a9b76507 | ||
|
|
5c5f711cbb | ||
|
|
809cd2ef0b | ||
|
|
5165f0b11f | ||
|
|
39689a4de9 | ||
|
|
e4292486a3 | ||
|
|
08431edbdb | ||
|
|
611bc73043 | ||
|
|
f9ddb860a9 | ||
|
|
94a7b315e3 | ||
|
|
c40a44b52e | ||
|
|
478d0b1d8a | ||
|
|
df153ba299 | ||
|
|
1c7bb87041 | ||
|
|
c21ba9ed0f | ||
|
|
02a2876821 | ||
|
|
30b980bf7e | ||
|
|
c0ecde554a | ||
|
|
47e1c27c05 | ||
|
|
12683dd8c6 | ||
|
|
dbe10d2c19 | ||
|
|
708a83ef22 | ||
|
|
1e4ca91a8b | ||
|
|
606012371e | ||
|
|
1efe7422d3 | ||
|
|
9bcefaafa8 | ||
|
|
45b4fef7d6 | ||
|
|
d3b557e0db | ||
|
|
67733b9d3c | ||
|
|
c1725577a7 | ||
|
|
e6f856e795 | ||
|
|
7826e03427 | ||
|
|
c5acfe7919 | ||
|
|
5a8968ae4f | ||
|
|
f3a9a3bc40 | ||
|
|
d29b1ef7d0 | ||
|
|
1caa63775f | ||
|
|
4c65324e11 | ||
|
|
e5e66bf27d | ||
|
|
2cfb9afac8 | ||
|
|
30e34f493f | ||
|
|
4fd0f0dba4 | ||
|
|
c65c560acd | ||
|
|
2d2ee38770 | ||
|
|
26b17074a1 | ||
|
|
bbd94dc2dc | ||
|
|
3494ffb302 | ||
|
|
8558656665 | ||
|
|
dc5d08b2a3 | ||
|
|
ec254c30c1 | ||
|
|
3435e8d6ed | ||
|
|
b3b2ec567f | ||
|
|
7068d0d301 | ||
|
|
f756747414 | ||
|
|
b24e1f5aae | ||
|
|
6ebe928712 | ||
|
|
1799cb0706 | ||
|
|
f39d595f98 | ||
|
|
014be56fb0 | ||
|
|
babe9eafad | ||
|
|
ec8788ce7d | ||
|
|
05d3be79cd | ||
|
|
345f4c8978 | ||
|
|
eed5d461e4 | ||
|
|
dc4606aa21 | ||
|
|
f1386f3aa5 | ||
|
|
2dbc112117 | ||
|
|
e6ddd5be27 | ||
|
|
7af0c5696d | ||
|
|
558a1ef405 | ||
|
|
8499270aef | ||
|
|
aa2dab31cf | ||
|
|
113383e31c | ||
|
|
f232b4dc29 | ||
|
|
304c0e21a0 | ||
|
|
f8e168adcd | ||
|
|
fdcdaadcb8 | ||
|
|
744d0ca7be | ||
|
|
1a037b9685 | ||
|
|
78ff773233 | ||
|
|
2e48c1b80d | ||
|
|
f371b251d2 | ||
|
|
d220081198 | ||
|
|
86e20aa483 | ||
|
|
03e34d0e2a | ||
|
|
3afd3e4cb4 | ||
|
|
c0c8695ea4 | ||
|
|
154b23cd39 | ||
|
|
34ae7c4634 | ||
|
|
70218cfeed | ||
|
|
db0b628497 | ||
|
|
685e85002e | ||
|
|
a1ba8c6d3f | ||
|
|
097c640a6c | ||
|
|
ea8f3fe1ff | ||
|
|
22db34a460 | ||
|
|
cf461cd82f | ||
|
|
35f2f8b043 | ||
|
|
cf4417431f | ||
|
|
6717b9e700 | ||
|
|
4f1a4b30f7 | ||
|
|
e34b2fefba | ||
|
|
db11db0cac | ||
|
|
6073ee934e | ||
|
|
4b79248af9 | ||
|
|
b6757337b3 | ||
|
|
e859ef2491 | ||
|
|
4cb0ab8a63 | ||
|
|
57084134e5 | ||
|
|
87e91b4766 | ||
|
|
d722986e66 | ||
|
|
1ed24cab9b | ||
|
|
9ca41cf4b6 | ||
|
|
cd09c29949 | ||
|
|
f5bbc20093 | ||
|
|
4c0a0e6119 | ||
|
|
8ea67498ed | ||
|
|
1eb1cb6f62 | ||
|
|
4f6fff6b1f | ||
|
|
2aca7fbaf4 | ||
|
|
13a9ff3379 | ||
|
|
423368e42f | ||
|
|
45ed0df6d0 | ||
|
|
454bdae81f | ||
|
|
5cb054f106 | ||
|
|
e864bf235e | ||
|
|
953a565a10 | ||
|
|
dd57d79b1b | ||
|
|
71a92846dd | ||
|
|
c39e85da63 | ||
|
|
4c0b3bb40f | ||
|
|
4fdd9b83fc | ||
|
|
26889d3762 | ||
|
|
e0846f63be | ||
|
|
35bd1df1aa | ||
|
|
4ed4d8423f | ||
|
|
cf1a80ecb6 | ||
|
|
e8b47b4745 | ||
|
|
5c8a5ed523 | ||
|
|
754267f0bd | ||
|
|
adb3cc5523 | ||
|
|
dd400ca720 | ||
|
|
f2046954e6 | ||
|
|
779fe568fc | ||
|
|
9bc8c07deb | ||
|
|
70ef6fe52e | ||
|
|
9bd955e4f6 | ||
|
|
a56d81ea51 | ||
|
|
b1632b8060 | ||
|
|
8f69a0ca44 | ||
|
|
e8fdf4fcda | ||
|
|
1e32788ad1 | ||
|
|
053ba2d164 | ||
|
|
daa34d0fe6 | ||
|
|
ee2c7069e4 | ||
|
|
4556d261d8 | ||
|
|
df46c5e165 | ||
|
|
910316cfde | ||
|
|
55dbc99000 | ||
|
|
6ca98e7102 | ||
|
|
f0a7a313fc | ||
|
|
384c4bc698 | ||
|
|
91cb060d10 | ||
|
|
d6e0e461f7 | ||
|
|
1840829928 | ||
|
|
298f8c8b0f | ||
|
|
495dce5d6c | ||
|
|
8a2a3fd74b | ||
|
|
4ec7d8bf7f | ||
|
|
f8fd2aa273 | ||
|
|
e38b178317 | ||
|
|
cebde164bb | ||
|
|
6db931eee6 | ||
|
|
2c66222509 | ||
|
|
2382ef1a27 | ||
|
|
99ac23b4b4 | ||
|
|
8ea5d257c4 | ||
|
|
664d3fc8d3 | ||
|
|
13fea7102b | ||
|
|
c2607fdf0f | ||
|
|
a44875cf00 | ||
|
|
ae0cde301d | ||
|
|
9f61a33c9f | ||
|
|
3b3ec3a2af | ||
|
|
63e0b36b41 | ||
|
|
56033dc0c1 | ||
|
|
ea09125e30 | ||
|
|
a44bbb3977 | ||
|
|
322c1c1b4c | ||
|
|
d0587ef3ab | ||
|
|
150db958da | ||
|
|
efacd02ffd | ||
|
|
1592c3638c | ||
|
|
7f7f5f187f | ||
|
|
740f1d5f75 | ||
|
|
6ec3dd7ebd | ||
|
|
73b54a2326 | ||
|
|
3895a59e03 | ||
|
|
67cb729554 | ||
|
|
d0288b673b | ||
|
|
7442852cad | ||
|
|
4baa1312a8 | ||
|
|
cdb362b628 | ||
|
|
e5894e0f5a | ||
|
|
6576498776 | ||
|
|
d224889b8d | ||
|
|
a6ea80436b | ||
|
|
0ea8200a57 | ||
|
|
4a5e3f42d3 | ||
|
|
2358a2f5e2 | ||
|
|
6e2fe89c61 | ||
|
|
583130b79b | ||
|
|
550095a5d0 | ||
|
|
f7157ca24c | ||
|
|
ddc1751296 | ||
|
|
0a643bb9d0 | ||
|
|
812b6f2158 | ||
|
|
6d39052c12 | ||
|
|
d4abf57904 | ||
|
|
a9df108116 | ||
|
|
39011a99c5 | ||
|
|
c97f79454d | ||
|
|
2985469116 | ||
|
|
c1738933d7 | ||
|
|
4565576021 | ||
|
|
0bf45ac757 | ||
|
|
a8b1f8e347 | ||
|
|
29e457c381 | ||
|
|
71da2cdda9 | ||
|
|
8b3437dd24 | ||
|
|
b766e2beab | ||
|
|
71913a9d1d | ||
|
|
3ad37ef26b | ||
|
|
b9a67e72ca | ||
|
|
1aa9149ff9 | ||
|
|
4c73887050 | ||
|
|
7b207deeb7 | ||
|
|
53eb117563 | ||
|
|
0dc2d5a625 | ||
|
|
b7396a7cd4 | ||
|
|
0509996f7f | ||
|
|
c3855160fb | ||
|
|
acdb874527 | ||
|
|
a96a9107c8 | ||
|
|
e41c75c1bc | ||
|
|
32bcf11ab9 | ||
|
|
f8cbcf1b4f | ||
|
|
65cd309c08 | ||
|
|
f8d6337862 | ||
|
|
f34bf4b487 | ||
|
|
7c086b1710 | ||
|
|
c587ca287e | ||
|
|
525eb1f1a4 | ||
|
|
7b6d8fbe56 | ||
|
|
bf6f4f8a6e | ||
|
|
5a6d5d877f | ||
|
|
2624e5d05c | ||
|
|
ef30bb3398 | ||
|
|
41d0c898e5 | ||
|
|
1bcd59df35 | ||
|
|
c9153e6b9b | ||
|
|
4978d19bff | ||
|
|
34b3d1fb52 | ||
|
|
5e03b1bebb | ||
|
|
3883860106 | ||
|
|
c833d93d2d | ||
|
|
a0bd098f98 | ||
|
|
15d2949b88 | ||
|
|
5edfb9eccf | ||
|
|
fdc0e2efdb | ||
|
|
34f7036b87 | ||
|
|
06b0d3775f | ||
|
|
f069cba449 | ||
|
|
86cb2d66d7 | ||
|
|
d801356f1e | ||
|
|
bcb4a75630 | ||
|
|
e4fd4fce8e | ||
|
|
b71c0ca9a3 | ||
|
|
32c692d93b | ||
|
|
87d67255d9 | ||
|
|
404d86d544 | ||
|
|
911b0a43d8 | ||
|
|
d5505f2f02 | ||
|
|
d1435f4fc6 | ||
|
|
65353b1417 | ||
|
|
0ae5288ab7 | ||
|
|
68cebfb733 | ||
|
|
2b0a61d143 | ||
|
|
dc2a339e09 | ||
|
|
7393f8923c | ||
|
|
ef0ecb31b2 | ||
|
|
63d0700af1 | ||
|
|
33da68f7e2 | ||
|
|
e10145ba2e | ||
|
|
e441b2f658 | ||
|
|
c7b707c266 | ||
|
|
8061bab6a9 | ||
|
|
4c26480d25 | ||
|
|
d992ed4935 | ||
|
|
a1a816ddc2 | ||
|
|
7b996be765 | ||
|
|
4851c0c9f3 | ||
|
|
cfbdef35e7 | ||
|
|
29a640446a | ||
|
|
d1e4c3d930 | ||
|
|
c3ad2ccc5e | ||
|
|
3662861589 | ||
|
|
f54d79e41a | ||
|
|
e2894d7a6e | ||
|
|
8636e9d10a | ||
|
|
1db6a3029b | ||
|
|
5c83e7dbb5 | ||
|
|
6cec9aca97 | ||
|
|
910f827fe2 | ||
|
|
273fb42833 | ||
|
|
11f3094b51 | ||
|
|
2b54fa3a19 | ||
|
|
77c44b0f04 | ||
|
|
96172158e5 | ||
|
|
f06b39f112 | ||
|
|
dd67502468 | ||
|
|
656fb00e9b | ||
|
|
958aced01b | ||
|
|
8a670148e4 | ||
|
|
b8b3054bba | ||
|
|
b03e2f6a8b | ||
|
|
805a0a4b66 | ||
|
|
af0e9371e9 | ||
|
|
11682328eb | ||
|
|
3cd7046ec4 | ||
|
|
5a99c436b6 | ||
|
|
6f23614b06 | ||
|
|
6561b6287f | ||
|
|
fe99903321 | ||
|
|
b7a5c1acc0 | ||
|
|
48ab6fa908 | ||
|
|
ac6b7e7cf5 | ||
|
|
acd80a39f2 | ||
|
|
1d6775dfa5 | ||
|
|
c791a62031 | ||
|
|
a3de95550e | ||
|
|
67c750a70c | ||
|
|
0b7ae7a629 | ||
|
|
e30d27c418 | ||
|
|
12bc7ed391 | ||
|
|
0e6e7bc913 | ||
|
|
75afbd450b | ||
|
|
618041f3ff | ||
|
|
6b1a0c486f | ||
|
|
60192399dc | ||
|
|
862f5da86d | ||
|
|
e3e19a7a0d | ||
|
|
1ac5aa547d | ||
|
|
cf151967a5 | ||
|
|
82f89c97a6 | ||
|
|
2309d12210 | ||
|
|
90134a3bea | ||
|
|
5dfe51c5d4 | ||
|
|
875797a7d8 | ||
|
|
121cb0c285 | ||
|
|
0dde39aa63 | ||
|
|
cc61337a9f | ||
|
|
5bbe789504 | ||
|
|
f5df1934b9 | ||
|
|
65592bae41 | ||
|
|
70b035d559 | ||
|
|
0c60f4c22f | ||
|
|
8abba8b1a1 | ||
|
|
9fbd4783a7 | ||
|
|
8998e56069 | ||
|
|
49f8a5a61b | ||
|
|
a4a2ae8f96 | ||
|
|
03405742a3 | ||
|
|
dbdf63595a | ||
|
|
b6ba1452f8 | ||
|
|
e37939e8c8 | ||
|
|
57f0474d91 | ||
|
|
332b6cb337 | ||
|
|
501da70526 | ||
|
|
990bf1ac74 | ||
|
|
560f5139eb | ||
|
|
4b3878c046 | ||
|
|
0de33667bf | ||
|
|
a9e731d090 | ||
|
|
aa0cd8e9a1 | ||
|
|
b71451bfd8 | ||
|
|
5b5323894e | ||
|
|
b95ae2fa70 | ||
|
|
4539174f47 | ||
|
|
9dae71ae08 | ||
|
|
854597cd2d | ||
|
|
7c473ca0ed | ||
|
|
528112d9bd | ||
|
|
4f3e07061e | ||
|
|
8c849f20f7 | ||
|
|
f33df43f9a | ||
|
|
91d270eb90 | ||
|
|
964bf270ab | ||
|
|
c89c0d2c01 | ||
|
|
37ab68909b | ||
|
|
2662c3984d | ||
|
|
4deafdc9de | ||
|
|
d7b6b9a5ce | ||
|
|
103cbb4319 | ||
|
|
62f978c40f | ||
|
|
73adc0f645 | ||
|
|
d848beec72 | ||
|
|
11d4fdf6e0 | ||
|
|
abf052244b | ||
|
|
31752a4617 | ||
|
|
f1681124d1 | ||
|
|
134da2750b | ||
|
|
1da6506ba7 | ||
|
|
66e29d8bd9 | ||
|
|
cee6ab37e7 | ||
|
|
067ad0cc22 | ||
|
|
a71ae473ac | ||
|
|
c689e34fa7 | ||
|
|
0fc413c78a | ||
|
|
c9ec055176 | ||
|
|
2006278a52 | ||
|
|
32760d492a | ||
|
|
4ec65def3f | ||
|
|
799f0600ef | ||
|
|
ab8dcfa134 | ||
|
|
d8bcd5d06c | ||
|
|
d9af0f2851 | ||
|
|
af42c1f960 | ||
|
|
4f2c705501 | ||
|
|
549dfcc99d | ||
|
|
38a269fc37 | ||
|
|
29f543b603 | ||
|
|
861f4afc0c | ||
|
|
df61cc8c4b | ||
|
|
a6d6f5943d | ||
|
|
dd4903cc3a | ||
|
|
fa7069780d | ||
|
|
b73eb4057e | ||
|
|
513c3df1d2 | ||
|
|
9e7c8d2c9f | ||
|
|
980faf36f0 | ||
|
|
a430cb7d8e | ||
|
|
76d1b91311 | ||
|
|
6dc51ef6eb | ||
|
|
4775779d8e | ||
|
|
3e43a9ac61 | ||
|
|
2233b6973b | ||
|
|
4092904071 | ||
|
|
c118bca2c2 | ||
|
|
b06a419f71 | ||
|
|
f8e6131e61 | ||
|
|
43280fdd5a | ||
|
|
eaea6c1c59 | ||
|
|
668b3fc2d8 | ||
|
|
a37e49b619 | ||
|
|
983e1bf095 | ||
|
|
b3863b7247 | ||
|
|
18967fad9a | ||
|
|
7a26259981 | ||
|
|
1a4c319f7e | ||
|
|
10e6db39c6 | ||
|
|
de8fefd02c | ||
|
|
bf84a52bc3 | ||
|
|
eaa9dab166 | ||
|
|
042d7b2275 | ||
|
|
298fd07712 | ||
|
|
5e31863838 | ||
|
|
4ff171c1a5 | ||
|
|
1ad085cfb8 | ||
|
|
40569c479e | ||
|
|
5092c4ece3 | ||
|
|
4d1b0d3486 | ||
|
|
b4aef1eb5e | ||
|
|
d7a3b68635 | ||
|
|
7e30c7d648 | ||
|
|
8c66b84305 | ||
|
|
e30c4b9337 | ||
|
|
9cbc7a4b97 | ||
|
|
4edcd8222d | ||
|
|
758e04a4eb | ||
|
|
404d067606 | ||
|
|
42d7930c11 | ||
|
|
132f2234fa | ||
|
|
6b8fbeb016 | ||
|
|
5117853b1b | ||
|
|
e9a4337ccf | ||
|
|
b371972acf | ||
|
|
6fc94eb375 | ||
|
|
eb375db4d6 | ||
|
|
5e702c5527 | ||
|
|
14e756ba87 | ||
|
|
dfc4956d59 | ||
|
|
6da226ab2b | ||
|
|
468d98750c | ||
|
|
04d3c7152c | ||
|
|
a0d74876b8 | ||
|
|
7352c25e9c | ||
|
|
256151c7e4 | ||
|
|
6f8002f540 | ||
|
|
de58173e36 | ||
|
|
ebf5153f35 | ||
|
|
cf7095f8cc | ||
|
|
9c64294186 | ||
|
|
9eec0812a1 | ||
|
|
f2cfe32e03 | ||
|
|
3b80847a9d | ||
|
|
bcff9862e7 | ||
|
|
439ec389a0 | ||
|
|
ba62ce0edc | ||
|
|
7eb7218667 | ||
|
|
fd0bc5d531 | ||
|
|
5f7f7bf194 | ||
|
|
dc108fd084 | ||
|
|
be2c36fbe5 | ||
|
|
005f32298f | ||
|
|
55131b091f | ||
|
|
d2fb022441 | ||
|
|
ed2ba2e1d5 | ||
|
|
5fbaff533c | ||
|
|
4d068e8e04 | ||
|
|
b1be3e3487 | ||
|
|
e09aac1b4a | ||
|
|
bc2744ca5c | ||
|
|
2361e37811 | ||
|
|
cb32d73c61 | ||
|
|
f8232e51a3 | ||
|
|
7d34ba62a7 | ||
|
|
e43e6b8100 | ||
|
|
ca4461dc4c | ||
|
|
dfeffe5e95 | ||
|
|
17efc329f8 | ||
|
|
9f305dcfe1 | ||
|
|
0de7277790 | ||
|
|
b6319e4d49 | ||
|
|
a829777e65 | ||
|
|
851efa7ffe | ||
|
|
dc73ec5cbf | ||
|
|
d9bd02fda6 | ||
|
|
b3233bcaa0 | ||
|
|
94638235bc | ||
|
|
67d5d2d6c4 | ||
|
|
50db0a3643 | ||
|
|
537cbd3d89 | ||
|
|
248ca45fc0 | ||
|
|
be227c5f88 | ||
|
|
94ec8e495e | ||
|
|
0299ae9ad0 | ||
|
|
cf32c08fd9 | ||
|
|
a708a52667 | ||
|
|
6896679afd | ||
|
|
af5ad235c9 | ||
|
|
ee6d91a1d4 | ||
|
|
ac7dc5e21f | ||
|
|
d18493b0ac | ||
|
|
6f03cff48f | ||
|
|
6b5abe7ab3 | ||
|
|
da17ca5a9f | ||
|
|
28341f4478 | ||
|
|
8cbf1bae34 | ||
|
|
3f54a9f044 | ||
|
|
3699fe387e | ||
|
|
52620e5829 | ||
|
|
0eb2e0dc80 | ||
|
|
15dce0c943 | ||
|
|
a56e1f25ff | ||
|
|
016273ba99 | ||
|
|
4adaf3165f | ||
|
|
87cf9446fe | ||
|
|
7c7475bb3a | ||
|
|
938bbb9ce8 | ||
|
|
be1d645adf | ||
|
|
83c2714982 | ||
|
|
8ab530baef | ||
|
|
d58d691472 | ||
|
|
80f5ecf637 | ||
|
|
0b063462ef | ||
|
|
d390121280 | ||
|
|
2dde78c197 | ||
|
|
8474be6e52 | ||
|
|
5c5812e853 | ||
|
|
e860fa1974 | ||
|
|
8e4ee3ec1a | ||
|
|
ea624f82de | ||
|
|
50f571bf2b | ||
|
|
f86c403a53 | ||
|
|
d1b1defbb7 | ||
|
|
d0e54a11e5 | ||
|
|
d2ee282845 | ||
|
|
8b26f24e21 | ||
|
|
6f7d2bc2ee | ||
|
|
9aceb849ad | ||
|
|
0350c1898b | ||
|
|
8c8d1a7d9b | ||
|
|
9da8f28a47 | ||
|
|
4ef108f93e | ||
|
|
3f3af2e01f | ||
|
|
ab38665421 | ||
|
|
72b89fc1ad | ||
|
|
d278d61a10 | ||
|
|
f6157ea21e | ||
|
|
cee4d5de8b | ||
|
|
6823ce7c96 | ||
|
|
2ae29707d2 | ||
|
|
bf2d5263cb | ||
|
|
0e46e6bc75 | ||
|
|
45d0d9f68f | ||
|
|
44a1c5620c | ||
|
|
50e8baa624 | ||
|
|
06e487359b | ||
|
|
3ac24b282b | ||
|
|
ebdbabcedd | ||
|
|
2f2b6ccadf | ||
|
|
aba0ed2f52 | ||
|
|
92a6e5c426 | ||
|
|
ad4b0435bc | ||
|
|
c76b5f436a | ||
|
|
46f084d660 | ||
|
|
09a80e9e13 | ||
|
|
b7b797674f | ||
|
|
1de983200b | ||
|
|
2cb19d3a30 | ||
|
|
6def6e1bea | ||
|
|
b8c96f32bd | ||
|
|
fd6e25e50f | ||
|
|
2fbea53939 | ||
|
|
3d52b0d475 | ||
|
|
5362ef6f20 | ||
|
|
4f11d0433d | ||
|
|
60edf5b3ea | ||
|
|
f252e26ab4 | ||
|
|
763c607bd8 | ||
|
|
2da0d6f886 | ||
|
|
f4cc095863 | ||
|
|
bc42e31518 | ||
|
|
6640944a51 | ||
|
|
377cd17425 | ||
|
|
1e7ffe6a0f | ||
|
|
8c9f885817 | ||
|
|
fe0a904894 | ||
|
|
47c7e6a43d | ||
|
|
5d9c7f4d9b | ||
|
|
b4f6c3fa00 | ||
|
|
276c2ec750 | ||
|
|
60c44af82b | ||
|
|
0571a16bcb | ||
|
|
b2cca56e16 | ||
|
|
ea2e95a627 | ||
|
|
8005ef1672 | ||
|
|
a0aa85fa4e | ||
|
|
d233bcfa50 | ||
|
|
0d2c7a318b | ||
|
|
661597162d | ||
|
|
a8b2fae0da | ||
|
|
a0acff4f4c | ||
|
|
c2157b66ef | ||
|
|
46540c17c8 | ||
|
|
0a0cdb75a4 | ||
|
|
629a5dcde9 | ||
|
|
ffe7d743a4 | ||
|
|
090cbe8ddd | ||
|
|
a6a1b1d3d0 | ||
|
|
8e99b149fc | ||
|
|
1263ef9731 | ||
|
|
baf10676a3 | ||
|
|
0bfa4970c5 | ||
|
|
81ec28ccb9 | ||
|
|
f3e5c3032f | ||
|
|
646bd0e51f | ||
|
|
813ca898a7 | ||
|
|
f2e1579f36 | ||
|
|
6e48c50a6c | ||
|
|
697dc9b1de | ||
|
|
56ab70f21f | ||
|
|
d0179d6790 | ||
|
|
5ccd830347 | ||
|
|
952bd37627 | ||
|
|
e35f11f208 | ||
|
|
7f4c0bea38 | ||
|
|
03022ad7dd | ||
|
|
47a6b4b526 | ||
|
|
12149f5858 | ||
|
|
70b535c368 | ||
|
|
b23ed92d7e | ||
|
|
e00c0aa591 | ||
|
|
38608cfa32 | ||
|
|
eb3ce1f70f | ||
|
|
3c338b9a3f | ||
|
|
de758867f8 | ||
|
|
168634cd0b | ||
|
|
df1ed9426d | ||
|
|
53c4951b29 | ||
|
|
fa0bee0b26 | ||
|
|
8482d2c110 | ||
|
|
929a0025ca | ||
|
|
a38be6605e | ||
|
|
abb411daac | ||
|
|
c0ba3fbe2d | ||
|
|
f442ba9141 | ||
|
|
30de1bcf3f | ||
|
|
a2a177de54 | ||
|
|
f30ffd415c | ||
|
|
c6f6df87ae | ||
|
|
0c59e2e12d | ||
|
|
80b250950e | ||
|
|
019590a290 | ||
|
|
950e26815e | ||
|
|
dc44eba062 | ||
|
|
d20534521e | ||
|
|
8394d5a4e1 | ||
|
|
b53facde73 | ||
|
|
8e82c748ad | ||
|
|
b0e631d402 | ||
|
|
fc1b4d3ddc | ||
|
|
2c076a2a26 | ||
|
|
16b930089a | ||
|
|
a93813c1f6 | ||
|
|
9e2361fc8f | ||
|
|
4bb6c5c4e8 | ||
|
|
40e580cae6 | ||
|
|
d46703ea4d | ||
|
|
5109b16ab2 | ||
|
|
0deaae479b | ||
|
|
b5ab00c143 | ||
|
|
16e6b51cba | ||
|
|
70ff99e4d0 | ||
|
|
68bee1244d | ||
|
|
d162f3edb0 | ||
|
|
c36ae7020f | ||
|
|
83ba395e03 | ||
|
|
f61ddc4926 | ||
|
|
3388e4deb6 | ||
|
|
9248d14195 | ||
|
|
a01a4a9fd2 | ||
|
|
7ec968fb03 | ||
|
|
ed4afc99f6 | ||
|
|
649b7d94f0 | ||
|
|
45751d25ed | ||
|
|
ec47c06ad7 | ||
|
|
244c1e5a01 | ||
|
|
670b7264ad | ||
|
|
bf0caa6f32 | ||
|
|
505494c560 | ||
|
|
35260bae58 | ||
|
|
f4ecd50601 | ||
|
|
89887ef6b0 | ||
|
|
58251a16dc | ||
|
|
5fdefde095 | ||
|
|
c6931b04e7 | ||
|
|
5a2df3d011 | ||
|
|
0d6ddc094b | ||
|
|
ca89734a36 | ||
|
|
e0956f63db | ||
|
|
967b13fac5 | ||
|
|
047648846a | ||
|
|
698130c4e2 | ||
|
|
3a2211512d | ||
|
|
aa702fa855 | ||
|
|
6fa0e5bfb0 | ||
|
|
61fad3018a | ||
|
|
3db2add75c | ||
|
|
2b6f5b9b8d | ||
|
|
fad1c30409 | ||
|
|
2291dff954 | ||
|
|
4b167ab2ba | ||
|
|
17352b8b8d | ||
|
|
aa0b70d921 | ||
|
|
ca72abbf26 | ||
|
|
8f0ef636ab | ||
|
|
78ca80f4d5 | ||
|
|
7aa5a39735 | ||
|
|
24cab5420a | ||
|
|
92d80c915b | ||
|
|
a0f00e0b2b | ||
|
|
be802650ca | ||
|
|
e9a6af1a42 | ||
|
|
839165633b | ||
|
|
9c507cc10a | ||
|
|
1af5c80b1b | ||
|
|
64ce6b0ef4 | ||
|
|
c3de1a9bea | ||
|
|
9cfb64d5c2 | ||
|
|
13a0dec2f6 | ||
|
|
36de35bcd2 | ||
|
|
099fe7a4c2 | ||
|
|
ef9b3098de | ||
|
|
7da9d47e5a | ||
|
|
b491906775 | ||
|
|
ac51febc8b | ||
|
|
de620e1fd5 | ||
|
|
881240fb3c | ||
|
|
fe7a55d227 | ||
|
|
e19f33f3de | ||
|
|
46ecc71373 | ||
|
|
91fec7991e | ||
|
|
510c0ce854 | ||
|
|
76ab08f62c | ||
|
|
afcbb62724 | ||
|
|
7a57ef4419 | ||
|
|
d8190353cc | ||
|
|
7d0a89d420 | ||
|
|
3015fc2542 | ||
|
|
97a7fcbca3 | ||
|
|
b9c3a99783 | ||
|
|
eac501941f | ||
|
|
650a132457 | ||
|
|
17014578be | ||
|
|
791246001f | ||
|
|
2e58c2438f | ||
|
|
4e99d889ff | ||
|
|
b3f07ce236 | ||
|
|
4affc39a20 | ||
|
|
7cff0f9d8a | ||
|
|
3da953fa85 | ||
|
|
e4168af8fb | ||
|
|
03e1bea097 | ||
|
|
7c479cf325 | ||
|
|
ab6d563a7b | ||
|
|
44cc075183 | ||
|
|
0633c900a8 | ||
|
|
0b32f6d32f | ||
|
|
46b0f8ea19 | ||
|
|
1558096356 | ||
|
|
bd65353ab5 | ||
|
|
c28c395af8 | ||
|
|
4417f0ea8f | ||
|
|
35dc8e74d0 | ||
|
|
d747702ae9 | ||
|
|
60b9ebe0d3 | ||
|
|
cfe45c4e2a | ||
|
|
dd99f952d5 | ||
|
|
45afd0804b | ||
|
|
035d9f7624 | ||
|
|
13da34032e | ||
|
|
7213f2527b | ||
|
|
584584a5ba | ||
|
|
69026d6c17 | ||
|
|
aab21f875e | ||
|
|
96565df518 | ||
|
|
d03d8da282 | ||
|
|
49a64df069 | ||
|
|
bdebaa5059 | ||
|
|
6333faba3c | ||
|
|
84e6e1a10b | ||
|
|
ae063bd74f | ||
|
|
208b9b54e7 | ||
|
|
31381203bd | ||
|
|
6cc9665025 | ||
|
|
4daf59e3d2 | ||
|
|
b117ac89c2 | ||
|
|
20c2bb2b79 | ||
|
|
031393529f | ||
|
|
e72aafb165 | ||
|
|
0c8514a9ed | ||
|
|
825941de76 | ||
|
|
4d82a1b67e | ||
|
|
76fb50807b | ||
|
|
1bde03203a | ||
|
|
615e30bdd4 | ||
|
|
51f8a3b798 | ||
|
|
e8d165a4a6 | ||
|
|
a7760a99bb | ||
|
|
b4ba1a6aca | ||
|
|
f58f97e731 | ||
|
|
80293fbc82 | ||
|
|
b61f465b1f | ||
|
|
96893d0092 | ||
|
|
948711ae6f | ||
|
|
e7c3112124 | ||
|
|
94b62ac792 | ||
|
|
82bad86ee6 | ||
|
|
237fb752e5 | ||
|
|
19a47cfa52 | ||
|
|
7d2b151fde | ||
|
|
5dd19fa6e7 | ||
|
|
bf01ff880d | ||
|
|
dc61380dc0 | ||
|
|
7987f04e22 | ||
|
|
147bb196b2 | ||
|
|
5073c18d95 | ||
|
|
68b728a4e3 | ||
|
|
e98e8717be | ||
|
|
425ddb3ff2 | ||
|
|
dbcbe25b51 | ||
|
|
4991f0027a | ||
|
|
6debaf0e5c | ||
|
|
d7964e75d7 | ||
|
|
7c167d29d2 | ||
|
|
43248fb244 | ||
|
|
33ec8e07ed | ||
|
|
da6ac05990 | ||
|
|
20a7f7b188 | ||
|
|
13327f2aec | ||
|
|
704bdf8e14 | ||
|
|
1423d694f8 | ||
|
|
57d44ec4bb | ||
|
|
2997281247 | ||
|
|
0b5810d83a | ||
|
|
bade2375b5 | ||
|
|
66e3a001cc | ||
|
|
64eacb4c9f | ||
|
|
18897487a9 | ||
|
|
6286b4b1a9 | ||
|
|
c407a7c642 | ||
|
|
df3ae6c2fb | ||
|
|
c5d1752d7f | ||
|
|
023b747e63 | ||
|
|
8a44c33e9f | ||
|
|
9cb2aa3286 | ||
|
|
0f16a0f6f8 | ||
|
|
98b019c735 | ||
|
|
8e9b398e9f | ||
|
|
69ead2f15f | ||
|
|
54d326e1ba | ||
|
|
9ede34412c | ||
|
|
f9b38448fd | ||
|
|
7e091602a7 | ||
|
|
0d055f2272 | ||
|
|
edf43fdf81 | ||
|
|
bbe1e3ffdc | ||
|
|
e07baf28c1 | ||
|
|
4e0a99ef38 | ||
|
|
b4c5125c32 | ||
|
|
182c7ebd70 | ||
|
|
24a353f3e1 | ||
|
|
2b7aae3b44 | ||
|
|
ed1a07a874 | ||
|
|
9381b34dfa | ||
|
|
a28c551213 | ||
|
|
46964d9dfd | ||
|
|
0784732f3d | ||
|
|
94ba66caa8 | ||
|
|
fe6cddde09 | ||
|
|
6632781f95 | ||
|
|
9b68f0e322 | ||
|
|
3777699ed4 | ||
|
|
7551b8e83a | ||
|
|
a329780d73 | ||
|
|
daa7aef683 | ||
|
|
7cab2ba9d9 | ||
|
|
c5275f3786 | ||
|
|
eba26ad2e6 | ||
|
|
b0f64baa8b | ||
|
|
7092d8138e | ||
|
|
d202b80bcf | ||
|
|
ffa0f837a1 | ||
|
|
25cf41d9b7 | ||
|
|
e7b4e265d4 | ||
|
|
8e572d417b | ||
|
|
8d25f69e77 | ||
|
|
3e17bc4188 | ||
|
|
b3780be39c | ||
|
|
a9bcc007ad | ||
|
|
fb51183da2 | ||
|
|
63c9fea5c2 | ||
|
|
6a02543de2 | ||
|
|
3a0c4d8704 | ||
|
|
3048dc72a7 | ||
|
|
39f7f119d7 | ||
|
|
7520aec9d4 | ||
|
|
90279a0a36 | ||
|
|
5e3c1e94b0 | ||
|
|
52a38e47ca | ||
|
|
157236bdb0 | ||
|
|
8487ae3d76 | ||
|
|
ce1dba9cac | ||
|
|
aa24841c87 | ||
|
|
b40fd1c8d9 | ||
|
|
c17ce93d9e | ||
|
|
8661cdb40b | ||
|
|
bc0d2e7d69 | ||
|
|
cb4e69cba9 | ||
|
|
7a725ce340 | ||
|
|
8baee004e8 | ||
|
|
3eed94de5b | ||
|
|
a78a8b6038 | ||
|
|
cae8164263 | ||
|
|
567a619003 | ||
|
|
1acd31de45 | ||
|
|
9225ee6a80 | ||
|
|
9ec49cb6d9 | ||
|
|
4ecf088423 | ||
|
|
0b83bf33e8 | ||
|
|
f03c37528e | ||
|
|
ae0dbd5050 | ||
|
|
dee2d11596 | ||
|
|
571ad3216b | ||
|
|
be3c10d635 | ||
|
|
b281e4c6b5 | ||
|
|
1df45b5beb | ||
|
|
4bd8dcde59 | ||
|
|
6e485ef169 | ||
|
|
80e3ee2e79 | ||
|
|
529cb1a5e2 | ||
|
|
bb17a417dc | ||
|
|
0557944381 | ||
|
|
e5cd7399e5 | ||
|
|
3a848279d5 | ||
|
|
8ed14ba4d5 | ||
|
|
717cfbd921 | ||
|
|
a1fc266ca5 | ||
|
|
14b9b9c79f | ||
|
|
f7fbe11132 | ||
|
|
2962e93407 | ||
|
|
90370cbc29 | ||
|
|
f84b365280 | ||
|
|
8db721b6aa | ||
|
|
998d11379c | ||
|
|
d8b3985528 | ||
|
|
b0b814befd | ||
|
|
369776173a | ||
|
|
934e140c98 | ||
|
|
a0858c04e4 | ||
|
|
16b2c7c173 | ||
|
|
df7fa49125 | ||
|
|
3a0c239091 | ||
|
|
abb71310d2 | ||
|
|
dfcbc661ca | ||
|
|
2ad0051a24 | ||
|
|
fbf6efa8fd | ||
|
|
d3b2458f24 | ||
|
|
1d6a5c84b6 | ||
|
|
8c82c2e5ef | ||
|
|
6a970eac86 | ||
|
|
3863f0d1a2 | ||
|
|
d04a7af13c | ||
|
|
fe74ad115d | ||
|
|
03da2719ec | ||
|
|
132d7ddd95 | ||
|
|
443aae6f7a | ||
|
|
5bfd012ea3 | ||
|
|
c2bcab0685 | ||
|
|
728dc323cd | ||
|
|
24c41e0d4d | ||
|
|
9e2e9cc6f7 | ||
|
|
f59466eab7 | ||
|
|
d3254e4bb7 | ||
|
|
884e02e822 | ||
|
|
bdf6bc6f87 | ||
|
|
65454de06c | ||
|
|
712ae25e0d | ||
|
|
767c52b241 | ||
|
|
4d7339bb60 | ||
|
|
cd8141b705 | ||
|
|
0182322630 | ||
|
|
a8cb5cbe86 | ||
|
|
7d5231279f | ||
|
|
c9c46c1ec1 | ||
|
|
e5052d73e4 | ||
|
|
e73d9b09a4 | ||
|
|
b10eadb10e | ||
|
|
86e38c87fb | ||
|
|
0ae5c1e43e | ||
|
|
90e969b5ba | ||
|
|
a82fde69c3 | ||
|
|
5c64a8d1ea | ||
|
|
e54a3afdfd | ||
|
|
0339ee31bd | ||
|
|
c5b304bc51 | ||
|
|
55d1808387 | ||
|
|
8b6a2e2cd7 | ||
|
|
5167121b6e | ||
|
|
3bbf316395 | ||
|
|
ad1ff9d44c | ||
|
|
8caa154b25 | ||
|
|
528ce00522 | ||
|
|
65bc2b62a1 | ||
|
|
f0c03173ef | ||
|
|
699edcc81e | ||
|
|
ad5b31be99 | ||
|
|
ea750dd18b | ||
|
|
f1c3c765c5 | ||
|
|
1dfcfd17fb | ||
|
|
a073089e73 | ||
|
|
607a2393a0 | ||
|
|
f67ed5e458 | ||
|
|
d206ef7ce1 | ||
|
|
1ceac3b8e9 | ||
|
|
50abc3f33b | ||
|
|
edaf2a01f4 | ||
|
|
4ceac64530 | ||
|
|
db67ceebc9 | ||
|
|
bb82ab2c09 | ||
|
|
3e9c44cef7 | ||
|
|
52d1b0e8aa | ||
|
|
53664c2d1f | ||
|
|
3bdfdfc1cf | ||
|
|
a2fc0c859c | ||
|
|
d93bc01d2d | ||
|
|
5eb2a9f2fe | ||
|
|
e7a1e1cc9c | ||
|
|
324b09070d | ||
|
|
9eea2a726e | ||
|
|
fc443716c8 | ||
|
|
6c517ebb35 | ||
|
|
9592708fe2 | ||
|
|
c8f9014a7e | ||
|
|
4b7d675f55 | ||
|
|
7559fbb966 | ||
|
|
9853ac8a4b | ||
|
|
dc715866bb | ||
|
|
5a0bf7639a | ||
|
|
70ee3dc406 | ||
|
|
b6590ab8d1 | ||
|
|
0caa529e0a | ||
|
|
df039a267d | ||
|
|
4fd7747338 | ||
|
|
620f7e3d49 | ||
|
|
a2fd894103 | ||
|
|
3003fa5594 | ||
|
|
284290f41a | ||
|
|
707e62a998 | ||
|
|
ca86ccf220 | ||
|
|
38fdd40cb7 | ||
|
|
206afe317c | ||
|
|
5d5fa0b453 | ||
|
|
7dd59bfdb0 | ||
|
|
b21d0acbdd | ||
|
|
1e4b58858e | ||
|
|
1100c95c47 | ||
|
|
564cbc6eba | ||
|
|
89b73247c7 | ||
|
|
129dbd29cf | ||
|
|
634eb45db6 | ||
|
|
6872464b8d | ||
|
|
c3b36c748b | ||
|
|
3b00811300 | ||
|
|
4b27a0d2f3 | ||
|
|
7d6eed155c | ||
|
|
43efeff393 | ||
|
|
01d8753db4 | ||
|
|
53bfe9cfa0 | ||
|
|
4274cb903c | ||
|
|
e262730554 | ||
|
|
019074c732 | ||
|
|
8818aec10e | ||
|
|
fc1615334c | ||
|
|
cdd5e62a71 | ||
|
|
9883fa2379 | ||
|
|
c55a542ba4 | ||
|
|
7512bdd33b | ||
|
|
c44e30af8b | ||
|
|
096b4683d4 | ||
|
|
bae41e2d34 | ||
|
|
51c2e125ce | ||
|
|
88885db964 | ||
|
|
084f565c9f | ||
|
|
b67d1a36f3 | ||
|
|
b520bc40a5 | ||
|
|
ce87955d7b | ||
|
|
5d9dc323e9 | ||
|
|
a70ce8404c | ||
|
|
954d74eff8 | ||
|
|
6960652579 | ||
|
|
1d5fae2b24 | ||
|
|
32b924a76a | ||
|
|
85a8a71149 | ||
|
|
0cc2f6e317 | ||
|
|
dc2ab49b32 | ||
|
|
d4045b68d4 | ||
|
|
6d9cd78c4e | ||
|
|
5730364a30 | ||
|
|
e572fa981d | ||
|
|
8c40aefc8b | ||
|
|
3a7f7f5eb9 | ||
|
|
1be5f51868 | ||
|
|
54fe5425e1 | ||
|
|
bab09a13c2 | ||
|
|
33c0dd8496 | ||
|
|
c9627bf4e6 | ||
|
|
8a9e71256f | ||
|
|
49b3949315 | ||
|
|
239535a02a | ||
|
|
8b3009d6e3 | ||
|
|
1d620a2e3b | ||
|
|
dab686f5e0 | ||
|
|
bbb4d40669 | ||
|
|
1d990f7f9c | ||
|
|
4c0b0fd096 | ||
|
|
9ab452c974 | ||
|
|
896bd6de39 | ||
|
|
b5e28c964f | ||
|
|
3168ce61ae | ||
|
|
b53634fa73 | ||
|
|
12c14c0396 | ||
|
|
70d13f9a80 | ||
|
|
c7edcc34d6 | ||
|
|
d9f98bc411 | ||
|
|
5f652d1e85 | ||
|
|
112b0cf407 | ||
|
|
2b23822015 | ||
|
|
492be74d94 | ||
|
|
2c400f6a44 | ||
|
|
e7856a2204 | ||
|
|
53b7af7a80 | ||
|
|
31714c8bf3 | ||
|
|
edd602fcdb | ||
|
|
5d4aa41db7 | ||
|
|
3936acad08 | ||
|
|
da188bbb4d | ||
|
|
73177ad913 | ||
|
|
dd478032e6 | ||
|
|
e469cc5ac6 | ||
|
|
8981100964 | ||
|
|
f17db32411 | ||
|
|
0fb930b473 | ||
|
|
942b24329f | ||
|
|
2526e11a03 | ||
|
|
57e6cad135 | ||
|
|
8e89c04900 | ||
|
|
78104e7d8a | ||
|
|
8fcbfada69 | ||
|
|
216b8e5d98 | ||
|
|
5abbc66878 | ||
|
|
b1fdacb99c | ||
|
|
3c221691b3 | ||
|
|
2b3ea5faab | ||
|
|
5ca5519c75 | ||
|
|
42afe4e24e | ||
|
|
6d86200992 | ||
|
|
f0d26d1935 | ||
|
|
35b0718027 | ||
|
|
790d540f91 | ||
|
|
b503d85d23 | ||
|
|
5d00c41800 | ||
|
|
2a6c8390fa | ||
|
|
c34fcda208 | ||
|
|
da84cc69bc | ||
|
|
dbe4911b65 | ||
|
|
003382e13f | ||
|
|
4d682ab1e2 | ||
|
|
240dd55fd9 | ||
|
|
ca104453ca | ||
|
|
a0460b8bfc | ||
|
|
34d6b23ba6 | ||
|
|
c3c1b918f0 | ||
|
|
9bbcb70320 | ||
|
|
bdad94b18c | ||
|
|
e036de0d90 | ||
|
|
8afda7422e | ||
|
|
c77a7e6d32 | ||
|
|
dac25d9dd8 | ||
|
|
e505a02ad7 | ||
|
|
47dccc3c67 | ||
|
|
9f565afcc2 | ||
|
|
8583ee73f3 | ||
|
|
ea9332362d | ||
|
|
f3d21dc6cc | ||
|
|
8cf9b73fbc | ||
|
|
55d8020292 | ||
|
|
42584ddcdb | ||
|
|
1be579a6e7 | ||
|
|
aec33f4d0f | ||
|
|
9461e91a9b | ||
|
|
7a1d1ce1c1 | ||
|
|
9f43986877 | ||
|
|
3a074a6f99 | ||
|
|
384d4c7647 | ||
|
|
9e9e7db6b4 | ||
|
|
e6a017827e | ||
|
|
44fda8e7d0 | ||
|
|
3e9b9b3cbe | ||
|
|
659d310e37 | ||
|
|
2838d446ef | ||
|
|
3891c03e0e | ||
|
|
2d79ecd203 | ||
|
|
094b1d0742 | ||
|
|
f4757c8370 | ||
|
|
d8d30b403b | ||
|
|
1da2103504 | ||
|
|
c955dc1374 | ||
|
|
7853446daf | ||
|
|
0c137374ae | ||
|
|
02d253d810 | ||
|
|
e4136ac8e5 | ||
|
|
e001541608 | ||
|
|
e8ff85905f | ||
|
|
d6a224ea5f | ||
|
|
ab8022ccbd | ||
|
|
a3f4cdefa3 | ||
|
|
80c49a6ea7 | ||
|
|
7258ccc596 | ||
|
|
2fef7f7389 | ||
|
|
de12536c94 | ||
|
|
2552813eaa | ||
|
|
49c5c36362 | ||
|
|
b2b79edc42 | ||
|
|
c0d92bbc76 | ||
|
|
aa35bf7f02 | ||
|
|
e096bc3fb3 | ||
|
|
e5b52ce56f | ||
|
|
8e8f0b4079 | ||
|
|
7c2c7f23e3 | ||
|
|
86151519db | ||
|
|
71dfb50135 | ||
|
|
5b2b02ae1e | ||
|
|
ba2043808d | ||
|
|
cafd4a0497 | ||
|
|
8a25f4e66b | ||
|
|
52287793fb | ||
|
|
0f809c61dc | ||
|
|
f9f8f93115 | ||
|
|
dcb6a17cf3 | ||
|
|
9565b3bd24 | ||
|
|
3e16cf5116 | ||
|
|
ca06e574ca | ||
|
|
8b67c1f800 | ||
|
|
043ad764b8 | ||
|
|
6f4da1d70a | ||
|
|
eecdf96b0b | ||
|
|
1dff113351 | ||
|
|
3686d24064 | ||
|
|
62bad715c2 | ||
|
|
319fb7cbff | ||
|
|
7a0002427d | ||
|
|
74ff22b506 | ||
|
|
6bdd99ee7b | ||
|
|
a9aa131d8c | ||
|
|
5c3b708636 | ||
|
|
d32109c18d | ||
|
|
7e8422d810 | ||
|
|
e27071de78 | ||
|
|
2684a45cc5 | ||
|
|
3e0eb5d58a | ||
|
|
5a53ba3f50 | ||
|
|
22378eaff8 | ||
|
|
95967a04e4 | ||
|
|
a61ee10532 | ||
|
|
9155b8a68a | ||
|
|
f4691c73c4 | ||
|
|
adab058c34 | ||
|
|
d8771e87f9 | ||
|
|
852601d0b5 | ||
|
|
5ebc2017a0 | ||
|
|
86bc055fa1 | ||
|
|
f7504dbd4b | ||
|
|
f48f0efe60 | ||
|
|
52842cd09a | ||
|
|
17266fb373 | ||
|
|
0a517b9256 | ||
|
|
20b17c3eb2 | ||
|
|
3e18caaab0 | ||
|
|
977e1ac25e | ||
|
|
52d4c7ff70 | ||
|
|
67a2cc281f | ||
|
|
30867cf631 | ||
|
|
b4aaa8824e | ||
|
|
fffa7617b1 | ||
|
|
b893ec7013 | ||
|
|
76d79cf17a | ||
|
|
24fd4e190e | ||
|
|
82b3ae254c | ||
|
|
3a715f5479 | ||
|
|
ac83fe3815 | ||
|
|
27d53b0d33 | ||
|
|
e264b45120 | ||
|
|
d8ff0feed3 | ||
|
|
81cc04f9a3 | ||
|
|
e929b5839f | ||
|
|
e340cea7be | ||
|
|
55bbaa1bf2 | ||
|
|
5a8012b084 | ||
|
|
8f339de43b | ||
|
|
e1b6ddca2c | ||
|
|
bd1da2f86c | ||
|
|
9d3696befe | ||
|
|
1903555355 | ||
|
|
e61d1b425d | ||
|
|
cb7438cb99 | ||
|
|
d50d1f6c5e | ||
|
|
1d73a4f04e | ||
|
|
ee02bfcd82 | ||
|
|
9c0b85db41 | ||
|
|
1118da779b | ||
|
|
cf10cabb6f | ||
|
|
9340345509 | ||
|
|
5c5cb8e5c8 | ||
|
|
782d0f48bf | ||
|
|
579b3b29bd | ||
|
|
dab38becd4 | ||
|
|
12f4a430b0 | ||
|
|
a8c0b82421 | ||
|
|
6765041a10 | ||
|
|
c9ece34fc5 | ||
|
|
1fec35a71e | ||
|
|
87385c49e4 | ||
|
|
bb31795d33 | ||
|
|
1c694d98d0 | ||
|
|
0d65b92220 | ||
|
|
3f922854b3 | ||
|
|
2c31a9b1ac | ||
|
|
79cb35ec4f | ||
|
|
e0be1dfe3a | ||
|
|
8de1b855ab | ||
|
|
c863c96023 | ||
|
|
c59e581ef2 | ||
|
|
9a294d4821 | ||
|
|
b5c5f09b16 | ||
|
|
07092a19ca | ||
|
|
d16c25fc80 | ||
|
|
c40ca6ebbd | ||
|
|
b4f4a87846 | ||
|
|
24dd6b4cb5 | ||
|
|
797441009d | ||
|
|
59fe948f83 | ||
|
|
3660ea15c5 | ||
|
|
cf0cd51810 | ||
|
|
af7686cd66 | ||
|
|
720d775582 | ||
|
|
612217f906 | ||
|
|
9595dda6b5 | ||
|
|
3e0c73690c | ||
|
|
1ed0f8180f | ||
|
|
ac966f41eb | ||
|
|
14ce396d6f | ||
|
|
0f4e675b50 | ||
|
|
e64fb88a5d | ||
|
|
4a03769a47 | ||
|
|
977d93dc67 | ||
|
|
0539581d5d | ||
|
|
2c3dcb0547 | ||
|
|
ae5dded36f | ||
|
|
2a852dcff1 | ||
|
|
0cd1cfd249 | ||
|
|
e48822da7b | ||
|
|
48e0d9825a | ||
|
|
ff766530eb | ||
|
|
2094dcecfe | ||
|
|
c70195a81e | ||
|
|
8eff53f8ea | ||
|
|
530ce78c37 | ||
|
|
1bdb0a8d96 | ||
|
|
3e4a2c3dbc | ||
|
|
8322e2d5d3 | ||
|
|
36e47ad79b | ||
|
|
81e80b2cd8 | ||
|
|
57f2827832 | ||
|
|
bda14dbba1 | ||
|
|
29b2e6e3d4 | ||
|
|
e7b7aa3944 | ||
|
|
0267340564 | ||
|
|
3ddb8e24b7 | ||
|
|
9e970befed | ||
|
|
abb28f949a | ||
|
|
4b40bae467 | ||
|
|
6acdb3e358 | ||
|
|
818d2f10cf | ||
|
|
efa476b5b3 | ||
|
|
0b26bdf5fb | ||
|
|
d9815cadcd | ||
|
|
224ac1b8ff | ||
|
|
f572b1fb35 | ||
|
|
32eddf7846 | ||
|
|
5aa72b23cf | ||
|
|
c26441aa64 | ||
|
|
4a7ef15df2 | ||
|
|
55bf2e9bc1 | ||
|
|
27459757db | ||
|
|
38d1831dd7 | ||
|
|
ac8168088c | ||
|
|
c4c7787acc | ||
|
|
589f3a3e35 | ||
|
|
72fcc53c49 | ||
|
|
d7b6541a62 | ||
|
|
4ac18c8ab4 | ||
|
|
3ae67d0d67 | ||
|
|
974463cbd4 | ||
|
|
3764bf860b | ||
|
|
9ddcfc5b96 | ||
|
|
5926babe03 | ||
|
|
6cc07a7651 | ||
|
|
c747f1c1c0 | ||
|
|
f72cc607a1 | ||
|
|
631f40cb1a | ||
|
|
335377da7a | ||
|
|
41ca723d96 | ||
|
|
8b397ebf05 | ||
|
|
5dee3d1b26 | ||
|
|
1139272435 | ||
|
|
e37c249248 | ||
|
|
ab62dda2fc | ||
|
|
4e4d3290d4 | ||
|
|
a836599f53 | ||
|
|
b3ff76d859 | ||
|
|
8b63334d30 | ||
|
|
2fbdc5447a | ||
|
|
5e0ec19a91 | ||
|
|
50c8fe71c3 | ||
|
|
ccc5f10fca | ||
|
|
79444acd83 | ||
|
|
4fbd256d14 | ||
|
|
41dc11e497 | ||
|
|
0ad960a9b0 | ||
|
|
0cc8f53eec | ||
|
|
6390348994 | ||
|
|
916b9e94e9 | ||
|
|
73231e630b | ||
|
|
530e1a3b6d | ||
|
|
cb6ca0cf40 | ||
|
|
51ad0941cb | ||
|
|
64f8785d20 | ||
|
|
f997bd0be8 | ||
|
|
b3287b2b0f | ||
|
|
159d8ec57d | ||
|
|
007151ef1d | ||
|
|
495a037714 | ||
|
|
d9be4de96a | ||
|
|
65bf3591a7 | ||
|
|
c5c6267b1d | ||
|
|
24a8b613ae | ||
|
|
df975bc075 | ||
|
|
2dbe465c0d | ||
|
|
8468609eda | ||
|
|
0b35c31e5b | ||
|
|
456ba2b03c | ||
|
|
17af2902eb | ||
|
|
4c99b235ed | ||
|
|
8a81dbe6fb | ||
|
|
36861e70ac | ||
|
|
b3deddfaf3 | ||
|
|
2661a6085a | ||
|
|
cfd0a9b894 | ||
|
|
b76ff7451c | ||
|
|
70dafd79e9 | ||
|
|
83b663388c | ||
|
|
df77506e1f | ||
|
|
8f661ca8a9 | ||
|
|
ff60fa58c3 | ||
|
|
45b18b4fc9 | ||
|
|
91ee73faa3 | ||
|
|
ae8ca35563 | ||
|
|
2a6b538c9b | ||
|
|
04480b1db9 | ||
|
|
713521e0f5 | ||
|
|
46f1738ad4 | ||
|
|
aaa75da7da | ||
|
|
b9e242674e | ||
|
|
da39a8e59f | ||
|
|
6dbb3945ff | ||
|
|
32598a47a2 | ||
|
|
2299e83685 | ||
|
|
6545b68874 | ||
|
|
b2bee3043a | ||
|
|
d99b166621 | ||
|
|
d4c2c7ca2c | ||
|
|
d443d61b09 | ||
|
|
fb143bcdb5 | ||
|
|
449a757841 | ||
|
|
99bfba6a45 | ||
|
|
8ffaf72dfa | ||
|
|
715dd4ef0f | ||
|
|
a06482bb41 | ||
|
|
2f82d25400 | ||
|
|
b1cb54a2b9 | ||
|
|
9ef7e00974 | ||
|
|
994b1319ca | ||
|
|
da44a4c705 | ||
|
|
ca5df8b32b | ||
|
|
a618b9a759 | ||
|
|
ba69e4279d | ||
|
|
7536a1f510 | ||
|
|
c7fc857c2d | ||
|
|
dc345354ee | ||
|
|
c9b9a9b2c0 | ||
|
|
0444eaa77c | ||
|
|
52cbbb11e0 | ||
|
|
0a2ee14396 | ||
|
|
b7a61761f3 | ||
|
|
321a62a192 | ||
|
|
c5b98176f6 | ||
|
|
f950727c44 | ||
|
|
c3d7275ae8 | ||
|
|
ff117d9f0b | ||
|
|
03a25ece8a | ||
|
|
0c8acbf834 | ||
|
|
be2264283f | ||
|
|
cc04440b5c | ||
|
|
ad800075eb | ||
|
|
0a1b11973a | ||
|
|
064258aa8b | ||
|
|
1f7c2d1f39 | ||
|
|
33dc73d4c4 | ||
|
|
8a00e32bc8 | ||
|
|
96d5009bef | ||
|
|
b089e0d7f8 | ||
|
|
57b1d9824a | ||
|
|
899df7bc78 | ||
|
|
8357c43aee | ||
|
|
354b624cb4 | ||
|
|
e6fd25052a | ||
|
|
f0fe57f807 | ||
|
|
7cea685c0e | ||
|
|
f192338596 | ||
|
|
87a8061e1c | ||
|
|
b28f5a1824 | ||
|
|
925b8a76ed | ||
|
|
1136d63929 | ||
|
|
d7c15759ee | ||
|
|
7de2babe56 | ||
|
|
9f01f909f6 | ||
|
|
2873c58731 | ||
|
|
ab1b54b56d | ||
|
|
b314975f0f | ||
|
|
1bab6dbcaf | ||
|
|
1aef1c5921 | ||
|
|
8265d3f731 | ||
|
|
fd0c8ca52d | ||
|
|
9aee9cb62f | ||
|
|
162c1c81e9 | ||
|
|
9df58e86ec | ||
|
|
05ddeafbfd | ||
|
|
f78e573b69 | ||
|
|
68f19d7335 | ||
|
|
9da96274ae | ||
|
|
32f21c2bfa | ||
|
|
54cc752a9e | ||
|
|
aef60fdda1 | ||
|
|
17abf1a78a | ||
|
|
16e89fea1f | ||
|
|
da36c2b13f | ||
|
|
e701e2e2ec | ||
|
|
a94e7b877a | ||
|
|
32da1c8c1e | ||
|
|
ba0cc3a57d | ||
|
|
b4f97588b7 | ||
|
|
c3f305bea1 | ||
|
|
7e58923415 | ||
|
|
c33f7cbe76 | ||
|
|
7be2815cbc | ||
|
|
9bdf648402 | ||
|
|
1105a33fe3 | ||
|
|
3672f835fe | ||
|
|
7f8a099a15 | ||
|
|
06e6c8638f | ||
|
|
5ba9685e76 | ||
|
|
4483f237f6 | ||
|
|
67ef9905e6 | ||
|
|
6f6dff3461 | ||
|
|
8de3973836 | ||
|
|
41e3cf403b | ||
|
|
eb1326e3ec | ||
|
|
14133b5e2f | ||
|
|
7fbfa4360c | ||
|
|
e91e983728 | ||
|
|
30922a239d | ||
|
|
fc6247ca5e | ||
|
|
63e1c0e44a | ||
|
|
4001fbb580 | ||
|
|
bb85ecc4f0 | ||
|
|
74edeea849 | ||
|
|
cd8e8e5aef | ||
|
|
a50ec18466 | ||
|
|
ce71090da3 | ||
|
|
928c2dacc5 | ||
|
|
282d93dde0 | ||
|
|
03a65131fc | ||
|
|
c937359a4e | ||
|
|
e1a20fe944 | ||
|
|
d7a034bc02 | ||
|
|
4581d9f266 | ||
|
|
851b82ee09 | ||
|
|
7dff46d44e | ||
|
|
d296eed0c3 | ||
|
|
56502994f4 | ||
|
|
81ce150a96 | ||
|
|
a6d0f40fc8 | ||
|
|
bc6df29be8 | ||
|
|
1f408a38c2 | ||
|
|
1ade1b814d | ||
|
|
5efd4280ee | ||
|
|
4c8596ee05 | ||
|
|
5eb4a8d88f | ||
|
|
7b00154c54 | ||
|
|
1011f9679e | ||
|
|
f8de19a427 | ||
|
|
096e8368c5 | ||
|
|
e3bb56818b | ||
|
|
7488a2fbba | ||
|
|
a480e8fa81 | ||
|
|
fbcee49b7e | ||
|
|
e3a247ad23 | ||
|
|
d800aaf11a | ||
|
|
094c19f350 | ||
|
|
65f74f5c72 | ||
|
|
1feeb94dbf | ||
|
|
641a446f01 | ||
|
|
6f1d9fbf70 | ||
|
|
d1050c2382 | ||
|
|
a0f46ee7a6 | ||
|
|
5571e06719 | ||
|
|
0e90ae224a | ||
|
|
a246152240 | ||
|
|
9eefd96eb1 | ||
|
|
5f592dd6bd | ||
|
|
4900ad0743 | ||
|
|
bd4bc1cad0 | ||
|
|
707d811586 | ||
|
|
5ed44e3432 | ||
|
|
49fd9f9377 | ||
|
|
11d8919d76 | ||
|
|
e144c7cc4c | ||
|
|
bd18f6c521 | ||
|
|
74f3d91777 | ||
|
|
1dd88ae8da | ||
|
|
0d8a8bae5f | ||
|
|
f0581f7706 | ||
|
|
24920dfa75 | ||
|
|
2c9fbebe4e | ||
|
|
33c9811ba9 | ||
|
|
2f0275ba3c | ||
|
|
9915ed4bc2 | ||
|
|
4a4153bb8b | ||
|
|
6dc5c01551 | ||
|
|
5c85d84228 | ||
|
|
5badcb4296 | ||
|
|
ee652e6908 | ||
|
|
dace3435ec | ||
|
|
58355b7041 | ||
|
|
3ea64975af | ||
|
|
b2efe2299f | ||
|
|
02ea4988d1 | ||
|
|
2f83a7e3d9 | ||
|
|
67f0419dc3 | ||
|
|
b2ca3783c4 | ||
|
|
dbf9a060c2 | ||
|
|
f614fc6dc3 | ||
|
|
1cb247fa39 | ||
|
|
bee5d97eac | ||
|
|
5fcee85f88 | ||
|
|
391874ecb2 | ||
|
|
4ab420fb0f | ||
|
|
bc83231874 | ||
|
|
a41c51783a | ||
|
|
cd1f6c38a4 | ||
|
|
bc137646df | ||
|
|
dc500c3463 | ||
|
|
8401d7b9ec | ||
|
|
97d1275cfe | ||
|
|
0bf7d60080 | ||
|
|
2a26b4d335 | ||
|
|
ba475d78a2 | ||
|
|
797f90a022 | ||
|
|
3fb20f5201 | ||
|
|
e2ce4995e6 | ||
|
|
78681448e4 | ||
|
|
b4a2b975a0 | ||
|
|
0f2f6da38f | ||
|
|
36b11dc296 | ||
|
|
c7a5b07da7 | ||
|
|
535e64328a | ||
|
|
fd921229f2 | ||
|
|
7bee903886 | ||
|
|
4a34358b6a | ||
|
|
17158641e0 | ||
|
|
257c868cc7 | ||
|
|
116b6a00bc | ||
|
|
b32921d7ed | ||
|
|
0c56d078ec | ||
|
|
05c205181b | ||
|
|
79ce5a13a0 | ||
|
|
5ca5b63151 | ||
|
|
eb50492a1f | ||
|
|
f936a3f35a | ||
|
|
e3120d2b5f | ||
|
|
e0ff37aa6e | ||
|
|
f4e1a15dfb | ||
|
|
76fd4c3d7b | ||
|
|
8eecdff85a | ||
|
|
8206965ae9 | ||
|
|
6d675af42c | ||
|
|
05db577e01 | ||
|
|
09d156b96a | ||
|
|
3c10a60011 | ||
|
|
8cd417eeab | ||
|
|
aae0eeca94 | ||
|
|
f3209123e0 | ||
|
|
1f0d138f31 | ||
|
|
5a0ad2a8bc | ||
|
|
1168708cd0 | ||
|
|
5c0938d05b | ||
|
|
f321062250 | ||
|
|
cef36d185e | ||
|
|
27b1d561b5 | ||
|
|
313376cd36 | ||
|
|
c615803fa6 | ||
|
|
2807862aba | ||
|
|
7ef2d1bc37 | ||
|
|
47249aaad3 | ||
|
|
cf28f45a59 | ||
|
|
b23125354b | ||
|
|
43b01a70a0 | ||
|
|
eab3243973 | ||
|
|
aca2c5f4b1 | ||
|
|
4ef2c70ed3 | ||
|
|
adfec1c0ef | ||
|
|
3e27993361 | ||
|
|
379511e232 | ||
|
|
30824d6133 | ||
|
|
e2bc68a46b | ||
|
|
109a357e95 | ||
|
|
7f5abdd670 | ||
|
|
63fe4e0a18 | ||
|
|
21f1ef5a6c | ||
|
|
fbe4a79045 | ||
|
|
c6a11d1f62 | ||
|
|
5512f14697 | ||
|
|
cabefb9d9e | ||
|
|
266d247470 | ||
|
|
56858bb480 | ||
|
|
3ae582dfd7 | ||
|
|
29b8ec04c5 | ||
|
|
736108572f | ||
|
|
b972fea237 | ||
|
|
0105d98302 | ||
|
|
f218a430f6 | ||
|
|
4355b05597 | ||
|
|
c7c79e9b42 | ||
|
|
472ee0cea4 | ||
|
|
6c5c8c980e | ||
|
|
8444bc32fb | ||
|
|
bd82622a2e | ||
|
|
39730420a2 | ||
|
|
97e131bc81 | ||
|
|
9de0c3d920 | ||
|
|
101a129256 | ||
|
|
bb1964e1d3 | ||
|
|
d7b4e48972 | ||
|
|
a8f5884144 | ||
|
|
ddd97f9328 | ||
|
|
45783a1e73 | ||
|
|
3bcec93972 | ||
|
|
a8d2505ba5 | ||
|
|
a28eb23f82 | ||
|
|
39fee04619 | ||
|
|
f234f061a1 | ||
|
|
05d0caaaea | ||
|
|
020e6311fb | ||
|
|
dd3d0777c7 | ||
|
|
aff5b89ac9 | ||
|
|
27c1b37c21 | ||
|
|
280d7a79be | ||
|
|
4d7ba75469 | ||
|
|
bf66a6ade1 | ||
|
|
8d1bb88fc9 | ||
|
|
bea95a4443 | ||
|
|
6df0ecdf8f | ||
|
|
3de1e669b2 | ||
|
|
e2b59f6517 | ||
|
|
9eaa440fab | ||
|
|
82b0ef795d | ||
|
|
ab0d3bf876 | ||
|
|
adb704aad4 | ||
|
|
59dd7cdfeb | ||
|
|
ef69de1614 | ||
|
|
24c9be9777 | ||
|
|
da8f9124ff | ||
|
|
c336bc86b1 | ||
|
|
a4e5e4eeaa | ||
|
|
c4dabcd9a4 | ||
|
|
74147d2b4a | ||
|
|
9dacc57b3a | ||
|
|
afae382803 | ||
|
|
aa20369a56 | ||
|
|
0c6f2f490f | ||
|
|
9570000674 | ||
|
|
27718f5d6d | ||
|
|
e9d214e977 | ||
|
|
c64733ae6f | ||
|
|
b04388a326 | ||
|
|
a1e2a583b5 | ||
|
|
51467658c6 | ||
|
|
7987a1fed8 | ||
|
|
dc12b2fa3d | ||
|
|
f2b4713c24 | ||
|
|
8fe53f501f | ||
|
|
536b12010f | ||
|
|
470bb82342 | ||
|
|
6ab26e5cdc | ||
|
|
da806afa6b | ||
|
|
dbd1744edc | ||
|
|
ed81d83f4c | ||
|
|
f95fae24fc | ||
|
|
2b488e1021 | ||
|
|
81b7f67cb4 | ||
|
|
86188fb772 | ||
|
|
fb25b628d6 | ||
|
|
564bb0b81c | ||
|
|
64e9d11570 | ||
|
|
52f08181a6 | ||
|
|
b44938412e | ||
|
|
e625c3bdb8 | ||
|
|
010ada1c23 | ||
|
|
90963fd585 | ||
|
|
f1351720e5 | ||
|
|
031b9dfee2 | ||
|
|
a3f1aaa41f | ||
|
|
dd5ef3905f | ||
|
|
8c9149b058 | ||
|
|
a3bd2c6734 | ||
|
|
09a4136272 | ||
|
|
d2516d4eaf | ||
|
|
aa4de95f26 | ||
|
|
6e685b9fcc | ||
|
|
d87444a7fb | ||
|
|
ad7e46a324 | ||
|
|
f0c0b894f2 | ||
|
|
16ef0467a8 | ||
|
|
ededd15b74 | ||
|
|
644cfbf61f | ||
|
|
84b8c8a6ca | ||
|
|
2782412b59 | ||
|
|
99e74b2341 | ||
|
|
ed2516a57a | ||
|
|
fd80d596df | ||
|
|
34d54a20b1 | ||
|
|
f27e9ca63e | ||
|
|
c8c4c6e7a9 | ||
|
|
0bb4c0167c | ||
|
|
3553a28b78 | ||
|
|
863824de01 | ||
|
|
a932246479 | ||
|
|
28d6834ae7 | ||
|
|
0296dc2371 | ||
|
|
df33f1eeff | ||
|
|
57790a926f | ||
|
|
f99d67e76e | ||
|
|
353d22ea90 | ||
|
|
71156a48ae | ||
|
|
0b95807664 | ||
|
|
d3208e42ca | ||
|
|
3bcec5fe6c | ||
|
|
11b54f5d47 | ||
|
|
1a18efbe49 | ||
|
|
d04a8595f3 | ||
|
|
2c7496a525 | ||
|
|
9a5ac60946 | ||
|
|
59edf55051 | ||
|
|
34eff754f5 | ||
|
|
6e0c2ad593 | ||
|
|
a082cf03dc | ||
|
|
5d01fbf6b8 | ||
|
|
8e6fe7258c | ||
|
|
a771c9aa30 | ||
|
|
f99437138d | ||
|
|
11c9808d7e | ||
|
|
61b718d716 | ||
|
|
2dd3439f90 | ||
|
|
44d9a8b42d | ||
|
|
63e64680bd | ||
|
|
2236ff6d6a | ||
|
|
8ec051b83e | ||
|
|
b0c09c2a94 | ||
|
|
ccd728edbc | ||
|
|
239d634ab1 | ||
|
|
9d4e978a1e | ||
|
|
f17b176ddd | ||
|
|
d35a781049 | ||
|
|
073c81c9aa | ||
|
|
29152cbf74 | ||
|
|
8d04be4a13 | ||
|
|
95632b0fef | ||
|
|
0c95aa4b86 | ||
|
|
551b10f3a6 | ||
|
|
0ec452930f | ||
|
|
64e1fa33d3 | ||
|
|
1228fe1baf | ||
|
|
972d39139d | ||
|
|
8bfbe723db | ||
|
|
cba0bbac02 | ||
|
|
e4d7651f02 | ||
|
|
c6d14bb079 | ||
|
|
2293458101 | ||
|
|
7c4af80c0f | ||
|
|
abeebac3c1 | ||
|
|
7761eecc34 | ||
|
|
63d6fe28e7 | ||
|
|
3f950c9f17 | ||
|
|
069d94c39b | ||
|
|
8d7a5dba0a | ||
|
|
dedf1d945c | ||
|
|
eaf856c7a0 | ||
|
|
541279bd1e | ||
|
|
626e7b5b06 | ||
|
|
67819cfd6c | ||
|
|
8a8bb6cf10 | ||
|
|
d7d56d2cbb | ||
|
|
ba6c223113 | ||
|
|
e361a5777b | ||
|
|
77577f45fa | ||
|
|
db54c35c24 | ||
|
|
b40425786c | ||
|
|
5625842582 | ||
|
|
197379a33a | ||
|
|
0c5cce9a96 | ||
|
|
546d8f3d16 | ||
|
|
945c0dc404 | ||
|
|
01829a4203 | ||
|
|
f994b0bf84 | ||
|
|
b3d5eaef01 | ||
|
|
6c588b0ae8 | ||
|
|
5929f3dd0e | ||
|
|
114048df57 | ||
|
|
5dec33abaa | ||
|
|
2d0493ac92 | ||
|
|
8c6dc46124 | ||
|
|
da48891d6e | ||
|
|
218b982231 | ||
|
|
9288115a4d | ||
|
|
0c4835caf3 | ||
|
|
343dbb810f | ||
|
|
4de10af212 | ||
|
|
c4c1e6191b | ||
|
|
933b1de514 | ||
|
|
721005b4d7 | ||
|
|
f4dcfc3c64 | ||
|
|
ebbda9ae11 | ||
|
|
b48f529177 | ||
|
|
f5b29d9ccc | ||
|
|
343c5872eb | ||
|
|
c2717419d4 | ||
|
|
444d0bb4da | ||
|
|
9b1f6614f6 | ||
|
|
ae3e9716f5 | ||
|
|
94b3467079 | ||
|
|
76cd1e34ca | ||
|
|
ccfd50c6b7 | ||
|
|
7cb9955f82 | ||
|
|
0710269e32 | ||
|
|
b2cbaa46d5 | ||
|
|
a42999afab | ||
|
|
86501edf9e | ||
|
|
36dbf24131 | ||
|
|
4c7f63ee6c | ||
|
|
2782e386f9 | ||
|
|
8850b696ab | ||
|
|
7e34a42088 | ||
|
|
ea891cfb3c | ||
|
|
9ecf2ad8f8 | ||
|
|
13ce9b12ac | ||
|
|
f815a342e7 | ||
|
|
9f0c356194 | ||
|
|
5241920b3c | ||
|
|
786665c582 | ||
|
|
ee026dd2ab | ||
|
|
73bfa1d1ab | ||
|
|
bf95ea8fd9 | ||
|
|
8fd07efa80 | ||
|
|
777fb8a624 | ||
|
|
1fdf2d2e19 | ||
|
|
37c64c6e36 | ||
|
|
0ab62357ce | ||
|
|
a816b64b86 | ||
|
|
13c2ffcc5b | ||
|
|
a940c44ae5 | ||
|
|
dbe88218e4 | ||
|
|
c1b2a43ef5 | ||
|
|
c6d87355db | ||
|
|
68e198f375 | ||
|
|
90819543f6 | ||
|
|
67f0c95888 | ||
|
|
69e2ddcb49 | ||
|
|
0614d593dd | ||
|
|
aee0dc7377 | ||
|
|
666c527a43 | ||
|
|
55fab905c1 | ||
|
|
9ee0876c2b | ||
|
|
66327ddda6 | ||
|
|
9eff28dac8 | ||
|
|
8c0b75b068 | ||
|
|
b2ce4472b5 | ||
|
|
5c228063bc | ||
|
|
b6038dab22 | ||
|
|
89b736ba83 | ||
|
|
0939a12a70 | ||
|
|
86b0d0bc80 | ||
|
|
f21378d696 | ||
|
|
35023ba945 | ||
|
|
fc5c0ddc52 | ||
|
|
b8d6eae391 | ||
|
|
01535f998d | ||
|
|
b2f85981ad | ||
|
|
531f9b1f77 | ||
|
|
bcf2aa511c | ||
|
|
7913b6800a | ||
|
|
a72bbc0ce2 | ||
|
|
c19026af9e | ||
|
|
c4e0fddf5b | ||
|
|
2b6d2c8407 | ||
|
|
b254b73745 | ||
|
|
6bbcb68a79 | ||
|
|
f48df3b6fe | ||
|
|
b5135607b4 | ||
|
|
018558cb9e | ||
|
|
2138609918 | ||
|
|
dd22ea4caf | ||
|
|
53096cbf0c | ||
|
|
54cb64aef2 | ||
|
|
0ce4d37e54 | ||
|
|
7babff444a | ||
|
|
027b33d313 | ||
|
|
57dfc84ee7 | ||
|
|
0004fd81ed | ||
|
|
cb25b013fb | ||
|
|
558a632821 | ||
|
|
e2732629bf | ||
|
|
6dac59f2d4 | ||
|
|
c9312a41da | ||
|
|
5521ebb35a | ||
|
|
7fed954836 | ||
|
|
15d1e95d31 | ||
|
|
de564c09b2 | ||
|
|
2eacdccc5d | ||
|
|
00876cd9df | ||
|
|
776f85238f | ||
|
|
abcaa3e669 | ||
|
|
369a99fe3a | ||
|
|
7157ec19b6 | ||
|
|
670ca5a83a | ||
|
|
e109e76069 | ||
|
|
a8f0aa6016 | ||
|
|
4bb598c9ad | ||
|
|
f0dccf3ca0 | ||
|
|
e59812782e | ||
|
|
02d396c33a | ||
|
|
68a72d2ceb | ||
|
|
33e47b1a51 | ||
|
|
80b04b4440 | ||
|
|
513b878285 | ||
|
|
b60e8cead1 | ||
|
|
49834ac5c8 | ||
|
|
f4e1d47704 | ||
|
|
caf06d3a7b | ||
|
|
bff577eed4 | ||
|
|
a1f5834052 | ||
|
|
7fab59ec17 | ||
|
|
c02f977487 | ||
|
|
c3b3faf7a4 | ||
|
|
4b42dcf97f | ||
|
|
662c87a579 | ||
|
|
328b5011af | ||
|
|
dc87f207cd | ||
|
|
25291680b0 | ||
|
|
2a15fcf645 | ||
|
|
dc2dd991c6 | ||
|
|
8a409311da | ||
|
|
d43142d811 | ||
|
|
6e2b44962f | ||
|
|
e00f89ea6f | ||
|
|
2f92b46a9d | ||
|
|
bb48507f58 | ||
|
|
94db19641a | ||
|
|
d8486967aa | ||
|
|
0c6ba1fd58 | ||
|
|
09a352c151 | ||
|
|
c98a786cc4 | ||
|
|
2b8e44b860 | ||
|
|
d6f0d3b65f | ||
|
|
a0187208a5 | ||
|
|
e891b36895 | ||
|
|
8790a879c9 | ||
|
|
a5f05e8ba0 | ||
|
|
bdb0b550f7 | ||
|
|
b3a142e244 | ||
|
|
24a1c0d390 | ||
|
|
9bab5d363c | ||
|
|
a8033da29e | ||
|
|
2f5b25269e | ||
|
|
0950240cfa | ||
|
|
3bed868bb9 | ||
|
|
f2996068f8 | ||
|
|
58eaf6df5b | ||
|
|
5e2915d143 | ||
|
|
ac489d50a3 | ||
|
|
fec7208f70 | ||
|
|
30208cda9a | ||
|
|
a022b9490c | ||
|
|
7c723a8e48 | ||
|
|
75cab1f389 | ||
|
|
bf9730d10e | ||
|
|
cd64ce0424 | ||
|
|
79b0bb3347 | ||
|
|
0e2861d8b0 | ||
|
|
5f3e4693e6 | ||
|
|
2465ad8ed8 | ||
|
|
a49ffb7945 | ||
|
|
55a133aa3c | ||
|
|
86b6eab206 | ||
|
|
862f83571f | ||
|
|
b91af798bc | ||
|
|
1758da9285 | ||
|
|
61c646a496 | ||
|
|
c6d60cb24f | ||
|
|
671556cfc4 | ||
|
|
5d81b090b9 | ||
|
|
4734150614 | ||
|
|
d50600e263 | ||
|
|
96da16ce33 | ||
|
|
3107e638f8 | ||
|
|
f9fadbf045 | ||
|
|
5ffd738802 | ||
|
|
6a19ee76cc | ||
|
|
43e04499d0 | ||
|
|
295c8d2515 | ||
|
|
f6c7b7bbcd | ||
|
|
cf4c99a093 | ||
|
|
01b937d82e | ||
|
|
c6134a1f59 | ||
|
|
6709f6e340 | ||
|
|
99c20a6a08 | ||
|
|
a46596cbba | ||
|
|
07cb257465 | ||
|
|
e9d477fd6e | ||
|
|
99cae8d6df | ||
|
|
c4ca7db14f | ||
|
|
9ad5d4b5e0 | ||
|
|
5300633c2b | ||
|
|
ff90971199 | ||
|
|
c023409091 | ||
|
|
cde3638bc9 | ||
|
|
b6c29b5541 | ||
|
|
a43e504fb1 | ||
|
|
676fee0a3e | ||
|
|
d57dfac961 | ||
|
|
d4bcec7ec2 | ||
|
|
42a7f3d8e7 | ||
|
|
e93e256512 | ||
|
|
72f667fbf9 | ||
|
|
f9d19e9302 | ||
|
|
edf2f575a2 | ||
|
|
3868470366 | ||
|
|
776233c718 | ||
|
|
c30769327b | ||
|
|
12669d882f | ||
|
|
b93cdd9aac | ||
|
|
c5ee3b6735 | ||
|
|
38880093e8 | ||
|
|
0ce3cd0c76 | ||
|
|
95fc55f840 | ||
|
|
013a6f9cd6 | ||
|
|
cfc1d926bf | ||
|
|
d9d6cc127f | ||
|
|
3e80ca51fc | ||
|
|
339f9dd942 | ||
|
|
67f9f2a74f | ||
|
|
636c151d51 | ||
|
|
410a62e2de | ||
|
|
45c90324fd | ||
|
|
1ece6f9107 | ||
|
|
9dcaf4ecdc | ||
|
|
f3250e5db5 | ||
|
|
d4e3a9d9f6 | ||
|
|
9b2bc42d92 | ||
|
|
ba7100a4c2 | ||
|
|
3dc49877a5 | ||
|
|
1546ac1235 | ||
|
|
6d39055193 | ||
|
|
1158018fdf | ||
|
|
f83c2ba230 | ||
|
|
0928518b8d | ||
|
|
a951391408 | ||
|
|
6e551adf21 | ||
|
|
bc565a13f1 | ||
|
|
787904f82c | ||
|
|
287f8d5d70 | ||
|
|
2db075ab69 | ||
|
|
d72e4424cd | ||
|
|
c33ae16bce | ||
|
|
9c03f2c8bd | ||
|
|
ce1285d2eb | ||
|
|
142a703f77 | ||
|
|
c2a260ba68 | ||
|
|
da85a0fa2f | ||
|
|
7a18c01a7c | ||
|
|
bdbbf32404 | ||
|
|
cccb0dd197 | ||
|
|
4b445d4860 | ||
|
|
046d5b38a9 | ||
|
|
a817264e90 | ||
|
|
2fb6605800 | ||
|
|
8cb76d3ed8 | ||
|
|
67e5a8e7a5 | ||
|
|
64c2ad3838 | ||
|
|
c2f70c4857 | ||
|
|
480de7cafb | ||
|
|
f04baf2201 | ||
|
|
0f8516f861 | ||
|
|
cd1bb106ec | ||
|
|
9196107b79 | ||
|
|
74546bd985 | ||
|
|
adc8fc6e9e | ||
|
|
acfb0f2eed | ||
|
|
69d8dc3b44 | ||
|
|
a751b2ef42 | ||
|
|
7f4a6b31a7 | ||
|
|
cf855ea282 | ||
|
|
ed479cbb76 | ||
|
|
851a0c4501 | ||
|
|
3a8a4fc1df | ||
|
|
3899b18911 | ||
|
|
d4d3e6b484 | ||
|
|
a5b0790d96 | ||
|
|
13ea4896b0 | ||
|
|
07f019213d | ||
|
|
44ff24f085 | ||
|
|
35586d769a | ||
|
|
68a2852f57 | ||
|
|
4360ab1cee | ||
|
|
e4309374be | ||
|
|
80cb794116 | ||
|
|
88a316478d | ||
|
|
a413fa8b90 | ||
|
|
b4e38b8fcd | ||
|
|
b5a1f8a3b3 | ||
|
|
d186cb605f | ||
|
|
9286928275 | ||
|
|
8740dcc72e | ||
|
|
c5dcddd4fd | ||
|
|
c246adf1c4 | ||
|
|
95cfd33824 | ||
|
|
1ce56a4e78 | ||
|
|
44b74a6c84 | ||
|
|
42940634dd | ||
|
|
1e3b6137d4 | ||
|
|
dfb4d0c576 | ||
|
|
4a5a463e44 | ||
|
|
788788edc0 | ||
|
|
741b43044d | ||
|
|
49d31eaeff | ||
|
|
8af6b69b44 | ||
|
|
d5dc0b7342 | ||
|
|
ead414d725 | ||
|
|
e5117bbf30 | ||
|
|
1d37165575 | ||
|
|
ba8482c5ab | ||
|
|
10dd78edbf | ||
|
|
cf3bcb5e63 | ||
|
|
352c5c581b | ||
|
|
64b7d49c0a | ||
|
|
b6a7d4fa0f | ||
|
|
01f77a03af | ||
|
|
d6fa6357f2 | ||
|
|
78d3e500fb | ||
|
|
46e45d1c2d | ||
|
|
3d5569183e | ||
|
|
e4857c2446 | ||
|
|
35c612b99b | ||
|
|
1ae683e3b3 | ||
|
|
8ff400fd0f | ||
|
|
84297d3460 | ||
|
|
b4504c0f73 | ||
|
|
9c403e7299 | ||
|
|
95563ae3bc | ||
|
|
cf65fbe6a1 | ||
|
|
46fb868503 | ||
|
|
744fcc3442 | ||
|
|
82c3158ada | ||
|
|
b821194cbd | ||
|
|
85da3bcac1 | ||
|
|
7b969cc623 | ||
|
|
1fefd074f9 | ||
|
|
aa2bfa7738 | ||
|
|
4c4b47a902 | ||
|
|
81a2d12ae5 | ||
|
|
7f6b39f155 | ||
|
|
d7e23d9466 | ||
|
|
0b44329a4b | ||
|
|
284bd607fd | ||
|
|
b6b4cee71f | ||
|
|
8c84139dc8 | ||
|
|
fd259c398c | ||
|
|
257b4847bf | ||
|
|
654715cf8a | ||
|
|
155d41c3e0 | ||
|
|
b759fb2438 | ||
|
|
9ef6cf575b | ||
|
|
159bdec3f5 | ||
|
|
17c1915104 | ||
|
|
0faaec8e3d | ||
|
|
10b58a8520 | ||
|
|
9d08fc6678 | ||
|
|
7255b1aa61 | ||
|
|
b9bb251d60 | ||
|
|
998de8d264 | ||
|
|
3aa0ecdb5c | ||
|
|
0e2a3baa5d | ||
|
|
f63613844b | ||
|
|
19df56bc23 | ||
|
|
ebcd62f7d2 | ||
|
|
c7d0d1d447 | ||
|
|
de6b8d9108 | ||
|
|
c4d23274c9 | ||
|
|
b719750e75 | ||
|
|
bec816346d | ||
|
|
9feb3f9254 | ||
|
|
48252cc673 | ||
|
|
010bade227 | ||
|
|
2364f3f6b0 | ||
|
|
9715c40c3f | ||
|
|
a96f33ef34 | ||
|
|
e713e6f8fe | ||
|
|
d25472bbfb | ||
|
|
8f74dd7ae6 | ||
|
|
1525e12aee | ||
|
|
7e0c59d59a | ||
|
|
8c9c04b549 | ||
|
|
9197c959dc | ||
|
|
eb2a76270f | ||
|
|
6ea0fa77db | ||
|
|
d75369dd40 | ||
|
|
53fe78afae | ||
|
|
0a9017bae1 | ||
|
|
0364de3a9c | ||
|
|
f3a7c72ddb | ||
|
|
10a379dc8a | ||
|
|
5d8db9045e | ||
|
|
96562f964d | ||
|
|
42e84d8dd2 | ||
|
|
9a92f57752 | ||
|
|
463a0e7f40 | ||
|
|
008a907894 | ||
|
|
4bde31f78a | ||
|
|
26cc87efe6 | ||
|
|
77259cd2f9 | ||
|
|
00027d3893 | ||
|
|
fa4e6eecb4 | ||
|
|
18439ffa3f | ||
|
|
73246f3824 | ||
|
|
360caa08bb | ||
|
|
4c0ea89fe0 | ||
|
|
8ee1e318a3 | ||
|
|
84b9957b17 | ||
|
|
319d9bcfe0 | ||
|
|
e52091ea7c | ||
|
|
a5f950bac7 | ||
|
|
3c03d3f68c | ||
|
|
9407523510 | ||
|
|
04dcaf5685 | ||
|
|
650c178631 | ||
|
|
92bccdd4fa | ||
|
|
048099535a | ||
|
|
8a096ffacb | ||
|
|
5b23cab8e9 | ||
|
|
f755d6683d | ||
|
|
8279a37642 | ||
|
|
be3597ddbe | ||
|
|
5785bb133b | ||
|
|
98f011552e | ||
|
|
d277946286 | ||
|
|
b1347283b9 | ||
|
|
a1a78e3b70 | ||
|
|
47955d174e | ||
|
|
c302ed167c | ||
|
|
94a4bbb268 | ||
|
|
2b2698c44c | ||
|
|
3ed9932864 | ||
|
|
37379d70ba | ||
|
|
338fb5fb30 | ||
|
|
d12053873a | ||
|
|
ed19a3d568 | ||
|
|
6572fa2def | ||
|
|
066c005493 | ||
|
|
0ad83c648e | ||
|
|
1280176fb0 | ||
|
|
022b40d40c | ||
|
|
fc9e01c8d8 | ||
|
|
0ef99949bc | ||
|
|
3e194345cf | ||
|
|
990e7a67da | ||
|
|
ef8450fce9 | ||
|
|
4759f1c9f9 | ||
|
|
53ce9da827 | ||
|
|
3d644d25cb | ||
|
|
5f35d0c644 | ||
|
|
90101c0dec | ||
|
|
6f9afbf0d5 | ||
|
|
f7360f0fec | ||
|
|
c7be2d1a44 | ||
|
|
52a8f7d1f1 | ||
|
|
c09e4ced7e | ||
|
|
36fb149236 | ||
|
|
a0eb2f398d | ||
|
|
c6cbc82178 | ||
|
|
3e357f311f | ||
|
|
228fe4b4d0 | ||
|
|
b1ee8fe36b | ||
|
|
09a52b8cf2 | ||
|
|
b07825aee3 | ||
|
|
cee897ecfa | ||
|
|
02c5bf9140 | ||
|
|
f62db3f3c6 | ||
|
|
c8ca61ba6e | ||
|
|
7455c23f0f | ||
|
|
347197573b | ||
|
|
1b08effa77 | ||
|
|
c483664bb1 | ||
|
|
96916a7ab4 | ||
|
|
1e9c82d6e5 | ||
|
|
a7b5504034 | ||
|
|
c820d77690 | ||
|
|
1c848c8db3 | ||
|
|
c20a2155fa | ||
|
|
811612634a | ||
|
|
00c4a00675 | ||
|
|
b32fb46dfe | ||
|
|
01a95e3b08 | ||
|
|
46b57440a0 | ||
|
|
7d131a2cd5 | ||
|
|
55da4da081 | ||
|
|
3aec06a088 | ||
|
|
7fadcacc26 | ||
|
|
cd8f86a7e4 | ||
|
|
58f837cd33 | ||
|
|
b005d26d3f | ||
|
|
1ae39bf15b | ||
|
|
f781103cb4 | ||
|
|
27d7d5ed68 | ||
|
|
11349c78cd | ||
|
|
6d78cd6710 | ||
|
|
9e151cf706 | ||
|
|
761312d0dd | ||
|
|
8b702734cf | ||
|
|
d4389da709 | ||
|
|
197f5bc796 | ||
|
|
869ba1ec9e | ||
|
|
0374c089c3 | ||
|
|
eabc223bf0 | ||
|
|
9953b58092 | ||
|
|
1205b95090 | ||
|
|
a9102764e6 | ||
|
|
c48f281b39 | ||
|
|
e2b5163869 | ||
|
|
f99f25cc5f | ||
|
|
b11e382851 | ||
|
|
3824cfd66d | ||
|
|
96a52f7a6f | ||
|
|
f3249a04a1 | ||
|
|
53b430aed6 | ||
|
|
eee6d61c7b | ||
|
|
676aee2213 | ||
|
|
b1c3d1bc53 | ||
|
|
56e985729d | ||
|
|
4dfa2310fc | ||
|
|
cd367c7940 | ||
|
|
8c9800d8fe | ||
|
|
06c441dab7 | ||
|
|
5406895717 | ||
|
|
341aaf8dc1 | ||
|
|
8b21acdbb3 | ||
|
|
e8aadf4409 | ||
|
|
43fb961091 | ||
|
|
74bc0442bd | ||
|
|
133ecee90d | ||
|
|
2b8ee048c8 | ||
|
|
3b4a813a6c | ||
|
|
018cf665d8 | ||
|
|
2cd40f68e6 | ||
|
|
64a35f954d | ||
|
|
cc3459e5a8 | ||
|
|
ced856c234 | ||
|
|
e6fb294aac | ||
|
|
69f02d8abc | ||
|
|
8f2fe1c003 | ||
|
|
6266743c4c | ||
|
|
7c26c21b87 | ||
|
|
2f81a59738 | ||
|
|
3d7da616bf | ||
|
|
013ccf9149 | ||
|
|
ce81b47935 | ||
|
|
aa0e321971 | ||
|
|
aaea752423 | ||
|
|
4a1f9bbc22 | ||
|
|
c1075bd08c | ||
|
|
fd4e81f64e | ||
|
|
fdcad08fdf | ||
|
|
efe2c8d032 | ||
|
|
e431cec90a | ||
|
|
9f7ee118f7 | ||
|
|
03d44703a2 | ||
|
|
f45eda8c23 | ||
|
|
57106471dc | ||
|
|
4220dc1479 | ||
|
|
d818da36f0 | ||
|
|
13bc7e128d | ||
|
|
7531131416 | ||
|
|
ee50a1d717 | ||
|
|
3c8a8f0349 | ||
|
|
5a9d09a854 | ||
|
|
b7c7d50513 | ||
|
|
c5b0e1bd4f | ||
|
|
749c364816 | ||
|
|
0a7c058d01 | ||
|
|
d2f7f252b2 | ||
|
|
f0cec58cf9 | ||
|
|
85c9115d5b | ||
|
|
fdf26a7f06 | ||
|
|
d20988a1cb | ||
|
|
c1ff4f2725 | ||
|
|
b3e42570bb | ||
|
|
ff4f0602ff | ||
|
|
d62d0c68ee | ||
|
|
0a60d5f585 | ||
|
|
600d569269 | ||
|
|
a94dec52d8 | ||
|
|
19638876a1 | ||
|
|
948aa06740 | ||
|
|
bc1ab42895 | ||
|
|
dfc5d7318c | ||
|
|
eb6c2af313 | ||
|
|
e967e920be | ||
|
|
b7a6b75155 | ||
|
|
9c24d8f3fe | ||
|
|
0afe372ebb | ||
|
|
6d9d69aebf | ||
|
|
ec3d8bb5aa | ||
|
|
6e75af9cef | ||
|
|
944c818096 | ||
|
|
6f8702a65e | ||
|
|
4d5f61ce45 | ||
|
|
50114318e2 | ||
|
|
ff853d748c | ||
|
|
0995f7a809 | ||
|
|
6877184666 | ||
|
|
3030b5edd1 | ||
|
|
1b6fe5b9ed | ||
|
|
c847bfb6c8 | ||
|
|
7a7d0e413b | ||
|
|
d650e927a7 | ||
|
|
87c1bc774b | ||
|
|
f1c6de0f1f | ||
|
|
96840e712d | ||
|
|
6ac4bb17aa | ||
|
|
4797a7d4ce | ||
|
|
c5345bf6ac | ||
|
|
61f0a89372 | ||
|
|
b296ddc4a0 | ||
|
|
96c4943ef7 | ||
|
|
d763d3ddeb | ||
|
|
52d3ee55e2 | ||
|
|
eef9b6237b | ||
|
|
4e21aced73 | ||
|
|
3a3b5db45d | ||
|
|
f9b6acf1dc | ||
|
|
346bc839a3 | ||
|
|
9379157da7 | ||
|
|
a432f84eb0 | ||
|
|
88ebd891b1 | ||
|
|
3ecaa0b634 | ||
|
|
11cb7edde4 | ||
|
|
1e3877b595 | ||
|
|
7ed597eefc | ||
|
|
c69004d5df | ||
|
|
c1fc03b7e2 | ||
|
|
bfe38b6f40 | ||
|
|
bb83c44309 | ||
|
|
6218df1293 | ||
|
|
21a8f93bc7 | ||
|
|
fb0051c85a | ||
|
|
101e93205b | ||
|
|
5980b1e5ec | ||
|
|
944898dd40 | ||
|
|
c81a6a0c7a | ||
|
|
0975784c8d | ||
|
|
183942e70c | ||
|
|
162b824030 | ||
|
|
18d134bda7 | ||
|
|
33992b426d | ||
|
|
f740dcf176 | ||
|
|
24f3f2f10e | ||
|
|
15beade4d2 | ||
|
|
ae34da5376 | ||
|
|
3370f962a4 | ||
|
|
ab1b682800 | ||
|
|
23f2646704 | ||
|
|
15449606d1 | ||
|
|
b708373ff8 | ||
|
|
3a3db29339 | ||
|
|
d97abb0763 | ||
|
|
bf62834959 | ||
|
|
7e2d5f6065 | ||
|
|
1d0b3910b2 | ||
|
|
bb7b8d6490 | ||
|
|
6030127779 | ||
|
|
018d91b6a1 | ||
|
|
a1b4e28760 | ||
|
|
e8aab09b4b | ||
|
|
62729ad0b2 | ||
|
|
0fe88af93e | ||
|
|
0e3f85e837 | ||
|
|
26e5032b9c | ||
|
|
ac2b7f8d44 | ||
|
|
3ab954e38c | ||
|
|
bc1eb3116e | ||
|
|
847c27663b | ||
|
|
992dc3eb65 | ||
|
|
da2ba8e093 | ||
|
|
a22bbe847f | ||
|
|
5c7325e0de | ||
|
|
ef6efdee12 | ||
|
|
4c755666b8 | ||
|
|
587a8e8274 | ||
|
|
80d87777f0 | ||
|
|
c3408302c1 | ||
|
|
c6a806ac4d | ||
|
|
b4e24c5bdd | ||
|
|
6f4bdccf04 | ||
|
|
19c225f75f | ||
|
|
f2c241fe3a | ||
|
|
13c2a9a2a5 | ||
|
|
5187e46404 | ||
|
|
b1626ca895 | ||
|
|
4fd066bb54 | ||
|
|
b37c8b0b24 | ||
|
|
6beb10355e | ||
|
|
3b61d605c1 | ||
|
|
75c18ef56c | ||
|
|
432cf9054d | ||
|
|
d5b2601b8f | ||
|
|
30959cd73f | ||
|
|
8aee01de95 | ||
|
|
c096cc6522 | ||
|
|
a4178ca843 | ||
|
|
9751e398e3 | ||
|
|
f7790b0e8e | ||
|
|
1e19db9d3a | ||
|
|
00ac6f88a7 | ||
|
|
188b1df96d | ||
|
|
9baa112ea1 | ||
|
|
59ea3478ac | ||
|
|
4da1930ff4 | ||
|
|
0c19cc22e0 | ||
|
|
fcc033df20 | ||
|
|
01626b2c32 | ||
|
|
eb3dcf275e | ||
|
|
4629647d78 | ||
|
|
ebce0b4a18 | ||
|
|
7b2e749b0d | ||
|
|
429d527a64 | ||
|
|
5a4933ff7f | ||
|
|
7161d59956 | ||
|
|
76cb7a0b33 | ||
|
|
760ee8362e | ||
|
|
d7ce393510 | ||
|
|
b005246ad5 | ||
|
|
3b922f1292 | ||
|
|
62d8930080 | ||
|
|
dbe4e49936 | ||
|
|
683c162cff | ||
|
|
b11b5996c1 | ||
|
|
d79ad333bf | ||
|
|
86ace8a020 | ||
|
|
dfca9ea600 | ||
|
|
6fc4ca1ae0 | ||
|
|
dcde07e7a7 | ||
|
|
cd70a74d25 | ||
|
|
e91749bbce | ||
|
|
143abc2420 | ||
|
|
f682c264a8 | ||
|
|
fb88f5dbdd | ||
|
|
7c22618cb8 | ||
|
|
81f2477282 | ||
|
|
be89699a1a | ||
|
|
04e2dac8e7 | ||
|
|
6fec436051 | ||
|
|
a13ea6d098 | ||
|
|
0bc88b77b2 | ||
|
|
9dcae8fcd0 | ||
|
|
fa6900fbbc | ||
|
|
c64da88289 | ||
|
|
f3584b3d52 | ||
|
|
1e9d815c92 | ||
|
|
926da49d39 | ||
|
|
e2fe3fec2c | ||
|
|
c3f7993b1a | ||
|
|
37fd03b14b | ||
|
|
687d428026 | ||
|
|
929716a621 | ||
|
|
e0c7813927 | ||
|
|
732d0eac5c | ||
|
|
0ec10de716 | ||
|
|
eca0cde913 | ||
|
|
76684055eb | ||
|
|
9ea59fd48a | ||
|
|
920ba0eebe | ||
|
|
3b76fbc284 | ||
|
|
821e1e624b | ||
|
|
55705b22ca | ||
|
|
8127265043 | ||
|
|
c52b10c115 | ||
|
|
91853768f7 | ||
|
|
42b647d9a9 | ||
|
|
f70dfe4d00 | ||
|
|
f7df668450 | ||
|
|
1daac3c5d1 | ||
|
|
0291c897be | ||
|
|
bf6a1eb0ba | ||
|
|
542eb9a7d8 | ||
|
|
45a94c9858 | ||
|
|
f3c29355f6 | ||
|
|
9359e081db | ||
|
|
2930ebb406 | ||
|
|
3adeb611df | ||
|
|
df69d70608 | ||
|
|
8811a2af14 | ||
|
|
d87e8f72a9 | ||
|
|
7bcd261f8e | ||
|
|
039552a46c | ||
|
|
c9df20878f | ||
|
|
b0fdc82616 | ||
|
|
766d76e712 | ||
|
|
e72a36bbb2 | ||
|
|
8ae2077591 | ||
|
|
945cceccb5 | ||
|
|
7f0b775587 | ||
|
|
6ee3538d91 | ||
|
|
f58722ab46 | ||
|
|
817facac14 | ||
|
|
e6fb2468c8 | ||
|
|
709cf50fbd | ||
|
|
811321b190 | ||
|
|
5a18c3748d | ||
|
|
e92f8ac398 | ||
|
|
3373e11923 | ||
|
|
2ec4640e7e | ||
|
|
3a546eb8dd | ||
|
|
5e14dddb6c | ||
|
|
cc55ab947d | ||
|
|
11843b44a1 | ||
|
|
1c570328f0 | ||
|
|
b1b4ba9677 | ||
|
|
fa9d7ce5ce | ||
|
|
c951295521 | ||
|
|
b45706ce7a | ||
|
|
57dfee488a | ||
|
|
6833adfb50 | ||
|
|
4c76583aba | ||
|
|
d55d4bb69f | ||
|
|
b83fca4445 | ||
|
|
6420525753 | ||
|
|
7c39967dc5 | ||
|
|
406d024e9f | ||
|
|
ed34e06d2d | ||
|
|
9c5f0e8159 | ||
|
|
b800af87af | ||
|
|
56c0f3bc5b | ||
|
|
6ba5c0b850 | ||
|
|
ac86c49d85 | ||
|
|
46f633870d | ||
|
|
b9417a3a55 | ||
|
|
f4caec88e8 | ||
|
|
8e09304da7 | ||
|
|
10157af05f | ||
|
|
66ae1083a8 | ||
|
|
8e15d114ac | ||
|
|
87d0349814 | ||
|
|
18b719de80 | ||
|
|
5252b760d9 | ||
|
|
73ac23824b | ||
|
|
da11deeece | ||
|
|
9eb1f7a67b | ||
|
|
15377abec5 | ||
|
|
6a8360b335 | ||
|
|
3d6ab89bc1 | ||
|
|
982138b8da | ||
|
|
b86a455efa | ||
|
|
d7bb7c9cf3 | ||
|
|
35b3050d88 | ||
|
|
e43a0746a8 | ||
|
|
fec83f1be3 | ||
|
|
712ba56ce8 | ||
|
|
4757be8bf6 | ||
|
|
582ed4da02 | ||
|
|
a804cc2e15 | ||
|
|
7d8e3b8fcd | ||
|
|
f452bfc1e1 | ||
|
|
f2d5f15e51 | ||
|
|
430dad523d | ||
|
|
4b5e5a9764 | ||
|
|
6ac798b50c | ||
|
|
b8cc947bc3 | ||
|
|
a08e71a16f | ||
|
|
4bacebab18 | ||
|
|
345873dae2 | ||
|
|
fda83cb06d | ||
|
|
f1245e2e00 | ||
|
|
090f27251e | ||
|
|
7f77ee091c | ||
|
|
28c8abd52b | ||
|
|
5c4164927d | ||
|
|
33b7bac870 | ||
|
|
66430b1900 | ||
|
|
8bdd4c2a79 | ||
|
|
0bb9c9b5a5 | ||
|
|
09cc81f5b5 | ||
|
|
19dad4482b | ||
|
|
d6dfd5d1ad | ||
|
|
f210ef4f8e | ||
|
|
11dee74e80 | ||
|
|
246554a0b1 | ||
|
|
ef6f9168c4 | ||
|
|
15e885ac8d | ||
|
|
af5ed82bff | ||
|
|
b90690ba5d | ||
|
|
d418617de6 | ||
|
|
f8a3f67ddb | ||
|
|
93cee9d434 | ||
|
|
5e766a0f20 | ||
|
|
4ed20925c6 | ||
|
|
7267917050 | ||
|
|
190ea14bbf | ||
|
|
0e895422bc | ||
|
|
cfa5eafd3d | ||
|
|
8cd2051b2e | ||
|
|
8fab3192b6 | ||
|
|
7851ff900f | ||
|
|
63f793aff3 | ||
|
|
0011c49d1e | ||
|
|
3bb19b6e7d | ||
|
|
b5083a9ccf | ||
|
|
4f11f3c3fd | ||
|
|
900421f411 | ||
|
|
63c0ca38f9 | ||
|
|
7a6913dea1 | ||
|
|
78237f3ef8 | ||
|
|
01252cb592 | ||
|
|
a7a80689bf | ||
|
|
cfd6bca270 | ||
|
|
e71c873fc1 | ||
|
|
0d9daaa18d | ||
|
|
416020b5bd | ||
|
|
ba1c1a82d7 | ||
|
|
dc5a744d8d | ||
|
|
e0fc646222 | ||
|
|
b61011fba9 | ||
|
|
163bbc5845 | ||
|
|
f69a7e3e5d | ||
|
|
a281cc38a4 | ||
|
|
666367e328 | ||
|
|
497792f739 | ||
|
|
153a94aad4 | ||
|
|
ed651bbd04 | ||
|
|
0ba4588be1 | ||
|
|
10e2f5cb36 | ||
|
|
8b6ba39da4 | ||
|
|
0f8489fe28 | ||
|
|
d096f1882a | ||
|
|
ce0ec1c143 | ||
|
|
c08c3e5cf6 | ||
|
|
e66f3adc06 | ||
|
|
ac21f8d98a | ||
|
|
bcb3b108a5 | ||
|
|
f397d35b6a | ||
|
|
ac3bf2cc95 | ||
|
|
1169f99c92 | ||
|
|
79295ca3ea | ||
|
|
c488a4d491 | ||
|
|
b909bb629b | ||
|
|
8e7e1320ac | ||
|
|
366b492174 | ||
|
|
a54c470fef | ||
|
|
e1b871a6ea | ||
|
|
a66faf4100 | ||
|
|
7bac6eb164 | ||
|
|
23a7e7b427 | ||
|
|
17e980aa15 | ||
|
|
5578d004bc | ||
|
|
668b4ca6e7 | ||
|
|
6b7a135b2b | ||
|
|
4cecb6bffb | ||
|
|
ff682c0cfc | ||
|
|
b0c8f9748a | ||
|
|
1fb9c249b3 | ||
|
|
63d95a5f0e | ||
|
|
9c8e5b9217 | ||
|
|
19698499d6 | ||
|
|
a831fab61d | ||
|
|
4f8b2e9926 | ||
|
|
6ae90c8f34 | ||
|
|
391d115b4d | ||
|
|
751854f36a | ||
|
|
8a8d0d9151 | ||
|
|
2df4da50da | ||
|
|
acf34e54ec | ||
|
|
3d549e7932 | ||
|
|
fb854c82ff | ||
|
|
b533b53690 | ||
|
|
9435c895bf | ||
|
|
b52e0e8ff1 | ||
|
|
6839d8afb1 | ||
|
|
7e502b0937 | ||
|
|
f8fb06210d | ||
|
|
6d3e9fb7af | ||
|
|
1f7115fa8d | ||
|
|
a5f48d6493 | ||
|
|
091f3dbebf | ||
|
|
eaaa335e50 | ||
|
|
b725b0af8b | ||
|
|
5fd21b16a9 | ||
|
|
a9c8b67b65 | ||
|
|
2f479b6078 | ||
|
|
115e92a7dc | ||
|
|
f2ea210122 | ||
|
|
4c8442f1f0 | ||
|
|
41d0500d81 | ||
|
|
5b50914bea | ||
|
|
2d98c32cb2 | ||
|
|
ec5cff92d8 | ||
|
|
291b607f4e | ||
|
|
5c126dd968 | ||
|
|
b5f657aba6 | ||
|
|
93c04d3389 | ||
|
|
3a183b7b44 | ||
|
|
a01ea4d930 | ||
|
|
02fec008a2 | ||
|
|
d66b646e58 | ||
|
|
42560d86ef | ||
|
|
64aae9d435 | ||
|
|
74fba213bc | ||
|
|
f78b282fb4 | ||
|
|
612ddc8a4e | ||
|
|
575d4f5223 | ||
|
|
a0d2a1ea74 | ||
|
|
dca9ed9bb2 | ||
|
|
79ac11bd40 | ||
|
|
83b92a8af2 | ||
|
|
feb6e7505c | ||
|
|
2b47b43390 | ||
|
|
a206f17205 | ||
|
|
2dfd74fe14 | ||
|
|
615b67952f | ||
|
|
a40768b6f9 | ||
|
|
ac92c0b9c3 | ||
|
|
d24592ee76 | ||
|
|
ddc46385f3 | ||
|
|
2540279185 | ||
|
|
e102a3f5cb | ||
|
|
32e5679d6c | ||
|
|
62d1432035 | ||
|
|
8d68d0b1ee | ||
|
|
9a7a7f7f4b | ||
|
|
5e34ca7d2b | ||
|
|
2fba044900 | ||
|
|
2ffad4edb4 | ||
|
|
2deb5cafce | ||
|
|
f8a9f58006 | ||
|
|
9d6a005bb2 | ||
|
|
61b8c3e9ec | ||
|
|
cc52343fbf | ||
|
|
95b4d20b5d | ||
|
|
7f5dfa7bb2 | ||
|
|
f3a780ecec | ||
|
|
6246c6fc9e | ||
|
|
f75ed26b04 | ||
|
|
859468b767 | ||
|
|
98359a035e | ||
|
|
1a6665e21d | ||
|
|
e8730266e5 | ||
|
|
b1712321e2 | ||
|
|
7ee4487924 | ||
|
|
282064375d | ||
|
|
3a075a7c67 | ||
|
|
8134a42ee8 | ||
|
|
01c8cd6d15 | ||
|
|
61a911c631 | ||
|
|
a1684f6d0b | ||
|
|
367e4ac01c | ||
|
|
08bd32f88d | ||
|
|
e7683658b7 | ||
|
|
057ee4e5cb | ||
|
|
bb01ac81fd | ||
|
|
0f83947e33 | ||
|
|
7172fe9816 | ||
|
|
7e6fe16448 | ||
|
|
775bda9da0 | ||
|
|
e496b6ee02 | ||
|
|
119bc227de | ||
|
|
e0ad269d4c | ||
|
|
143531822a | ||
|
|
371821c6a3 | ||
|
|
a9a2e027c8 | ||
|
|
5aa128ea62 | ||
|
|
ebfc4a15a4 | ||
|
|
2cb7fcf861 | ||
|
|
8f9ed86162 | ||
|
|
d308f4a3c2 | ||
|
|
e9094d3f03 | ||
|
|
094d427268 | ||
|
|
7e8d7af500 | ||
|
|
d7d16cbede | ||
|
|
03610bb643 | ||
|
|
a1032b168c | ||
|
|
bb46f5218c | ||
|
|
e47418efff | ||
|
|
d388145dce | ||
|
|
e6d132830a | ||
|
|
2c413b9455 | ||
|
|
56fff3d6cd | ||
|
|
5581bdad15 | ||
|
|
901e1b7565 | ||
|
|
05bac6c619 | ||
|
|
905c5a349f | ||
|
|
dc72163d44 | ||
|
|
cdb038ed6f | ||
|
|
96fc9c9ab7 | ||
|
|
28d39e927b | ||
|
|
1726d23a44 | ||
|
|
b26e580a74 | ||
|
|
2a9fe2a774 | ||
|
|
56a070ad99 | ||
|
|
38e7921a9d | ||
|
|
3e66a45a0d | ||
|
|
caf948e80e | ||
|
|
0406776361 | ||
|
|
0d45d9da11 | ||
|
|
905907f304 | ||
|
|
0768c4d4f1 | ||
|
|
87c8b648fc | ||
|
|
5d247a2055 | ||
|
|
f5db63a96d | ||
|
|
334293bc04 | ||
|
|
a28e8440b7 | ||
|
|
fb53750ee3 | ||
|
|
e1f4d01509 | ||
|
|
fa564bb67c | ||
|
|
29e5a20d23 | ||
|
|
c56a92b18b | ||
|
|
a5578bc229 | ||
|
|
bbe7ae21e8 | ||
|
|
75d52f0a3e | ||
|
|
e4424a38c5 | ||
|
|
8d6587a95e | ||
|
|
4f709d86ea | ||
|
|
3ad68743ca | ||
|
|
c0123c0e32 | ||
|
|
761d355bf7 | ||
|
|
e70f6d3276 | ||
|
|
620f17db1b | ||
|
|
0c0ff5f64b | ||
|
|
84acaa1163 | ||
|
|
9aedda4643 | ||
|
|
24d5e841d1 | ||
|
|
fc1d04e192 | ||
|
|
e0fd12fd05 | ||
|
|
d814f96e9d | ||
|
|
fabf37e889 | ||
|
|
5a6849b006 | ||
|
|
52d5e473c4 | ||
|
|
b1dc8c8f52 | ||
|
|
dbbff76f4c | ||
|
|
e98a670850 | ||
|
|
e5c19866eb | ||
|
|
7b1eae1d37 | ||
|
|
c9f8962fc8 | ||
|
|
50d857e9f3 | ||
|
|
324c95ae62 | ||
|
|
d443f370d2 | ||
|
|
bcec2e84b5 | ||
|
|
b09805786d | ||
|
|
24c59f9f68 | ||
|
|
44ce140103 | ||
|
|
a0a265736c | ||
|
|
7515b51d64 | ||
|
|
6777bbfaca | ||
|
|
cb51abaacd | ||
|
|
0beaad89d3 | ||
|
|
ffb6eb9ff4 | ||
|
|
696f0b1c31 | ||
|
|
c34fbb3831 | ||
|
|
a18fcb9048 | ||
|
|
8524608cf3 | ||
|
|
215e55282d | ||
|
|
4d66061c82 | ||
|
|
60e958a312 | ||
|
|
0695089005 | ||
|
|
9d48a61694 | ||
|
|
0dc643686e | ||
|
|
becd33d3a9 | ||
|
|
ca51618fe9 | ||
|
|
5c508b566f | ||
|
|
bfaff9d0ee | ||
|
|
d363386a38 | ||
|
|
b9aa04dbb3 | ||
|
|
68d3126f16 | ||
|
|
f0d3a648af | ||
|
|
7aca78dc21 | ||
|
|
e8931fe5de | ||
|
|
4be6b2ae55 | ||
|
|
351429c19c | ||
|
|
02154c02b2 | ||
|
|
1cf834f731 | ||
|
|
c29ac899da | ||
|
|
cdb8531b9a | ||
|
|
1838e7143f | ||
|
|
d67c9ce97f | ||
|
|
f8cf94da98 | ||
|
|
eec2ea8ffe | ||
|
|
2197952a70 | ||
|
|
105c7e6009 | ||
|
|
87e020db8a | ||
|
|
be1e3440b7 | ||
|
|
db95ccff91 | ||
|
|
ea7209f246 | ||
|
|
722bf6de1e | ||
|
|
25f7fe9b77 | ||
|
|
b3efe7e46c | ||
|
|
df4c1c8174 | ||
|
|
9178cb9851 | ||
|
|
2a3a417a29 | ||
|
|
ccbf4f0cf6 | ||
|
|
53bda08502 | ||
|
|
20e2452350 | ||
|
|
0987aa0077 | ||
|
|
45bb3b1413 | ||
|
|
6d7522ba44 | ||
|
|
778baeb2c0 | ||
|
|
cd54a85aec | ||
|
|
3aabba530d | ||
|
|
9dd080ae4b | ||
|
|
0505a65a74 | ||
|
|
32c3955be1 | ||
|
|
87901b15ba | ||
|
|
290cb0660d | ||
|
|
c5d04fbd6a | ||
|
|
9ab5e19576 | ||
|
|
378b233c33 | ||
|
|
892e6cf6f6 | ||
|
|
1c6ab039f4 | ||
|
|
d1a390924f | ||
|
|
b8b355a0a2 | ||
|
|
a2fde712c3 | ||
|
|
007483d1ed | ||
|
|
4d9a144aa7 | ||
|
|
8fc459e811 | ||
|
|
5ff8baabfa | ||
|
|
beb142ed98 | ||
|
|
3048d94603 | ||
|
|
b4265c5407 | ||
|
|
b365c53262 | ||
|
|
c624447dfc | ||
|
|
9cff92f3e1 | ||
|
|
b1ed49aea4 | ||
|
|
4c0222fb1c | ||
|
|
2ea025fdb4 | ||
|
|
afc4d5211b | ||
|
|
44014704a0 | ||
|
|
e1cb398e02 | ||
|
|
938b7e3d9d | ||
|
|
901d12332d | ||
|
|
5faf0b599f | ||
|
|
5d9471f186 | ||
|
|
530344e2cc | ||
|
|
93c8b46781 | ||
|
|
e35b40b793 | ||
|
|
7f6d1911e2 | ||
|
|
849eeb9f61 | ||
|
|
bb3dc913a2 | ||
|
|
a2905da259 | ||
|
|
bbf9b03ef4 | ||
|
|
ced82adfae | ||
|
|
632b1b2c4b | ||
|
|
c10adfa7cf | ||
|
|
117cb7fd55 | ||
|
|
db0c67dd10 | ||
|
|
84578cbd91 | ||
|
|
0cf8ad9930 | ||
|
|
93bdacae44 | ||
|
|
c39c666834 | ||
|
|
bd5583311e | ||
|
|
5157a5a186 | ||
|
|
c2af3d7faa | ||
|
|
6ade1e3215 | ||
|
|
74c779b81e | ||
|
|
fa9e4c5ea3 | ||
|
|
5391cf8b17 | ||
|
|
78f0107cb8 | ||
|
|
1f07fc05a4 | ||
|
|
3ed0f85ba7 | ||
|
|
77830f353c | ||
|
|
e64951e1d3 | ||
|
|
2f7e414d42 | ||
|
|
3be40e8f15 | ||
|
|
bd975e3041 | ||
|
|
724d5ba148 | ||
|
|
c03e25dc0d | ||
|
|
d702321c37 | ||
|
|
2d16f61cdf | ||
|
|
fb4ff4cab0 | ||
|
|
4c7c1867c3 | ||
|
|
4fbb44f790 | ||
|
|
911eb2ebf9 | ||
|
|
406d72db67 | ||
|
|
c3255c0a42 | ||
|
|
ac925ef2d5 | ||
|
|
3b32a79997 | ||
|
|
15cf912949 | ||
|
|
c69f99b644 | ||
|
|
fe74b9f8de | ||
|
|
a578d2eda8 | ||
|
|
9f795adbc4 | ||
|
|
d32e121832 | ||
|
|
5ffe3a4280 | ||
|
|
0e847669e8 | ||
|
|
198c8525f2 | ||
|
|
e67a70cbea | ||
|
|
1c801f86eb | ||
|
|
123b73506d | ||
|
|
71834855e8 | ||
|
|
7b93233386 | ||
|
|
d3723b3d38 | ||
|
|
e1f7d20251 | ||
|
|
8bdf3af20c | ||
|
|
d20bfe4f68 | ||
|
|
a27fac26db | ||
|
|
6214be89c8 | ||
|
|
b72f2848dd | ||
|
|
da943cec51 | ||
|
|
416944b293 | ||
|
|
a717832bfb | ||
|
|
4934f830fc | ||
|
|
c146e278fc | ||
|
|
d49fb42d47 | ||
|
|
ec40d28c25 | ||
|
|
83a22b318c | ||
|
|
dd690a1065 | ||
|
|
627d2060cd | ||
|
|
f892470f88 | ||
|
|
d25a84511c | ||
|
|
e8f4e47da5 | ||
|
|
7f5c3ac4f6 | ||
|
|
46c8b743f2 | ||
|
|
860230a837 | ||
|
|
e4e7671ab6 | ||
|
|
5ac6f79a47 | ||
|
|
db62807b9b | ||
|
|
9bbab79c2a | ||
|
|
275966674b | ||
|
|
f15a6e827a | ||
|
|
701172d318 | ||
|
|
765add698d | ||
|
|
fcafcb1700 | ||
|
|
e0a4fd1989 | ||
|
|
59dbc95e0d | ||
|
|
a0934dc7e0 | ||
|
|
184984d472 | ||
|
|
922eba369d | ||
|
|
3dd878594f | ||
|
|
8f1cac51c8 | ||
|
|
dea600f9bf | ||
|
|
ec551e2f36 | ||
|
|
35d8ec11fa | ||
|
|
c68c06d0c3 | ||
|
|
16e657858a | ||
|
|
889cf28571 | ||
|
|
9c6ef73ba3 | ||
|
|
14233a4c03 | ||
|
|
adadb10b17 | ||
|
|
be8815e2b7 | ||
|
|
ed5868aa06 | ||
|
|
2722d45fdd | ||
|
|
192de9bf32 | ||
|
|
cc9c3ae870 | ||
|
|
2563acb019 | ||
|
|
969b5221f5 | ||
|
|
8f9818c385 | ||
|
|
de0048e96b | ||
|
|
0c386e3032 | ||
|
|
f2b485740b | ||
|
|
3d044db749 | ||
|
|
3fec1232da | ||
|
|
1347076988 | ||
|
|
9fb5d02aa9 | ||
|
|
40ef304bcf | ||
|
|
9f9681bf39 | ||
|
|
f5d3ab845d | ||
|
|
8a368a9ed1 | ||
|
|
e75308763c | ||
|
|
02297c82ff | ||
|
|
cd893a6ff8 | ||
|
|
8036ca8aec | ||
|
|
a22b21016e | ||
|
|
5ce46ce603 | ||
|
|
60af526ac5 | ||
|
|
e568d54af9 | ||
|
|
6a08adb962 | ||
|
|
f68b18f639 | ||
|
|
7cc193c460 | ||
|
|
83b11ebd82 | ||
|
|
f466e4b0e7 | ||
|
|
4e62421f45 | ||
|
|
12db9cf64e | ||
|
|
60de25db56 | ||
|
|
885d03a020 | ||
|
|
8ba1ce6f1a | ||
|
|
95b5bdcdc5 | ||
|
|
953ac2b514 | ||
|
|
a5b6ef2a18 | ||
|
|
2edf3315d6 | ||
|
|
c7beb3208f | ||
|
|
6d56874b8f | ||
|
|
7f580b3029 | ||
|
|
28e86b7f15 | ||
|
|
abc9006b8e | ||
|
|
cd73332f77 | ||
|
|
8998c4165d | ||
|
|
a3ad389064 | ||
|
|
1099f24bbf | ||
|
|
ebd4ca5662 | ||
|
|
b52eecb904 | ||
|
|
2565b29679 | ||
|
|
0be2e884b1 | ||
|
|
d33fa59a9f | ||
|
|
066439ec19 | ||
|
|
7f7078c9f0 | ||
|
|
f63363cfb8 | ||
|
|
b536454c5b | ||
|
|
d19d409038 | ||
|
|
b9943e0ca2 | ||
|
|
438572359f | ||
|
|
2a1191bfc1 | ||
|
|
58724710d1 | ||
|
|
b5f619dadd | ||
|
|
723e024d25 | ||
|
|
bc28af9d7c | ||
|
|
3afe1ff2e4 | ||
|
|
e40b7407d5 | ||
|
|
781a1218a5 | ||
|
|
eb3dd52dd8 | ||
|
|
94bb3d3e04 | ||
|
|
7dcfb2b4ad | ||
|
|
8b655cb67e | ||
|
|
e533bb9bbf | ||
|
|
2468ee6d34 | ||
|
|
d5f6dfeb2a | ||
|
|
132e8d0baa | ||
|
|
1408daf070 | ||
|
|
f6f8a5e858 | ||
|
|
7af7f27042 | ||
|
|
e04d01106a | ||
|
|
e34c870d02 | ||
|
|
e030fdc548 | ||
|
|
aadfe97a58 | ||
|
|
4d528bbc24 | ||
|
|
f7efb51155 | ||
|
|
82c952bdeb | ||
|
|
2cd29242ae | ||
|
|
23aca9118e | ||
|
|
69b293d86b | ||
|
|
578b8fd103 | ||
|
|
a3e39fe309 | ||
|
|
e8d1bdb192 | ||
|
|
43de234b53 | ||
|
|
0e501983f4 | ||
|
|
9388fb69f8 | ||
|
|
6fa999d162 | ||
|
|
88acb4c4d9 | ||
|
|
c4d0a4f449 | ||
|
|
2a11727622 | ||
|
|
81e724d4f6 | ||
|
|
673679e5eb | ||
|
|
5891ec12a0 | ||
|
|
2e009ecfff | ||
|
|
420ca09aee | ||
|
|
20f4177c29 | ||
|
|
ccdfd76de2 | ||
|
|
7fbb57dea4 | ||
|
|
39d3496f4b | ||
|
|
8acf1542f6 | ||
|
|
5a7fa39fc9 | ||
|
|
8781ada304 | ||
|
|
a0799c99ec | ||
|
|
be39f6c6a0 | ||
|
|
143387e11d | ||
|
|
db786790ee | ||
|
|
bfd4554758 | ||
|
|
6722c28d81 | ||
|
|
7943327f7d | ||
|
|
76a93fcbc3 | ||
|
|
6c825b7892 | ||
|
|
e925036f8d | ||
|
|
2bbecf2416 | ||
|
|
b3ce56e32a | ||
|
|
d9638fca0e | ||
|
|
264773ee06 | ||
|
|
d260937564 | ||
|
|
71dd29ae30 | ||
|
|
6607dc999e | ||
|
|
093a970d7f | ||
|
|
131d4d9454 | ||
|
|
e4838a6225 | ||
|
|
9bd075e3a0 | ||
|
|
816c7e6416 | ||
|
|
cf00c1ffa0 | ||
|
|
d6f2d2f25c | ||
|
|
01faecb6ed | ||
|
|
3f3b3d04e6 | ||
|
|
3edf9486c9 | ||
|
|
3228f4f21b | ||
|
|
856f58468e | ||
|
|
d1a444d6d1 | ||
|
|
4410cc5cdf | ||
|
|
48f7be1f8e | ||
|
|
d3da6b76dc | ||
|
|
b68e30f6ff | ||
|
|
b948e4b59d | ||
|
|
adaa19c807 | ||
|
|
fd4bda4865 | ||
|
|
e0d31020c8 | ||
|
|
0aa6d4ed5d | ||
|
|
5db0db5959 | ||
|
|
5f4707b280 | ||
|
|
e41fd6d8a9 | ||
|
|
1cd66f2952 | ||
|
|
211f5d2ad8 | ||
|
|
79e3ac1a26 | ||
|
|
379101461e | ||
|
|
536716ba84 | ||
|
|
cd782a1488 | ||
|
|
ae50580eff | ||
|
|
083d520d38 | ||
|
|
09eb4f9325 | ||
|
|
b82c0d9bdd | ||
|
|
fee10c4735 | ||
|
|
06c28ad222 | ||
|
|
865e5b607a | ||
|
|
750aad12f6 | ||
|
|
62c9bd14ce | ||
|
|
b651e4cfbe | ||
|
|
540fb5605b | ||
|
|
347a183428 | ||
|
|
0768c14544 | ||
|
|
39ee09e442 | ||
|
|
832e4c3e8d | ||
|
|
bbe4d39ddd | ||
|
|
9d3f9ea496 | ||
|
|
fef0bf1075 | ||
|
|
7fc73c9cf3 | ||
|
|
805354f806 | ||
|
|
37a3f20b85 | ||
|
|
eb1ddcb2a3 | ||
|
|
3f28711419 | ||
|
|
a4d9ed6ac8 | ||
|
|
5b4ae84255 | ||
|
|
8c20160cb6 | ||
|
|
e9f4f7498c | ||
|
|
d5b7752fdb | ||
|
|
709fee14c6 | ||
|
|
cac49c513c | ||
|
|
da872ef789 | ||
|
|
9d3ae1c4d0 | ||
|
|
a61b1a19bb | ||
|
|
5140441585 | ||
|
|
1519576e82 | ||
|
|
647b192b1f | ||
|
|
449ea0d073 | ||
|
|
2a7411dd91 | ||
|
|
65f67f48a3 | ||
|
|
580b1c081f | ||
|
|
eb6ed2df62 | ||
|
|
f0dee053ca | ||
|
|
88d11eaf44 | ||
|
|
defbe00b6a | ||
|
|
003eed2758 | ||
|
|
71efb88a36 | ||
|
|
a9ad34c8db | ||
|
|
ba88529f50 | ||
|
|
c06568406c | ||
|
|
35e749a72f | ||
|
|
132548a987 | ||
|
|
b7a100b1f5 | ||
|
|
26b57eab2f | ||
|
|
0de242d9bb | ||
|
|
d1c9c94493 | ||
|
|
9dbd7bdcf5 | ||
|
|
09ed33d12d | ||
|
|
a93bf46382 | ||
|
|
f5be4dafc6 | ||
|
|
2549099d3b | ||
|
|
32e125b3f9 | ||
|
|
d1fee09721 | ||
|
|
648d745177 | ||
|
|
143fe678d4 | ||
|
|
d7b7427431 | ||
|
|
ecaea97a99 | ||
|
|
16e2e6f346 | ||
|
|
cc85226c3d | ||
|
|
1c7c9c60cf | ||
|
|
f92dad2d9d | ||
|
|
7971761628 | ||
|
|
355177a22c | ||
|
|
1da83e161b | ||
|
|
9f4469d798 | ||
|
|
e53d23a925 | ||
|
|
24d7026a7a | ||
|
|
cdda84eaab | ||
|
|
75345fa915 | ||
|
|
1f041497ec | ||
|
|
ca94deb2c2 | ||
|
|
37e21bc6a5 | ||
|
|
39c5ab2997 | ||
|
|
54bfaff625 | ||
|
|
287ff14a1f | ||
|
|
52085d5555 | ||
|
|
eeb2f2ba80 | ||
|
|
eddb43c08e | ||
|
|
3df72f4136 | ||
|
|
b371c91584 | ||
|
|
54d444c5c5 | ||
|
|
39ac6fb719 | ||
|
|
155a1ba5c8 | ||
|
|
9d7f47c37a | ||
|
|
8dfcff6911 | ||
|
|
0c45ef1b5a | ||
|
|
6eb15567ae | ||
|
|
6bfdc85d8f | ||
|
|
01919da550 | ||
|
|
61bfe50a66 | ||
|
|
d7030591f9 | ||
|
|
48d2fa770e | ||
|
|
b2275303a2 | ||
|
|
b190c55526 | ||
|
|
252d0e0667 | ||
|
|
b05198c6bf | ||
|
|
474a3b4584 | ||
|
|
b0715c481b | ||
|
|
7c4afedd26 | ||
|
|
9abbd9eb10 | ||
|
|
8a51ae7b94 | ||
|
|
6535d32447 | ||
|
|
131efe9348 | ||
|
|
5250c1571f | ||
|
|
f109b70f3e | ||
|
|
857fbcc0c7 | ||
|
|
32d38f3eb8 | ||
|
|
b671136060 | ||
|
|
ec612942a1 | ||
|
|
0760483bee | ||
|
|
cc4c9e85c8 | ||
|
|
e2f1bc59a0 | ||
|
|
0582d4d83e | ||
|
|
d664b9fb0b | ||
|
|
92255b2a25 | ||
|
|
9a7b199a5c | ||
|
|
41bf233413 | ||
|
|
4e2aea5cb0 | ||
|
|
a614f3be7a | ||
|
|
87a5000e57 | ||
|
|
10b3d3d862 | ||
|
|
8ee3542787 | ||
|
|
8a96f95c59 | ||
|
|
cb4e02f02e | ||
|
|
b64a224b99 | ||
|
|
14cdead342 | ||
|
|
f80afde044 | ||
|
|
935ae44985 | ||
|
|
c8a728969d | ||
|
|
c255ffeaaa | ||
|
|
8e394c3c08 | ||
|
|
93c6adda3c | ||
|
|
4beb60683f | ||
|
|
56b03adad0 | ||
|
|
da052fb6ee | ||
|
|
e25004012b | ||
|
|
288c4c9a13 | ||
|
|
d48f810ef6 | ||
|
|
04cabf258d | ||
|
|
50cf97a378 | ||
|
|
0320f9c7ba | ||
|
|
f635588643 | ||
|
|
f687134a38 | ||
|
|
4afb2f0b23 | ||
|
|
dc24ab8b57 | ||
|
|
dc547a271a | ||
|
|
6211edb4c6 | ||
|
|
ffff65a8d7 | ||
|
|
6507aa0a73 | ||
|
|
f47d49b1c0 | ||
|
|
e566fc551d | ||
|
|
2be8437d73 | ||
|
|
702a73b734 | ||
|
|
92f28ae164 | ||
|
|
14d7db7499 | ||
|
|
4e419a19cd | ||
|
|
092292683c | ||
|
|
35cb47328a | ||
|
|
21f4403fdb | ||
|
|
021619910e | ||
|
|
9dccd59665 | ||
|
|
36e934583a | ||
|
|
7f9fd963fd | ||
|
|
9dce6c6b88 | ||
|
|
934568dcf4 | ||
|
|
e71df15045 | ||
|
|
fba9192bbc | ||
|
|
cc64f88964 | ||
|
|
cb52407188 | ||
|
|
dea657a673 | ||
|
|
795a078d08 | ||
|
|
0976dfa3b9 | ||
|
|
bb51d7b0e2 | ||
|
|
759f4738ca | ||
|
|
6a51fac1e4 | ||
|
|
134869ad1a | ||
|
|
33f80c6eef | ||
|
|
fd467fd63d | ||
|
|
2c01d45a49 | ||
|
|
0030ddd97f | ||
|
|
2f11dce5ef | ||
|
|
987683cf99 | ||
|
|
750c838141 | ||
|
|
ba7cc5f6fb | ||
|
|
29b2b389fd | ||
|
|
bda28533c5 | ||
|
|
628b9699e8 | ||
|
|
a739c9a0ff | ||
|
|
f62a5c7157 | ||
|
|
f79f368c72 | ||
|
|
0b8a55c0cf | ||
|
|
539e01b5bc | ||
|
|
63a89b7080 | ||
|
|
ea9e90d785 | ||
|
|
e8f4ce0886 | ||
|
|
517b1cae36 | ||
|
|
bf3cfae610 | ||
|
|
23be652f11 | ||
|
|
eb6a4a95cd | ||
|
|
f846c1648b | ||
|
|
a24c41e9cf | ||
|
|
9258a2a3e9 | ||
|
|
1d98b5fd02 | ||
|
|
304f03a836 | ||
|
|
41007486bf | ||
|
|
4b79636b8f | ||
|
|
1a259744af | ||
|
|
ea21b16846 | ||
|
|
78926a5a84 | ||
|
|
5cf3fc1017 | ||
|
|
75aba83724 | ||
|
|
653cd869ba | ||
|
|
14997fe479 | ||
|
|
75986f7ac5 | ||
|
|
d949e3e8c5 | ||
|
|
dead814781 | ||
|
|
31ddd5ca12 | ||
|
|
96fc577b15 | ||
|
|
17921c4b5a | ||
|
|
835c373123 | ||
|
|
41077644d1 | ||
|
|
fd08220e2b | ||
|
|
a298b55b95 | ||
|
|
0058f45243 | ||
|
|
25e21494f1 | ||
|
|
3ccbd9cdc7 | ||
|
|
083404fc90 | ||
|
|
bab801171f | ||
|
|
07a378fffe | ||
|
|
02db417d31 | ||
|
|
642acd5cbe | ||
|
|
ccf7ef96b5 | ||
|
|
4e0c9a780a | ||
|
|
31ed7f7e30 | ||
|
|
e9271376dc | ||
|
|
83d7633503 | ||
|
|
d04dce377a | ||
|
|
d034f5145c | ||
|
|
7bc8ed1270 | ||
|
|
b54a58e93c | ||
|
|
3e01918c57 | ||
|
|
5d861a3399 | ||
|
|
d6c52e0fef | ||
|
|
d7d501d43a | ||
|
|
78de25b639 | ||
|
|
6217293e23 | ||
|
|
8fc22f0db7 | ||
|
|
f2dc30c912 | ||
|
|
60278f1c52 | ||
|
|
b3f21c47fc | ||
|
|
990080cc04 | ||
|
|
4ec4554fa5 | ||
|
|
474b2eb453 | ||
|
|
e8f2566542 | ||
|
|
eb2ce1f30b | ||
|
|
64b4812664 | ||
|
|
0ea2930de7 | ||
|
|
a0802dce05 | ||
|
|
d70a20ae4c | ||
|
|
e130b1991f | ||
|
|
da3c00aeac | ||
|
|
9d83605ccd | ||
|
|
a22ab5c7b7 | ||
|
|
99611d287b | ||
|
|
355fa2c764 | ||
|
|
16e381031b | ||
|
|
72e13f3a5a | ||
|
|
7bb1897e98 | ||
|
|
e67e59e56a | ||
|
|
e5b9c564af | ||
|
|
b19a178e2e | ||
|
|
a7cdd16125 | ||
|
|
9dfa2f6979 | ||
|
|
ad2d61154b | ||
|
|
bab6cd29ce | ||
|
|
31efd16916 | ||
|
|
ea4b32d326 | ||
|
|
b5d320392c | ||
|
|
e873fd637d | ||
|
|
fb65cda40f | ||
|
|
1f3ad61fd5 | ||
|
|
bf37d48ac5 | ||
|
|
1ee5101ba7 | ||
|
|
629fc3f824 | ||
|
|
d5c423adaf | ||
|
|
a726f7d49e | ||
|
|
b90cc5ceb9 | ||
|
|
31757c1935 | ||
|
|
bdc37d879e | ||
|
|
d4e2dcfb67 | ||
|
|
a58740c4ee | ||
|
|
538896f0a3 | ||
|
|
897b86cba2 | ||
|
|
85348f653d | ||
|
|
055635d63d | ||
|
|
a92a93bc54 | ||
|
|
dcf14f338b | ||
|
|
41d9465e89 | ||
|
|
ed4cfa01c5 | ||
|
|
544f59b0ea | ||
|
|
dc88d56345 | ||
|
|
31ba9c1471 | ||
|
|
79718501d6 | ||
|
|
9b1533a69b | ||
|
|
d69f0ef861 | ||
|
|
69040a2ae0 | ||
|
|
572f8ec9c4 | ||
|
|
ecabf96c86 | ||
|
|
9f510b9172 | ||
|
|
a6de718152 | ||
|
|
d98394f0cf | ||
|
|
a8703841b2 | ||
|
|
3f2a4d9c7c | ||
|
|
f8ede83073 | ||
|
|
a61d36ff49 | ||
|
|
9cc60526b7 | ||
|
|
3627b9a16c | ||
|
|
3e51d4f62f | ||
|
|
db572116e1 | ||
|
|
896fec3fc5 | ||
|
|
900e979035 | ||
|
|
4b540c6d7e | ||
|
|
8202444413 | ||
|
|
79457dabd1 | ||
|
|
c27082938b | ||
|
|
e3501a00dc | ||
|
|
048eac2d67 | ||
|
|
f1a897cec0 | ||
|
|
5ef24f6923 | ||
|
|
dcc3eb63c4 | ||
|
|
1240849cda | ||
|
|
5865536463 | ||
|
|
152faf2b36 | ||
|
|
7af2561a91 | ||
|
|
67ab00564f | ||
|
|
a057f8e72c | ||
|
|
f1aba7c217 | ||
|
|
b2824fe796 | ||
|
|
ea2c86ef0c | ||
|
|
067eace890 | ||
|
|
70403f62d9 | ||
|
|
2e932ba803 | ||
|
|
c41f63a4c8 | ||
|
|
ee3e8ed07e | ||
|
|
02b72945f1 | ||
|
|
58b70cc7dd | ||
|
|
75e0c5f7ed | ||
|
|
9947059dcc | ||
|
|
bffdad9cdc | ||
|
|
619f6bb893 | ||
|
|
f00951f788 | ||
|
|
046dc3d5a9 | ||
|
|
7bbfcac62b | ||
|
|
808e5d8c7d | ||
|
|
57b1a2757e | ||
|
|
4359c699dc | ||
|
|
0baf75f779 | ||
|
|
f9281be252 | ||
|
|
603c65950c | ||
|
|
b434cd85a0 | ||
|
|
c998623932 | ||
|
|
2f37e8d600 | ||
|
|
ae6e2acb87 | ||
|
|
4489526a11 | ||
|
|
7b317f79e2 | ||
|
|
b6d6c4ee57 | ||
|
|
785e174cbb | ||
|
|
e1a3a1c136 | ||
|
|
028beaf5e6 | ||
|
|
7d0a77821c | ||
|
|
734d549473 | ||
|
|
cf0852c846 | ||
|
|
9dd87881e1 | ||
|
|
50b73dc023 | ||
|
|
f05d6fb70e | ||
|
|
77bcd64f03 | ||
|
|
4d67ee1150 | ||
|
|
bad6246b59 | ||
|
|
9e9a6d4575 | ||
|
|
086a086d12 | ||
|
|
4b265a4f0a | ||
|
|
80af6ce214 | ||
|
|
b236a708e2 | ||
|
|
2682c42a9e | ||
|
|
2b3f059c55 | ||
|
|
e2037c2e4b | ||
|
|
ad65ffcf9b | ||
|
|
1387926fdd | ||
|
|
2837aa68a7 | ||
|
|
9ae4e7924a | ||
|
|
72ab7b68b8 | ||
|
|
6e5f3632c6 | ||
|
|
867232a244 | ||
|
|
ab5a0efd48 | ||
|
|
017871b025 | ||
|
|
b24e6763c3 | ||
|
|
c41fae1f8a | ||
|
|
bc6a9fbf66 | ||
|
|
e61d8f6356 | ||
|
|
a93d4a1e29 | ||
|
|
f7c479d40b | ||
|
|
e0c73d5195 | ||
|
|
5cd95d47b2 | ||
|
|
032e9ebda5 | ||
|
|
3c63f1b656 | ||
|
|
b668810351 | ||
|
|
d80b501829 | ||
|
|
98e6c244da | ||
|
|
7de7b0c7ec | ||
|
|
4974cd17eb | ||
|
|
04f0550f1d | ||
|
|
3ea6d40b4c | ||
|
|
7df117128c | ||
|
|
cf330f732c | ||
|
|
b75744f0d4 | ||
|
|
245397491a | ||
|
|
16a335ab42 | ||
|
|
015e1b776e | ||
|
|
71df6e6cb8 | ||
|
|
0ad68bdb66 | ||
|
|
688567a532 | ||
|
|
a24c90f5a9 | ||
|
|
e2c9a1a96f | ||
|
|
503edee161 | ||
|
|
211d2bcfff | ||
|
|
67cf9c4933 | ||
|
|
bf0ee1f16c | ||
|
|
f25570dd4e | ||
|
|
5c7379738b | ||
|
|
93e08cb946 | ||
|
|
5f35f2b26b | ||
|
|
772ead2f9e | ||
|
|
8d35578ad2 | ||
|
|
4695d966ee | ||
|
|
fc6a8c5aa8 | ||
|
|
11e1b3ce15 | ||
|
|
2401ca127e | ||
|
|
f19ffa5328 | ||
|
|
4043036e27 | ||
|
|
e61b887e31 | ||
|
|
38f70a3a06 | ||
|
|
5d5e497d22 | ||
|
|
4c7dc7eb20 | ||
|
|
efcb9468f4 | ||
|
|
8fb2664584 | ||
|
|
158d0505ea | ||
|
|
d4a31af34d | ||
|
|
31b2f7d9e0 | ||
|
|
102a2b1061 | ||
|
|
1ac5d9c95a | ||
|
|
d2006b19af | ||
|
|
c0dd8055c2 | ||
|
|
7f400e5073 | ||
|
|
149a2abd07 | ||
|
|
7114bf47ec | ||
|
|
876026bedf | ||
|
|
9d2bfee634 | ||
|
|
8c6981f642 | ||
|
|
a4c02d15c6 | ||
|
|
c5674041bf | ||
|
|
e30234fce8 | ||
|
|
a830d68fae | ||
|
|
fd817d4dbc | ||
|
|
1eda133f01 | ||
|
|
1655b2521f | ||
|
|
45c7ab1938 | ||
|
|
6db64e924c | ||
|
|
8d2afe1103 | ||
|
|
74c758e503 | ||
|
|
617f210cf8 | ||
|
|
286acd933c | ||
|
|
1ce6abf3de | ||
|
|
8120857c5b | ||
|
|
4059840c43 | ||
|
|
3ea0fc0fe6 | ||
|
|
c9e52b65d4 | ||
|
|
18996b9698 | ||
|
|
93eba2874d | ||
|
|
c93f6d9fb1 | ||
|
|
a1ae336247 | ||
|
|
f00c143b28 | ||
|
|
cb16212a09 | ||
|
|
dd320002c2 | ||
|
|
7e2c3130b0 | ||
|
|
adce53f009 | ||
|
|
c5d9d997b0 | ||
|
|
8d7ceb6d6c | ||
|
|
f4336d6f9d | ||
|
|
dfbbf1e5d8 | ||
|
|
12d731dfcf | ||
|
|
c1ffb28416 | ||
|
|
7de2968629 | ||
|
|
99f8e49e93 | ||
|
|
6fdd5b6a6d | ||
|
|
f0fc857cb4 | ||
|
|
469b3cc1e1 | ||
|
|
18b7250736 | ||
|
|
754f9ce45d | ||
|
|
831cdc7580 | ||
|
|
c8afae83c9 | ||
|
|
fd4f548d6e | ||
|
|
86b6fe60ea | ||
|
|
cbcde9a311 | ||
|
|
d8370d797b | ||
|
|
0983b7700f | ||
|
|
19b0c2a0b0 | ||
|
|
9bcd5473ad | ||
|
|
7dc04a3207 | ||
|
|
cc524c3d9a | ||
|
|
d747651237 | ||
|
|
d35035fab8 | ||
|
|
d7b2998ebe | ||
|
|
1c85c44fad | ||
|
|
b53309f9f6 | ||
|
|
939cc2432e | ||
|
|
b3e649e463 | ||
|
|
ddecd62870 | ||
|
|
b3a30acb30 | ||
|
|
46589d5798 | ||
|
|
c7990b3d31 | ||
|
|
76d34a00e6 | ||
|
|
b8fb8a57fa | ||
|
|
a2d921040d | ||
|
|
07a8c48171 | ||
|
|
538f21b781 | ||
|
|
a0e4cd23cc | ||
|
|
e571911b1b | ||
|
|
3d90e41a7f | ||
|
|
4769a76ca0 | ||
|
|
a0f89188b9 | ||
|
|
ab341e1c93 | ||
|
|
a6bf3e8892 | ||
|
|
0ba64871f6 | ||
|
|
9338e4e97d | ||
|
|
887f6d16c9 | ||
|
|
33d6860d36 | ||
|
|
123bcfc5e2 | ||
|
|
c3fec1f112 | ||
|
|
0300bbf5cb | ||
|
|
a7b7fa4162 | ||
|
|
d0b452373b | ||
|
|
51169956dc | ||
|
|
3de7f959d3 | ||
|
|
abf9c71fa9 | ||
|
|
e5af61151e | ||
|
|
b630da3424 | ||
|
|
7d2f8e4d3e | ||
|
|
16082b9056 | ||
|
|
4623ed60b0 | ||
|
|
3ea06a4a2a | ||
|
|
fec5feef77 | ||
|
|
34bcf4786b | ||
|
|
a5e33acf51 | ||
|
|
a9392483b1 | ||
|
|
60b336dd34 | ||
|
|
45264c9c25 | ||
|
|
fe67243700 | ||
|
|
6cdc7b47cf | ||
|
|
12fe5ce838 | ||
|
|
88eaeed762 | ||
|
|
5f6b6651e1 | ||
|
|
912e362f11 | ||
|
|
bfd6e2061f | ||
|
|
c24f960d82 | ||
|
|
16c73e6654 | ||
|
|
6d85667761 | ||
|
|
e516b1e321 | ||
|
|
b80ad3f9b3 | ||
|
|
832066b81f | ||
|
|
7f7f9b36cd | ||
|
|
ce6a1b9cfc | ||
|
|
759026de6a | ||
|
|
0b8262a167 | ||
|
|
285654f044 | ||
|
|
c9f7d845a2 | ||
|
|
6439f09220 | ||
|
|
040495ff56 | ||
|
|
3c6a9b2b96 | ||
|
|
bcb04a1a76 | ||
|
|
159b84ef68 | ||
|
|
d34064d660 | ||
|
|
956fa21b89 | ||
|
|
3883f47fd0 | ||
|
|
3ce2cee0a5 | ||
|
|
af3e759da2 | ||
|
|
1640b8cad8 | ||
|
|
116a0f81f5 | ||
|
|
c37193b667 | ||
|
|
d10dd029b5 | ||
|
|
a203a029cb | ||
|
|
9c014b9e64 | ||
|
|
3b038786ad | ||
|
|
84bce837a0 | ||
|
|
064f2b6a8b | ||
|
|
0e397f09f3 | ||
|
|
48a4d04b61 | ||
|
|
aa5ab51147 | ||
|
|
0e9f072917 | ||
|
|
580bb15076 | ||
|
|
bf63b12a93 | ||
|
|
3b0057625d | ||
|
|
3cd5074594 | ||
|
|
300623ac88 | ||
|
|
9e55f02c3b | ||
|
|
ac20a570cd | ||
|
|
545bed355d | ||
|
|
ead2873ab5 | ||
|
|
05831b3438 | ||
|
|
1d7814737d | ||
|
|
690a4cfbc6 | ||
|
|
3af275f8d6 | ||
|
|
a1772be47d | ||
|
|
d502a17312 | ||
|
|
c550150071 | ||
|
|
4600a65f07 | ||
|
|
0aea30473c | ||
|
|
85053cf283 | ||
|
|
0bffe65c24 | ||
|
|
03c5092815 | ||
|
|
19e580bdc9 | ||
|
|
f5681a4234 | ||
|
|
6614384f3c | ||
|
|
1c1eed4fd8 | ||
|
|
3929b47776 | ||
|
|
36a5618dc8 | ||
|
|
96957f398a | ||
|
|
5331d4d232 | ||
|
|
de55f34bbd | ||
|
|
e0f737c293 | ||
|
|
e04230a126 | ||
|
|
4804ab14b8 | ||
|
|
0619d27b8d | ||
|
|
2381b2e136 | ||
|
|
d843ec9f7a | ||
|
|
287a122d85 | ||
|
|
59e3fd6c2c | ||
|
|
ea247567ba | ||
|
|
40b9920f8f | ||
|
|
b93dc94cdb | ||
|
|
6a8547cca0 | ||
|
|
a1b08c5ee3 | ||
|
|
8dfafeb4e3 | ||
|
|
c66066a91f | ||
|
|
dc8d6ce37b | ||
|
|
c8aaa59e1c | ||
|
|
a8e086dbc3 | ||
|
|
1b28d14dcb | ||
|
|
fbf67d7a29 | ||
|
|
f12358bfb0 | ||
|
|
d61fe61b66 | ||
|
|
c7d4d35200 | ||
|
|
e5dd1249b2 | ||
|
|
65aab404ba | ||
|
|
64578a3afd | ||
|
|
74ea5e0bd7 | ||
|
|
9d66bc3258 | ||
|
|
466637933a | ||
|
|
85421efb19 | ||
|
|
69843cf9ce | ||
|
|
8c10914e78 | ||
|
|
d120b2b73a | ||
|
|
d6593abd5e | ||
|
|
5ca1be74b8 | ||
|
|
5838d4899d | ||
|
|
54a85f705b | ||
|
|
10caf5c785 | ||
|
|
1310910b23 | ||
|
|
83bc77ad51 | ||
|
|
19897803d4 | ||
|
|
1487265556 | ||
|
|
6161b898cd | ||
|
|
0e4defe032 | ||
|
|
db6c8a8b79 | ||
|
|
d41028a664 | ||
|
|
d473c8b1df | ||
|
|
87c67b8c5f | ||
|
|
480e58cc9f | ||
|
|
a7cb540ae3 | ||
|
|
dce90d9491 | ||
|
|
19ffd2c1f2 | ||
|
|
329cc47ca6 | ||
|
|
d3031b22b7 | ||
|
|
53d5e42603 | ||
|
|
0c5b54219e | ||
|
|
f6a828b183 | ||
|
|
9179494c16 | ||
|
|
7d26d60bd4 | ||
|
|
7bb843eb0f | ||
|
|
efafb68f00 | ||
|
|
b93c1cb093 | ||
|
|
ea69982a26 | ||
|
|
8e013368b3 | ||
|
|
1ae2bd256e | ||
|
|
43a6aed45c | ||
|
|
746f94368d | ||
|
|
ef7fd61029 | ||
|
|
ea590431d8 | ||
|
|
befe7be9de | ||
|
|
c839c01680 | ||
|
|
9c01340900 | ||
|
|
02044d1d3f | ||
|
|
1e5688a10e | ||
|
|
ee3a80c6e5 | ||
|
|
a33bd07a3d | ||
|
|
278eca6c56 | ||
|
|
91bdfb9a12 | ||
|
|
130abb7e3b | ||
|
|
e43a1b00f6 | ||
|
|
85023f4c14 | ||
|
|
7698c135be | ||
|
|
7f64ff28c0 | ||
|
|
33bd1f17af | ||
|
|
f751192942 | ||
|
|
798261d992 | ||
|
|
470dcc3d11 | ||
|
|
3997e07366 | ||
|
|
25dd5857c2 | ||
|
|
1fb8da7a02 | ||
|
|
ed7105e2cf | ||
|
|
e3ce64b2a2 | ||
|
|
bb9b16ab50 | ||
|
|
86c5c56a38 | ||
|
|
791ec39e57 | ||
|
|
ac3c871ff8 | ||
|
|
312fe96bbd | ||
|
|
5696478540 | ||
|
|
981e5b206b | ||
|
|
9294fb9b8c | ||
|
|
61a5c8ce08 | ||
|
|
02ae5e4d7c | ||
|
|
6ac092bf38 | ||
|
|
4caf71f5b5 | ||
|
|
ed2d6ab75b | ||
|
|
dd2cf6bbaa | ||
|
|
1d213e28c4 | ||
|
|
1b47f26e4b | ||
|
|
a8db0ab298 | ||
|
|
479d45d2d9 | ||
|
|
e0694e88a2 | ||
|
|
0fff5cc80f | ||
|
|
72e27e7dab | ||
|
|
231841bcfe | ||
|
|
10e1c10bcf | ||
|
|
9eaf539e98 | ||
|
|
643dee0ab6 | ||
|
|
6731de5286 | ||
|
|
946006fb08 | ||
|
|
e0c3807b29 | ||
|
|
45f384c870 | ||
|
|
66bcbd7d66 | ||
|
|
6a52ce38f9 | ||
|
|
e938380cb8 | ||
|
|
869e3bdc9a | ||
|
|
b14dd671b5 | ||
|
|
32a436bab4 | ||
|
|
cdf0fa6d6b | ||
|
|
ff505d48ed | ||
|
|
46a07e1da5 | ||
|
|
d2c6f22e32 | ||
|
|
9e72c25a0f | ||
|
|
decfd1ce9c | ||
|
|
0679596d4d | ||
|
|
98da0bbffb | ||
|
|
3077cb6610 | ||
|
|
4888f39b05 | ||
|
|
212a9e04ce | ||
|
|
04dc83c149 | ||
|
|
7abf78f452 | ||
|
|
680e0c347c | ||
|
|
5053f2a183 | ||
|
|
235871bf4b | ||
|
|
731edd0940 | ||
|
|
d1e9f4e811 | ||
|
|
d85e43545b | ||
|
|
de8aceeeb4 | ||
|
|
55e82ef0dc | ||
|
|
b8b798706f | ||
|
|
2f729a1c05 | ||
|
|
c20940b631 | ||
|
|
43c8fb156b | ||
|
|
5f67f1ad64 | ||
|
|
b630dc458f | ||
|
|
b98c031192 | ||
|
|
bbb0f99495 | ||
|
|
0cc5442188 | ||
|
|
28bbb40835 | ||
|
|
6fc7d0f866 | ||
|
|
e4cc45b56f | ||
|
|
985a52b415 | ||
|
|
debba57b43 | ||
|
|
e91a85cbec | ||
|
|
48acbe27bb | ||
|
|
46ad9ff041 | ||
|
|
927a5636bd | ||
|
|
b3d24d4ec2 | ||
|
|
aab8234e55 | ||
|
|
b6e994767c | ||
|
|
7df184a5ec | ||
|
|
63ebea7540 | ||
|
|
35fa794781 | ||
|
|
85f491555f | ||
|
|
1dba69eb38 | ||
|
|
ed582b0752 | ||
|
|
fbc0415761 | ||
|
|
8482d6776b | ||
|
|
d08b6d58ef | ||
|
|
2d8e5089f4 | ||
|
|
be4da756bc | ||
|
|
5f533a35ce | ||
|
|
bd90b8aba9 | ||
|
|
3fbe8fa7c1 | ||
|
|
08ad853ac5 | ||
|
|
913a1f0b8f | ||
|
|
2b9292bc38 | ||
|
|
90c699f418 | ||
|
|
41da733a19 | ||
|
|
4cbff1975f | ||
|
|
a142d31a56 | ||
|
|
22961f13af | ||
|
|
23a4c5d7d6 | ||
|
|
f206110cd2 | ||
|
|
25d8e847a7 | ||
|
|
52f733988e | ||
|
|
856935a3f6 | ||
|
|
2ab263265b | ||
|
|
24aeb4ac0d | ||
|
|
8123ac83f5 | ||
|
|
cbb10e3b1b | ||
|
|
8f1fba2b7b | ||
|
|
161c523488 | ||
|
|
7158b3a1f6 | ||
|
|
4805d67ca1 | ||
|
|
218c1c46c4 | ||
|
|
3433445bbb | ||
|
|
81b1d21c35 | ||
|
|
5fde79eab8 | ||
|
|
d94970b0ed | ||
|
|
ecf8a9b28f | ||
|
|
5fbe427853 | ||
|
|
9ff877dce5 | ||
|
|
0177bf59ff | ||
|
|
53a6ded473 | ||
|
|
651e3d05e4 | ||
|
|
bfa97d2311 | ||
|
|
7a8485f425 | ||
|
|
924d580670 | ||
|
|
e98dffbb1d | ||
|
|
8ebc170ec0 | ||
|
|
a71813b911 | ||
|
|
a30cbae14d | ||
|
|
6f1166bcce | ||
|
|
e04b39f7a2 | ||
|
|
7af2ecb17f | ||
|
|
a85ecb6719 | ||
|
|
aad62add90 | ||
|
|
80ff3e60c4 | ||
|
|
4fd846804a | ||
|
|
e8bc890c10 | ||
|
|
f31c9f2a67 | ||
|
|
e4758a2c48 | ||
|
|
86b0bd5df3 | ||
|
|
96d15a6c05 | ||
|
|
4b30a95d7a | ||
|
|
e0c5bb9ffe | ||
|
|
924f463126 | ||
|
|
5f0802bd2c | ||
|
|
c42541c99b | ||
|
|
8675bc2b01 | ||
|
|
75a8a6cc64 | ||
|
|
1fdfb2b738 | ||
|
|
c73f576314 | ||
|
|
d2734bbdd9 | ||
|
|
5889533297 | ||
|
|
410bfa3cb2 | ||
|
|
af7b083fd8 | ||
|
|
ab6816c074 | ||
|
|
22c23521a3 | ||
|
|
f76127e364 | ||
|
|
75cd05c50e | ||
|
|
11db9b8fdc | ||
|
|
d9f3663dcc | ||
|
|
395b1bc424 | ||
|
|
6eee593f31 | ||
|
|
dec576c89d | ||
|
|
1da25fb7a5 | ||
|
|
82f042ba98 | ||
|
|
e97f144bf4 | ||
|
|
8b90e3480a | ||
|
|
e80b36ded2 | ||
|
|
b46981f4ce | ||
|
|
5d32d4987e | ||
|
|
94f87e3557 | ||
|
|
400c036c67 | ||
|
|
9dbda2e573 | ||
|
|
2fba4e5e99 | ||
|
|
bc6486d7b0 | ||
|
|
526d769271 | ||
|
|
f67bfc485c | ||
|
|
b53a5e2540 | ||
|
|
23aff10b83 | ||
|
|
f18ec81394 | ||
|
|
0bf8f8ce34 | ||
|
|
ceb3fb4ed3 | ||
|
|
8e4718c760 | ||
|
|
b578202876 | ||
|
|
7a583a86ef | ||
|
|
838e83c1f3 | ||
|
|
49e292676e | ||
|
|
2e3f2a4a62 | ||
|
|
2e948de48c | ||
|
|
8d209d8e01 | ||
|
|
2cc1d41f57 | ||
|
|
8d5be706a8 | ||
|
|
18e5f78f21 | ||
|
|
e07da4cad3 | ||
|
|
3233aaf5a5 | ||
|
|
3f4f469489 | ||
|
|
0036c7bd8a | ||
|
|
db437cbda8 | ||
|
|
6c84dcbf80 | ||
|
|
44089a20ab | ||
|
|
8e8b8c27d7 | ||
|
|
70c76be920 | ||
|
|
0170bb504b | ||
|
|
0adc61842f | ||
|
|
a0542acab4 | ||
|
|
9c0aa5e7a3 | ||
|
|
4f41981cd8 | ||
|
|
a7c65b091b | ||
|
|
c6cf0725d0 | ||
|
|
de8fb5d489 | ||
|
|
5458134efb | ||
|
|
e3043b7dcb | ||
|
|
19d29e4018 | ||
|
|
1d443b6b4b | ||
|
|
ecc1b3b971 | ||
|
|
dc44540ee8 | ||
|
|
fa4dfdf813 | ||
|
|
46a405c131 | ||
|
|
129343dc94 | ||
|
|
0cc30a7e49 | ||
|
|
2aa64be3a6 | ||
|
|
13c208de3b | ||
|
|
ac395ba4a6 | ||
|
|
3177072e2f | ||
|
|
2febff1a79 | ||
|
|
f4fb73386e | ||
|
|
cf8d769c73 | ||
|
|
9c8b34c47d | ||
|
|
ea63596eb3 | ||
|
|
db5b8614f3 | ||
|
|
e190db8128 | ||
|
|
da28bdd2f0 | ||
|
|
21e0bd5996 | ||
|
|
4e19ece566 | ||
|
|
bac2a42c82 | ||
|
|
044587ec57 | ||
|
|
32d12a9c7a | ||
|
|
f37189ba9b | ||
|
|
1cfa4a7bec | ||
|
|
4eb84b928b | ||
|
|
2f74f819d4 | ||
|
|
09125cce6b | ||
|
|
db666da35a | ||
|
|
8c20d513fd | ||
|
|
c65803b306 | ||
|
|
0cd2bbdc09 | ||
|
|
8a5f7d09c9 | ||
|
|
528ec8869b | ||
|
|
e5116f86dc | ||
|
|
3e694c1b9d | ||
|
|
eeb5148f29 | ||
|
|
7f60f6f8c1 | ||
|
|
032929c22c | ||
|
|
9748f946ce | ||
|
|
a0897e2ed3 | ||
|
|
f408948925 | ||
|
|
1dd241938c | ||
|
|
34f41d7bf1 | ||
|
|
43c55159d6 | ||
|
|
e67b672727 | ||
|
|
91b39c7df7 | ||
|
|
1694c10f39 | ||
|
|
391f6cc9ea | ||
|
|
375b5e9182 | ||
|
|
4e03fc78dd | ||
|
|
73818f1a53 | ||
|
|
bcd037018f | ||
|
|
878cbab737 | ||
|
|
b86dc9f84d | ||
|
|
8829d77144 | ||
|
|
88db8b43da | ||
|
|
fd1682052d | ||
|
|
74a1a176c5 | ||
|
|
dcf7aa2723 | ||
|
|
80fd06aa6a | ||
|
|
bede819e42 | ||
|
|
5fe6bf0fcd | ||
|
|
8e9f1f781c | ||
|
|
50a71251a1 | ||
|
|
717af548d5 | ||
|
|
451c0d6679 | ||
|
|
78303cdc07 | ||
|
|
10080ca0f2 | ||
|
|
f95c97b38c | ||
|
|
bbce3bd894 | ||
|
|
15382edbd6 | ||
|
|
b7cd38ab12 | ||
|
|
2d9f4d8c03 | ||
|
|
ee4d170525 | ||
|
|
a6b6375985 | ||
|
|
e203ddb7b6 | ||
|
|
321fa30a5f | ||
|
|
d676a5df2a | ||
|
|
58923cbcc0 | ||
|
|
2e7ca940c2 | ||
|
|
49714af3e6 | ||
|
|
c5b11f6ad3 | ||
|
|
89c7440c0d | ||
|
|
c41f370421 | ||
|
|
52cc95b957 | ||
|
|
9a07fc841f | ||
|
|
d52e25949a | ||
|
|
e140a87a6b | ||
|
|
617303659c | ||
|
|
2135ccd420 | ||
|
|
909a82d2d7 | ||
|
|
dbfe40a080 | ||
|
|
3f75d2b08f | ||
|
|
21b427d4df | ||
|
|
4549b5129d | ||
|
|
60f9d1b6c6 | ||
|
|
9ab7bf2408 | ||
|
|
755ea27d46 | ||
|
|
3f566164c2 | ||
|
|
dbac04eb47 | ||
|
|
991c568ee4 | ||
|
|
9d744c31c3 | ||
|
|
7ae0622730 | ||
|
|
e0aa93de4c | ||
|
|
d8463c9bc4 | ||
|
|
4bbe1cfa65 | ||
|
|
9a3d983659 | ||
|
|
1452a26361 | ||
|
|
bdebe50836 | ||
|
|
edcea8f6db | ||
|
|
50b2140d46 | ||
|
|
e2eeea5162 | ||
|
|
35f5f8e187 | ||
|
|
f8e02e5d4c | ||
|
|
32fa870855 | ||
|
|
b99a714497 | ||
|
|
778948b661 | ||
|
|
f6083608f9 | ||
|
|
f694435063 | ||
|
|
e86b8463ea | ||
|
|
9d24b2a46b | ||
|
|
9e0913d6e4 | ||
|
|
e03d11afa2 | ||
|
|
7aa7619c4e | ||
|
|
9db939f74e | ||
|
|
96fd613e89 | ||
|
|
8a9b2379dc | ||
|
|
07f5d3cce4 | ||
|
|
94ff96cf1f | ||
|
|
fb775d4ead | ||
|
|
12f56d6501 | ||
|
|
b234851f00 | ||
|
|
6338348877 | ||
|
|
c6dee66c71 | ||
|
|
4cf6acb1e2 | ||
|
|
8fb04a83bc | ||
|
|
587c766673 | ||
|
|
76fea1fbca | ||
|
|
6852a8ef39 | ||
|
|
517baed1b1 | ||
|
|
2e4cf6fe8c | ||
|
|
85d5cf1407 | ||
|
|
053564d9e9 | ||
|
|
6eaf182cee | ||
|
|
16687889e3 | ||
|
|
32ca133da5 | ||
|
|
a18b0fbcff | ||
|
|
4f0cb4abe1 | ||
|
|
6c812387fd | ||
|
|
5537abbdfb | ||
|
|
7649bba8f5 | ||
|
|
0772a09303 | ||
|
|
b43fed4fbc | ||
|
|
7270bbb7f0 | ||
|
|
a0eea34497 | ||
|
|
49ac6c4e07 | ||
|
|
462cb0421f | ||
|
|
d6e4d5a18c | ||
|
|
815166e421 | ||
|
|
7880748ecd | ||
|
|
aae2cebccd | ||
|
|
f43b2cb2bd | ||
|
|
4e5611ac7b | ||
|
|
b8835cee3f | ||
|
|
c428b33acc | ||
|
|
262490efaa | ||
|
|
11af9f9716 | ||
|
|
bb787ae7cb | ||
|
|
2fba9c579e | ||
|
|
1583b4191a | ||
|
|
1fdc5a5fe6 | ||
|
|
717baa8bd8 | ||
|
|
0bec865e32 | ||
|
|
29a4a0266b | ||
|
|
40424d5864 | ||
|
|
ead0c95f43 | ||
|
|
839be66f85 | ||
|
|
8fc79aa735 | ||
|
|
c094aebd80 | ||
|
|
dea6cc76e3 | ||
|
|
236c6c40f0 | ||
|
|
49fc462ee5 | ||
|
|
fa0f6cd0c6 | ||
|
|
539c95237e | ||
|
|
eef81c09bb | ||
|
|
742a4d91d4 | ||
|
|
1be18e9a48 | ||
|
|
3c9b5ad0bd | ||
|
|
5f15b0bce0 | ||
|
|
f1f98288e0 | ||
|
|
4539fd3e09 | ||
|
|
a39c668bab | ||
|
|
1a5d5ddec2 | ||
|
|
f36ee6de55 | ||
|
|
7559525e48 | ||
|
|
a1c73c0335 | ||
|
|
1ac5d646cf | ||
|
|
6ac8c31b76 | ||
|
|
8fbd81a884 | ||
|
|
11ef9eed01 | ||
|
|
66c5ebf42f | ||
|
|
3e68ea031b | ||
|
|
bb51b8f4c0 | ||
|
|
f87e83c697 | ||
|
|
a3426ca0e2 | ||
|
|
8c3fc983bc | ||
|
|
5380ae4768 | ||
|
|
0b92bc0cd7 | ||
|
|
48296556f5 | ||
|
|
55b3557f22 | ||
|
|
25dfa91caa | ||
|
|
bb6058feaa | ||
|
|
a2da7ad5f8 | ||
|
|
b7ee0bf85e | ||
|
|
652354e59d | ||
|
|
48cc05ccf2 | ||
|
|
004f017550 | ||
|
|
4d4c8b45fb | ||
|
|
295380491f | ||
|
|
2d362c2274 | ||
|
|
fcaf807aed | ||
|
|
2f9ab80205 | ||
|
|
c32da75ccd | ||
|
|
1194f5f28c | ||
|
|
c4a8f2371d | ||
|
|
c5f0e41be9 | ||
|
|
154bb5df06 | ||
|
|
30d1a948c8 | ||
|
|
5097663cb8 | ||
|
|
04618dbe64 | ||
|
|
721de974ee | ||
|
|
70a459a112 | ||
|
|
cc70e683c7 | ||
|
|
eb5d7ef3fe | ||
|
|
b457c3dc09 | ||
|
|
27a779e535 | ||
|
|
e41a9f5b9c | ||
|
|
f9b1523794 | ||
|
|
033000c4e1 | ||
|
|
a08ef0e369 | ||
|
|
bc1fb58cd6 | ||
|
|
a584a04f03 | ||
|
|
b0d2a7c913 | ||
|
|
e4af749931 | ||
|
|
611c948140 | ||
|
|
f1fc51c85c | ||
|
|
1e10c0cf98 | ||
|
|
b10452c2dc | ||
|
|
8ed274e96e | ||
|
|
3115fb5402 | ||
|
|
a40c4a87ba | ||
|
|
2f204ff2ca | ||
|
|
d0103bd7d9 | ||
|
|
a3d34a0e63 | ||
|
|
13a3574979 | ||
|
|
f5099e7d9a | ||
|
|
f8204dc8a9 | ||
|
|
7932234ed8 | ||
|
|
59de9303c5 | ||
|
|
e10e56542d | ||
|
|
474d2fb2c6 | ||
|
|
45bae5569b | ||
|
|
eee1d86fc3 | ||
|
|
d35866d832 | ||
|
|
5939ce9331 | ||
|
|
a7329c38e3 | ||
|
|
0e0071d790 | ||
|
|
8c0d727dc1 | ||
|
|
509439d906 | ||
|
|
63f1aea871 | ||
|
|
c4e1e516ee | ||
|
|
690cd32023 | ||
|
|
00b8ca7b58 | ||
|
|
f06b2707b9 | ||
|
|
51eff14456 | ||
|
|
84e04a4859 | ||
|
|
cfd7ba8bbb | ||
|
|
4922093f24 | ||
|
|
897d312a1d | ||
|
|
457e3f6033 | ||
|
|
59e9948aac | ||
|
|
3ab2228a8b | ||
|
|
992a6a39c5 | ||
|
|
b66b1b1965 | ||
|
|
3b2e80225a | ||
|
|
1fddbd0ee3 | ||
|
|
32be4760cd | ||
|
|
cc60420184 | ||
|
|
a5d96ae90f | ||
|
|
cf04776017 | ||
|
|
0d6d5ff541 | ||
|
|
362378a94a | ||
|
|
59fd6b0334 | ||
|
|
a2c18875f6 | ||
|
|
c57a723546 | ||
|
|
2eeacf071a | ||
|
|
bc94559e4d | ||
|
|
a731f979b0 | ||
|
|
7dc1c84031 | ||
|
|
c05eb0a5c7 | ||
|
|
3edd0994c6 | ||
|
|
e51bf3a056 | ||
|
|
3a91ff6da5 | ||
|
|
ac7976eea9 | ||
|
|
40a36c570e | ||
|
|
0d6f436e2f | ||
|
|
9cab0b0105 | ||
|
|
5817719a7c | ||
|
|
c24b0dad86 | ||
|
|
fef3cce6e0 | ||
|
|
45bffe9e26 | ||
|
|
141753d598 | ||
|
|
4c11fded37 | ||
|
|
bbcf72b0e4 | ||
|
|
ea8fd6991c | ||
|
|
aa2add89cd | ||
|
|
780c7ba10d | ||
|
|
eb02375ee5 | ||
|
|
7a946c5bf4 | ||
|
|
98654d6c0f | ||
|
|
47d61c3ae9 | ||
|
|
4fe6ea9c8a | ||
|
|
f8b59e9308 | ||
|
|
3baea33f46 | ||
|
|
d640f098b9 | ||
|
|
75cfdc06c6 | ||
|
|
a8ef006163 | ||
|
|
5bb235c02a | ||
|
|
4ffb6fe8bd | ||
|
|
318e1bfec8 | ||
|
|
925ec7555f | ||
|
|
e2ab98dea0 | ||
|
|
3ce0d62f83 | ||
|
|
96f6adb74b | ||
|
|
ca1655c25e | ||
|
|
af2b497fdf | ||
|
|
398021e77a | ||
|
|
f98832f587 | ||
|
|
35e75e3d55 | ||
|
|
6f9a14000c | ||
|
|
74be3a448f | ||
|
|
c6b3fb3aef | ||
|
|
a7c40760cd | ||
|
|
2d34e6f839 | ||
|
|
8a407d5ee9 | ||
|
|
0c7c379d46 | ||
|
|
0a70c8f525 | ||
|
|
f2a77335b0 | ||
|
|
d493ffcfde | ||
|
|
a3c78bffe6 | ||
|
|
8612a70ea3 | ||
|
|
429502815f | ||
|
|
80fe557cf3 | ||
|
|
3e3ebc6b8b | ||
|
|
c3ae096e67 | ||
|
|
a08f3c3e9c | ||
|
|
3f6a8abe1b | ||
|
|
255884b3fb | ||
|
|
e796cb0f27 | ||
|
|
428b24d51b | ||
|
|
2238500f22 | ||
|
|
b9be625e9b | ||
|
|
90cae7c6a5 | ||
|
|
04d031d33d | ||
|
|
629c0a315c | ||
|
|
3378831ba5 | ||
|
|
0905b2ba25 | ||
|
|
a2f665de76 | ||
|
|
71e01b58c0 | ||
|
|
1706552f25 | ||
|
|
55abae9d4f | ||
|
|
063bfe6cb7 | ||
|
|
a6d90aaeec | ||
|
|
f18da9078c | ||
|
|
0f49b18986 | ||
|
|
9a64c052cc | ||
|
|
2295cd130a | ||
|
|
5ab4d1d2f8 | ||
|
|
cd1007a972 | ||
|
|
9a7949c79d | ||
|
|
7cf87cb2a3 | ||
|
|
e04aa9639e | ||
|
|
ad72edfa49 | ||
|
|
2f8580c380 | ||
|
|
25a7b2ae22 | ||
|
|
ced0ffabbd | ||
|
|
522039cb60 | ||
|
|
17ddf81681 | ||
|
|
8b15b193a2 | ||
|
|
4793d80775 | ||
|
|
1e0aef10d8 | ||
|
|
2556a95c48 | ||
|
|
0d1c90a23e | ||
|
|
4d10540d8d | ||
|
|
e83991f533 | ||
|
|
78a60d9959 | ||
|
|
cea6f4751e | ||
|
|
6d0a4a9ce0 | ||
|
|
4be7b3dfa5 | ||
|
|
3588a1599f | ||
|
|
fa59fc325e | ||
|
|
375e023d8b | ||
|
|
97e0fbea33 | ||
|
|
21fbc5d6a6 | ||
|
|
8f4a99cc24 | ||
|
|
13d59d1427 | ||
|
|
8360226526 | ||
|
|
2c29e9f07c | ||
|
|
7dfb3c92ba | ||
|
|
6d1f518209 | ||
|
|
3fc90a8000 | ||
|
|
729490c212 | ||
|
|
a1c7298f9d | ||
|
|
622530ae68 | ||
|
|
4d92d60469 | ||
|
|
ce47e41665 | ||
|
|
bdef113184 | ||
|
|
254364ca11 | ||
|
|
77f33b6762 | ||
|
|
dd673a426f | ||
|
|
8248a41994 | ||
|
|
d5e9250405 | ||
|
|
102790400d | ||
|
|
63af2a556b | ||
|
|
17a2c4977e | ||
|
|
e60f0f3981 | ||
|
|
d3f3afa6e7 | ||
|
|
010a311ab7 | ||
|
|
3cddcb4482 | ||
|
|
775e473fb0 | ||
|
|
c6a224a6d1 | ||
|
|
c4b53d0710 | ||
|
|
060a309f82 | ||
|
|
ac77d6c7fe | ||
|
|
e0b23bbaea | ||
|
|
b11e35b7d4 | ||
|
|
74b078c3f1 | ||
|
|
4860deacf8 | ||
|
|
d5d4c551c5 | ||
|
|
f5f7a6cb2a | ||
|
|
70fb5304d0 | ||
|
|
a40ec68883 | ||
|
|
d0d5c84689 | ||
|
|
46cfcbdf43 | ||
|
|
75e9a65bcd | ||
|
|
78aae09a09 | ||
|
|
467f680968 | ||
|
|
862e62b9e4 | ||
|
|
10f6d88ba1 | ||
|
|
49b619cec2 | ||
|
|
439bf558cc | ||
|
|
5afc7363f0 | ||
|
|
45105f16c6 | ||
|
|
5627bb850e | ||
|
|
b6a56fb7e8 | ||
|
|
6ce38d28ae | ||
|
|
694f7dfee4 | ||
|
|
59a5eb4591 | ||
|
|
199f9d38ea | ||
|
|
2ca7e7e2b3 | ||
|
|
827f3da238 | ||
|
|
41cdf11b46 | ||
|
|
fe3fe78538 | ||
|
|
a0dad9f908 | ||
|
|
6dcf1995c1 | ||
|
|
b5d0c2797b | ||
|
|
a3aa9aac88 | ||
|
|
60cf3639ce | ||
|
|
3c387987ed | ||
|
|
b536e4101d | ||
|
|
1b071fe5a2 | ||
|
|
0cf7165841 | ||
|
|
23bbc93a92 | ||
|
|
85830c5f63 | ||
|
|
f3b298586f | ||
|
|
9b2329a49b | ||
|
|
eab8db26fe | ||
|
|
73e1381194 | ||
|
|
755170f752 | ||
|
|
3a75a34c31 | ||
|
|
b69fd5feb8 | ||
|
|
fe53d6ed3f | ||
|
|
2ed0d80be5 | ||
|
|
ea78c81da9 | ||
|
|
6f1f0ef1bf | ||
|
|
4ed7c62cca | ||
|
|
5ac74e31e0 | ||
|
|
6b753378bc | ||
|
|
40dd8e2702 | ||
|
|
74114081ef | ||
|
|
d76349f200 | ||
|
|
a8820459d5 | ||
|
|
d70c1e2149 | ||
|
|
1672c06a36 | ||
|
|
9abc993f08 | ||
|
|
f5c1d53512 | ||
|
|
04a416828b | ||
|
|
836fc810b3 | ||
|
|
3515a1818a | ||
|
|
f67cdb8e44 | ||
|
|
22a6938332 | ||
|
|
e471d036d1 | ||
|
|
319d1508c2 | ||
|
|
0a4b847f50 | ||
|
|
78a61585ce | ||
|
|
19a0a9b769 | ||
|
|
3c210cae1e | ||
|
|
d80d2a4c35 | ||
|
|
563a799de2 | ||
|
|
93ac463920 | ||
|
|
9ce25b36c4 | ||
|
|
14138da395 | ||
|
|
ca1654eae2 | ||
|
|
1ac26f9b67 | ||
|
|
9cd6325ee1 | ||
|
|
3feb7454c5 | ||
|
|
b96babed0a | ||
|
|
345609b5ac | ||
|
|
d8e018a044 | ||
|
|
c51a2b3a6c | ||
|
|
60c746ed21 | ||
|
|
8ac474583b | ||
|
|
dc6b14760d | ||
|
|
8340d30d77 | ||
|
|
b7477f4654 | ||
|
|
e024792e68 | ||
|
|
e41a2618f8 | ||
|
|
ae3c81e0a6 | ||
|
|
237d56ac16 | ||
|
|
60f9744253 | ||
|
|
ec29d3b4a1 | ||
|
|
7ab43d62db | ||
|
|
e08ea100a4 | ||
|
|
e5238c6fcf | ||
|
|
496bba9475 | ||
|
|
923a85f5cc | ||
|
|
2b9c2283db | ||
|
|
095367ac29 | ||
|
|
47a1e91c19 | ||
|
|
f648d5d0ab | ||
|
|
f88e8c3ba4 | ||
|
|
471884cdf4 | ||
|
|
9dd16696ef | ||
|
|
c03c2ef9f2 | ||
|
|
1b09e55129 | ||
|
|
5e36fd3351 | ||
|
|
7e68455893 | ||
|
|
076354168e | ||
|
|
9390536d79 | ||
|
|
4b489cd254 | ||
|
|
3c60c1918e | ||
|
|
4fb87d7c87 | ||
|
|
0adac61dad | ||
|
|
ae504890c7 | ||
|
|
0452b7c326 | ||
|
|
e9d7db6f61 | ||
|
|
0a279ebbbd | ||
|
|
153e30bb1c | ||
|
|
945d6a0188 | ||
|
|
31b5e111bf | ||
|
|
62746ef4ff | ||
|
|
d0894b8c33 | ||
|
|
39bc96fbd1 | ||
|
|
27e48672bb | ||
|
|
536611f0a2 | ||
|
|
c5897a8f81 | ||
|
|
bfb89ae937 | ||
|
|
59a08bb733 | ||
|
|
c9fce4aff9 | ||
|
|
91463b5a4e | ||
|
|
3d00f0ea37 | ||
|
|
bc8229b952 | ||
|
|
ef85335f8f | ||
|
|
9871983602 | ||
|
|
7c658fff27 | ||
|
|
de343361e5 | ||
|
|
1bbe040688 | ||
|
|
c6f26eff9e | ||
|
|
0331b0a1e2 | ||
|
|
7be94f7d44 | ||
|
|
eb0030af45 | ||
|
|
e69ccee1f7 | ||
|
|
beaaa19ada | ||
|
|
6aa3769e9f | ||
|
|
1e5253e9e5 | ||
|
|
f35c426e26 | ||
|
|
0bbda61037 | ||
|
|
eb703a6d80 | ||
|
|
3bb50c7b8a | ||
|
|
de51d1ee8e | ||
|
|
a5c0f64d5e | ||
|
|
160770d979 | ||
|
|
f3a6d7c3ce | ||
|
|
fc2e88758f | ||
|
|
d35a16c30f | ||
|
|
f78cbc818f | ||
|
|
9e61390e78 | ||
|
|
aeacaeb08f | ||
|
|
7cfd88dab7 | ||
|
|
187b008eb2 | ||
|
|
aab8668d4b | ||
|
|
50b2d9f4b8 | ||
|
|
c996384000 | ||
|
|
0930a80dd3 | ||
|
|
212579440e | ||
|
|
132ed11e0e | ||
|
|
ce561e5f3a | ||
|
|
fb8fc4e07c | ||
|
|
ebd44261fe | ||
|
|
77e82ac376 | ||
|
|
5f7937dd33 | ||
|
|
ca796567f3 | ||
|
|
c5fe8ce4dc | ||
|
|
c69f56bd2f | ||
|
|
846f27eebc | ||
|
|
846d9a0c2d | ||
|
|
3ea542769f | ||
|
|
c1bae75a85 | ||
|
|
b5c4cd7a00 | ||
|
|
6fb688f882 | ||
|
|
bbd5b115dd | ||
|
|
884a281dd4 | ||
|
|
89bbe4c782 | ||
|
|
e969c006b7 | ||
|
|
cfb3324b6f | ||
|
|
145326b368 | ||
|
|
5abd614e01 | ||
|
|
55f63a8a12 | ||
|
|
4133a3cbc3 | ||
|
|
6db629db4d | ||
|
|
0b484452fd | ||
|
|
2c2688a680 | ||
|
|
0991948d3e | ||
|
|
640f958d26 | ||
|
|
edae1fc950 | ||
|
|
88ea6fb11d | ||
|
|
74d48b9b91 | ||
|
|
80d363eac5 | ||
|
|
8116e3181f | ||
|
|
b4e4250144 | ||
|
|
df1b8c8f71 | ||
|
|
872cd52f99 | ||
|
|
f4e7c2f6ce | ||
|
|
819136660e | ||
|
|
9acc354608 | ||
|
|
959800d9b5 | ||
|
|
93c2a95860 | ||
|
|
4f94fb9ea0 | ||
|
|
32f1fc504c | ||
|
|
3a2030f3b6 | ||
|
|
6c762a19e7 | ||
|
|
feea5a269f | ||
|
|
a410519ff5 | ||
|
|
9f47676fa3 | ||
|
|
ba75d4c907 | ||
|
|
08ca9ba4a4 | ||
|
|
bd56763235 | ||
|
|
433346583e | ||
|
|
d899835b31 | ||
|
|
4d4854d610 | ||
|
|
4dda9a5183 | ||
|
|
035c115ca8 | ||
|
|
4e17f5b9a5 | ||
|
|
f72b739e21 | ||
|
|
6de2acea83 | ||
|
|
fcd2e936b4 | ||
|
|
41622dc2a9 | ||
|
|
0efc7ae07d | ||
|
|
4489801c4f | ||
|
|
faa0c191a4 | ||
|
|
f9f1db874f | ||
|
|
c6ace07201 | ||
|
|
649a32fa82 | ||
|
|
8dc5f90a88 | ||
|
|
08cc79e513 | ||
|
|
d2014ff946 | ||
|
|
d5148e0b0f | ||
|
|
a3b0f08d57 | ||
|
|
8f27f92269 | ||
|
|
e346f6fc74 | ||
|
|
3e2d693b37 | ||
|
|
e4a90bc417 | ||
|
|
0b941ef495 | ||
|
|
45238eea0f | ||
|
|
382c88eb17 | ||
|
|
97cd4953b0 | ||
|
|
ece95a2ee4 | ||
|
|
8af94099a3 | ||
|
|
324cbd8327 | ||
|
|
9877db53d9 | ||
|
|
493efb1bf7 | ||
|
|
0ffdfb4f76 | ||
|
|
b2c0f64992 | ||
|
|
e6f18b2838 | ||
|
|
630e5d8082 | ||
|
|
6d499785be | ||
|
|
424337507d | ||
|
|
876369b2f1 | ||
|
|
692d3702a1 | ||
|
|
3cb30fa873 | ||
|
|
673b1d79e2 | ||
|
|
28b3286e21 | ||
|
|
177e335cad | ||
|
|
3c7511780b | ||
|
|
6adc4ef78b | ||
|
|
9639f0a87b | ||
|
|
e77bde5e75 | ||
|
|
031d26deb4 | ||
|
|
9e528bef6f | ||
|
|
5ddf83ab5a | ||
|
|
281f83968c | ||
|
|
cb2b167849 | ||
|
|
896de3243e | ||
|
|
961d298b3f | ||
|
|
77f4f0f0c9 | ||
|
|
7d4d9c5c34 | ||
|
|
5a0140cf3a | ||
|
|
3ca2fcad1c | ||
|
|
6f5afaa410 | ||
|
|
0a8436a862 | ||
|
|
a26a4f7c9d | ||
|
|
4219306f55 | ||
|
|
ecf93dbf4f | ||
|
|
3245258560 | ||
|
|
e5820bdbaa | ||
|
|
0a237df13d | ||
|
|
ceee24a4cd | ||
|
|
01ac83b971 | ||
|
|
bfb60b8a33 | ||
|
|
1239449207 | ||
|
|
cfc9f38ccd | ||
|
|
0c5feb7493 | ||
|
|
61158d4693 | ||
|
|
97f8083ee0 | ||
|
|
8f8e0242d8 | ||
|
|
c2805a25bd | ||
|
|
037c2426ab | ||
|
|
669c5cf23f | ||
|
|
1a6f092a39 | ||
|
|
9c50da1e82 | ||
|
|
c754f6ca69 | ||
|
|
5cc2c0ccfc | ||
|
|
11695db3e3 | ||
|
|
0fd6417833 | ||
|
|
18376b38cf | ||
|
|
be68581019 | ||
|
|
debef378c9 | ||
|
|
ceff6f834a | ||
|
|
300ac178de | ||
|
|
70f8f5e921 | ||
|
|
143b2531bb | ||
|
|
56c9ada9e0 | ||
|
|
ec678ff800 | ||
|
|
9cb5c80981 | ||
|
|
0f42cf1bd9 | ||
|
|
3d5a9bc78c | ||
|
|
a7aa5d93ff | ||
|
|
3788350d7c | ||
|
|
56a28240ff | ||
|
|
cb96da9bfa | ||
|
|
b63bf2720c | ||
|
|
eb28fd80f9 | ||
|
|
0de3e4a0af | ||
|
|
2254b35256 | ||
|
|
26326c178e | ||
|
|
8addf6e9a5 | ||
|
|
da3976277f | ||
|
|
0329b9ef9a | ||
|
|
e32480406f | ||
|
|
caeb6b311d | ||
|
|
a92c8bf067 | ||
|
|
33a89a8684 | ||
|
|
9919cc1ba6 | ||
|
|
974e2f7d4a | ||
|
|
7e78bd904d | ||
|
|
78aaf2fd9d | ||
|
|
5bbac46b88 | ||
|
|
70df23f6f8 | ||
|
|
595cc41d9c | ||
|
|
184f06453a | ||
|
|
cb19bd1dd4 | ||
|
|
980953f861 | ||
|
|
d62336a718 | ||
|
|
4c956c400e | ||
|
|
9e6fe01229 | ||
|
|
e98c02b831 | ||
|
|
c6a49a018f | ||
|
|
7d1822d04e | ||
|
|
19477f95a9 | ||
|
|
fcaf1a73b4 | ||
|
|
0159b3297d | ||
|
|
9ddde1cf40 | ||
|
|
cb6b68a05f | ||
|
|
42162f7b37 | ||
|
|
df86573d4c | ||
|
|
96d9890d86 | ||
|
|
1335534aae | ||
|
|
c501c762cf | ||
|
|
fe2e67d1c6 | ||
|
|
7752bb27f6 | ||
|
|
8a95b29c86 | ||
|
|
a6ecac6f1d | ||
|
|
6bf947ee6e | ||
|
|
ad5c92044c | ||
|
|
8702a522d8 | ||
|
|
4b3e6a8ab6 | ||
|
|
8fd1977ab0 | ||
|
|
b2f0b281cd | ||
|
|
555c29971f | ||
|
|
9aac83a83e | ||
|
|
28036b3741 | ||
|
|
13a63ae5fe | ||
|
|
947461e31f | ||
|
|
53d6dfcb6b | ||
|
|
91aad0b28e | ||
|
|
24b7ad602a | ||
|
|
db43d1d8a7 | ||
|
|
3e4629b077 | ||
|
|
abc2ba9a3c | ||
|
|
149c764ca1 | ||
|
|
e188fe0956 | ||
|
|
b44e39cce8 | ||
|
|
c57d4ff268 | ||
|
|
ad40a77afd | ||
|
|
36adbe54a5 | ||
|
|
59861f883b | ||
|
|
17f5bc21e7 | ||
|
|
a0c21bf820 | ||
|
|
da54801353 | ||
|
|
552f5a3f61 | ||
|
|
8b718ee54b | ||
|
|
dbb351f078 | ||
|
|
00a2314999 | ||
|
|
7c5553640e | ||
|
|
5ced6d6aef | ||
|
|
3b2d51a96b | ||
|
|
eba14fa801 | ||
|
|
596c631a71 | ||
|
|
9d0ee46068 | ||
|
|
22d4d72ef4 | ||
|
|
86018d09e1 | ||
|
|
f7a6dc503c | ||
|
|
ed106b7feb | ||
|
|
d51281b576 | ||
|
|
f784236908 | ||
|
|
45f608bac0 | ||
|
|
fb16148641 | ||
|
|
3bc3818955 | ||
|
|
3860ab6f68 | ||
|
|
94634ace27 | ||
|
|
6f8b72bfb3 | ||
|
|
3ebe2a7176 | ||
|
|
87af36724b | ||
|
|
7fd4e395da | ||
|
|
981bea82f4 | ||
|
|
a761166dfa | ||
|
|
9291d87dab | ||
|
|
97e027db33 | ||
|
|
7d2ee932e9 | ||
|
|
79a736a9f6 | ||
|
|
541f3caf50 | ||
|
|
162eb9bb70 | ||
|
|
a0a3f2d2b6 | ||
|
|
eedc332a04 | ||
|
|
ee27adc926 | ||
|
|
de5ac65dd6 | ||
|
|
200034075d | ||
|
|
f793e823ec | ||
|
|
3d016f7385 | ||
|
|
02ff84337a | ||
|
|
ca44bfc681 | ||
|
|
aac1207beb | ||
|
|
c19358ee50 | ||
|
|
0595f74596 | ||
|
|
f932863ee1 | ||
|
|
5f638d7aac | ||
|
|
697ea6d946 | ||
|
|
cb2543df8a | ||
|
|
8129bf95a4 | ||
|
|
991df05826 | ||
|
|
83e08e04d7 | ||
|
|
d8ba814b26 | ||
|
|
11d442c0a0 | ||
|
|
784bd9ec54 | ||
|
|
84f0869fde | ||
|
|
3a076895bb | ||
|
|
b8bb269c72 | ||
|
|
baf5b74da2 | ||
|
|
8ffde3c86a | ||
|
|
e0926981a4 | ||
|
|
908eeaf9cd | ||
|
|
b40489973e | ||
|
|
256847556e | ||
|
|
36ef5b504b | ||
|
|
1d0f716a4e | ||
|
|
a43d257715 | ||
|
|
2672c87f68 | ||
|
|
ae2f236663 | ||
|
|
703eb4e7a0 | ||
|
|
591a0db767 | ||
|
|
ec2b3e61c6 | ||
|
|
9d54fe57f8 | ||
|
|
3030eb8cae | ||
|
|
f3bf7cd5bc | ||
|
|
5af21dfc79 | ||
|
|
42112db262 | ||
|
|
66c247ba9c | ||
|
|
c3d4d40d1b | ||
|
|
c967d1ab3a | ||
|
|
bfad7d30f0 | ||
|
|
6a4a13d041 | ||
|
|
a2599744f0 | ||
|
|
9092e509c6 | ||
|
|
b5009c57b4 | ||
|
|
f21743e213 | ||
|
|
dad1ab3b22 | ||
|
|
a968ce8437 | ||
|
|
225f1fb724 | ||
|
|
c6a51a39f0 | ||
|
|
b6dde9472f | ||
|
|
ecf5219493 | ||
|
|
b9bce39f1e | ||
|
|
c685aa11b5 | ||
|
|
d7716c5e5a | ||
|
|
9dbd1060ad | ||
|
|
5927f264a8 | ||
|
|
c84c57be67 | ||
|
|
14b982346f | ||
|
|
361613bb23 | ||
|
|
a0db745586 | ||
|
|
e1c67b1fba | ||
|
|
901d1b3af8 | ||
|
|
fc9f365b47 | ||
|
|
06c0a20b4d | ||
|
|
a7e97524e4 | ||
|
|
8217bef1eb | ||
|
|
7f74cabf12 | ||
|
|
cf8e8a5b96 | ||
|
|
023073b422 | ||
|
|
6dd1a052d3 | ||
|
|
c422c4e130 | ||
|
|
37320faecc | ||
|
|
f68d0ffb7d | ||
|
|
79eab3513d | ||
|
|
5d188dee44 | ||
|
|
729774d6f8 | ||
|
|
a067d1bc0d | ||
|
|
399a46eb92 | ||
|
|
f514411cea | ||
|
|
aee6a1648a | ||
|
|
f45f393b71 | ||
|
|
2acc260239 | ||
|
|
a184032321 | ||
|
|
4f3b82565f | ||
|
|
2934d628b5 | ||
|
|
3c76cbaa1e | ||
|
|
83d21d8076 | ||
|
|
d0fdcb18db | ||
|
|
5fd9c608ed | ||
|
|
3434e1c53f | ||
|
|
824293a681 | ||
|
|
c9a188825d | ||
|
|
d5a95fcac0 | ||
|
|
832bdeb3be | ||
|
|
965e75761d | ||
|
|
bcfca75b56 | ||
|
|
9932033365 | ||
|
|
a9dfdc494b | ||
|
|
f1a0c90fb1 | ||
|
|
4398053245 | ||
|
|
ec528b797e | ||
|
|
966213238a | ||
|
|
7a9d436a56 | ||
|
|
caf99ea472 | ||
|
|
db258b68ea | ||
|
|
f12ea12eda | ||
|
|
9e0ab0029b | ||
|
|
db795bc07a | ||
|
|
6382054ae5 | ||
|
|
441ba991fa | ||
|
|
f56f8f56f3 | ||
|
|
1cfe2b5dac | ||
|
|
0f04bc72bd | ||
|
|
5a84f07281 | ||
|
|
a4887558b8 | ||
|
|
15896e422c | ||
|
|
0bf57a9c64 | ||
|
|
53e3cd60d0 | ||
|
|
dd5b8dfabf | ||
|
|
4173e3c487 | ||
|
|
a254a8acb1 | ||
|
|
ce160b4f1a | ||
|
|
fef8659bf1 | ||
|
|
de21842485 | ||
|
|
674791bf91 | ||
|
|
6715e3b171 | ||
|
|
53255dcf48 | ||
|
|
d3d6e637d6 | ||
|
|
426c273de8 | ||
|
|
7d76f2829a | ||
|
|
64a9f1e5d7 | ||
|
|
ba47f9fe7c | ||
|
|
d1a2112163 | ||
|
|
b853ce1546 | ||
|
|
6ff4d852e1 | ||
|
|
629b8fdb88 | ||
|
|
3de71150a6 | ||
|
|
f2b68c8261 | ||
|
|
376c47c98f | ||
|
|
0e4311490c | ||
|
|
b5e1097890 | ||
|
|
bb8d6b5143 | ||
|
|
c8453bb3f7 | ||
|
|
4c75213caa | ||
|
|
725d3fa6ea | ||
|
|
52d743f223 | ||
|
|
b89155a64a | ||
|
|
66c571d217 | ||
|
|
fac31cce07 | ||
|
|
ad1feaf35c | ||
|
|
f2764393be | ||
|
|
851a68883c | ||
|
|
5bdb108e47 | ||
|
|
f2ff7661e4 | ||
|
|
4a91a6bf4b | ||
|
|
e8505e4434 | ||
|
|
7f174a46c3 | ||
|
|
8546fbe868 | ||
|
|
80155f7b4c | ||
|
|
1afbf0e20f | ||
|
|
0e39681621 | ||
|
|
0d63470af3 | ||
|
|
b683a21217 | ||
|
|
9f8f8c1a9c | ||
|
|
5c71bad6e1 | ||
|
|
ea73b04ef3 | ||
|
|
f14b5ead0e | ||
|
|
48cbb00cbe | ||
|
|
fe073353c0 | ||
|
|
5880700ab4 | ||
|
|
021d8d1fec | ||
|
|
c80f2c0817 | ||
|
|
6e53274b6a | ||
|
|
43e75cec60 | ||
|
|
4b2ac75e94 | ||
|
|
5f734a6210 | ||
|
|
c0becb6dc7 | ||
|
|
3dbb828d82 | ||
|
|
69e7c2d0ae | ||
|
|
5d1e9f0c86 | ||
|
|
787061ffd4 | ||
|
|
bc296e2dcc | ||
|
|
c21def03db | ||
|
|
916a65f5d6 | ||
|
|
c2dc6da49f | ||
|
|
0f84a92306 | ||
|
|
f0cb9591ec | ||
|
|
249314e586 | ||
|
|
10569743c8 | ||
|
|
1cd71875ac | ||
|
|
43fd3df629 | ||
|
|
7592c2cb1a | ||
|
|
7606d347a0 | ||
|
|
9c10e17f06 | ||
|
|
2d429613e6 | ||
|
|
2ff183fd2a | ||
|
|
b48d45c38d | ||
|
|
e2cfecffe3 | ||
|
|
847de065d6 | ||
|
|
9694054674 | ||
|
|
f3e2248cc4 | ||
|
|
ef48465b2a | ||
|
|
d112eb710c | ||
|
|
144ef77113 | ||
|
|
5c0660793d | ||
|
|
a91e33ce96 | ||
|
|
5b09f4211d | ||
|
|
4b31842ecc | ||
|
|
7e978197d2 | ||
|
|
1284cf0187 | ||
|
|
fb36b6b633 | ||
|
|
8b48512de7 | ||
|
|
70a5d416d1 | ||
|
|
42d0e056fb | ||
|
|
f055d610d3 | ||
|
|
5ac646f89f | ||
|
|
b493f98f39 | ||
|
|
2e947a5e91 | ||
|
|
c9c168d853 | ||
|
|
e494e09063 | ||
|
|
aab6140bfa | ||
|
|
98d06cffb2 | ||
|
|
de79024451 | ||
|
|
dcb4b71a3d | ||
|
|
d07e8114c6 | ||
|
|
67beb0c4d5 | ||
|
|
ca4cc6fe80 | ||
|
|
4ed4dab397 | ||
|
|
6b74749c12 | ||
|
|
b83ab7873e | ||
|
|
73153b484b | ||
|
|
40915d76c6 | ||
|
|
8668e313f8 | ||
|
|
a18c5dd9c4 | ||
|
|
53f6b51cde | ||
|
|
6a4d9703cc | ||
|
|
0d9459bdd6 | ||
|
|
57a2371a16 | ||
|
|
cd5fb7ea8c | ||
|
|
8ebd47f7d7 | ||
|
|
bccc87a808 | ||
|
|
478209a840 | ||
|
|
1c5cb87985 | ||
|
|
83103c314b | ||
|
|
bc759a2903 | ||
|
|
6bdc39213b | ||
|
|
0e7eb937b4 | ||
|
|
e63968056e | ||
|
|
9ef57888fa | ||
|
|
6710f21388 | ||
|
|
b5efab645f | ||
|
|
5d86ead6c0 | ||
|
|
7b4b53af21 | ||
|
|
2e5bf801a0 | ||
|
|
04cee55976 | ||
|
|
479827380c | ||
|
|
6f22e5b7d9 | ||
|
|
6de8b41da2 | ||
|
|
3e6e781c8d | ||
|
|
57acada057 | ||
|
|
68e92c8319 | ||
|
|
1b972eff60 | ||
|
|
b11d9ce683 | ||
|
|
1c19000977 | ||
|
|
eea5656df7 | ||
|
|
8749fb1da8 | ||
|
|
a90254c045 | ||
|
|
dacde83aae | ||
|
|
42c2a9754f | ||
|
|
44ccf469d9 | ||
|
|
1c9723afd7 | ||
|
|
23bf60a80e | ||
|
|
04e97ce36b | ||
|
|
0370ea6d61 | ||
|
|
a9bbf81f93 | ||
|
|
fa2547ddf7 | ||
|
|
a26a8318da | ||
|
|
206c33b6bc | ||
|
|
5acb12ebe0 | ||
|
|
040aa7115c | ||
|
|
531353e14d | ||
|
|
3f83d34dd9 | ||
|
|
5fc5b3c32d | ||
|
|
227a684c70 | ||
|
|
be932f0f5b | ||
|
|
37c3bced4b | ||
|
|
4eed0fe226 | ||
|
|
4d183a3757 | ||
|
|
177af75c93 | ||
|
|
f90babad30 | ||
|
|
8cbd17b1ba | ||
|
|
0db1db10b8 | ||
|
|
eb025dae5c | ||
|
|
cec503a1b4 | ||
|
|
5472fafa56 | ||
|
|
a0a7a48c3b | ||
|
|
89a37681fc | ||
|
|
7b6ed6733f | ||
|
|
78961d37c1 | ||
|
|
b391be598b | ||
|
|
d0e857ddb2 | ||
|
|
928e341f16 | ||
|
|
3759de23eb | ||
|
|
9c9976c121 | ||
|
|
eb3fc1d43e | ||
|
|
7b745d6fb2 | ||
|
|
d10d14acac | ||
|
|
ca5599714b | ||
|
|
f337b8df6d | ||
|
|
7cd58cabab | ||
|
|
8b4f21bd95 | ||
|
|
ab820d3083 | ||
|
|
fb23d440f0 | ||
|
|
f70b857d1b | ||
|
|
bd07643039 | ||
|
|
686e5af1bb | ||
|
|
34ccddfc2d | ||
|
|
b6f73fdc29 | ||
|
|
c19324dfea | ||
|
|
772b64fabd | ||
|
|
ef92740400 | ||
|
|
ee9c5be180 | ||
|
|
ca9a6feeb0 | ||
|
|
022cb596be | ||
|
|
9eb53c3d47 | ||
|
|
dfcfa9883b | ||
|
|
fb6d291d38 | ||
|
|
e4e29ae837 | ||
|
|
94534b7c15 | ||
|
|
491040b2c7 | ||
|
|
b4adc21f19 | ||
|
|
bae4084355 | ||
|
|
d394fe5dda | ||
|
|
dcfe4e8a97 | ||
|
|
be9e253a2f | ||
|
|
620216fb26 | ||
|
|
70d71f4355 | ||
|
|
6b87f1082e | ||
|
|
fd44c34a61 | ||
|
|
6c247029bd | ||
|
|
6bbdb92784 | ||
|
|
22182c0d7f | ||
|
|
87f66789de | ||
|
|
1879c8e724 | ||
|
|
693830b09a | ||
|
|
e3fa99632e | ||
|
|
b3d11b1fa5 | ||
|
|
2b6187a009 | ||
|
|
a8fc6009f7 | ||
|
|
92141b52ce | ||
|
|
b63f304db1 | ||
|
|
ec3e755168 | ||
|
|
a41ff68078 | ||
|
|
244e172413 | ||
|
|
da936740a6 | ||
|
|
35fae90a9d | ||
|
|
c5a739c68f | ||
|
|
dc92fe358e | ||
|
|
59996174b6 | ||
|
|
84f9364d4c | ||
|
|
a635fb0203 | ||
|
|
e3e1c5ac20 | ||
|
|
e3e9add8b1 | ||
|
|
ffd0d165a7 | ||
|
|
c1d5a0c721 | ||
|
|
3e743d78f3 | ||
|
|
90c847ca59 | ||
|
|
1b162c577e | ||
|
|
a5f4b01d82 | ||
|
|
c5508c7c0b | ||
|
|
80e349860b | ||
|
|
157b243956 | ||
|
|
eabf214312 | ||
|
|
d52117c8dd | ||
|
|
d457c50945 | ||
|
|
b294ab5042 | ||
|
|
9d0812746b | ||
|
|
9f203c9a17 | ||
|
|
0c92039ba4 | ||
|
|
cf6d084155 | ||
|
|
7e6a6f6de2 | ||
|
|
954d3a0326 | ||
|
|
6f6356e0b4 | ||
|
|
9e26d0e0c0 | ||
|
|
bf3ba84e92 | ||
|
|
7a790e48fb | ||
|
|
32bc0f2982 | ||
|
|
fb4a3fd479 | ||
|
|
ccdb8693ee | ||
|
|
a8c5699241 | ||
|
|
e0c4e4b686 | ||
|
|
8a40c25069 | ||
|
|
0fd729951a | ||
|
|
7a30dc4868 | ||
|
|
4b1965afbc | ||
|
|
b2b281f525 | ||
|
|
d2a6847715 | ||
|
|
2690f07cbd | ||
|
|
aa82964563 | ||
|
|
c636aba734 | ||
|
|
ce92663b0a | ||
|
|
a89ba7074f | ||
|
|
a71e706aa4 | ||
|
|
736a2d1022 | ||
|
|
17e13e9e71 | ||
|
|
9d7b94ba34 | ||
|
|
218f7ed718 | ||
|
|
cb0b2e08cf | ||
|
|
c2a990768d | ||
|
|
36537eccc0 | ||
|
|
6cdcb391fb | ||
|
|
9d9c9ae97b | ||
|
|
c478b62711 | ||
|
|
e7f7f33f60 | ||
|
|
c1f3dbba33 | ||
|
|
d5098fe70f | ||
|
|
469d075e77 | ||
|
|
2a4b3fd616 |
11
.clang-format
Normal file
11
.clang-format
Normal file
@@ -0,0 +1,11 @@
|
||||
---
|
||||
BasedOnStyle: WebKit
|
||||
AllowShortLoopsOnASingleLine: 'false'
|
||||
AlwaysBreakAfterDefinitionReturnType: false
|
||||
BreakBeforeBraces: Allman
|
||||
IndentCaseLabels: 'true'
|
||||
PointerAlignment: Left
|
||||
TabWidth: '4'
|
||||
UseTab: ForIndentation
|
||||
|
||||
...
|
||||
62
.distr
Normal file
62
.distr
Normal file
@@ -0,0 +1,62 @@
|
||||
README
|
||||
CHANGES
|
||||
Copyright
|
||||
Makefile
|
||||
|
||||
h
|
||||
modules/h
|
||||
|
||||
first
|
||||
util/data
|
||||
util/LLgen
|
||||
|
||||
modules/src/alloc
|
||||
#modules/src/assert
|
||||
modules/src/system
|
||||
modules/src/string
|
||||
modules/src/read_em
|
||||
modules/src/em_code
|
||||
modules/src/em_mes
|
||||
modules/src/print
|
||||
modules/src/object
|
||||
modules/src/idf
|
||||
modules/src/input
|
||||
modules/src/flt_arith
|
||||
|
||||
util/amisc
|
||||
util/cmisc
|
||||
util/ack
|
||||
lib/descr/fe
|
||||
util/arch
|
||||
#util/cpp
|
||||
#util/cgg
|
||||
util/ncgg
|
||||
util/misc
|
||||
util/opt
|
||||
util/ego
|
||||
util/topgen
|
||||
util/led
|
||||
|
||||
lang/cem
|
||||
lang/pc
|
||||
lang/m2
|
||||
#lang/occam
|
||||
lang/basic
|
||||
|
||||
mach/proto
|
||||
mach/i80
|
||||
mach/i86
|
||||
mach/i386
|
||||
mach/m68020
|
||||
mach/vc4
|
||||
|
||||
plat
|
||||
plat/cpm
|
||||
plat/pc86
|
||||
plat/linux
|
||||
plat/linux386
|
||||
plat/linux68k
|
||||
plat/rpi
|
||||
|
||||
examples
|
||||
man
|
||||
6
.travis.yml
Normal file
6
.travis.yml
Normal file
@@ -0,0 +1,6 @@
|
||||
before_install:
|
||||
- sudo apt-get install ed lua5.1 liblua5.1-posix1 ninja-build
|
||||
language: c
|
||||
script:
|
||||
- make PREFIX=/tmp/acki -j4
|
||||
|
||||
276
Action
Normal file
276
Action
Normal file
@@ -0,0 +1,276 @@
|
||||
name "System definition"
|
||||
dir first
|
||||
action ack_sys
|
||||
failure "You have to run the shell script first/first"
|
||||
fatal
|
||||
end
|
||||
name "Manual pages"
|
||||
dir man
|
||||
end
|
||||
! name "EM definition"
|
||||
! dir etc
|
||||
! end
|
||||
name "EM definition library"
|
||||
dir util/data
|
||||
end
|
||||
name "C utilities"
|
||||
dir util/cmisc
|
||||
end
|
||||
name "Yacc parser generator"
|
||||
dir util/byacc
|
||||
end
|
||||
name "Flex lexical analyzer generator"
|
||||
dir util/flex
|
||||
action "make firstinstall && make clean"
|
||||
end
|
||||
name "Include files for modules"
|
||||
dir modules/h
|
||||
end
|
||||
name "Modules"
|
||||
dir modules/src
|
||||
indir
|
||||
end
|
||||
! name "LL(1) Parser generator"
|
||||
! dir util/LLgen
|
||||
! action "make firstinstall && make clean"
|
||||
! end
|
||||
name "C preprocessor"
|
||||
dir util/cpp
|
||||
end
|
||||
name "Peephole optimizer libraries"
|
||||
dir modules/src/em_opt
|
||||
end
|
||||
name "ACK object utilities"
|
||||
dir util/amisc
|
||||
end
|
||||
name "Encode/Decode"
|
||||
dir util/misc
|
||||
end
|
||||
name "Shell files in bin"
|
||||
dir util/shf
|
||||
end
|
||||
name "EM assembler"
|
||||
dir util/ass
|
||||
end
|
||||
name "EM Peephole optimizer"
|
||||
dir util/opt
|
||||
end
|
||||
name "EM Global optimizer"
|
||||
dir util/ego
|
||||
indir
|
||||
end
|
||||
name "ACK archiver"
|
||||
dir util/arch
|
||||
end
|
||||
name "Program 'ack'"
|
||||
dir util/ack
|
||||
end
|
||||
name "Bootstrap for backend tables"
|
||||
dir util/cgg
|
||||
end
|
||||
name "Bootstrap for newest form of backend tables"
|
||||
dir util/ncgg
|
||||
end
|
||||
name "Bootstrap for code expanders"
|
||||
dir util/ceg
|
||||
indir
|
||||
end
|
||||
name "LED link editor"
|
||||
dir util/led
|
||||
end
|
||||
name "TOPGEN target optimizer generator"
|
||||
dir util/topgen
|
||||
end
|
||||
name "C frontend"
|
||||
dir lang/cem/cemcom
|
||||
end
|
||||
name "ANSI-C frontend"
|
||||
dir lang/cem/cemcom.ansi
|
||||
end
|
||||
name "ANSI-C preprocessor"
|
||||
dir lang/cem/cpp.ansi
|
||||
end
|
||||
name "ANSI-C header files"
|
||||
dir lang/cem/libcc.ansi
|
||||
end
|
||||
name "LINT C program checker"
|
||||
dir lang/cem/lint
|
||||
end
|
||||
name "EM definition lint-library"
|
||||
action "make lintlib"
|
||||
dir util/data
|
||||
end
|
||||
name "Modules lint libraries"
|
||||
dir modules/src
|
||||
indir "Action.lint"
|
||||
end
|
||||
name "Global optimizer lint libraries"
|
||||
dir util/ego/share
|
||||
action "make lintlib"
|
||||
end
|
||||
name "Pascal frontend"
|
||||
dir lang/pc/comp
|
||||
end
|
||||
name "Basic frontend"
|
||||
dir lang/basic/src
|
||||
end
|
||||
name "Occam frontend"
|
||||
dir lang/occam/comp
|
||||
end
|
||||
name "Modula-2 frontend"
|
||||
dir lang/m2/comp
|
||||
end
|
||||
name "Modula-2 definition modules"
|
||||
dir lang/m2/libm2
|
||||
end
|
||||
name "Modula-2 makefile generator"
|
||||
dir lang/m2/m2mm
|
||||
end
|
||||
name "Fortran to C compiler"
|
||||
dir lang/fortran/comp
|
||||
end
|
||||
name "EM interpreter in C"
|
||||
dir util/int
|
||||
end
|
||||
name "Symbolic debugger"
|
||||
dir util/grind
|
||||
end
|
||||
name "Intel 8086 support"
|
||||
dir mach/i86
|
||||
indir
|
||||
end
|
||||
name "Intel 80286 support for Xenix"
|
||||
dir mach/xenix3
|
||||
indir
|
||||
end
|
||||
name "Intel 80386 support for Xenix 386 System V"
|
||||
dir mach/i386
|
||||
indir
|
||||
end
|
||||
name "MSC6500 support"
|
||||
dir mach/6500
|
||||
indir
|
||||
end
|
||||
name "Motorola 6800 support"
|
||||
dir mach/6800
|
||||
indir
|
||||
end
|
||||
name "Motorola 6805 support"
|
||||
dir mach/6805
|
||||
indir
|
||||
end
|
||||
name "Motorola 6809 support"
|
||||
dir mach/6809
|
||||
indir
|
||||
end
|
||||
name "Intel 8080 support"
|
||||
dir mach/i80
|
||||
indir
|
||||
end
|
||||
name "2-2 Interpreter support"
|
||||
dir mach/em22
|
||||
indir
|
||||
end
|
||||
name "2-4 Interpreter support"
|
||||
dir mach/em24
|
||||
indir
|
||||
end
|
||||
name "4-4 Interpreter support"
|
||||
dir mach/em44
|
||||
indir
|
||||
end
|
||||
name "Motorola 68000 2-4 support"
|
||||
dir mach/m68k2
|
||||
indir
|
||||
end
|
||||
name "Motorola 68000 4-4 support"
|
||||
dir mach/m68k4
|
||||
indir
|
||||
end
|
||||
name "NS16032 support"
|
||||
dir mach/ns
|
||||
indir
|
||||
end
|
||||
name "PDP 11 support"
|
||||
dir mach/pdp
|
||||
indir
|
||||
end
|
||||
name "PMDS support"
|
||||
dir mach/pmds
|
||||
indir
|
||||
end
|
||||
name "PMDS 4/4 support"
|
||||
dir mach/pmds4
|
||||
indir
|
||||
end
|
||||
name "Signetics 2650 support"
|
||||
dir mach/s2650
|
||||
indir
|
||||
end
|
||||
name "Vax 4-4 support"
|
||||
dir mach/vax4
|
||||
indir
|
||||
end
|
||||
name "M68020 System V/68 support"
|
||||
dir mach/m68020
|
||||
indir
|
||||
end
|
||||
name "Sun 3 M68020 support"
|
||||
dir mach/sun3
|
||||
indir
|
||||
end
|
||||
name "Sun 4 SPARC SunOs 4 support"
|
||||
dir mach/sparc
|
||||
system "sparc|sparc_solaris"
|
||||
indir
|
||||
end
|
||||
name "Sun 4 SPARC Solaris support"
|
||||
dir mach/sparc_solaris
|
||||
system "sparc_solaris"
|
||||
indir
|
||||
end
|
||||
name "Sun 2 M68000 support"
|
||||
dir mach/sun2
|
||||
indir
|
||||
end
|
||||
name "Mantra M68000 System V.0 support"
|
||||
dir mach/mantra
|
||||
indir
|
||||
end
|
||||
name "PC Minix support"
|
||||
dir mach/minix
|
||||
indir
|
||||
end
|
||||
name "Atari ST Minix support"
|
||||
dir mach/minixST
|
||||
indir
|
||||
end
|
||||
name "Z80 support"
|
||||
dir mach/z80
|
||||
indir
|
||||
end
|
||||
name "Zilog Z8000 support"
|
||||
dir mach/z8000
|
||||
indir
|
||||
end
|
||||
name "Acorn Archimedes support"
|
||||
dir mach/arm
|
||||
indir
|
||||
end
|
||||
name "Documentation"
|
||||
dir doc
|
||||
end
|
||||
name "Motorola 68000 interpreters"
|
||||
system "m68*|sun*"
|
||||
dir mach/mantra/int
|
||||
end
|
||||
name "Fast compilers"
|
||||
system "m68020|sun3|i386|vax*"
|
||||
dir fast
|
||||
indir
|
||||
end
|
||||
name "Fast cc-compatible C compiler"
|
||||
system "sun3|vax*"
|
||||
dir fcc
|
||||
indir
|
||||
end
|
||||
40
CHANGES
Normal file
40
CHANGES
Normal file
@@ -0,0 +1,40 @@
|
||||
# $Source$
|
||||
# $State$
|
||||
# $Revision$
|
||||
|
||||
6.1pre1
|
||||
|
||||
Threw away the make-based build system, because it just didn't work. Wrote
|
||||
ackbuilder. Many, many little bugfixes and cleanups, too many to remember.
|
||||
|
||||
6.0pre4
|
||||
|
||||
Fixed some minor bit-rotting issues that were preventing compilation on
|
||||
modern Linux systems.
|
||||
|
||||
6.0pre3
|
||||
|
||||
Added the cpm platform. Made some optimisations to the i80 code generator,
|
||||
including getting topgen up and running and adding some peephole optimiser
|
||||
rules. Fixed loads of bugs in ego so that it now works on platforms that
|
||||
support it (pc86 and linux386). Made the floating point work on platforms
|
||||
that support it (pc86 and linux386 again). Made stdint.h work. Lots and lots
|
||||
of bugfixes and tweaks everywhere.
|
||||
|
||||
6.0pre2
|
||||
|
||||
Much simplified the syscall interface by disabling libmon and instead
|
||||
calling the syscalls directly. Disabled the K&R C compiler and libc because
|
||||
it doesn't actually gain us anything and has a high maintenance load --- the
|
||||
ANSI C compiler works fine with K&R C. Adapted the rest of the system to
|
||||
build with the ANSI C compiler. Rewrote the pc86 syscall interface and added
|
||||
linux386 support, using the i386 code generator. Lots and lots of bugfixes
|
||||
and tweaks everywhere.
|
||||
|
||||
6.0pre1
|
||||
|
||||
First working version of the 6.0 release stream. Working frontends: both C
|
||||
compilers, Pascal, Modula-2, Basic and Occam. Working backends: i86. Working
|
||||
platforms: pc86, the very noddy testbed setup that produces floppy disk
|
||||
images.
|
||||
|
||||
32
Copyright
Normal file
32
Copyright
Normal file
@@ -0,0 +1,32 @@
|
||||
Copyright (c) 1987, 1990, 1993, 2005 Vrije Universiteit, Amsterdam, The Netherlands.
|
||||
All rights reserved.
|
||||
|
||||
Redistribution and use of the Amsterdam Compiler Kit in source and
|
||||
binary forms, with or without modification, are permitted provided
|
||||
that the following conditions are met:
|
||||
|
||||
* Redistributions of source code must retain the above copyright
|
||||
notice, this list of conditions and the following disclaimer.
|
||||
|
||||
* Redistributions in binary form must reproduce the above
|
||||
copyright notice, this list of conditions and the following
|
||||
disclaimer in the documentation and/or other materials provided
|
||||
with the distribution.
|
||||
|
||||
* Neither the name of Vrije Universiteit nor the names of the
|
||||
software authors or contributors may be used to endorse or
|
||||
promote products derived from this software without specific
|
||||
prior written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS, AUTHORS, AND
|
||||
CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
|
||||
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
||||
IN NO EVENT SHALL VRIJE UNIVERSITEIT OR ANY AUTHORS OR CONTRIBUTORS BE
|
||||
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||||
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
||||
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
||||
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
104
Makefile
Normal file
104
Makefile
Normal file
@@ -0,0 +1,104 @@
|
||||
# ======================================================================= #
|
||||
# ACK CONFIGURATION #
|
||||
# (Edit this before building) #
|
||||
# ======================================================================= #
|
||||
|
||||
# What platform to build for by default?
|
||||
|
||||
DEFAULT_PLATFORM = pc86
|
||||
|
||||
# Where should the ACK put its temporary files?
|
||||
|
||||
ACK_TEMP_DIR = /tmp
|
||||
|
||||
# Where is the ACK going to be installed, eventually? If you don't want to
|
||||
# install it and just want to run the ACK from the build directory
|
||||
# (/tmp/ack-build/staging, by default), leave this as $(INSDIR).
|
||||
|
||||
#PREFIX = /usr/local
|
||||
PREFIX = $(INSDIR)
|
||||
|
||||
# Where do you want to put the object files used when building?
|
||||
|
||||
BUILDDIR = $(ACK_TEMP_DIR)/ack-build
|
||||
|
||||
# What build flags do you want to use?
|
||||
|
||||
CFLAGS = -g
|
||||
LDFLAGS =
|
||||
|
||||
# Various commands.
|
||||
|
||||
AR = ar
|
||||
CC = gcc
|
||||
|
||||
# Which build system to use; use 'ninja' or 'make' (in lower case). Leave
|
||||
# blank to autodetect.
|
||||
|
||||
BUILDSYSTEM =
|
||||
|
||||
# Build flags for ninja.
|
||||
|
||||
NINJAFLAGS =
|
||||
|
||||
# Build flags for make.
|
||||
|
||||
MAKEFLAGS = -r
|
||||
|
||||
# ======================================================================= #
|
||||
# END OF CONFIGURATION #
|
||||
# ======================================================================= #
|
||||
|
||||
# You shouldn't need to change anything below this point unless you are
|
||||
# actually developing ACK.
|
||||
|
||||
OBJDIR = $(abspath $(BUILDDIR)/obj)
|
||||
BINDIR = $(abspath $(BUILDDIR)/bin)
|
||||
LIBDIR = $(abspath $(BUILDDIR)/lib)
|
||||
INCDIR = $(abspath $(BUILDDIR)/include)
|
||||
INSDIR = $(abspath $(BUILDDIR)/staging)
|
||||
|
||||
PLATIND = $(INSDIR)/share/ack
|
||||
PLATDEP = $(INSDIR)/lib/ack
|
||||
|
||||
MAKECMDGOALS ?= +ack
|
||||
BUILD_FILES = $(shell find * -name '*.lua')
|
||||
|
||||
ifneq ($(shell which ninja),)
|
||||
BUILDSYSTEM = ninja
|
||||
BUILDFLAGS = $(NINJAFLAGS)
|
||||
else
|
||||
BUILDSYSTEM = make
|
||||
BUILDFLAGS = $(MAKEFLAGS)
|
||||
endif
|
||||
|
||||
ifneq ($(findstring +, $(MAKECMDGOALS)),)
|
||||
|
||||
$(MAKECMDGOALS): $(BUILDDIR)/build.$(BUILDSYSTEM)
|
||||
@$(BUILDSYSTEM) $(BUILDFLAGS) -f $^ $(MAKECMDGOALS)
|
||||
|
||||
endif
|
||||
|
||||
$(BUILDDIR)/build.$(BUILDSYSTEM): first/ackbuilder.lua Makefile $(BUILD_FILES)
|
||||
@mkdir -p $(BUILDDIR)
|
||||
@lua5.1 first/ackbuilder.lua \
|
||||
first/build.lua build.lua \
|
||||
--$(BUILDSYSTEM) \
|
||||
OBJDIR=$(OBJDIR) \
|
||||
BINDIR=$(BINDIR) \
|
||||
LIBDIR=$(LIBDIR) \
|
||||
INCDIR=$(INCDIR) \
|
||||
INSDIR=$(INSDIR) \
|
||||
PLATIND=$(PLATIND) \
|
||||
PLATDEP=$(PLATDEP) \
|
||||
AR=$(AR) \
|
||||
CC=$(CC) \
|
||||
> $(BUILDDIR)/build.$(BUILDSYSTEM)
|
||||
|
||||
install:
|
||||
mkdir -p $(PREFIX)
|
||||
tar cf - -C $(INSDIR) . | tar xvf - -C $(PREFIX)
|
||||
|
||||
clean:
|
||||
@rm -rf $(BUILDDIR)
|
||||
|
||||
45
NEW
Normal file
45
NEW
Normal file
@@ -0,0 +1,45 @@
|
||||
This is ACK distribution 5.6.
|
||||
|
||||
This is a minor update of 5.5, the last public release from Vrije University.
|
||||
Only minor changes have been made to make the system build on modern
|
||||
platforms.
|
||||
|
||||
The NEW document from the previous release follows.
|
||||
|
||||
David Given
|
||||
dg@cowlark.com 2005-06-24
|
||||
|
||||
-----------------------------------------------------------------------------
|
||||
|
||||
The only addition with respect to the 5th ACK distribution is the support
|
||||
for Solaris 2 on SPARCs. It also contains many bug fixes.
|
||||
|
||||
Notes for the 5th ACK distribution:
|
||||
|
||||
It is not wise to mix files created by the previous version of the Kit
|
||||
with files belonging to this version, although that might sometimes work.
|
||||
Many problems with the previous distribution have been fixed.
|
||||
The major additions are:
|
||||
|
||||
- an ANSI C compiler
|
||||
- a LINT C program checker, both non-ansi and ansi
|
||||
- an Intel 80386 back-end
|
||||
- a SPARC code expander
|
||||
- a source level debugger for Pascal, Modula-2, C, and ANSI C
|
||||
- an Acorn Archimedes back-end
|
||||
- code-expanders for VAX, Intel 80386 and Motorola M68020 processors,
|
||||
and very fast Pascal, Modula-2, ANSI C, and C compilers constructed
|
||||
using these code expanders
|
||||
- a cc-compatible very fast C compiler for SUN-3 and VAX.
|
||||
|
||||
Also added, but not part of the Kit proper are
|
||||
- flex: a lexical analyzer generator
|
||||
- byacc: yacc-clone by UCB
|
||||
- f2c: a Fortran to C compiler by AT&T.
|
||||
|
||||
See the ACK installation manual for their copyright notices.
|
||||
|
||||
--
|
||||
Ceriel Jacobs, Dept. of Mathematics and Computer Science, Vrije Universiteit,
|
||||
De Boelelaan 1081a, 1081 HV Amsterdam, The Netherlands
|
||||
Email: ceriel@cs.vu.nl Fax: +31 20 6427705
|
||||
182
README
Normal file
182
README
Normal file
@@ -0,0 +1,182 @@
|
||||
THE AMSTERDAM COMPILER KIT V6.1pre1
|
||||
===================================
|
||||
|
||||
© 1987-2005 Vrije Universiteit, Amsterdam
|
||||
2016-08-02
|
||||
|
||||
|
||||
INTRODUCTION
|
||||
============
|
||||
|
||||
The Amsterdam Compiler Kit is a complete compiler toolchain consisting of
|
||||
front end compilers for a number of different languages, code generators,
|
||||
support libraries, and all the tools necessary to go from source code to
|
||||
executable on any of the platforms it supports.
|
||||
|
||||
This is an early prerelease of the apocryphal version 6.1 release. Not a
|
||||
lot is supported, the build mechanism needs work, and a lot of things are
|
||||
probably broken. However, what's there should be sufficient to get things
|
||||
done and to evaluate how the full 6.1 release should work.
|
||||
|
||||
|
||||
SUPPORT
|
||||
=======
|
||||
|
||||
Languages:
|
||||
|
||||
ANSI C, Pascal, Modula 2, Basic. K&R is supported via the ANSI C compiler.
|
||||
|
||||
Platforms:
|
||||
|
||||
pc86 produces bootable floppy disk images for 8086 PCs
|
||||
linux386 produces ELF executables for PC Linux systems
|
||||
linux68k produces ELF executables for m68020 Linux systems
|
||||
cpm produces i80 CP/M .COM files
|
||||
rpi produces Raspberry Pi GPU binaries
|
||||
|
||||
|
||||
INSTALLATION
|
||||
============
|
||||
|
||||
The version 5.0 build mechanism has been completely rewritten. Installation
|
||||
ought to be fairly straightforward.
|
||||
|
||||
Requirements:
|
||||
|
||||
- an ANSI C compiler. This defaults to gcc. You can change this by setting
|
||||
the CC make variable.
|
||||
|
||||
- flex and yacc.
|
||||
|
||||
- GNU make.
|
||||
|
||||
- Lua 5.1 and the luaposix library (used by the build system).
|
||||
|
||||
- (optionally) ninja; if you've got this, this will be autodetected and give
|
||||
you faster builds.
|
||||
|
||||
- about 40MB free in /tmp (or some other temporary directory).
|
||||
|
||||
- about 6MB in the target directory.
|
||||
|
||||
Instructions:
|
||||
|
||||
- edit the Makefile. There's a small section at the top where you can change
|
||||
the configuration. Probably the only one you may want to edit is PREFIX,
|
||||
which changes where the ACK installs to.
|
||||
|
||||
- Run:
|
||||
|
||||
make
|
||||
|
||||
...from the command line. This will do the build.
|
||||
|
||||
The make system is fully parallelisable. If you have a multicore system,
|
||||
install ninja and it'll use all your cores. If you don't have ninja, you
|
||||
can still use make for parallel builds with:
|
||||
|
||||
make MAKEFLAGS='-r -j8' # or however many cores you have
|
||||
|
||||
...but frankly, I recommend ninja.
|
||||
|
||||
- Run:
|
||||
|
||||
sudo make install
|
||||
|
||||
...from the command line. This will install the ACK in your PREFIX
|
||||
directory (by default, /usr/local).
|
||||
|
||||
The ACK should now be ready to use.
|
||||
|
||||
|
||||
USAGE
|
||||
=====
|
||||
|
||||
Currently I haven't sorted out all the documentation --- it's supplied in the
|
||||
distribution, but not all of it gets installed yet --- so here is a quickstart
|
||||
guide.
|
||||
|
||||
The main command to use is 'ack'. This invokes the compiler and the linker.
|
||||
Some useful options include:
|
||||
|
||||
-m<platform> build for the specified platform
|
||||
-o <file> specifies the output file
|
||||
-c produce a .o file
|
||||
-c.s produce a .s assembly file
|
||||
-O enable optimisation (optimisation levels go up to 6)
|
||||
-ansi compile ANSI C (when using the C compiler)
|
||||
-v be more verbose (repeatable)
|
||||
<file> build file
|
||||
|
||||
ack figures out which language to use from the file extension:
|
||||
|
||||
.c C (ANSI or K&R)
|
||||
.b Basic
|
||||
.mod Modula-2
|
||||
.ocm Occam 1
|
||||
.p Pascal
|
||||
.o object files
|
||||
.s assembly files
|
||||
.e ACK intermediate code assembly files
|
||||
|
||||
For further information, see the man page (which actually does get
|
||||
installed, but is rather out of date).
|
||||
|
||||
There are some (known working) example programs in the 'examples' directory.
|
||||
A sample command line is:
|
||||
|
||||
ack -mlinux386 -O examples/paranoia.c
|
||||
|
||||
|
||||
|
||||
GOTCHAS
|
||||
=======
|
||||
|
||||
There are some things you should be aware of.
|
||||
|
||||
- Look at plat/<PLATFORMNAME>/README for information about the supported
|
||||
platforms.
|
||||
|
||||
- The library support is fairly limited; for C, it's at roughly the ANSI C
|
||||
level, and for the other languages it's similar.
|
||||
|
||||
- When compiling languages other than C, the ACK will usually look at the
|
||||
first character of the file. If it's a #, then the file will be run through
|
||||
the C preprocessor anyway.
|
||||
|
||||
- BSD systems may need to up the number of file descriptors (e.g.
|
||||
'ulimit -n 200') before the ACK will compile.
|
||||
|
||||
- The ACK uses its own .o format. You won't be able to mix the ACK's object
|
||||
files and another compiler's.
|
||||
|
||||
- The distribution contains *everything*, including the weird, ancient,
|
||||
archaic stuff that doesn't work any more and never will, such as the int EM
|
||||
interpreter and the assembler-linkers. Only some of it builds. Look for
|
||||
build.lua files.
|
||||
|
||||
DISCLAIMER
|
||||
==========
|
||||
|
||||
The ACK is mature, well-tested software, but the environment in which it was
|
||||
developed for and tested under is rather different from that available on
|
||||
today's machines. There will probably be little in the way of logical bugs,
|
||||
but there may be many compilation and API bugs.
|
||||
|
||||
If you wish to use the ACK, *please* join the mailing list. We are interested
|
||||
in any reports of success and particularly, failure. If it does fail for you,
|
||||
we would love to know why, in as much detail as possible. Bug fixes are even
|
||||
more welcome.
|
||||
|
||||
The ACK is licensed under a BSD-like license. Please see the 'Copyright' file
|
||||
for the full text.
|
||||
|
||||
You can find the mailing list on the project's web site:
|
||||
|
||||
http://tack.sourceforge.net/
|
||||
|
||||
Please enjoy.
|
||||
|
||||
David Given (dtrg on Sourceforge)
|
||||
dg@cowlark.com
|
||||
2016-08-02
|
||||
20
TODO
Normal file
20
TODO
Normal file
@@ -0,0 +1,20 @@
|
||||
# $Source$
|
||||
# $State$
|
||||
|
||||
This file contains things that I have noticed need fixing, but have not
|
||||
yet been fixed. Everything here should be reasonably low priority. Some
|
||||
bugs have been bodged around to make things work; these are all marked in
|
||||
the source with FIXME tags.
|
||||
|
||||
|
||||
* util/int needs to be rewritten to emulate sgtty with termios; look for
|
||||
FIXMEs.
|
||||
|
||||
* mach/i80/dl/nascom.c needs to be rewritten to use termios, not sgtty.
|
||||
|
||||
|
||||
# Revision history
|
||||
# $Log$
|
||||
# Revision 2.1 2005-06-24 23:20:41 dtrg
|
||||
# Added some new readmes at the top level.
|
||||
#
|
||||
146
TakeAction
Executable file
146
TakeAction
Executable file
@@ -0,0 +1,146 @@
|
||||
#!/bin/sh
|
||||
|
||||
case $# in
|
||||
0) PAR='make install && make clean' ; CMD=Action ;;
|
||||
1) PAR="$1" ; CMD=Action ;;
|
||||
2) PAR="$1" ; CMD="$2" ;;
|
||||
*) echo Syntax: "$0" [command [file]] ; exit 1 ;;
|
||||
esac
|
||||
if test -r "$CMD"
|
||||
then :
|
||||
else
|
||||
case "$CMD" in
|
||||
Action) echo No Action file present ;;
|
||||
*) echo No Action file "($CMD)" present ;;
|
||||
esac
|
||||
fi
|
||||
case $0 in
|
||||
/*) THISFILE=$0
|
||||
;;
|
||||
*) if [ -f $0 ]
|
||||
then
|
||||
THISFILE=`pwd`/$0
|
||||
else
|
||||
THISFILE=$0
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
SYS=
|
||||
RETC=0
|
||||
{ while read LINE
|
||||
do
|
||||
eval set $LINE
|
||||
case x"$1" in
|
||||
x!*) ;;
|
||||
xname) SYS="$2"
|
||||
ACTION='$PAR'
|
||||
DIR=.
|
||||
FM=no
|
||||
FAIL='Failed for $SYS, see $DIR/Out'
|
||||
SUCC='$SYS -- done'
|
||||
ATYPE=
|
||||
FATAL=no
|
||||
DOIT=yes
|
||||
;;
|
||||
xfatal) FATAL=yes ;;
|
||||
xaction|xindir) case x$ATYPE in
|
||||
x) ACTION=$2 ; ATYPE=$1
|
||||
case $ATYPE$FM in
|
||||
indirno) FAIL='Failed for $SYS' ;;
|
||||
esac
|
||||
;;
|
||||
*) echo Already specified an $ATYPE for this name
|
||||
RETC=65 ;;
|
||||
esac ;;
|
||||
xfailure) FM=yes
|
||||
FAIL="$2" ;;
|
||||
xsuccess) SUCC="$2" ;;
|
||||
xdir) DIR="$2" ;;
|
||||
xsystem) PAT="$2"
|
||||
oIFS=$IFS
|
||||
IFS="|"
|
||||
eval set $2
|
||||
case x`ack_sys` in
|
||||
x$1|x$2|x$3|x$4|x$5|x$6|x$7) ;;
|
||||
*) echo "Sorry, $SYS can only be made on $PAT systems"
|
||||
DOIT=no
|
||||
;;
|
||||
esac
|
||||
IFS=$oIFS
|
||||
;;
|
||||
xend) case $DOIT in
|
||||
no) continue ;;
|
||||
esac
|
||||
case x$SYS in
|
||||
x) echo Missing name line; RETC=65 ;;
|
||||
*) if test -d $DIR
|
||||
then (
|
||||
cd $DIR
|
||||
X=
|
||||
case $ATYPE in
|
||||
indir)
|
||||
if $THISFILE "$PAR" $ACTION
|
||||
then eval echo $SUCC
|
||||
else RETC=2 ; eval echo $FAIL
|
||||
fi ;;
|
||||
*)
|
||||
case "$ACTION" in
|
||||
'$PAR')
|
||||
ACTION="$PAR"
|
||||
;;
|
||||
*) ;;
|
||||
esac
|
||||
if [ -f No$CMD ]
|
||||
then
|
||||
x=`cat No$CMD`
|
||||
if [ "$ACTION" = "$x" ]
|
||||
then
|
||||
ACTION='echo "No actions performed, No$CMD file present"'
|
||||
SUCC='$SYS -- skipped'
|
||||
fi
|
||||
fi
|
||||
if eval "{ $ACTION ; } >Out 2>&1 </dev/null"
|
||||
then eval echo $SUCC
|
||||
if [ "$SUCC" = '$SYS -- skipped' ]
|
||||
then :
|
||||
else echo "$ACTION" > No$CMD 2>/dev/null
|
||||
fi
|
||||
else RETC=1 ; X=: ; eval echo $FAIL
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
(echo ------- `pwd`
|
||||
cat Out
|
||||
$X rm -f Out
|
||||
) 2>/dev/null 1>&- 1>&3
|
||||
exit $RETC
|
||||
)
|
||||
case $? in
|
||||
0) ;;
|
||||
*) case $RETC in
|
||||
0) RETC=$? ;;
|
||||
esac ;;
|
||||
esac
|
||||
else
|
||||
echo Directory $DIR for $SYS is inaccessible
|
||||
RETC=66
|
||||
fi ;;
|
||||
esac
|
||||
case $FATAL$RETC in
|
||||
yes0) ;;
|
||||
yes*) echo Fatal error, installation stopped.
|
||||
exit $RETC ;;
|
||||
esac
|
||||
SYS=
|
||||
;;
|
||||
*) echo Unknown keyword "$1"
|
||||
RETC=67 ;;
|
||||
esac
|
||||
done
|
||||
exit $RETC
|
||||
} <$CMD
|
||||
RETX=$?
|
||||
case $RETX in
|
||||
0) exit $RETC ;;
|
||||
*) exit $RETX ;;
|
||||
esac
|
||||
8
bin/cc-and-mkdep.ack
Executable file
8
bin/cc-and-mkdep.ack
Executable file
@@ -0,0 +1,8 @@
|
||||
#!/bin/sh
|
||||
: '$Id$'
|
||||
|
||||
: Compile and make dependencies. First argument is the file on which the
|
||||
: dependencies must be produced. This version is for ACK.
|
||||
n=$1
|
||||
shift
|
||||
exec $CC -Rcem-A$n -Rcem-m $*
|
||||
21
bin/cc-and-mkdep.all
Executable file
21
bin/cc-and-mkdep.all
Executable file
@@ -0,0 +1,21 @@
|
||||
#!/bin/sh
|
||||
: '$Id$'
|
||||
|
||||
: Compile and make dependencies. First argument is the file on which the
|
||||
: dependencies must be produced. This version is a generic one that should
|
||||
: work for all Unix systems.
|
||||
n=$1
|
||||
shift
|
||||
cpp_args=
|
||||
for i in $*
|
||||
do
|
||||
case $i in
|
||||
-I*|-D*|-U*) cpp_args="$cpp_args $i"
|
||||
;;
|
||||
-*) ;;
|
||||
*) cpp_args="$cpp_args $i"
|
||||
;;
|
||||
esac
|
||||
done
|
||||
$UTIL_HOME/lib.bin/cpp -d -m $cpp_args > $n 2>/dev/null
|
||||
exec $CC $*
|
||||
8
bin/cc-and-mkdep.sun
Executable file
8
bin/cc-and-mkdep.sun
Executable file
@@ -0,0 +1,8 @@
|
||||
#!/bin/sh
|
||||
: '$Id$'
|
||||
|
||||
: Compile and make dependencies. First argument is the file on which the
|
||||
: dependencies must be produced. This version is for the SUN cc.
|
||||
n=$1
|
||||
shift
|
||||
exec $CC -Qpath $UTIL_HOME/lib.bin -Qoption cpp -d$n -Qoption cpp -m $*
|
||||
19
bin/do_deps
Executable file
19
bin/do_deps
Executable file
@@ -0,0 +1,19 @@
|
||||
#!/bin/sh
|
||||
: '$Id$'
|
||||
|
||||
: Produce dependencies for all argument files
|
||||
|
||||
for i in $*
|
||||
do
|
||||
n=`basename $i .c`
|
||||
if [ -f $n.dep ]
|
||||
then
|
||||
:
|
||||
else
|
||||
echo $n.'$(SUF): '$i > $n.dep
|
||||
echo " head -5 $n.dep > $n.dp1" >> $n.dep
|
||||
echo ' CC="$(CC)" UTIL_HOME="$(UTIL_HOME)" $(CC_AND_MKDEP) '$n.dp2 '$(CFLAGS)' -c $i >> $n.dep
|
||||
echo " cat $n.dp1 $n.dp2 > $n.dep" >> $n.dep
|
||||
echo " rm -f $n.dp1 $n.dp2" >> $n.dep
|
||||
fi
|
||||
done
|
||||
48
bin/do_resolve
Executable file
48
bin/do_resolve
Executable file
@@ -0,0 +1,48 @@
|
||||
#!/bin/sh
|
||||
: '$Id$'
|
||||
|
||||
: Resolve name clashes in the files on the argument list. If these
|
||||
: files reside in another directory, a copy is made in the current
|
||||
: directory. If not, it is overwritten. Never do this in a source
|
||||
: directory! A list of the new files is produced on standard output.
|
||||
|
||||
UTIL_BIN=$UTIL_HOME/bin
|
||||
|
||||
trap "rm -f tmp$$ a.out nmclash.* longnames clashes" 0 1 2 3 15
|
||||
|
||||
: first find out if we have to resolve problems with identifier significance.
|
||||
|
||||
cat > nmclash.c <<'EOF'
|
||||
/* Accepted if many characters of long names are significant */
|
||||
abcdefghijklmnopr() { }
|
||||
abcdefghijklmnopq() { }
|
||||
main() { }
|
||||
EOF
|
||||
if $CC nmclash.c
|
||||
then : no identifier significance problem
|
||||
for i in $*
|
||||
do
|
||||
echo $i
|
||||
done
|
||||
else
|
||||
$UTIL_BIN/prid -l7 $* > longnames
|
||||
|
||||
: remove code generating routines from the clashes list.
|
||||
: code generating routine names start with C_.
|
||||
: also remove names starting with flt_.
|
||||
|
||||
sed '/^C_/d' < longnames | sed '/^flt_/d' > tmp$$
|
||||
$UTIL_BIN/cclash -c -l7 tmp$$ > clashes
|
||||
for i in $*
|
||||
do
|
||||
$UTIL_BIN/cid -Fclashes < $i > tmp$$
|
||||
n=`basename $i .xxx`
|
||||
if cmp -s $n tmp$$
|
||||
then
|
||||
rm -f tmp$$
|
||||
else
|
||||
mv tmp$$ $n
|
||||
fi
|
||||
echo $n
|
||||
done
|
||||
fi
|
||||
13
bin/lint-lib.ack
Executable file
13
bin/lint-lib.ack
Executable file
@@ -0,0 +1,13 @@
|
||||
#!/bin/sh
|
||||
: '$Id$'
|
||||
|
||||
: Create a lint library file. The name of the library file is constructed
|
||||
: from the first argument. The second argument indicates the directory where
|
||||
: the result is to be placed. This version is for ACK lint.
|
||||
|
||||
n=$1
|
||||
shift
|
||||
d=$1
|
||||
shift
|
||||
lint -L$n $*
|
||||
mv $n.llb $d
|
||||
13
bin/lint-lib.unix
Executable file
13
bin/lint-lib.unix
Executable file
@@ -0,0 +1,13 @@
|
||||
#!/bin/sh
|
||||
: '$Id$'
|
||||
|
||||
: Create a lint library file. The name of the library file is constructed
|
||||
: from the first argument. The second argument indicates the directory where
|
||||
: the result is to be placed. This version is for Unix lint.
|
||||
|
||||
n=$1
|
||||
shift
|
||||
d=$1
|
||||
shift
|
||||
/usr/bin/lint -C$n $*
|
||||
mv llib-l$n.ln $d
|
||||
20
bin/mk_manpage
Executable file
20
bin/mk_manpage
Executable file
@@ -0,0 +1,20 @@
|
||||
#!/bin/sh
|
||||
|
||||
num=`expr $1 : '.*\.\([1-8]\)'`
|
||||
|
||||
if [ -d $2/man ] ; then : ; else mkdir $2/man ; fi
|
||||
if [ -f $2/man/head ] ; then : ; else cat > $2/man/head <<'EOF'
|
||||
.rn TH yy
|
||||
.de TH
|
||||
.di zz
|
||||
.yy "\\$1" "\\$2" "\\$3" "\\$4"
|
||||
.ds ]W 5th ACK distribution
|
||||
.ds ]D Amsterdam Compiler Kit
|
||||
.ds ]L "\\$3
|
||||
.di
|
||||
.rm zz
|
||||
..
|
||||
EOF
|
||||
fi
|
||||
if [ -d $2/man/man$num ] ; then : ; else mkdir $2/man/man$num ; fi
|
||||
cat $2/man/head $1 | sed "s!TARGETHOME!$2!" > $2/man/man$num/`expr //$1 : '.*/\([^/]*\)'`
|
||||
9
bin/rm_deps
Executable file
9
bin/rm_deps
Executable file
@@ -0,0 +1,9 @@
|
||||
#!/bin/sh
|
||||
: $Id$
|
||||
|
||||
: remove dependencies from a makefile, write result on standard output.
|
||||
: we cannot do this directly in a makefile because some make versions
|
||||
: have # start a comment, always.
|
||||
|
||||
sed -e '/^#DEPENDENCIES/,$d' $1
|
||||
echo '#DEPENDENCIES'
|
||||
38
build.lua
Normal file
38
build.lua
Normal file
@@ -0,0 +1,38 @@
|
||||
vars.cflags = {
|
||||
"-g", "-O"
|
||||
}
|
||||
vars.ackcflags = {
|
||||
"-O6"
|
||||
}
|
||||
vars.plats = {
|
||||
"cpm",
|
||||
"linux386",
|
||||
"linux68k",
|
||||
"pc86",
|
||||
"rpi",
|
||||
}
|
||||
|
||||
local plat_packages = {}
|
||||
for _, p in ipairs(vars.plats) do
|
||||
plat_packages[#plat_packages+1] = "plat/"..p.."+pkg"
|
||||
end
|
||||
|
||||
installable {
|
||||
name = "ack",
|
||||
map = {
|
||||
"lang/basic/src+pkg",
|
||||
"lang/cem/cemcom.ansi+pkg",
|
||||
"lang/m2/comp+pkg",
|
||||
"lang/pc/comp+pkg",
|
||||
"util/ack+pkg",
|
||||
"util/amisc+pkg",
|
||||
"util/arch+pkg",
|
||||
"util/ego+pkg",
|
||||
"util/led+pkg",
|
||||
"util/misc+pkg",
|
||||
"util/opt+pkg",
|
||||
"examples+pkg",
|
||||
plat_packages
|
||||
}
|
||||
}
|
||||
|
||||
71
config.pm
Normal file
71
config.pm
Normal file
@@ -0,0 +1,71 @@
|
||||
-- ======================================================================= --
|
||||
-- ACK CONFIGURATION --
|
||||
-- (Edit this before building) --
|
||||
-- ======================================================================= --
|
||||
|
||||
-- What platform to build for by default?
|
||||
|
||||
DEFAULT_PLATFORM = "pc86"
|
||||
|
||||
-- Where should the ACK put its temporary files?
|
||||
|
||||
ACK_TEMP_DIR = "/tmp"
|
||||
|
||||
-- Where is the ACK going to be installed, eventually?
|
||||
|
||||
PREFIX = "/tmp/ack-temp/staging"
|
||||
|
||||
-- ======================================================================= --
|
||||
-- BROKEN ACK CONFIGURATION --
|
||||
-- (Currently not editable) --
|
||||
-- ======================================================================= --
|
||||
|
||||
-- FIXME: the following two variables must be set to their Minix variants
|
||||
-- due to hard-coded references in the descr files.
|
||||
|
||||
-- Name of the platform-independent library directory; 'share' on modern
|
||||
-- systems, 'lib' on Minix-like systems.
|
||||
|
||||
PLATIND = "lib"
|
||||
|
||||
-- Name of the platform-dependent library directory; 'lib' on modern
|
||||
-- systems, 'lib.bin' on Minix-like systems.
|
||||
|
||||
PLATDEP = "lib.bin"
|
||||
|
||||
-- ======================================================================= --
|
||||
-- BUILD SYSTEM CONFIGURATION --
|
||||
-- (Not user servicable) --
|
||||
-- ======================================================================= --
|
||||
|
||||
-- Absolute path to the ACK source directory.
|
||||
|
||||
ROOTDIR = posix.getcwd().."/"
|
||||
|
||||
-- Temporary directory used during the build process.
|
||||
|
||||
TEMPDIR = "/tmp/ack-temp/"
|
||||
|
||||
-- Directory in which dynamically generated header files will go during
|
||||
-- the build process.
|
||||
|
||||
HEADERDIR = TEMPDIR.."headers/"
|
||||
|
||||
-- Directory in which tools used by the build process but which not actually
|
||||
-- deployed with the ACK will go.
|
||||
|
||||
TOOLDIR = TEMPDIR.."tools/"
|
||||
|
||||
-- Directory in which the libraries used to build the ACK tools but which are
|
||||
-- not actually deployed with the ACK will go.
|
||||
|
||||
LIBDIR = TEMPDIR.."lib/"
|
||||
|
||||
-- Staging area where the installation will be built before actually copying
|
||||
-- it.
|
||||
|
||||
BINDIR = TEMPDIR.."staging/"
|
||||
|
||||
-- Directory that the pm cache goes in.
|
||||
|
||||
pm.intermediate_cache_dir = TEMPDIR.."pmcache/"
|
||||
1893
doc/6500.doc
Normal file
1893
doc/6500.doc
Normal file
File diff suppressed because it is too large
Load Diff
1077
doc/LLgen/LLgen.n
Normal file
1077
doc/LLgen/LLgen.n
Normal file
File diff suppressed because it is too large
Load Diff
54
doc/LLgen/LLgen.refs
Normal file
54
doc/LLgen/LLgen.refs
Normal file
@@ -0,0 +1,54 @@
|
||||
%T An ALL(1) Compiler Generator
|
||||
%A D. R. Milton
|
||||
%A L. W. Kirchhoff
|
||||
%A B. R. Rowland
|
||||
%B Proc. of the SIGPLAN '79 Symposium on Compiler Construction
|
||||
%D August 1979
|
||||
%J SIGPLAN Notices
|
||||
%N 8
|
||||
%P 152-157
|
||||
%V 14
|
||||
|
||||
%T Lex - A Lexical Analyser Generator
|
||||
%A M. E. Lesk
|
||||
%I Bell Laboratories
|
||||
%D October 1975
|
||||
%C Murray Hill, New Jersey
|
||||
%R Comp. Sci. Tech. Rep. No. 39
|
||||
|
||||
%T Yacc: Yet Another Compiler Compiler
|
||||
%A S. C. Johnson
|
||||
%I Bell Laboratories
|
||||
%D 1975
|
||||
%C Murray Hill, New Jersey
|
||||
%R Comp. Sci. Tech. Rep. No. 32
|
||||
|
||||
%T The C Programming Language
|
||||
%A B. W. Kernighan
|
||||
%A D. M. Ritchie
|
||||
%I Prentice-Hall, Inc.
|
||||
%C Englewood Cliffs, New Jersey
|
||||
%D 1978
|
||||
|
||||
%A M. Griffiths
|
||||
%T LL(1) Grammars and Analysers
|
||||
%E F. L. Bauer and J. Eickel
|
||||
%B Compiler Construction, An Advanced Course
|
||||
%I Springer-Verlag
|
||||
%C New York, N.Y.
|
||||
%D 1974
|
||||
|
||||
%T Make - A Program for Maintaining Computer Programs
|
||||
%A S. I. Feldman
|
||||
%J Software - Practice and Experience
|
||||
%V 10
|
||||
%N 8
|
||||
%P 255-265
|
||||
%D August 1979
|
||||
|
||||
%T Methods for the Automatic Construction of Error Correcting Parsers
|
||||
%A J. R\*:ohrich
|
||||
%J Acta Informatica
|
||||
%V 13
|
||||
%P 115-139
|
||||
%D 1980
|
||||
2712
doc/LLgen/LLgen_NCER.n
Normal file
2712
doc/LLgen/LLgen_NCER.n
Normal file
File diff suppressed because it is too large
Load Diff
15
doc/LLgen/Makefile
Normal file
15
doc/LLgen/Makefile
Normal file
@@ -0,0 +1,15 @@
|
||||
# $Id$
|
||||
|
||||
GRAP=grap
|
||||
PIC=pic
|
||||
EQN=eqn
|
||||
REFER=refer
|
||||
TBL=tbl
|
||||
|
||||
all: ../LLgen.doc ../LLgen_NCER.doc
|
||||
|
||||
../LLgen.doc: LLgen.n LLgen.refs
|
||||
$(REFER) -sA+T -p LLgen.refs LLgen.n | $(EQN) | $(TBL) > $@
|
||||
|
||||
../LLgen_NCER.doc: LLgen_NCER.n
|
||||
$(GRAP) LLgen_NCER.n | pic | eqn > $@
|
||||
20
doc/LLgen/proto.make
Normal file
20
doc/LLgen/proto.make
Normal file
@@ -0,0 +1,20 @@
|
||||
# $Id$
|
||||
|
||||
#PARAMS do not remove this line!
|
||||
|
||||
SRC_DIR = $(SRC_HOME)/doc/LLgen
|
||||
|
||||
GRAP=grap
|
||||
PIC=pic
|
||||
EQN=eqn
|
||||
REFER=refer
|
||||
TBL=tbl
|
||||
|
||||
all: $(TARGET_HOME)/doc/LLgen.doc $(TARGET_HOME)/doc/LLgen_NCER.doc
|
||||
|
||||
$(TARGET_HOME)/doc/LLgen.doc: $(SRC_DIR)/LLgen.n $(SRC_DIR)/LLgen.refs
|
||||
$(REFER) -sA+T -p $(SRC_DIR)/LLgen.refs $(SRC_DIR)/LLgen.n | $(EQN) | $(TBL) > $@
|
||||
|
||||
$(TARGET_HOME)/doc/LLgen_NCER.doc: $(SRC_DIR)/LLgen_NCER.n
|
||||
$(GRAP) $(SRC_DIR)/LLgen_NCER.n | pic | eqn > $@
|
||||
|
||||
82
doc/Makefile
Normal file
82
doc/Makefile
Normal file
@@ -0,0 +1,82 @@
|
||||
# $Id$
|
||||
|
||||
# This Makefile is not supposed to be used in the doc source directory.
|
||||
# Instead, it is supposed to be copied to the target doc directory.
|
||||
|
||||
SUF=dit
|
||||
PRINT=dis
|
||||
NROFF=troff
|
||||
MS=-ms
|
||||
OPR=dip
|
||||
|
||||
RESFILES= \
|
||||
toolkit.$(SUF) install.$(SUF) em.$(SUF) ack.$(SUF) v7bugs.$(SUF) \
|
||||
peep.$(SUF) cg.$(SUF) ncg.$(SUF) regadd.$(SUF) LLgen.$(SUF) \
|
||||
basic.$(SUF) crefman.$(SUF) pascal.$(SUF) pcref.$(SUF) val.$(SUF) \
|
||||
ansi_C.$(SUF) \
|
||||
6500.$(SUF) i80.$(SUF) z80.$(SUF) top.$(SUF) ego.$(SUF) \
|
||||
m68020.$(SUF) occam.$(SUF) m2ref.$(SUF) ceg.$(SUF) nopt.$(SUF) \
|
||||
sparc.$(SUF) int.$(SUF) lint.$(SUF)
|
||||
|
||||
.SUFFIXES: .doc .$(SUF) .lpr .out
|
||||
|
||||
.doc.$(SUF):
|
||||
$(NROFF) $(MS) $< > $@
|
||||
|
||||
# directly to the printer:
|
||||
.doc.lpr:
|
||||
$(NROFF) $(MS) $< | $(OPR)
|
||||
|
||||
# to standard output
|
||||
.doc.out:
|
||||
@$(NROFF) $(MS) $<
|
||||
|
||||
# Exceptions, to be run without -ms
|
||||
|
||||
v7bugs.$(SUF): v7bugs.doc
|
||||
$(NROFF) v7bugs.doc >$@
|
||||
|
||||
v7bugs.lpr: v7bugs.doc
|
||||
$(NROFF) v7bugs.doc | $(OPR)
|
||||
|
||||
v7bugs.out: v7bugs.doc
|
||||
@$(NROFF) v7bugs.doc
|
||||
|
||||
pcref.$(SUF): pcref.doc
|
||||
$(NROFF) pcref.doc >$@
|
||||
|
||||
pcref.lpr: pcref.doc
|
||||
$(NROFF) pcref.doc | $(OPR)
|
||||
|
||||
pcref.out: pcref.doc
|
||||
@$(NROFF) pcref.doc
|
||||
|
||||
val.$(SUF): val.doc
|
||||
$(NROFF) val.doc >$@
|
||||
|
||||
val.lpr: val.doc
|
||||
$(NROFF) val.doc | $(OPR)
|
||||
|
||||
val.out: val.doc
|
||||
@$(NROFF) val.doc
|
||||
|
||||
pr:
|
||||
@make "SUF="$(SUF) "NROFF="$(NROFF) "MS="$(MS) \
|
||||
$(RESFILES) >make.pr.out 2>&1
|
||||
@$(PRINT) $(RESFILES)
|
||||
|
||||
# The 'opr' entry creates a lot of paper ... but the user must be able
|
||||
# to write the doc directory. I hope that this limits the users of
|
||||
# this entry to persons that know what they are doing.
|
||||
opr:
|
||||
@make "SUF="$(SUF) "NROFF="$(NROFF) "MS="$(MS) $(RESFILES)
|
||||
$(OPR) $(RESFILES)
|
||||
|
||||
clean:
|
||||
-rm -f $(RESFILES)
|
||||
|
||||
# The distr entry is only used when making a distribution tree.
|
||||
# It makes a version of the installation manual, suitable for a simple
|
||||
# line printer.
|
||||
distr: install.doc
|
||||
tbl install.doc | nroff -Tlp $(MS) >install.pr
|
||||
8
doc/READ_ME
Normal file
8
doc/READ_ME
Normal file
@@ -0,0 +1,8 @@
|
||||
Some of these documents use a font called CW.
|
||||
If this font is not available, reference to it can be changed with
|
||||
a sed-script like
|
||||
s/\.ft CW/.ft yourfont/
|
||||
s/\\f(CW/\\fyourfont/g
|
||||
s/^.fp\(.*\)CW$/.fp\1yourfont/
|
||||
However, the font must be a constant-width font for the documents to look
|
||||
reasonable.
|
||||
444
doc/ack.doc
Normal file
444
doc/ack.doc
Normal file
@@ -0,0 +1,444 @@
|
||||
.\" $Id$
|
||||
.nr PD 1v
|
||||
.tr ~
|
||||
.TL
|
||||
Ack Description File
|
||||
.br
|
||||
Reference Manual
|
||||
.AU
|
||||
Ed Keizer
|
||||
.AI
|
||||
Vakgroep Informatica
|
||||
Vrije Universiteit
|
||||
Amsterdam
|
||||
.NH
|
||||
Introduction
|
||||
.PP
|
||||
The program \fIack\fP(I) internally maintains a table of
|
||||
possible transformations and a table of string variables.
|
||||
The transformation table contains one entry for each possible
|
||||
transformation of a file.
|
||||
Which transformations are used depends on the suffix of the
|
||||
source file.
|
||||
Each transformation table entry tells which input suffixes are
|
||||
allowed and what suffix/name the output file has.
|
||||
When the output file does not already satisfy the request of the
|
||||
user (indicated with the flag \fB\-c.suffix\fP), the table is scanned
|
||||
starting with the next transformation in the table for another
|
||||
transformation that has as input suffix the output suffix of
|
||||
the previous transformation.
|
||||
A few special transformations are recognized, among them is the
|
||||
combiner, which is
|
||||
a program combining several files into one.
|
||||
When no stop suffix was specified (flag \fB\-c.suffix\fP) \fIack\fP
|
||||
stops after executing the combiner with as arguments the \-
|
||||
possibly transformed \- input files and libraries.
|
||||
\fIAck\fP will only perform the transformations in the order in
|
||||
which they are presented in the table.
|
||||
.LP
|
||||
The string variables are used while creating the argument list
|
||||
and program call name for
|
||||
a particular transformation.
|
||||
.NH
|
||||
Which descriptions are used
|
||||
.PP
|
||||
\fIAck\fP always uses two description files: one to define the
|
||||
front-end transformations and one for the machine dependent
|
||||
back-end transformations.
|
||||
Each description has a name.
|
||||
First the way of determining
|
||||
the name of the descriptions needed is described.
|
||||
.PP
|
||||
When the shell environment variable ACKFE is set \fIack\fP uses
|
||||
that to determine the front-end table name, otherwise it uses
|
||||
\fBfe\fP.
|
||||
.PP
|
||||
The way the backend table name is determined is more
|
||||
convoluted.
|
||||
.br
|
||||
First, when the last filename in the program call name is not
|
||||
one of \fIack\fP or the front-end call-names,
|
||||
this filename is used as the backend description name.
|
||||
Second, when the \fB\-m\fP is present the \fB\-m\fP is chopped of this
|
||||
flag and the rest is used as the backend description name.
|
||||
Third, when both failed the shell environment variable ACKM is
|
||||
used.
|
||||
Last, when also ACKM was not present the default backend is
|
||||
used, determined by the definition of ACKM in h/local.h.
|
||||
The presence and value of the definition of ACKM is
|
||||
determined at compile time of \fIack\fP.
|
||||
.PP
|
||||
Now, we have the names, but that is only the first step.
|
||||
\fIAck\fP stores a few descriptions at compile time.
|
||||
This descriptions are simply files read in at compile time.
|
||||
At the moment of writing this document, the descriptions
|
||||
included are: pdp, fe, i86, m68k2, vax2 and int.
|
||||
The name of a description is first searched for internally,
|
||||
then in lib/descr/\fIname\fP, then in
|
||||
lib/\fIname\fP/descr, and finally in the current
|
||||
directory of the user.
|
||||
.NH
|
||||
Using the description file
|
||||
.PP
|
||||
Before starting on a narrative of the description file,
|
||||
the introduction of a few terms is necessary.
|
||||
All these terms are used to describe the scanning of zero
|
||||
terminated strings, thereby producing another string or
|
||||
sequence of strings.
|
||||
.IP Backslashing 5
|
||||
.br
|
||||
All characters preceded by \e are modified to prevent
|
||||
recognition at further scanning.
|
||||
This modification is undone before a string is passed to the
|
||||
outside world as argument or message.
|
||||
When reading the description files the
|
||||
sequences \e\e, \e# and \e<newline> have a special meaning.
|
||||
\e\e translates to a single \e, \e# translates to a single #
|
||||
that is not
|
||||
recognized as the start of comment, but can be used in
|
||||
recognition and finally, \e<newline> translates to nothing at
|
||||
all, thereby allowing continuation lines.
|
||||
.nr PD 0
|
||||
.IP "Variable replacement"
|
||||
.br
|
||||
The scan recognizes the sequences {{, {NAME} and {NAME?text}
|
||||
Where NAME can be any combination if characters excluding ? and
|
||||
} and text may be anything excluding }.
|
||||
(~\e} is allowed of course~)
|
||||
The first sequence produces an unescaped single {.
|
||||
The second produces the contents of the NAME, definitions are
|
||||
done by \fIack\fP and in description files.
|
||||
When the NAME is not defined an error message is produced on
|
||||
the diagnostic output.
|
||||
The last sequence produces the contents of NAME if it is
|
||||
defined and text otherwise.
|
||||
.PP
|
||||
.IP "Expression replacement"
|
||||
.br
|
||||
Syntax: (\fIsuffix sequence\fP:\fIsuffix sequence\fP=\fItext\fP)
|
||||
.br
|
||||
Example: (.c.p.e:.e=tail_em)
|
||||
.br
|
||||
If the two suffix sequences have a common member \-~\&.e in this
|
||||
case~\- the text is produced.
|
||||
When no common member is present the empty string is produced.
|
||||
Thus the example given is a constant expression.
|
||||
Normally, one of the suffix sequences is produced by variable
|
||||
replacement.
|
||||
\fIAck\fP sets three variables while performing the diverse
|
||||
transformations: HEAD, TAIL and RTS.
|
||||
All three variables depend on the properties \fIrts\fP and
|
||||
\fIneed\fP from the transformations used.
|
||||
Whenever a transformation is used for the first time,
|
||||
the text following the \fIneed\fP is appended to both the HEAD and
|
||||
TAIL variable.
|
||||
The value of the variable RTS is determined by the first
|
||||
transformation used with a \fIrts\fP property.
|
||||
.IP
|
||||
Two runtime flags have effect on the value of one or more of
|
||||
these variables.
|
||||
The flag \fB\-.suffix\fP has the same effect on these three variables
|
||||
as if a file with that \fBsuffix\fP was included in the argument list
|
||||
and had to be translated.
|
||||
The flag \fB\-r.suffix\fP only has that effect on the TAIL
|
||||
variable.
|
||||
The program call names \fIacc\fP and \fIcc\fP have the effect
|
||||
of an automatic \fB\-.c\fP flag.
|
||||
\fIApc\fP and \fIpc\fP have the effect of an automatic \fB\-.p\fP flag.
|
||||
.IP "Line splitting"
|
||||
.br
|
||||
The string is transformed into a sequence of strings by replacing
|
||||
the blank space by string separators (nulls).
|
||||
.IP "IO replacement"
|
||||
.br
|
||||
The > in the string is replaced by the output file name.
|
||||
The < in the string is replaced by the input file name.
|
||||
When multiple input files are present the string is duplicated
|
||||
for each input file name.
|
||||
.nr PD 1v
|
||||
.LP
|
||||
Each description is a sequence of variable definitions followed
|
||||
by a sequence of transformation definitions.
|
||||
Variable definitions use a line each, transformations
|
||||
definitions consist of a sequence of lines.
|
||||
Empty lines are discarded, as are lines with nothing but
|
||||
comment.
|
||||
Comment is started by a # character, and continues to the end
|
||||
of the line.
|
||||
Three special two-characters sequences exist: \e#, \e\e and
|
||||
\e<newline>.
|
||||
Their effect is described under 'backslashing' above.
|
||||
Each \- nonempty \- line starts with a keyword, possibly
|
||||
preceded by blank space.
|
||||
The keyword can be followed by a further specification.
|
||||
The two are separated by blank space.
|
||||
.PP
|
||||
Variable definitions use the keyword \fIvar\fP and look like this:
|
||||
.DS X
|
||||
var NAME=text
|
||||
.DE
|
||||
The name can be any identifier, the text may contain any
|
||||
character.
|
||||
Blank space before the equal sign is not part of the NAME.
|
||||
Blank space after the equal is considered as part of the text.
|
||||
The text is scanned for variable replacement before it is
|
||||
associated with the variable name.
|
||||
.br
|
||||
.sp 2
|
||||
The start of a transformation definition is indicated by the
|
||||
keyword \fIname\fP.
|
||||
The last line of such a definition contains the keyword
|
||||
\fIend\fP.
|
||||
The lines in between associate properties to a transformation
|
||||
and may be presented in any order.
|
||||
The identifier after the \fIname\fP keyword determines the name
|
||||
of the transformation.
|
||||
This name is used for debugging and by the \fB\-R\fP flag.
|
||||
The keywords are used to specify which input suffices are
|
||||
recognized by that transformation,
|
||||
the program to run, the arguments to be handed to that program
|
||||
and the name or suffix of the resulting output file.
|
||||
Two keywords are used to indicate which run-time startoffs and
|
||||
libraries are needed.
|
||||
The possible keywords are:
|
||||
.IP \fIfrom\fP
|
||||
.br
|
||||
followed by a sequence of suffices.
|
||||
Each file with one of these suffices is allowed as input file.
|
||||
Preprocessor transformations do not need the \fIfrom\fP
|
||||
keyword. All other transformations do.
|
||||
.nr PD 0
|
||||
.IP \fIto\fP
|
||||
.br
|
||||
followed by the suffix of the output file name or in the case of a
|
||||
linker
|
||||
the output file name.
|
||||
.IP \fIprogram\fP
|
||||
.br
|
||||
followed by name of the load file of the program, a pathname most likely
|
||||
starts with either a / or {EM}.
|
||||
This keyword must be
|
||||
present, the remainder of the line
|
||||
is subject to backslashing and variable replacement.
|
||||
.IP \fImapflag\fP
|
||||
.br
|
||||
The mapflags are used to grab flags given to \fIack\fP and
|
||||
pass them on to a specific transformation.
|
||||
This feature uses a few simple pattern matching and replacement
|
||||
facilities.
|
||||
Multiple occurrences of this keyword are allowed.
|
||||
This text following the keyword is
|
||||
subjected to backslashing.
|
||||
The keyword is followed by a match expression and a variable
|
||||
assignment separated by blank space.
|
||||
As soon as both description files are read, \fIack\fP looks
|
||||
at all transformations in these files to find a match for the
|
||||
flags given to \fIack\fP.
|
||||
The flags \fB\-m\fP, \fB\-o\fP,
|
||||
\fB\-O\fP, \fB\-r\fP, \fB\-v\fP, \fB\-g\fP, \-\fB\-c\fP, \fB\-t\fP,
|
||||
\fB\-k\fP, \fB\-R\fP and \-\fB\-.\fP are specific to \fIack\fP and
|
||||
not handed down to any transformation.
|
||||
The matching is performed in the order in which the entries
|
||||
appear in the definition.
|
||||
The scanning stops after first match is found.
|
||||
When a match is found, the variable assignment is executed.
|
||||
A * in the match expression matches any sequence of characters,
|
||||
a * in the right hand part of the assignment is
|
||||
replaced by the characters matched by
|
||||
the * in the expression.
|
||||
The right hand part is also subject to variable replacement.
|
||||
The variable will probably be used in the program arguments.
|
||||
The \fB\-l\fP flags are special,
|
||||
the order in which they are presented to \fIack\fP must be
|
||||
preserved.
|
||||
The identifier LNAME is used in conjunction with the scanning of
|
||||
\fB\-l\fP flags.
|
||||
The value assigned to LNAME is used to replace the flag.
|
||||
The example further on shows the use of all this.
|
||||
.IP \fIargs\fP
|
||||
.br
|
||||
The keyword is followed by the program call arguments.
|
||||
It is subject to backslashing, variable replacement, expression
|
||||
replacement, line splitting and IO replacement.
|
||||
The variables assigned to by \fImapflags\fP will probably be
|
||||
used here.
|
||||
The flags not recognized by \fIack\fP or any of the transformations
|
||||
are passed to the linker and inserted before all other arguments.
|
||||
.IP \fIstdin\fP
|
||||
.br
|
||||
This keyword indicates that the transformation reads from standard input.
|
||||
.IP \fIstdout\fP
|
||||
.br
|
||||
This keyword indicates that the transformation writes on standard output.
|
||||
.IP \fIoptimizer\fP
|
||||
.br
|
||||
The presence of this keyword indicates that this transformation is an optimizer.
|
||||
It can be followed by a number, indicating the "level" of the
|
||||
optimizer (see description of the -O option in the ack(1ACK) manual page).
|
||||
.IP \fIpriority\fP
|
||||
.br
|
||||
This \-~optional~\- keyword is followed by a number. Positive priority means
|
||||
that the transformation is likely to be used, negative priority means that
|
||||
the transformation is unlikely to be used.
|
||||
Priorities can also be set with a ack(1ACK) command line option.
|
||||
Priorities come in handy when there are several implementations of a
|
||||
certain transformation. They can then be used to select a default one.
|
||||
.IP \fIlinker\fP
|
||||
.br
|
||||
This keyword indicates that this transformation is the linker.
|
||||
.IP \fIcombiner\fP
|
||||
.br
|
||||
This keyword indicates that this transformation is a combiner. A combiner
|
||||
is a program combining several files into one, but is not a linker.
|
||||
An example of a combiner is the global optimizer.
|
||||
.IP \fIprep\fP
|
||||
.br
|
||||
This \-~optional~\- keyword is followed an option indicating its relation
|
||||
to the preprocessor.
|
||||
The possible options are:
|
||||
.DS X
|
||||
always the input files must be preprocessed
|
||||
cond the input files must be preprocessed when starting with #
|
||||
is this transformation is the preprocessor
|
||||
.DE
|
||||
.IP \fIrts\fP
|
||||
.br
|
||||
This \-~optional~\- keyword indicates that the rest of the line must be
|
||||
used to set the variable RTS, if it was not already set.
|
||||
Thus the variable RTS is set by the first transformation
|
||||
executed which such a property or as a result from \fIack\fP's program
|
||||
call name (acc, cc, apc or pc) or by the \fB\-.suffix\fP flag.
|
||||
.IP \fIneed\fP
|
||||
.br
|
||||
This \-~optional~\- keyword indicates that the rest of the line must be
|
||||
concatenated to the HEAD and TAIL variables.
|
||||
This is done once for every transformation used or indicated
|
||||
by one of the program call names mentioned above or indicated
|
||||
by the \fB\-.suffix\fP flag.
|
||||
.br
|
||||
.nr PD 1v
|
||||
.NH
|
||||
Conventions used in description files
|
||||
.PP
|
||||
\fIAck\fP reads two description files.
|
||||
A few of the variables defined in the machine specific file
|
||||
are used by the descriptions of the front-ends.
|
||||
Other variables, set by \fIack\fP, are of use to all
|
||||
transformations.
|
||||
.PP
|
||||
\fIAck\fP sets the variable EM to the home directory of the
|
||||
Amsterdam Compiler Kit.
|
||||
The variable SOURCE is set to the name of the argument that is currently
|
||||
being massaged, this is useful for debugging.
|
||||
The variable SUFFIX is set to the suffix of the argument that is
|
||||
currently being massaged.
|
||||
.br
|
||||
The variable M indicates the
|
||||
directory in lib/{M}/tail_..... and NAME is the string to
|
||||
be defined by the preprocessor with \-D{NAME}.
|
||||
The definitions of {w}, {s}, {l}, {d}, {f} and {p} indicate
|
||||
EM_WSIZE, EM_SSIZE, EM_LSIZE, EM_DSIZE, EM_FSIZE and EM_PSIZE
|
||||
respectively.
|
||||
.br
|
||||
The variable INCLUDES is used as the last argument to \fIcpp\fP.
|
||||
It is used to add directories to
|
||||
the list of directories containing #include files.
|
||||
.PP
|
||||
The variables HEAD, TAIL and RTS are set by \fIack\fP and used
|
||||
to compose the arguments for the linker.
|
||||
.NH
|
||||
Example
|
||||
.PP
|
||||
Description for front-end
|
||||
.DS X
|
||||
.ta 4n 40n
|
||||
name cpp # the C-preprocessor
|
||||
# no from, it's governed by the P property
|
||||
to .i # result files have suffix i
|
||||
program {EM}/lib/cpp # pathname of loadfile
|
||||
mapflag \-I* CPP_F={CPP_F?} \-I* # grab \-I.. \-U.. and
|
||||
mapflag \-U* CPP_F={CPP_F?} \-U* # \-D.. to use as arguments
|
||||
mapflag \-D* CPP_F={CPP_F?} \-D* # in the variable CPP_F
|
||||
args {CPP_F?} {INCLUDES?} \-D{NAME} \-DEM_WSIZE={w} \-DEM_PSIZE={p} \e
|
||||
\-DEM_SSIZE={s} \-DEM_LSIZE={l} \-DEM_FSIZE={f} \-DEM_DSIZE={d} <
|
||||
# The arguments are: first the \-[IUD]...
|
||||
# then the include dir's for this machine
|
||||
# then the NAME and size values finally
|
||||
# followed by the input file name
|
||||
stdout # Output on stdout
|
||||
prep is # Is preprocessor
|
||||
end
|
||||
name cem # the C-compiler proper
|
||||
from .c # used for files with suffix .c
|
||||
to .k # produces compact code files
|
||||
program {EM}/lib/em_cem # pathname of loadfile
|
||||
mapflag \-p CEM_F={CEM_F?} \-Xp # pass \-p as \-Xp to cem
|
||||
mapflag \-L CEM_F={CEM_F?} \-l # pass \-L as \-l to cem
|
||||
args \-Vw{w}i{w}p{p}f{f}s{s}l{l}d{d} {CEM_F?}
|
||||
# the arguments are the object sizes in
|
||||
# the \-V... flag and possibly \-l and \-Xp
|
||||
stdin # input from stdin
|
||||
stdout # output on stdout
|
||||
prep always # use cpp
|
||||
rts .c # use the C run-time system
|
||||
need .c # use the C libraries
|
||||
end
|
||||
name decode # make human readable files from compact code
|
||||
from .k.m # accept files with suffix .k or .m
|
||||
to .e # produce .e files
|
||||
program {EM}/lib/em_decode # pathname of loadfile
|
||||
args < # the input file name is the only argument
|
||||
stdout # the output comes on stdout
|
||||
end
|
||||
.DE
|
||||
|
||||
.DS X
|
||||
.ta 4n 40n
|
||||
Example of a backend, in this case the EM assembler/loader.
|
||||
|
||||
var w=2 # wordsize 2
|
||||
var p=2 # pointersize 2
|
||||
var s=2 # short size 2
|
||||
var l=4 # long size 4
|
||||
var f=4 # float size 4
|
||||
var d=8 # double size 8
|
||||
var M=em22
|
||||
var NAME=em22 # for cpp (NAME=em22 results in #define em22 1)
|
||||
var LIB=lib/{M}/tail_ # part of file name for libraries
|
||||
var RT=lib/{M}/head_ # part of file name for run-time startoff
|
||||
var SIZE_FLAG=\-sm # default internal table size flag
|
||||
var INCLUDES=\-I{EM}/include # use {EM}/include for #include files
|
||||
name asld # Assembler/loader
|
||||
from .k.m.a # accepts compact code and archives
|
||||
to e.out # output file name
|
||||
program {EM}/lib/em_ass # load file pathname
|
||||
mapflag \-l* LNAME={EM}/{LIB}* # e.g. \-ly becomes
|
||||
# {EM}/mach/int/lib/tail_y
|
||||
mapflag \-+* ASS_F={ASS_F?} \-+* # recognize \-+ and \-\-
|
||||
mapflag \-\-* ASS_F={ASS_F?} \-\-*
|
||||
mapflag \-s* SIZE_FLAG=\-s* # overwrite old value of SIZE_FLAG
|
||||
args {SIZE_FLAG} \e
|
||||
({RTS}:.c={EM}/{RT}cc) ({RTS}:.p={EM}/{RT}pc) \-o > < \e
|
||||
(.p:{TAIL}={EM}/{LIB}pc) \e
|
||||
(.c:{TAIL}={EM}/{LIB}cc.1s {EM}/{LIB}cc.2g) \e
|
||||
(.c.p:{TAIL}={EM}/{LIB}mon)
|
||||
# \-s[sml] must be first argument
|
||||
# the next line contains the choice for head_cc or head_pc
|
||||
# and the specification of in- and output.
|
||||
# the last three args lines choose libraries
|
||||
linker
|
||||
end
|
||||
.DE
|
||||
|
||||
The command \fIack \-mem22 \-v \-v \-I../h \-L \-ly prog.c\fP
|
||||
would result in the following
|
||||
calls (with exec(II)):
|
||||
.DS X
|
||||
.ta 4n
|
||||
1) /lib/cpp \-I../h \-I/usr/em/include \-Dem22 \-DEM_WSIZE=2 \-DEM_PSIZE=2 \e
|
||||
\-DEM_SSIZE=2 \-DEM_LSIZE=4 \-DEM_FSIZE=4 \-DEM_DSIZE=8 prog.c
|
||||
2) /usr/em/lib/em_cem \-Vw2i2p2f4s2l4d8 \-l
|
||||
3) /usr/em/lib/em_ass \-sm /usr/em/lib/em22/head_cc \-o e.out prog.k
|
||||
/usr/em/lib/em22/tail_y /usr/em/lib/em22/tail_cc.1s
|
||||
/usr/em/lib/em22/tail_cc.2g /usr/em/lib/em22/tail_mon
|
||||
.DE
|
||||
365
doc/ansi_C.doc
Executable file
365
doc/ansi_C.doc
Executable file
@@ -0,0 +1,365 @@
|
||||
.de NS
|
||||
.sp
|
||||
.in 0
|
||||
\\fBANS \\$1:\\fP
|
||||
..
|
||||
.TL
|
||||
Amsterdam Compiler Kit-ANSI C compiler compliance statements
|
||||
.AU
|
||||
Hans van Eck
|
||||
.AI
|
||||
Dept. of Mathematics and Computer Science
|
||||
Vrije Universiteit
|
||||
Amsterdam, The Netherlands
|
||||
.PP
|
||||
This document specifies the implementation-defined behaviour of the ANSI-C
|
||||
front end of the Amsterdam Compiler Kit as required by ANS X3.159-1989. Since
|
||||
the implementation-defined behaviour sometimes depends on the machine
|
||||
compiling on or for, some items will be left unspecified in this
|
||||
document\(dg.
|
||||
.FS
|
||||
\(dg when cross-compiling, run-time behaviour may be different from
|
||||
compile-time behaviour
|
||||
.FE
|
||||
The compiler assumes that it runs on a UNIX system.
|
||||
.NS A.6.3.1
|
||||
.IP -
|
||||
Diagnostics are placed on the standard error output. They have the
|
||||
following specification:
|
||||
.br
|
||||
"<file>", line <nr>: [(<class>)] <diagnostic>
|
||||
.br
|
||||
There are three classes of diagnostics: "error", "strict" and "warning".
|
||||
When the class is "error", the <class> is absent.
|
||||
.br
|
||||
The class "strict" is used for violations of the standard which are
|
||||
not severe enough to stop compilation. An example is the the occurrence
|
||||
of non white-space after an '#else' or '#endif' pre-processing
|
||||
directive. The class "warning" is used for legal but dubious
|
||||
constructions. An example is overflow of constant expressions.
|
||||
.NS A.6.3.2
|
||||
.IP -
|
||||
The function 'main' can have two arguments. The first argument is an
|
||||
integer specifying the number of arguments on the command line. The second
|
||||
argument is a pointer to an array of pointers to the arguments (as
|
||||
strings).
|
||||
.IP -
|
||||
Interactive devices are terminals.
|
||||
.NS A.6.3.3
|
||||
.IP -
|
||||
The number of significant characters is an option. By default it is 64.
|
||||
There is a distinction between upper and lower case.
|
||||
.NS A.6.3.4
|
||||
.IP -
|
||||
The compiler assumes ASCII-characters in both the source and execution
|
||||
character set.
|
||||
.IP -
|
||||
There are no multi-byte characters.
|
||||
.IP -
|
||||
There 8 bits in a character.
|
||||
.IP -
|
||||
Character constants with values that can not be represented in 8 bits
|
||||
are truncated.
|
||||
.IP -
|
||||
Character constants that are more than 1 character wide will have the
|
||||
first character specified in the least significant byte.
|
||||
.IP -
|
||||
The only supported locale is "C".
|
||||
.IP -
|
||||
A plain 'char' has the same range of values as 'signed char'.
|
||||
.NS A.6.3.5
|
||||
.IP -
|
||||
The compiler assumes that it works on and compiles for a
|
||||
2-complement binary-number system. Shorts will use 2 bytes and longs
|
||||
will use 4 bytes. The size of integers are machine dependent.
|
||||
.IP -
|
||||
Converting an integer to a shorter signed integer is implemented by
|
||||
ignoring the high-order byte(s) of the former.
|
||||
Converting a unsigned integer to a signed integer of the same type is
|
||||
only done in administration. This means that the bit-pattern remains
|
||||
unchanged.
|
||||
.IP -
|
||||
The result of bitwise operations on signed integers are what can be
|
||||
expected on a 2-complement machine.
|
||||
.IP -
|
||||
If either operand is negative, whether the result of the / operator is the
|
||||
largest integer less than or equal to the algebraic quotient or the
|
||||
smallest integer greater than or equal to the algebraic quotient is machine
|
||||
dependent, as is the sign of the result of the % operator.
|
||||
.IP -
|
||||
The right-shift of a negative value is negative.
|
||||
.NS A.6.3.6
|
||||
.IP -
|
||||
The representation of floating-point values is machine-dependent.
|
||||
When native floating-point is not present an IEEE-emulation is used.
|
||||
The compiler uses high-precision floating-point for constant folding.
|
||||
.IP -
|
||||
Truncation is always to the nearest floating-point number that can
|
||||
be represented.
|
||||
.NS A.6.3.7
|
||||
.IP -
|
||||
The type returned by the sizeof-operator (also known as size_t)
|
||||
is 'unsigned int'. This is done for backward compatibility reasons.
|
||||
.IP -
|
||||
Casting an integer to a pointer or vice versa has no effect in
|
||||
bit-pattern when the sizes are equal. Otherwise the value will be
|
||||
truncated or zero-extended (depending on the direction of the
|
||||
conversion and the relative sizes).
|
||||
.IP -
|
||||
When a pointer is as large as an integer, the type of a 'ptrdiff_t' will
|
||||
be 'int'. Otherwise the type will be 'long'.
|
||||
.NS A.6.3.8
|
||||
.IP -
|
||||
Since the front end has only limited control over the registers, it can
|
||||
only make it more likely that variables that are declared as
|
||||
registers also end up in registers. The only things that can possibly be
|
||||
put into registers are : 'int', 'long', 'float', 'double', 'long double'
|
||||
and pointers.
|
||||
.NS A.6.3.9
|
||||
.IP -
|
||||
When a member of a union object is accessed using a member of a
|
||||
different type, the resulting value will usually be garbage. The
|
||||
compiler makes no effort to catch these errors.
|
||||
.IP -
|
||||
The alignment of types is a compile-time option. The alignment of
|
||||
a structure-member is the alignment of its type. Usually, the
|
||||
alignment is passed on to the compiler by the 'ack' program. When a
|
||||
user wants to do this manually, he/she should be prepared for trouble.
|
||||
.IP -
|
||||
A "plain" 'int' bit-field is taken as a 'signed int'. This means that
|
||||
a field with a size of 1 bit can only store the values 0 and -1.
|
||||
.IP -
|
||||
The order of allocation of bit-fields is a compile-time option. By
|
||||
default, high-order bits are allocated first.
|
||||
.IP -
|
||||
An enum has the same size as a "plain" 'int'.
|
||||
.NS A.6.3.10
|
||||
.IP -
|
||||
An access to a volatile declared variable is done by just mentioning
|
||||
the variable. E.g. the statement "x;" where x is declared volatile,
|
||||
constitutes an access.
|
||||
.S A.6.3.11
|
||||
.IP -
|
||||
There is no fixed limit on the number of declarators that may modify an
|
||||
arithmetic, structure or union type, although specifying too many may
|
||||
cause the compiler to run out of memory.
|
||||
.NS A.6.3.12
|
||||
.IP -
|
||||
The maximum number of cases in a switch-statement is in the order of
|
||||
1e9, although the compiler may run out of memory somewhat earlier.
|
||||
.NS A.6.3.13
|
||||
.IP -
|
||||
Since both the pre-processor and the compiler assume ASCII-characters,
|
||||
a single character constant in a conditional-inclusion directive
|
||||
matches the same value in the execution character set.
|
||||
.IP -
|
||||
The pre-processor recognizes -I... command-line options. The
|
||||
directories thus specified are searched first. After that, depending on the
|
||||
command that the preprocessor is called with, machine/system-dependant
|
||||
directories are searched. After that, ~em/include/_tail_ac and
|
||||
/usr/include are visited.
|
||||
.IP -
|
||||
Quoted names are first looked for in the directory in which the file
|
||||
which does the include resides.
|
||||
.IP -
|
||||
The characters in a h- or q- char-sequence are taken to be UNIX
|
||||
paths.
|
||||
.IP -
|
||||
Neither the compiler nor the preprocessor know any pragmas.
|
||||
.IP -
|
||||
Since the compiler runs on UNIX, __DATE__ and __TIME__ will always be
|
||||
defined.
|
||||
.NS A.6.3.14
|
||||
.IP -
|
||||
NULL is defined as ((void *)0). This in order to flag dubious
|
||||
constructions like "int x = NULL;".
|
||||
.IP -
|
||||
The diagnostic printed by 'assert' is as follows:
|
||||
.ti +4n
|
||||
"Assertion "<expr>" failed, file "<file>", line <line>",
|
||||
.br
|
||||
where <expr> is the argument to the assert macro, printed as string.
|
||||
(the <file> and <line> should be clear)
|
||||
.KS
|
||||
.IP -
|
||||
The sets for character test macros.
|
||||
.TS
|
||||
l l.
|
||||
name: set:
|
||||
isalnum() 0-9A-Za-z
|
||||
isalpha() A-Za-z
|
||||
iscntrl() \e000-\e037\e177
|
||||
islower() a-z
|
||||
isupper() A-Z
|
||||
isprint() <space>-~ (== \e040-\e176)
|
||||
.TE
|
||||
.KE
|
||||
As an addition, there is an isascii() macro, which tests whether a character
|
||||
is an ascii character. Characters in the range from \e000 to \e177 are ascii
|
||||
characters.
|
||||
.KS
|
||||
.IP -
|
||||
The behaviour of mathematic functions on domain error:
|
||||
.TS
|
||||
l c
|
||||
l n.
|
||||
name: returns:
|
||||
asin() 0.0
|
||||
acos() 0.0
|
||||
atan2() 0.0
|
||||
fmod() 0.0
|
||||
log() -HUGE_VAL
|
||||
log10() -HUGE_VAL
|
||||
pow() 0.0
|
||||
sqrt() 0.0
|
||||
.TE
|
||||
.KE
|
||||
.IP -
|
||||
Underflow range errors do not cause errno to be set.
|
||||
.IP -
|
||||
The function fmod() returns 0.0 and sets errno to EDOM when the second
|
||||
argument is 0.0.
|
||||
.IP -
|
||||
The set of signals for the signal() function depends on the UNIX-system
|
||||
which the compiler is compiling for. The default handling, semantics
|
||||
and behaviour of these signals are those specified by the operating
|
||||
system vendor. The default handling is not reset when SIGILL is
|
||||
received.
|
||||
.IP -
|
||||
A text-stream need not end in a new-line character.
|
||||
.IP -
|
||||
White space characters before a new-line appear when read in.
|
||||
.IP -
|
||||
There may be any number of null characters appended to a binary
|
||||
stream.
|
||||
.IP -
|
||||
The file position indicator of an append mode stream is initially
|
||||
positioned at the beginning of the file.
|
||||
.IP -
|
||||
A write on a text stream does not cause the associated file to be
|
||||
truncated beyond that point.
|
||||
.IP -
|
||||
The buffering intended by the standard is fully supported.
|
||||
.IP -
|
||||
A zero-length file actually exists.
|
||||
.IP -
|
||||
A file name can consist of any character, except for the '\e0' and
|
||||
the '/'.
|
||||
.IP -
|
||||
A file can be open multiple times.
|
||||
.IP -
|
||||
When a remove() is done on an open file, reading and writing behave
|
||||
just as can be expected from a non-removed file. When the associated
|
||||
stream is closed, all written data will be lost.
|
||||
.IP -
|
||||
When a file exists prior to a call to rename(), the behaviour is that
|
||||
of the underlying UNIX system. Normally, the call would fail.
|
||||
.IP -
|
||||
The %p conversion in fprintf() has the same effect as %#x or %#lx,
|
||||
depending on the sizes of pointer and integer.
|
||||
.IP -
|
||||
The %p conversion in fscanf() has the same effect as %x or %lx,
|
||||
depending on the sizes of pointer and integer.
|
||||
.IP -
|
||||
A - character that is neither the first nor the last character in the
|
||||
scanlist for %[ conversion is taken to be a range indicator. When the
|
||||
first character has a higher ASCII-value than the second, the - will
|
||||
just be put into the scanlist.
|
||||
.IP -
|
||||
The value of errno when fgetpos() or ftell() failed is that of lseek().
|
||||
This means:
|
||||
.RS
|
||||
.IP "EBADF \-" 10
|
||||
when the stream is not valid
|
||||
.IP "ESPIPE \-"
|
||||
when fildes is associated with a pipe (and on some systems: sockets)
|
||||
.IP "EINVAL \-"
|
||||
the resulting file pointer would be negative
|
||||
.RE
|
||||
.LP
|
||||
.IP -
|
||||
The messages generated by perror() depend on the value of errno.
|
||||
The mapping of errors to strings is done by strerror().
|
||||
.IP -
|
||||
When the requested size is zero, malloc(), calloc() and realloc()
|
||||
return a null-pointer.
|
||||
.IP -
|
||||
When abort() is called, output buffers will be flushed. Temporary files
|
||||
(made with the tmpfile() function) will have disappeared when SIGABRT
|
||||
is not caught or ignored.
|
||||
.IP -
|
||||
The exit() function returns the low-order eight bits of its argument
|
||||
to the environment.
|
||||
.IP -
|
||||
The predefined environment names are controlled by the user.
|
||||
Setting environment variables is done through the putenv() function.
|
||||
This function accepts a pointer to char as its argument.
|
||||
To set f.i. the environment variable TERM to a230 one writes
|
||||
.ti +4n
|
||||
putenv("TERM=a230");
|
||||
.br
|
||||
The argument to putenv() is stored in an internal table, so malloc'ed
|
||||
strings can not be freed until another call to putenv() (which sets the
|
||||
same environment variable) is made. The function returns 1 if it fails,
|
||||
0 otherwise.
|
||||
.LP
|
||||
.IP -
|
||||
The argument to system is passed as argument to /bin/sh -c.
|
||||
.IP -
|
||||
The strings returned by strerror() depend on errno in the following
|
||||
way:
|
||||
.TS
|
||||
l l.
|
||||
errno string
|
||||
0 "Error 0",
|
||||
EPERM "Not owner",
|
||||
ENOENT "No such file or directory",
|
||||
ESRCH "No such process",
|
||||
EINTR "Interrupted system call",
|
||||
EIO "I/O error",
|
||||
ENXIO "No such device or address",
|
||||
E2BIG "Arg list too long",
|
||||
ENOEXEC "Exec format error",
|
||||
EBADF "Bad file number",
|
||||
ECHILD "No children",
|
||||
EAGAIN "No more processes",
|
||||
ENOMEM "Not enough core",
|
||||
EACCES "Permission denied",
|
||||
EFAULT "Bad address",
|
||||
ENOTBLK "Block device required",
|
||||
EBUSY "Mount device busy",
|
||||
EEXIST "File exists",
|
||||
EXDEV "Cross-device link",
|
||||
ENODEV "No such device",
|
||||
ENOTDIR "Not a directory",
|
||||
EISDIR "Is a directory",
|
||||
EINVAL "Invalid argument",
|
||||
ENFILE "File table overflow",
|
||||
EMFILE "Too many open files",
|
||||
ENOTTY "Not a typewriter",
|
||||
ETXTBSY "Text file busy",
|
||||
EFBUG "File too large",
|
||||
ENOSPC "No space left on device",
|
||||
ESPIPE "Illegal seek",
|
||||
EROFS "Read-only file system",
|
||||
EMLINK "Too many links",
|
||||
EPIPE "Broken pipe",
|
||||
EDOM "Math argument",
|
||||
ERANGE "Result too large"
|
||||
.TE
|
||||
everything else causes strerror() to return "unknown error"
|
||||
.IP -
|
||||
The local time zone is per default MET (GMT + 1:00:00). This can be
|
||||
changed through the TZ environment variable, or by some changes in the
|
||||
sources.
|
||||
.IP -
|
||||
The clock() function returns the number of ticks since process
|
||||
startup.
|
||||
.SH
|
||||
References
|
||||
.IP [1]
|
||||
ANS X3.159-1989
|
||||
.I
|
||||
American National Standard for Information Systems -
|
||||
Programming Language C
|
||||
.R
|
||||
949
doc/basic.doc
Normal file
949
doc/basic.doc
Normal file
@@ -0,0 +1,949 @@
|
||||
.\" $Id$
|
||||
.TL
|
||||
.de Sy
|
||||
.LP
|
||||
.IP \fBsyntax\fR 10
|
||||
..
|
||||
.de PU
|
||||
.IP \fBpurpose\fR 10
|
||||
..
|
||||
.de RM
|
||||
.IP \fBremarks\fR 10
|
||||
..
|
||||
The ABC compiler
|
||||
.AU
|
||||
Martin L. Kersten
|
||||
Gert-Jan Akkerman
|
||||
Marcel Worring
|
||||
Edo Westerhuis
|
||||
Frans Kunst
|
||||
Ronnie Lachniet
|
||||
.AI
|
||||
Department of Mathematics and Computer Science.
|
||||
.br
|
||||
Free University
|
||||
.br
|
||||
Amsterdam
|
||||
.AB
|
||||
This manual describes the
|
||||
programming language BASIC and its compiler
|
||||
included in the Amsterdam Compiler Kit.
|
||||
.AE
|
||||
.SH
|
||||
INTRODUCTION.
|
||||
.LP
|
||||
The BASIC-EM compiler is an extensive implementation of the
|
||||
programming language BASIC.
|
||||
The language structure and semantics are modelled after the
|
||||
BASIC interpreter/compiler of Microsoft (tr), a short comparison
|
||||
is provided in appendix A.
|
||||
.LP
|
||||
The compiler generates code for a virtual machine, the EM machine
|
||||
[[ACM, etc]].
|
||||
Using EM as an intermediate machine results in a highly portable
|
||||
compiler and BASIC code.
|
||||
.br
|
||||
The drawback of EM is that it does not directly reflect one particular
|
||||
hardware design, which means that many of the low level operations available
|
||||
within BASIC are ill-defined or even inapplicable.
|
||||
To mention a few, the peek and poke instructions are likely
|
||||
to be behave errorneous, while line printer and tapedeck
|
||||
primitives are unknown.
|
||||
.LP
|
||||
This manual is divided into three chapters.
|
||||
.br
|
||||
Chapter 1 discusses the general language syntax and semantics.
|
||||
.br
|
||||
Chapter 2 describes the statements available in BASIC-EM.
|
||||
.br
|
||||
Chapter 3 describes the predefined functions, ordered alphabetically.
|
||||
.LP
|
||||
Appendix A discusses the differences with Microsoft BASIC.
|
||||
.br
|
||||
Appendix B describes all reserved symbols.
|
||||
.LP
|
||||
.LP
|
||||
.SH
|
||||
SYNTAX NOTATION
|
||||
.LP
|
||||
The conventions for syntax presentation are as follows:
|
||||
.IP CAPS 10
|
||||
Items are reserved words, must be input as shown.
|
||||
.IP <> 10
|
||||
Items in lowercase letters enclosed in angular brackets
|
||||
are to be supplied by the user.
|
||||
.IP [] 10
|
||||
Items are optional.
|
||||
.IP \.\.\. 10
|
||||
Items may be repeated any number of times
|
||||
.IP {} 10
|
||||
A choice between two or more alternatives. At least one of the entries
|
||||
must be chosen.
|
||||
.IP | 10
|
||||
Vertical bars separate the choices within braces.
|
||||
.LP
|
||||
All punctuation must be included where shown.
|
||||
.bp
|
||||
.NH 1
|
||||
GENERAL INFORMATION
|
||||
.LP
|
||||
The BASIC-EM compiler is designed for a UNIX based environment.
|
||||
It accepts a text file with a BASIC program (suffix .b) and generates
|
||||
an executable file, called a.out.
|
||||
.NH 2
|
||||
LINE FORMAT
|
||||
.LP
|
||||
A BASIC program consists of a series of lines, starting with a
|
||||
positive line number in the range 0 to 32767.
|
||||
A line may consists of more than one physical line on a terminal, but
|
||||
is limited to 1024 characters.
|
||||
Multiple BASIC statements may be placed on a single line, provided
|
||||
they are separated by a colon (:).
|
||||
.NH 2
|
||||
CONSTANTS
|
||||
.LP
|
||||
The BASIC compiler character set is comprised of alphabetic
|
||||
characters, numeric characters, and special characters shown below.
|
||||
.DS
|
||||
= + - * / ^ ( ) % # $ \\ _
|
||||
! [ ] , . ; : & ' ? > < \\ (blanc)
|
||||
.DE
|
||||
.LP
|
||||
BASIC uses two different types of constants during processing:
|
||||
numeric and string constants.
|
||||
.br
|
||||
A string constant is a sequence of characters taken from the ASCII
|
||||
character set enclosed by double quotation marks.
|
||||
.br
|
||||
Numeric constants are positive or negative numbers, grouped into
|
||||
five different classes.
|
||||
.IP "a) integer constants" 25
|
||||
.br
|
||||
Whole numbers in the range of -32768 and 32767. Integer constants do
|
||||
not contain decimal points.
|
||||
.IP "b) fixed point constants" 25
|
||||
.br
|
||||
Positive or negative real numbers, i.e. numbers with a decimal point.
|
||||
.IP "c) floating point constants" 25
|
||||
.br
|
||||
Real numbers in scientific notation. A floating point constant
|
||||
consists of an optional signed integer or fixed point number
|
||||
followed by the letter E (or D) and an optional signed integer
|
||||
(the exponent).
|
||||
The allowable range of floating point constants is 10^-38 to 10^+38.
|
||||
.IP "d) Hex constants" 25
|
||||
.br
|
||||
Hexadecimal numbers, denoted by the prefix &H.
|
||||
.IP "e) Octal constants" 25
|
||||
.br
|
||||
Octal numbers, denoted by the prefix &O.
|
||||
.NH 2
|
||||
VARIABLES
|
||||
.LP
|
||||
Variables are names used to represent values in a BASIC program.
|
||||
A variable is assigned a value by assigment specified in the program.
|
||||
Before a variable is assigned its value is assumed to be zero.
|
||||
.br
|
||||
Variable names are composed of letters, digits or the decimal point,
|
||||
starting with a letter. Up to 40 characters are significant.
|
||||
A variable name can be followed by any of the following type
|
||||
declaration characters:
|
||||
.IP % 5
|
||||
Defines an integer variable
|
||||
.IP ! 5
|
||||
Defines a single precision variable (see below)
|
||||
.IP # 5
|
||||
Defines a double precision variable
|
||||
.IP $ 5
|
||||
Defines a string variable.
|
||||
.LP
|
||||
Beside single valued variables, values may be grouped into tables or arrays.
|
||||
Each element in an array is referenced by the array name and an index,
|
||||
such a variable is called a subscripted variable.
|
||||
An array has as many subscripts as there are dimensions in the array,
|
||||
the maximum of which is 11.
|
||||
.br
|
||||
If a variable starts with FN it is assumed to be a call to a user defined
|
||||
function.
|
||||
.br
|
||||
A variable name may not be a reserved word nor the name
|
||||
of a predefined function.
|
||||
A list of all reserved identifiers is included as Appendix B.
|
||||
.LP
|
||||
NOTES:
|
||||
.br
|
||||
Two variables with the same name but different type is
|
||||
considered illegal.
|
||||
.br
|
||||
The type of a variable without typedeclaration-character is set,
|
||||
at it's first occurence in the program,
|
||||
to the defaulttype which is (in this implementation) double precision.
|
||||
.br
|
||||
Multi-dimensional array's must be declared before use (see
|
||||
DIM-statement ).
|
||||
.br
|
||||
BASIC-EM differs from Microsoft BASIC in supporting floats in one precision
|
||||
only (due to EM), eg doubles and floats have the same precision.
|
||||
.NH 2
|
||||
EXPRESSIONS
|
||||
.LP
|
||||
When necessary the compiler will convert a numeric value from
|
||||
one type to another.
|
||||
A value is always converted to the precision of the variable it is assigned
|
||||
to.
|
||||
When a floating point value is converted to an integer the fractional
|
||||
portion is rounded.
|
||||
In an expression all values are converted to the same degree of precision,
|
||||
i.e. that of the most precise operand.
|
||||
.br
|
||||
Division by zero results in the message "Division by zero".
|
||||
If overflow (or underflow) occurs, the "Overflow (underflow)" message is
|
||||
displayed and execution is terminated (contrary to Microsoft).
|
||||
.SH
|
||||
Arithmetic
|
||||
.LP
|
||||
The arithmetic operators in order of precedence,a re:
|
||||
.DS L
|
||||
^ Exponentiation
|
||||
- Negation
|
||||
*,/,\\\\\\\\,MOD Multiplication, Division, Remainder
|
||||
+,- Addition, Substraction
|
||||
.DE
|
||||
The operator \\\\ denotes integer division, its operands are rounded to
|
||||
integers before the operator is applied.
|
||||
Modulus arithmetic is denoted by the operator MOD, which yields the
|
||||
integer value that is the remainder of an integer division.
|
||||
.br
|
||||
The order in which operators are performed can be changed with parentheses.
|
||||
.SH
|
||||
Relational
|
||||
.LP
|
||||
The relational operators in order of precedence, are:
|
||||
.DS
|
||||
= Equality
|
||||
<> Inequality
|
||||
< Less than
|
||||
> Greater than
|
||||
<= Less than or equal to
|
||||
>= Greater than or equal to
|
||||
.DE
|
||||
The relational operators are used to compare two values and returns
|
||||
either "true" (-1) or "false" (0) (See IF statement).
|
||||
The precedence of the relational operators is lower
|
||||
then the arithmetic operators.
|
||||
.SH
|
||||
Logical
|
||||
.LP
|
||||
The logical operators performs tests on multiple relations, bit manipulations,
|
||||
or boolean operations.
|
||||
The logical operators returns a bitwise result ("true" or "false").
|
||||
In an expression, logical operators are performed after the relational and
|
||||
arithmetic operators.
|
||||
The logical operators work by converting their operands to signed
|
||||
two-complement integers in the range -32768 to 32767.
|
||||
.DS
|
||||
NOT Bitwise negation
|
||||
AND Bitwise and
|
||||
OR Bitwise or
|
||||
XOR Bitwise exclusive or
|
||||
EQV Bitwise equivalence
|
||||
IMP Bitwise implies
|
||||
.DE
|
||||
.SH
|
||||
Functional
|
||||
.LP
|
||||
A function is used in an expression to call a system or user defined
|
||||
function.
|
||||
A list of predefined functions is presented in chapter 3.
|
||||
.SH
|
||||
String operations
|
||||
.LP
|
||||
Strings can be concatenated by using +. Strings can be compared with
|
||||
the relational operators. String comparison is performed in lexicographic
|
||||
order.
|
||||
.NH 2
|
||||
ERROR MESSAGES
|
||||
.LP
|
||||
The occurence of an error results in termination of the program
|
||||
unless an ON....ERROR statement has been encountered.
|
||||
.bp
|
||||
.NH 1
|
||||
B-EM STATEMENTS
|
||||
.LP
|
||||
This chapter describes the statements available within the BASIC-EM
|
||||
compiler. Each description is formatted as follows:
|
||||
.Sy
|
||||
Shows the correct syntax for the statement. See introduction of
|
||||
syntax notation above.
|
||||
.PU
|
||||
Describes the purpose and details of the instructions.
|
||||
.RM
|
||||
Describes special cases, deviation from Microsoft BASIC etc.
|
||||
.LP
|
||||
.NH 2
|
||||
CALL
|
||||
.Sy
|
||||
CALL <variable name>[(<argument list>)]
|
||||
.PU
|
||||
The CALL statement provides the means to execute procedures
|
||||
and functions written in another language included in the
|
||||
Amsterdam Compiler Kit.
|
||||
The argument list consist of (subscripted) variables.
|
||||
The BASIC compiler pushes the address of the arguments on the stack in order
|
||||
of encounter.
|
||||
.RM
|
||||
Not yet available.
|
||||
.NH 2
|
||||
CLOSE
|
||||
.Sy
|
||||
CLOSE [[#]<file number>[,[#]<file number...>]]
|
||||
.PU
|
||||
To terminate I/O on a disk file.
|
||||
<file number> is the number associated with the file
|
||||
when it was OPENed (See OPEN-statement). Ommission of parameters results in closing
|
||||
all files.
|
||||
.sp
|
||||
The END statement and STOP statement always issue a CLOSE of
|
||||
all files.
|
||||
.NH 2
|
||||
DATA
|
||||
.Sy
|
||||
DATA <list of constants>
|
||||
.PU
|
||||
DATA statements are used to construct a data bank of values that are
|
||||
accessed by the program's READ statement.
|
||||
DATA statements are non-executable,
|
||||
the data items are assembled in a data file by the BASIC compiler.
|
||||
This file can be replaced, provided the layout remains
|
||||
the same (otherwise the RESTORE won't function properly).
|
||||
.sp
|
||||
The list of data items consists of numeric and string constants
|
||||
as discussed in section 1.
|
||||
Moreover, string constants starting with a letter and not
|
||||
containing blancs, newlines, commas, colon need not be enclosed with
|
||||
the string quotes.
|
||||
.sp
|
||||
DATA statements can be reread using the RESTORE statement.
|
||||
.NH 2
|
||||
DEF FN
|
||||
.Sy
|
||||
DEF FN<name> [(<parameterlist>)]=<expression>
|
||||
.PU
|
||||
To define and name a function that is written by the user.
|
||||
<name> must be an identifier and should be preceded by FN,
|
||||
which is considered integral part of the function name.
|
||||
<expression> defines the expression to be evaluated upon function call.
|
||||
.sp
|
||||
The parameter list is comprised of a comma separated
|
||||
list of variable names, used within the function definition,
|
||||
that are to replaced by values upon function call.
|
||||
The variable names defined in the parameterlist, called formal
|
||||
parameters, do not affect the definition and use of variables
|
||||
defined with the same name in the rest of the BASIC program.
|
||||
.sp
|
||||
A type declaration character may be suffixed to the function name to
|
||||
designate the data type of the function result.
|
||||
.NH 2
|
||||
DEFINT/SNG/DBL/STR
|
||||
.Sy
|
||||
DEF<type> <range of letters>
|
||||
.PU
|
||||
Any undefined variable starting with the letter included in the range of
|
||||
letters is declared of type <type> unless a type declaration character
|
||||
is appended.
|
||||
The range of letters is a comma separated list of characters and
|
||||
character ranges (<letter>-<letter>).
|
||||
.NH 2
|
||||
DIM
|
||||
.Sy
|
||||
DIM <list of subscripted variable>
|
||||
.PU
|
||||
The DIM statement allocates storage for subscripted variables.
|
||||
If an undefined subscripted variable is used
|
||||
the maximum value of the array subscript is assumed to be 10.
|
||||
A subscript out of range is signalled by the program (when ACK works)
|
||||
The minimum subscript value is 0, unless the OPTION BASE statement has been
|
||||
encountered.
|
||||
.sp
|
||||
All variables in a subscripted variable are initially zero.
|
||||
.sp
|
||||
BUGS. Multi-dimensional arrays MUST be defined. Subscript out of range is
|
||||
left unnotified.
|
||||
.NH 2
|
||||
END
|
||||
.Sy
|
||||
END
|
||||
.PU
|
||||
END terminates a BASIC program and returns to the UNIX shell.
|
||||
An END statement at the end of the BASIC program is optional.
|
||||
.NH 2
|
||||
ERR and ERL
|
||||
.Sy
|
||||
<identifier name>= ERR
|
||||
.br
|
||||
<identifier name>= ERL
|
||||
.PU
|
||||
Whenever an error occurs the variable ERR contains the
|
||||
error number and ERL the BASIC line where the error occurred.
|
||||
The variables are usually used in error handling routines
|
||||
provided by the user.
|
||||
.NH 2
|
||||
ERROR
|
||||
.Sy
|
||||
ERROR <integer expression>
|
||||
.PU
|
||||
To simulate the occurrence of a BASIC error.
|
||||
To define a private error code a value must be used that is not already in
|
||||
use by the BASIC runtime system.
|
||||
The list of error messages currently in use can be found in appendix B.
|
||||
.NH 2
|
||||
FIELD
|
||||
.PU
|
||||
To be implemented.
|
||||
.NH 2
|
||||
FOR...NEXT
|
||||
.Sy
|
||||
FOR <variable>= <low>TO<high>[STEP<size>]
|
||||
.br
|
||||
......
|
||||
.br
|
||||
NEXT [<variable>][,<variable>...]
|
||||
.PU
|
||||
The FOR statements allows a series of statements to be performed
|
||||
repeatedly. <variable> is used as a counter. During the first
|
||||
execution pass it is assigned the value <low>,
|
||||
an arithmetic expression. After each pass the counter
|
||||
is incremented (decremented) with the step size <size>, an expression.
|
||||
Ommission of the step size is intepreted as an increment of 1.
|
||||
.br
|
||||
Execution of the program lines specified between the FOR and the NEXT
|
||||
statement is terminated as soon as <low> is greater (less) than <high>
|
||||
.sp
|
||||
The NEXT statement is labeled with the name(s) of the counter to be
|
||||
incremented.
|
||||
.sp
|
||||
The variables mentioned in the NEXT statement may be ommitted, in which case
|
||||
the variable of increment the counter of the most recent FOR statement.
|
||||
If a NEXT statement is encountered before its corresponding FOR statement,
|
||||
the error message "NEXT without FOR" is generated.
|
||||
.NH 2
|
||||
GET
|
||||
.Sy
|
||||
GET [#]<file number>[, <record number>]
|
||||
.PU
|
||||
To be implemented.
|
||||
.NH 2
|
||||
GOSUB...RETURN
|
||||
.Sy
|
||||
GOSUB <line number>
|
||||
...
|
||||
.br
|
||||
RETURN
|
||||
.PU
|
||||
The GOSUB statement branches to the first statement of a subroutine.
|
||||
The RETURN statement cause a branch back to the statement following the
|
||||
most recent GOSUB statement.
|
||||
A subroutine may contain more than one RETURN statement.
|
||||
.sp
|
||||
Subroutines may be called recursively.
|
||||
Nesting of subroutine calls is limited, upon exceeding the maximum depth
|
||||
the error message "XXXXX" is displayed.
|
||||
.NH 2
|
||||
GOTO
|
||||
.Sy
|
||||
GOTO <line number>
|
||||
.PU
|
||||
To branch unconditionally to a specified line in the program.
|
||||
If <line number> does not exists, the compilation error message
|
||||
"Line not defined" is displayed.
|
||||
.RM
|
||||
Microsoft BASIC continues at the first line
|
||||
equal or greater then the line specified.
|
||||
.NH 2
|
||||
IF...THEN
|
||||
.Sy
|
||||
.br
|
||||
IF <expression> THEN {<statements>|<line number>}
|
||||
[ELSE {<statements>|<line number>}]
|
||||
.br
|
||||
.Sy
|
||||
IF <expression> GOTO <line number>
|
||||
[ELSE {<statements>|<line number>}]
|
||||
.PU
|
||||
The IF statement is used
|
||||
to make a decision regarding the program flow based on the
|
||||
result of the expressions.
|
||||
If the expression is not zero, the THEN or GOTO clause is
|
||||
executed. If the result of <expression> is zero, the THEN or
|
||||
GOTO clause is ignored and the ELSE clause, if present is
|
||||
executed.
|
||||
.br
|
||||
IF..THEN..ELSE statements may be nested.
|
||||
Nesting is limited by the length of the line.
|
||||
The ELSE clause matches with the closests unmatched THEN.
|
||||
.sp
|
||||
When using IF to test equality for a value that is the
|
||||
result of a floating point expression, remember that the
|
||||
internal representation of the value may not be exact.
|
||||
Therefore, the test should be against a range to
|
||||
handle the relative error.
|
||||
.RM
|
||||
Microsoft BASIC allows a comma before THEN.
|
||||
.NH 2
|
||||
INPUT
|
||||
.Sy
|
||||
INPUT [;][<"prompt string">;]<list of variables>
|
||||
.PU
|
||||
An INPUT statement can be used to obtain values from the user at the
|
||||
terminal.
|
||||
When an INPUT statement is encountered a question mark is printed
|
||||
to indicate the program is awaiting data.
|
||||
IF <"prompt string"> is included, the string is printed before the
|
||||
the question mark. The question mark is suppressed when the prompt
|
||||
string is followed by a comma, rather then a semicolon.
|
||||
.sp
|
||||
For each variable in the variable a list a value should be supplied.
|
||||
Data items presented should be separated by a comma.
|
||||
.sp
|
||||
The type of the variable in the variable list must aggree with the
|
||||
type of the data item entered. Responding with too few or too many
|
||||
data items causes the message "?Redo". No assignment of input values
|
||||
is made until an acceptable response is given.
|
||||
.RM
|
||||
The option to disgard the carriage return with the semicolon after the
|
||||
input symbol is not yet implemented.
|
||||
.NH 2
|
||||
INPUT [#]
|
||||
.Sy
|
||||
INPUT #<file number>,<list of variables>
|
||||
.PU
|
||||
The purpose of the INPUT# statement is to read data items from a sequential
|
||||
file and assign them to program variables.
|
||||
<file number> is the number used to open the file for input.
|
||||
The variables mentioned are (subscripted) variables.
|
||||
The type of the data items read should aggree with the type of the variables.
|
||||
A type mismatch results in the error message "XXXXX".
|
||||
.sp
|
||||
The data items on the sequential file are separated by commas and newlines.
|
||||
In scanning the file, leading spaces, new lines, tabs, and
|
||||
carriage returns are ignored. The first character encountered
|
||||
is assumed to be the state of a new item.
|
||||
String items need not be enclosed with double quotes, provided
|
||||
it does not contain spaces, tabs, newlines and commas,
|
||||
.RM
|
||||
Microsoft BASIC won't assign values until the end of input statement.
|
||||
This means that the user has to supply all the information.
|
||||
.NH 2
|
||||
LET
|
||||
.Sy
|
||||
[LET]<variable>=<expression>
|
||||
.PU
|
||||
To assign the value of an expression to a (subscribted) variable.
|
||||
The type convertions as dictated in chapter 1 apply.
|
||||
.NH 2
|
||||
LINE INPUT
|
||||
.Sy
|
||||
LINE INPUT [;][<"prompt string">;]<string variable>
|
||||
.PU
|
||||
An entire line of input is assigned to the string variable.
|
||||
See INPUT for the meaning of the <"prompt string"> option.
|
||||
.NH 2
|
||||
LINE INPUT [#]
|
||||
.Sy
|
||||
LINE INPUT #<file number>,<string variable>
|
||||
.PU
|
||||
Read an entire line of text from a sequential file <file number>
|
||||
and assign it to a string variable.
|
||||
.NH 2
|
||||
LSET and RSET
|
||||
.PU
|
||||
To be implemented
|
||||
.NH 2
|
||||
MID$
|
||||
.Sy
|
||||
MID$(<string expr1>,n[,m])=<string expr2>
|
||||
.PU
|
||||
To replace a portion of a string with another string value.
|
||||
The characters of <string expr2> replaces characters in <string expr1>
|
||||
starting at position n. If m is present, at most m characters are copied,
|
||||
otherwise all characters are copied.
|
||||
However, the string obtained never exceeds the length of string expr1.
|
||||
.NH 2
|
||||
ON ERROR GOTO
|
||||
.Sy
|
||||
ON ERROR GOTO <line number>
|
||||
.PU
|
||||
To enable error handling within the BASIC program.
|
||||
An error may result from arithmetic errors, disk problems, interrupts, or
|
||||
as a result of the ERROR statement.
|
||||
After printing an error message the program is continued at the
|
||||
statements associated with <line number>.
|
||||
.sp
|
||||
Error handling is disabled using ON ERROR GOTO 0.
|
||||
Subsequent errors result in an error message and program termination.
|
||||
.NH 2
|
||||
ON...GOSUB and ON ...GOTO
|
||||
.Sy
|
||||
ON <expression> GOSUB <list of line numbers>
|
||||
.br
|
||||
ON <expression> GOTO <list of line numbers>
|
||||
.PU
|
||||
To branch to one of several specified line numbers or subroutines, based
|
||||
on the result of the <expression>. The list of line numbers are considered
|
||||
the first, second, etc alternative. Branching to the first occurs when
|
||||
the expression evaluates to one, to the second alternative on two, etc.
|
||||
If the value of the expression is zero or greater than the number of alternatives, processing continues at the first statement following the ON..GOTO
|
||||
(ON GOSUB) statement.
|
||||
.sp
|
||||
When the expression results in a negative number the
|
||||
an "Illegal function call" error occurs.
|
||||
.sp
|
||||
BUG If the value of the expression is zero or greater than the number of
|
||||
alternatives, processing does NOT continue at the first statement
|
||||
following the ON..GOTO (ON GOSUB) statement.
|
||||
.NH 2
|
||||
OPEN
|
||||
.Sy
|
||||
OPEN {"i" | "o" | "r" } , [#]<file number> , <file-name>
|
||||
.PU
|
||||
To open <file-name> (filename should be quoted) for input/reading or output.
|
||||
If file is not opened for output it has to be existent, otherwise an
|
||||
"file not found" error will occur.
|
||||
.NH 2
|
||||
OPTION BASE
|
||||
.Sy
|
||||
OPTION BASE n
|
||||
.PU
|
||||
To declare the lower bound of subsequent array subscripts as either
|
||||
0 or 1. The default lower bound is zero.
|
||||
.NH 2
|
||||
POKE
|
||||
.Sy
|
||||
POKE <expr1>,<expr2>
|
||||
.PU
|
||||
To poke around in memory. The use of this statement is not recommended,
|
||||
because it requires full understanding of both
|
||||
the implementation of the Amsterdam
|
||||
Compiler Kit and the hardware characteristics.
|
||||
.NH 2
|
||||
PRINT
|
||||
.Sy
|
||||
PRINT <list of variables and/or constants>
|
||||
.PU
|
||||
To print constants or the contents of variables on the terminal-device.
|
||||
If the variables or constants are seperated by comma's the values will
|
||||
be printed seperated by tabs.
|
||||
If the variables or constants are seperated by semi-colon's the values
|
||||
will be printed without spaces in between.
|
||||
The new-line generated at the end of the print-statement can be suppressed by
|
||||
a semi-colon at the end of list of variables or constants.
|
||||
.NH 2
|
||||
PRINT USING
|
||||
.PU
|
||||
To be implemented
|
||||
.NH 2
|
||||
PUT
|
||||
.PU
|
||||
To be implemented
|
||||
.NH 2
|
||||
RANDOMIZE
|
||||
.Sy
|
||||
RANDOMIZE [<expression>]
|
||||
.PU
|
||||
To reset the random seed. When the expression is ommitted, the system
|
||||
will ask for a value between -32768 and 32767.
|
||||
The random number generator returns the same sequence of values provided
|
||||
the same seed is used.
|
||||
.NH 2
|
||||
READ
|
||||
.Sy
|
||||
READ <list of variables>
|
||||
.PU
|
||||
To read values from the DATA statements and assign them to variables.
|
||||
The type of the variables should match to the type of the items being read,
|
||||
otherwise a "Syntax error" occurs. If all data is read the message "Out of
|
||||
data" will be displayed.
|
||||
.NH 2
|
||||
REM
|
||||
.Sy
|
||||
REM <remark>
|
||||
.PU
|
||||
To include explantory information in a program.
|
||||
The REM statements are not executed.
|
||||
A single quote has the same effect as : REM, which
|
||||
allows for the inclusion of comment at the end of the line.
|
||||
.RM
|
||||
Microsoft BASIC does not allow REM statements as part of
|
||||
DATA lines.
|
||||
.NH 2
|
||||
RESTORE
|
||||
.Sy
|
||||
RESTORE [<line number>]
|
||||
.PU
|
||||
To allow DATA statements to be re-read from a specific line.
|
||||
After a RESTORE statement is executed, the next READ accesses
|
||||
the first item of the DATA statements.
|
||||
If <line number> is specified, the next READ accesses the first
|
||||
item in the specified line.
|
||||
.sp
|
||||
Note that data statements result in a sequential datafile generated
|
||||
by the compiler, being read by the read statements.
|
||||
This data file may be replaced using the operating system functions
|
||||
with a modified version, provided the same layout of items
|
||||
(same number of lines and items per line) is used.
|
||||
.NH 2
|
||||
STOP
|
||||
.Sy
|
||||
STOP
|
||||
.PU
|
||||
To terminate the execution of a program and return to the operating system
|
||||
command interpreter. A STOP statement results in the message "Break in line
|
||||
???"
|
||||
.NH 2
|
||||
SWAP
|
||||
.Sy
|
||||
SWAP <variable>,<variable>
|
||||
.PU
|
||||
To exchange the values of two variables.
|
||||
.sp
|
||||
BUG. Strings cannot be swapped !
|
||||
.NH 2
|
||||
TRON/TROFF
|
||||
.Sy
|
||||
TRON
|
||||
.Sy
|
||||
TROFF
|
||||
.PU
|
||||
As an aid in debugging the TRON statement results in a program
|
||||
listing each line being interpreted. TROFF disables generation of
|
||||
this code.
|
||||
.NH 2
|
||||
WHILE...WEND
|
||||
.Sy
|
||||
WHILE <expression>
|
||||
.....
|
||||
WEND
|
||||
.PU
|
||||
To execute a series of BASIC statements as long as a conditional expression
|
||||
is true. WHILE...WEND loops may be nested.
|
||||
.NH 2
|
||||
WRITE
|
||||
.Sy
|
||||
WRITE [<list of expressions>]
|
||||
.PU
|
||||
To write data at the terminal in DATA statement layout conventions.
|
||||
The expressions should be separated by commas.
|
||||
.NH 2
|
||||
WRITE #
|
||||
.Sy
|
||||
WRITE #<file number> ,<list of expressions>
|
||||
.PU
|
||||
To write a sequential data file, being opened with the "O" mode.
|
||||
The values are being writting using the DATA statements layout conventions.
|
||||
.bp
|
||||
.NH
|
||||
FUNCTIONS
|
||||
.LP
|
||||
.IP ABS(X) 25
|
||||
Returns the absolute value of expression X
|
||||
.IP ASC(X$) 25
|
||||
Returns the numeric value of the first character of the string.
|
||||
If X$ is not initialized an "Illegal function call" error
|
||||
is returned.
|
||||
.IP ATN(X) 25
|
||||
Returns the arctangent of X in radians. Result is in the range
|
||||
of -pi/2 to pi/2.
|
||||
.IP CDBL(X) 25
|
||||
Converts X to a double precision number.
|
||||
.IP CHR$(X) 25
|
||||
Converts the integer value X to its ASCII character.
|
||||
X must be in the range of 0 to 257.
|
||||
It is used for cursor addressing and generating bel signals.
|
||||
.IP CINT(X) 25
|
||||
Converts X to an integer by rounding the fractional portion.
|
||||
If X is not in the range -32768 to 32767 an "Overflow"
|
||||
error occurs.
|
||||
.IP COS(X) 25
|
||||
Returns the cosine of X in radians.
|
||||
.IP CSNG(X) 25
|
||||
Converts X to a single precision number.
|
||||
.IP CVI(<2-bytes>) 25
|
||||
Convert two byte string value to integer number.
|
||||
.IP CVS(<4-bytes>) 25
|
||||
Convert four byte string value to single precision number.
|
||||
.IP CVD(<8-bytes>) 25
|
||||
Convert eight byte string value to double precision number.
|
||||
.IP EOF[(<file-number>)] 25
|
||||
Returns -1 (true) if the end of a sequential file has been reached.
|
||||
.IP EXP(X) 25
|
||||
Returns e(base of natural logarithm) to the power of X.
|
||||
X should be less then 10000.0.
|
||||
.IP FIX(X) 25
|
||||
Returns the truncated integer part of X. FIX(X) is
|
||||
equivalent to SGN(X)*INT(ABS(X)).
|
||||
The major difference between FIX and INT is that FIX does not
|
||||
return the next lower number for negative X.
|
||||
.IP HEX$(X) 25
|
||||
Returns the string which represents the hexadecimal value of
|
||||
the decimal argument. X is rounded to an integer using CINT
|
||||
before HEX$ is evaluated.
|
||||
.IP INT(X) 25
|
||||
Returns the largest integer <= X.
|
||||
.IP INP$(X[,[#]Y]) 25
|
||||
Returns the string of X characters read from the terminal or
|
||||
the designated file.
|
||||
.IP LEN(X$) 25
|
||||
Returns the number of characters in the string X$.
|
||||
Non printable and blancs are counted too.
|
||||
.IP LOC(<file\ number>) 25
|
||||
For sequential files LOC returns
|
||||
position of the read/write head, counted in number of bytes.
|
||||
For random files the function returns the record number just
|
||||
read or written from a GET or PUT statement.
|
||||
If nothing was read or written 0 is returned.
|
||||
.IP LOG(X) 25
|
||||
Returns the natural logarithm of X. X must be greater than zero.
|
||||
.IP MID$(X,I,[J]) 25
|
||||
Returns first J characters from string X starting at position I in X.
|
||||
If J is omitted all characters starting of from position I in X are returned.
|
||||
.IP MKI$(X) 25
|
||||
Converts an integer expression to a two-byte string.
|
||||
.IP MKS$(X) 25
|
||||
Converts a single precision expression to a four-byte string.
|
||||
.IP MKD$(X) 25
|
||||
Converts a double precision expression to a eight-byte string.
|
||||
.IP OCT$(X) 25
|
||||
Returns the string which represents the octal value of the decimal
|
||||
argument. X is rounded to an integer using CINT before OCTS is evaluated.
|
||||
.IP PEEK(I) 25
|
||||
Returns the byte read from the indicated memory. (Of limited use
|
||||
in the context of ACK)
|
||||
.IP POS(I) 25
|
||||
Returns the current cursor position. To be implemented.
|
||||
.IP RIGHT$(X$,I)
|
||||
Returns the right most I characters of string X$.
|
||||
If I=0 then the empty string is returned.
|
||||
.IP RND(X) 25
|
||||
Returns a random number between 0 and 1. X is a dummy argument.
|
||||
.IP SGN(X) 25
|
||||
If X>0 , SGN(X) returns 1.
|
||||
.br
|
||||
if X=0, SGN(X) returns 0.
|
||||
.br
|
||||
if X<0, SGN(X) returns -1.
|
||||
.IP SIN(X) 25
|
||||
Returns the sine of X in radians.
|
||||
.IP SPACE$(X) 25
|
||||
Returns a string of spaces length X. The expression
|
||||
X is rounded to an integer using CINT.
|
||||
.IP STR$(X)
|
||||
Returns the string representation value of X.
|
||||
.IP STRING$(I,J) 25
|
||||
Returns thes string of length Iwhose characters all
|
||||
have ASCII code J. (or first character when J is a string)
|
||||
.IP TAB(I) 25
|
||||
Spaces to position I on the terminal. If the current
|
||||
print position is already beyond space I,TAB
|
||||
goes to that position on the next line.
|
||||
Space 1 is leftmost position, and the rightmost position
|
||||
is width minus 1. To be used within PRINT statements only.
|
||||
.IP TAN(X) 25
|
||||
Returns the tangent of X in radians. If TAN overflows
|
||||
the "Overflow" message is displayed.
|
||||
.IP VAL(X$) 25
|
||||
Returns the numerical value of string X$.
|
||||
The VAL function strips leading blanks and tabs from the
|
||||
argument string.
|
||||
.bp
|
||||
.SH
|
||||
APPENDIX A DIFFERENCES WITH MICROSOFT BASIC
|
||||
.LP
|
||||
The following list of Microsoft commands and statements are
|
||||
not recognized by the compiler.
|
||||
.DS
|
||||
SPC
|
||||
USR
|
||||
VARPTR
|
||||
AUTO
|
||||
CHAIN
|
||||
CLEAR
|
||||
CLOAD
|
||||
COMMON
|
||||
CONT
|
||||
CSAVE
|
||||
DELETE
|
||||
EDIT
|
||||
ERASE
|
||||
FRE
|
||||
KILL
|
||||
LIST
|
||||
LLIST
|
||||
LOAD
|
||||
LPRINT
|
||||
MERGE
|
||||
NAME
|
||||
NEW
|
||||
NULL
|
||||
RENUM
|
||||
RESUME
|
||||
RUN
|
||||
SAVE
|
||||
WAIT
|
||||
WIDTH LPRINT
|
||||
.DE
|
||||
Some statements are in the current implementation not available,
|
||||
but will be soon. These include:
|
||||
.DS
|
||||
CALL
|
||||
DEFUSR
|
||||
FIELD
|
||||
GET
|
||||
INKEY
|
||||
INPUT$
|
||||
INSTR$
|
||||
LEFT$
|
||||
LSET
|
||||
RSET
|
||||
PUT
|
||||
.DE
|
||||
.bp
|
||||
.SH
|
||||
APPENDIX B RESERVED WORDS IN BASIC-EM
|
||||
.LP
|
||||
The following list of words/symbols/names/identifiers are reserved, which
|
||||
means that they can not be used for variable-names.
|
||||
.DS
|
||||
ABS AND ASC AS
|
||||
ATN AUTO BASE CALL
|
||||
CDBL CHAIN CHR CINT
|
||||
CLEAR CLOAD CLOSE COMMON
|
||||
CONT COS CSNG CSAVE
|
||||
CVI CVS CVD DATA
|
||||
DEFINT DEFSNG DEFDBL DEFSTR
|
||||
DEF DELETE DIM EDIT
|
||||
ELSE END EOF ERASE
|
||||
ERROR ERR ERL ELSE
|
||||
EQV EXP FIELD FIX
|
||||
FOR FRE GET GOSUB
|
||||
GOTO HEX IF IMP
|
||||
INKEY INPUT INP INSTR
|
||||
INT KILL LEFT LEN
|
||||
LET LINE LIST LLIST
|
||||
LOAD LOC LOG LPOS
|
||||
LPRINT LSET MERGE MID
|
||||
MKI MKS MKD MOD
|
||||
NAME NEW NEXT NOT
|
||||
NULL ON OCT OPEN
|
||||
OPTION OR OUT PEEK
|
||||
POKE PRINT POS PUT
|
||||
RANDOMIZE READ REM RENUM
|
||||
REN RESTORE RESUME RETURN
|
||||
RIGHT RND RUN SAVE
|
||||
STEP SGN SIN SPACE
|
||||
SPC SQR STOP STRING
|
||||
STR SWAP TAB TAN
|
||||
THEN TO TRON TROFF
|
||||
USING USR VAL VARPTR
|
||||
WAIT WHILE WEND WIDTH
|
||||
WRITE XOR
|
||||
.DE
|
||||
42
doc/ceg/ceg.ref
Normal file
42
doc/ceg/ceg.ref
Normal file
@@ -0,0 +1,42 @@
|
||||
%T A Practical Toolkit For Making Compilers
|
||||
%A A.S. Tanenbaum
|
||||
%A H. v. Staveren
|
||||
%A E.G. Keizer
|
||||
%A J.W. Stevenson
|
||||
%J Communications of the ACM
|
||||
%V 26
|
||||
%N 9
|
||||
%D September 1983
|
||||
|
||||
%T Description of a Machine Architecture for Use with Block Structured Languages
|
||||
%A A.S. Tanenbuum
|
||||
%A H. v. Staveren
|
||||
%A E.G. Keizer
|
||||
%A J.W. Stevenson
|
||||
%R IR-81
|
||||
%I Dept. Mathematics and Computer Science, Vrije Universiteit
|
||||
%C Amsterdam
|
||||
%D August 1983
|
||||
|
||||
%T EM_CODE(3ACK)
|
||||
%A ACK Documentation
|
||||
%I Dept. Mathematics and Computer Science, Vrije Universiteit
|
||||
%C Amsterdam
|
||||
|
||||
%T ACK.OUT(5ACK)
|
||||
%A ACK Documentation
|
||||
%I Dept. Mathematics and Computer Science, Vrije Universiteit
|
||||
%C Amsterdam
|
||||
%K aout
|
||||
|
||||
%T PRINT(3ACK)
|
||||
%A ACK Documentation
|
||||
%I Dept. Mathematics and Computer Science, Vrije Universiteit
|
||||
%C Amsterdam
|
||||
|
||||
%T The C Programming Language
|
||||
%A B.W. Kernighan
|
||||
%A D.M. Ritchie
|
||||
%I Prentice-Hall Inc.
|
||||
%C Englewood Cliffs, New Jersey
|
||||
%D 1978
|
||||
1587
doc/ceg/ceg.tr
Normal file
1587
doc/ceg/ceg.tr
Normal file
File diff suppressed because it is too large
Load Diff
12
doc/ceg/proto.make
Normal file
12
doc/ceg/proto.make
Normal file
@@ -0,0 +1,12 @@
|
||||
# $Id$
|
||||
|
||||
#PARAMS do not remove this line!
|
||||
|
||||
SRC_DIR = $(SRC_HOME)/doc/ceg
|
||||
|
||||
PIC=pic
|
||||
TBL=tbl
|
||||
REFER=refer
|
||||
|
||||
$(TARGET_HOME)/doc/ceg.doc: $(SRC_DIR)/ceg.tr $(SRC_DIR)/ceg.ref
|
||||
$(PIC) $(SRC_DIR)/ceg.tr | $(REFER) -e -p $(SRC_DIR)/ceg.ref | $(TBL) > $@
|
||||
1864
doc/cg.doc
Normal file
1864
doc/cg.doc
Normal file
File diff suppressed because it is too large
Load Diff
629
doc/crefman.doc
Normal file
629
doc/crefman.doc
Normal file
@@ -0,0 +1,629 @@
|
||||
\." $Id$
|
||||
.\" eqn crefman.doc | troff -ms
|
||||
.EQ
|
||||
delim $$
|
||||
.EN
|
||||
.RP
|
||||
.TL
|
||||
ACK/CEM Compiler
|
||||
.br
|
||||
Reference Manual
|
||||
.AU
|
||||
Erik H. Baalbergen
|
||||
.AI
|
||||
Department of Mathematics and Computer Science
|
||||
Vrije Universiteit
|
||||
Amsterdam
|
||||
The Netherlands
|
||||
.AB no
|
||||
.AE
|
||||
.NH
|
||||
C Language
|
||||
.PP
|
||||
This section discusses the extensions to and deviations from the C language,
|
||||
as described in [1].
|
||||
The issues are numbered according to the reference manual.
|
||||
.SH
|
||||
2.2 Identifiers
|
||||
.PP
|
||||
Upper and lower case letters are different.
|
||||
The number of significant letters
|
||||
is 32 by default, but may be set to another value using the \fB\-M\fP option.
|
||||
The identifier length should be set according to the rest of the compilation
|
||||
programs.
|
||||
.SH
|
||||
2.3 Keywords
|
||||
.SH
|
||||
\f(CWasm\fP
|
||||
.PP
|
||||
The keyword \f(CWasm\fP
|
||||
is recognized.
|
||||
However, the statement
|
||||
.DS
|
||||
.ft CW
|
||||
asm(string);
|
||||
.ft R
|
||||
.DE
|
||||
is skipped, while a warning is given.
|
||||
.SH
|
||||
\f(CWenum\fP
|
||||
.PP
|
||||
The \f(CWenum\fP keyword is recognized and interpreted.
|
||||
.SH
|
||||
\f(CWentry\fP, \f(CWfortran\fP
|
||||
.PP
|
||||
The words \f(CWentry\fP and \f(CWfortran\fP
|
||||
are reserved under the restricted option.
|
||||
The words are not interpreted by the compiler.
|
||||
.SH
|
||||
2.4.1 Integer Constants
|
||||
.PP
|
||||
The type of an integer constant is the first of the corresponding list
|
||||
in which its value can be represented. Decimal: \f(CWint, long, unsigned long\fP;
|
||||
octal or hexadecimal: \f(CWint, unsigned, long, unsigned long\fP; suffixed by
|
||||
the letter L or l: \f(CWlong, unsigned long\fP.
|
||||
.SH
|
||||
2.4.3 Character Constants
|
||||
.PP
|
||||
A character constant is a sequence of 1 up to \f(CWsizeof(int)\fP characters
|
||||
enclosed in single quotes.
|
||||
The value of a character constant '$c sub 1 c sub 2 ... c sub n$'
|
||||
is $d sub n + M \(mu d sub {n - 1} + ... + M sup {n - 1} \(mu d sub 2 + M sup n \(mu d sub 1$,
|
||||
where M is 1 + maximum unsigned number representable in an \f(CWunsigned char\fP,
|
||||
and $d sub i$ is the signed value (ASCII)
|
||||
of character $c sub i$.
|
||||
.SH
|
||||
2.4.4 Floating Constants
|
||||
.PP
|
||||
The compiler does not support compile-time floating point arithmetic.
|
||||
.SH
|
||||
2.6 Hardware characteristics
|
||||
.PP
|
||||
The compiler is capable of producing EM code for machines with the following
|
||||
properties
|
||||
.IP \(bu
|
||||
a \f(CWchar\fP is 8 bits
|
||||
.IP \(bu
|
||||
the size of \f(CWint\fP is equal to the word size
|
||||
.IP \(bu
|
||||
the size of \f(CWshort\fP may not exceed the size of \f(CWint\fP
|
||||
.IP \(bu
|
||||
the size of \f(CWint\fP may not exceed the size of \f(CWlong\fP
|
||||
.IP \(bu
|
||||
the size of pointers is equal to the size of either \f(CWshort\fP, \f(CWint\fP
|
||||
or \f(CWlong\fP
|
||||
.LP
|
||||
.SH
|
||||
4 What's in a name?
|
||||
.SH
|
||||
\f(CWchar\fP
|
||||
.PP
|
||||
Objects of type \f(CWchar\fP are taken to be signed.
|
||||
The combination \f(CWunsigned char\fP is legal.
|
||||
.SH
|
||||
\f(CWunsigned\fP
|
||||
.PP
|
||||
The type combinations \f(CWunsigned char\fP, \f(CWunsigned short\fP and
|
||||
\f(CWunsigned long\fP are supported.
|
||||
.SH
|
||||
\f(CWenum\fP
|
||||
.PP
|
||||
The data type \f(CWenum\fP is implemented as described
|
||||
in \fIRecent Changes to C\fP (see appendix A).
|
||||
.I Cem
|
||||
treats enumeration variables as if they were \f(CWint\fP.
|
||||
.SH
|
||||
\f(CWvoid\fP
|
||||
.PP
|
||||
Type \f(CWvoid\fP is implemented.
|
||||
The type specifies an empty set of values, which takes no storage space.
|
||||
.SH
|
||||
\fRFundamental types\fP
|
||||
.PP
|
||||
The names of the fundamental types can be redefined by the user, using
|
||||
\f(CWtypedef\fP.
|
||||
.SH
|
||||
7 Expressions
|
||||
.PP
|
||||
The order of evaluation of expressions depends on the complexity of the
|
||||
subexpressions.
|
||||
In case of commutative operations, the most complex subexpression is
|
||||
evaluated first.
|
||||
Parameter lists are evaluated from right to left.
|
||||
.SH
|
||||
7.2 Unary operators
|
||||
.PP
|
||||
The type of a \f(CWsizeof\fP expression is \f(CWunsigned int\fP.
|
||||
.SH
|
||||
7.13 Conditional operator
|
||||
.PP
|
||||
Both the second and the third expression in a conditional expression may
|
||||
include assignment operators.
|
||||
They may be structs or unions.
|
||||
.SH
|
||||
7.14 Assignment operators
|
||||
.PP
|
||||
Structures may be assigned, passed as arguments to functions, and returned
|
||||
by functions.
|
||||
The types of operands taking part must be the same.
|
||||
.SH
|
||||
8.2 Type specifiers
|
||||
.PP
|
||||
The combinations \f(CWunsigned char\fP, \f(CWunsigned short\fP
|
||||
and \f(CWunsigned long\fP are implemented.
|
||||
.SH
|
||||
8.5 Structure and union declarations
|
||||
.PP
|
||||
Fields of any integral type, either signed or unsigned,
|
||||
are supported, as long as the type fits in a word on the target machine.
|
||||
.PP
|
||||
Fields are left adjusted by default; the first field is put into the left
|
||||
part of a word, the next one on the right side of the first one, etc.
|
||||
The \f(CW-Vr\fP option in the call of the compiler
|
||||
causes fields to be right adjusted within a machine word.
|
||||
.PP
|
||||
The tags of structs and unions occupy a different name space from that of
|
||||
variables and that of member names.
|
||||
.SH
|
||||
9.7 Switch statement
|
||||
.PP
|
||||
The type of \fIexpression\fP in
|
||||
.DS
|
||||
.ft CW
|
||||
\f(CWswitch (\fP\fIexpression\fP\f(CW)\fP \fIstatement\fP
|
||||
.ft
|
||||
.DE
|
||||
must be integral.
|
||||
A warning is given under the restricted option if the type is \f(CWlong\fP.
|
||||
.SH
|
||||
10 External definitions
|
||||
.PP
|
||||
See [4] for a discussion on this complicated issue.
|
||||
.SH
|
||||
10.1 External function definitions
|
||||
.PP
|
||||
Structures may be passed as arguments to functions, and returned
|
||||
by functions.
|
||||
.SH
|
||||
11.1 Lexical scope
|
||||
.PP
|
||||
Typedef names may be redeclared like any other variable name; the ice mentioned
|
||||
in \(sc11.1 is walked correctly.
|
||||
.SH
|
||||
12 Compiler control lines
|
||||
.PP
|
||||
Lines which do not occur within comment, and with \f(CW#\fP as first
|
||||
character, are interpreted as compiler control line.
|
||||
There may be an arbitrary number of spaces, tabs and comments (collectively
|
||||
referred as \fIwhite space\fP) following the \f(CW#\fP.
|
||||
Comments may contain newline characters.
|
||||
Control lines with only white space between the \f(CW#\fP and the line separator
|
||||
are skipped.
|
||||
.PP
|
||||
The #\f(CWinclude\fP, #\f(CWifdef\fP, #\f(CWifndef\fP, #\f(CWundef\fP, #\f(CWelse\fP and
|
||||
#\f(CWendif\fP control lines and line directives consist of a fixed number of
|
||||
arguments.
|
||||
The list of arguments may be followed an arbitrary sequence of characters,
|
||||
in which comment is interpreted as such.
|
||||
(I.e., the text between \f(CW/*\fP and \f(CW*/\fP is skipped, regardless of
|
||||
newlines; note that commented-out lines beginning with \f(CW#\fP are not
|
||||
considered to be control lines.)
|
||||
.SH
|
||||
12.1 Token replacement
|
||||
.PP
|
||||
The replacement text of macros is taken to be a string of characters, in which
|
||||
an identifier may stand for a formal parameter, and in which comment is
|
||||
interpreted as such.
|
||||
Comments and newline characters, preceeded by a backslash, in the replacement
|
||||
text are replaced by a space character.
|
||||
.PP
|
||||
The actual parameters of a macro are considered tokens and are
|
||||
balanced with regard to \f(CW()\fP, \f(CW{}\fP and \f(CW[]\fP.
|
||||
This prevents the use of macros like
|
||||
.DS
|
||||
.ft CW
|
||||
CTL([)
|
||||
.ft
|
||||
.DE
|
||||
.PP
|
||||
Formal parameters of a macro must have unique names within the formal-parameter
|
||||
list of that macro.
|
||||
.PP
|
||||
A message is given at the definition of a macro if the macro has
|
||||
already been #\f(CWdefined\fP, while the number of formal parameters differ or
|
||||
the replacement texts are not equal (apart from leading and trailing
|
||||
white space).
|
||||
.PP
|
||||
Recursive use of macros is detected by the compiler.
|
||||
.PP
|
||||
Standard #\f(CWdefined\fP macros are
|
||||
.DS
|
||||
\f(CW__FILE__\fP name of current input file as string constant
|
||||
\f(CW__DATE__\fP curent date as string constant; e.g. \f(CW"Tue Wed 2 14:45:23 1986"\fP
|
||||
\f(CW__LINE__\fP current line number as an integer
|
||||
.DE
|
||||
.PP
|
||||
No message is given if \fIidentifier\fP is not known in
|
||||
.DS
|
||||
.ft CW
|
||||
#undef \fIidentifier\fP
|
||||
.ft
|
||||
.DE
|
||||
.SH
|
||||
12.2 File inclusion
|
||||
.PP
|
||||
A newline character is appended to each file which is included.
|
||||
.SH
|
||||
12.3 Conditional compilation
|
||||
.PP
|
||||
The #\f(CWif\fP, #\f(CWifdef\fP and #\f(CWifndef\fP control lines may be followed
|
||||
by an arbitrary number of
|
||||
.DS
|
||||
.ft CW
|
||||
#elif \fIconstant-expression\fP
|
||||
.ft
|
||||
.DE
|
||||
control lines, before the corresponding #\f(CWelse\fP or #\f(CWendif\fP
|
||||
is encountered.
|
||||
The construct
|
||||
.DS
|
||||
.ft CW
|
||||
#elif \fIconstant-expression\fP
|
||||
some text
|
||||
#endif /* corresponding to #elif */
|
||||
.ft
|
||||
.DE
|
||||
is equivalent to
|
||||
.DS
|
||||
.ft CW
|
||||
#else
|
||||
#if \fIconstant-expression\fP
|
||||
some text
|
||||
#endif /* corresponding to #if */
|
||||
#endif /* corresponding to #else */
|
||||
.ft
|
||||
.DE
|
||||
.PP
|
||||
The \fIconstant-expression\fP in #\f(CWif\fP and #\f(CWelif\fP control lines
|
||||
may contain the construction
|
||||
.DS
|
||||
.ft CW
|
||||
defined(\fIidentifier\fP)
|
||||
.ft
|
||||
.DE
|
||||
which is replaced by \f(CW1\fP, if \fIidentifier\fP has been #\f(CWdefined\fP,
|
||||
and by \f(CW0\fP, if not.
|
||||
.PP
|
||||
Comments in skipped lines are interpreted as such.
|
||||
.SH
|
||||
12.4 Line control
|
||||
.PP
|
||||
Line directives may occur in the following forms:
|
||||
.DS
|
||||
.ft CW
|
||||
#line \fIconstant\fP
|
||||
#line \fIconstant\fP "\fIfilename\fP"
|
||||
#\fIconstant\fP
|
||||
#\fIconstant\fP "\fIfilename\fP"
|
||||
.ft
|
||||
.DE
|
||||
Note that \fIfilename\fP is enclosed in double quotes.
|
||||
.SH
|
||||
14.2 Functions
|
||||
.PP
|
||||
If a pointer to a function is called, the function the pointer points to
|
||||
is called instead.
|
||||
.SH
|
||||
15 Constant expressions
|
||||
.PP
|
||||
The compiler distinguishes the following types of integral constant expressions
|
||||
.IP \(bu
|
||||
field-width specifier
|
||||
.IP \(bu
|
||||
case-entry specifier
|
||||
.IP \(bu
|
||||
array-size specifier
|
||||
.IP \(bu
|
||||
global variable initialization value
|
||||
.IP \(bu
|
||||
enum-value specifier
|
||||
.IP \(bu
|
||||
truth value in \f(CW#if\fP control line
|
||||
.LP
|
||||
.PP
|
||||
Constant integral expressions are compile-time evaluated while an effort
|
||||
is made to report overflow.
|
||||
Constant floating expressions are not compile-time evaluated.
|
||||
.NH
|
||||
Compiler flags
|
||||
.IP \fB\-C\fR
|
||||
Run the preprocessor stand-alone while maintaining the comments.
|
||||
Line directives are produced whenever needed.
|
||||
.IP \fB\-D\fP\fIname\fP=\fIstring-of-characters\fP
|
||||
.br
|
||||
Define \fIname\fR as macro with \fIstring-of-characters\fR as
|
||||
replacement text.
|
||||
.IP \fB\-D\fP\fIname\fP
|
||||
.br
|
||||
Equal to \fB\-D\fP\fIname\fP\fB=1\fP.
|
||||
.IP \fB\-E\fP
|
||||
Run the preprocessor stand alone, i.e.,
|
||||
list the sequence of input tokens and delete any comments.
|
||||
Line directives are produced whenever needed.
|
||||
.IP \fB\-I\fIpath\fR
|
||||
.br
|
||||
Prepend \fIpath\fR to the list of include directories.
|
||||
To put the directories "include", "sys/h" and "util/h" into the
|
||||
include directory list in that order, the user has to specify
|
||||
.DS
|
||||
.ft CW
|
||||
-Iinclude -Isys/h -Iutil/h
|
||||
.ft R
|
||||
.DE
|
||||
An empty \fIpath\fP causes the standard include
|
||||
directory (usually \f(CW/usr/include\fP) to be forgotten.
|
||||
.IP \fB\-M\fP\fIn\fP
|
||||
.br
|
||||
Set maximum significant identifier length to \fIn\fP.
|
||||
.IP \fB\-n\fP
|
||||
Suppress EM register messages.
|
||||
The user-declared variables are not stored into registers on the target
|
||||
machine.
|
||||
.IP \fB\-p\fP
|
||||
Generate the EM \fBfil\fP and \fBlin\fP instructions in order to enable
|
||||
an interpreter to keep track of the current location in the source code.
|
||||
.IP \fB\-P\fP
|
||||
Equivalent with \fB\-E\fP, but without line directives.
|
||||
.IP \fB\-R\fP
|
||||
Interpret the input as restricted C (according to the language as
|
||||
described in [1]).
|
||||
.IP \fB\-T\fP\fIpath\fP
|
||||
.br
|
||||
Create temporary files, if necessary, in directory \fIpath\fP.
|
||||
.IP \fB\-U\fP\fIname\fP
|
||||
.br
|
||||
Get rid of the compiler-predefined macro \fIname\fP, i.e.,
|
||||
consider
|
||||
.DS
|
||||
.ft CW
|
||||
#undef \fIname\fP
|
||||
.ft R
|
||||
.DE
|
||||
to appear in the beginning of the file.
|
||||
.IP \fB\-V\fIcm\fR.\fIn\fR,\ \fB\-V\fIcm\fR.\fIncm\fR.\fIn\fR\ ...
|
||||
.br
|
||||
Set the size and alignment requirements.
|
||||
The letter \fIc\fR indicates the simple type, which is one of
|
||||
\fBs\fR(short), \fBi\fR(int), \fBl\fR(long), \fBf\fR(float), \fBd\fR(double)
|
||||
or \fBp\fR(pointer).
|
||||
If \fIc\fR is \fBS\fP or \fBU\fP, then \fIn\fP is taken to be the initial
|
||||
alignment of structs or unions, respectively.
|
||||
The effective alignment of a struct or union is the least common multiple
|
||||
of the initial struct/union alignment and the alignments of its members.
|
||||
The \fIm\fR parameter can be used to specify the length of the type (in bytes)
|
||||
and the \fIn\fR parameter for the alignment of that type.
|
||||
Absence of \fIm\fR or \fIn\fR causes the default value to be retained.
|
||||
To specify that the bitfields should be right adjusted instead of the
|
||||
default left adjustment, specify \fBr\fR as \fIc\fR parameter.
|
||||
.IP \fB\-w\fR
|
||||
Suppress warning messages
|
||||
.IP \fB\-\-\fIcharacter\fR
|
||||
.br
|
||||
Set debug-flag \fIcharacter\fP.
|
||||
This enables some special features offered by a debug and develop version of
|
||||
the compiler.
|
||||
Some particular flags may be recognized, others may have surprising effects.
|
||||
.RS
|
||||
.IP \fBd\fP
|
||||
Generate a dependency graph, reflecting the calling structure of functions.
|
||||
Lines of the form
|
||||
.DS
|
||||
.ft CW
|
||||
DFA: \fIcalling-function\fP: \fIcalled-function\fP
|
||||
.ft
|
||||
.DE
|
||||
are generated whenever a function call is encountered.
|
||||
.IP \fBf\fP
|
||||
Dump whole identifier table, including macros and reserved words.
|
||||
.IP \fBh\fP
|
||||
Supply hash-table statistics.
|
||||
.IP \fBi\fP
|
||||
Print names of included files.
|
||||
.IP \fBm\fP
|
||||
Supply statistics concerning the memory allocation.
|
||||
.IP \fBt\fP
|
||||
Dump table of identifiers.
|
||||
.IP \fBu\fP
|
||||
Generate extra statistics concerning the predefined types and identifiers.
|
||||
Works in combination with \fBf\fP or \fBt\fP.
|
||||
.IP \fBx\fP
|
||||
Print expression trees in human-readable format.
|
||||
.RE
|
||||
.LP
|
||||
.SH
|
||||
References
|
||||
.IP [1]
|
||||
Brian W. Kernighan, Dennis M. Ritchie,
|
||||
.I
|
||||
The C Programming Language
|
||||
.R
|
||||
.IP [2]
|
||||
L. Rosler,
|
||||
.I
|
||||
Draft Proposed Standard - Programming Language C,
|
||||
.R
|
||||
ANSI X3J11 Language Subcommittee
|
||||
.IP [3]
|
||||
Erik H. Baalbergen, Dick Grune, Maarten Waage,
|
||||
.I
|
||||
The CEM Compiler,
|
||||
.R
|
||||
Informatica Manual IM-4, Dept. of Mathematics and Computer Science, Vrije
|
||||
Universiteit, Amsterdam, The Netherlands
|
||||
.IP [4]
|
||||
Erik H. Baalbergen,
|
||||
.I
|
||||
Modeling global declarations in C,
|
||||
.R
|
||||
internal paper
|
||||
.LP
|
||||
.bp
|
||||
.SH
|
||||
Appendix A - Enumeration Type
|
||||
.PP
|
||||
The syntax is
|
||||
.sp
|
||||
.RS
|
||||
.I enum-specifier :
|
||||
.RS
|
||||
\&\f(CWenum\fP { \fIenum-list\fP }
|
||||
.br
|
||||
\&\f(CWenum\fP \fIidentifier\fP { \fIenum-list\fP }
|
||||
.br
|
||||
\&\f(CWenum\fP \fIidentifier\fP
|
||||
.RE
|
||||
.sp
|
||||
\&\fIenum-list\fP :
|
||||
.RS
|
||||
\&\fIenumerator\fP
|
||||
.br
|
||||
\&\fIenum-list\fP , \fIenumerator\fP
|
||||
.RE
|
||||
.sp
|
||||
\&\fIenumerator\fP :
|
||||
.RS
|
||||
\&\fIidentifier\fP
|
||||
.br
|
||||
\&\fIidentifier\fP = \fIconstant-expression\fP
|
||||
.RE
|
||||
.sp
|
||||
.RE
|
||||
The identifier has the same role as the structure tag in a struct specification.
|
||||
It names a particular enumeration type.
|
||||
.PP
|
||||
The identifiers in the enum-list are declared as constants, and may appear
|
||||
whenever constants are required.
|
||||
If no enumerators with
|
||||
.B =
|
||||
appear, then the values of the constants begin at 0 and increase by 1 as the
|
||||
declaration is read from left to right.
|
||||
An enumerator with
|
||||
.B =
|
||||
gives the associated identifier the value indicated; subsequent identifiers
|
||||
continue the progression from the assigned value.
|
||||
.PP
|
||||
Enumeration tags and constants must all be distinct, and, unlike structure
|
||||
tags and members, are drawn from the same set as ordinary identifiers.
|
||||
.PP
|
||||
Objects of a given enumeration type are regarded as having a type distinct
|
||||
from objects of all other types.
|
||||
.bp
|
||||
.SH
|
||||
Appendix B: C grammar in LL(1) form
|
||||
.PP
|
||||
The \fBbold-faced\fP and \fIitalicized\fP tokens represent terminal symbols.
|
||||
.vs 16
|
||||
.nf
|
||||
\fBexternal definitions\fP
|
||||
program: external-definition*
|
||||
external-definition: ext-decl-specifiers [declarator [function | non-function] | '\fB;\fP'] | asm-statement
|
||||
ext-decl-specifiers: decl-specifiers?
|
||||
non-function: initializer? ['\fB,\fP' init-declarator]* '\fB;\fP'
|
||||
function: declaration* compound-statement
|
||||
.sp 1
|
||||
\fBdeclarations\fP
|
||||
declaration: decl-specifiers init-declarator-list? '\fB;\fP'
|
||||
decl-specifiers: other-specifier+ [single-type-specifier other-specifier*]? | single-type-specifier other-specifier*
|
||||
other-specifier: \fBauto\fP | \fBstatic\fP | \fBextern\fP | \fBtypedef\fP | \fBregister\fP | \fBshort\fP | \fBlong\fP | \fBunsigned\fP
|
||||
type-specifier: decl-specifiers
|
||||
single-type-specifier: \fItype-identifier\fP | struct-or-union-specifier | enum-specifier
|
||||
init-declarator-list: init-declarator ['\fB,\fP' init-declarator]*
|
||||
init-declarator: declarator initializer?
|
||||
declarator: primary-declarator ['\fB(\fP' formal-list ? '\fB)\fP' | arrayer]* | '\fB*\fP' declarator
|
||||
primary-declarator: identifier | '\fB(\fP' declarator '\fB)\fP'
|
||||
arrayer: '\fB[\fP' constant-expression? '\fB]\fP'
|
||||
formal-list: formal ['\fB,\fP' formal]*
|
||||
formal: identifier
|
||||
enum-specifier: \fBenum\fP [enumerator-pack | identifier enumerator-pack?]
|
||||
enumerator-pack: '\fB{\fP' enumerator ['\fB,\fP' enumerator]* '\fB,\fP'? '\fB}\fP'
|
||||
enumerator: identifier ['\fB=\fP' constant-expression]?
|
||||
struct-or-union-specifier: [ \fBstruct\fP | \fBunion\fP] [ struct-declaration-pack | identifier struct-declaration-pack?]
|
||||
struct-declaration-pack: '\fB{\fP' struct-declaration+ '\fB}\fP'
|
||||
struct-declaration: type-specifier struct-declarator-list '\fB;\fP'?
|
||||
struct-declarator-list: struct-declarator ['\fB,\fP' struct-declarator]*
|
||||
struct-declarator: declarator bit-expression? | bit-expression
|
||||
bit-expression: '\fB:\fP' constant-expression
|
||||
initializer: '\fB=\fP'? initial-value
|
||||
cast: '\fB(\fP' type-specifier abstract-declarator '\fB)\fP'
|
||||
abstract-declarator: primary-abstract-declarator ['\fB(\fP' '\fB)\fP' | arrayer]* | '\fB*\fP' abstract-declarator
|
||||
primary-abstract-declarator: ['\fB(\fP' abstract-declarator '\fB)\fP']?
|
||||
.sp 1
|
||||
\fBstatements\fP
|
||||
statement:
|
||||
expression-statement
|
||||
| label '\fB:\fP' statement
|
||||
| compound-statement
|
||||
| if-statement
|
||||
| while-statement
|
||||
| do-statement
|
||||
| for-statement
|
||||
| switch-statement
|
||||
| case-statement
|
||||
| default-statement
|
||||
| break-statement
|
||||
| continue-statement
|
||||
| return-statement
|
||||
| jump
|
||||
| '\fB;\fP'
|
||||
| asm-statement
|
||||
;
|
||||
expression-statement: expression '\fB;\fP'
|
||||
label: identifier
|
||||
if-statement: \fBif\fP '\fB(\fP' expression '\fB)\fP' statement [\fBelse\fP statement]?
|
||||
while-statement: \fBwhile\fP '\fB(\fP' expression '\fB)\fP' statement
|
||||
do-statement: \fBdo\fP statement \fBwhile\fP '\fB(\fP' expression '\fB)\fP' '\fB;\fP'
|
||||
for-statement: \fBfor\fP '\fB(\fP' expression? '\fB;\fP' expression? '\fB;\fP' expression? '\fB)\fP' statement
|
||||
switch-statement: \fBswitch\fP '\fB(\fP' expression '\fB)\fP' statement
|
||||
case-statement: \fBcase\fP constant-expression '\fB:\fP' statement
|
||||
default-statement: \fBdefault\fP '\fB:\fP' statement
|
||||
break-statement: \fBbreak\fP '\fB;\fP'
|
||||
continue-statement: \fBcontinue\fP '\fB;\fP'
|
||||
return-statement: \fBreturn\fP expression? '\fB;\fP'
|
||||
jump: \fBgoto\fP identifier '\fB;\fP'
|
||||
compound-statement: '\fB{\fP' declaration* statement* '\fB}\fP'
|
||||
asm-statement: \fBasm\fP '\fB(\fP' \fIstring\fP '\fB)\fP' '\fB;\fP'
|
||||
.sp 1
|
||||
\fBexpressions\fP
|
||||
initial-value: assignment-expression | initial-value-pack
|
||||
initial-value-pack: '\fB{\fP' initial-value-list '\fB}\fP'
|
||||
initial-value-list: initial-value ['\fB,\fP' initial-value]* '\fB,\fP'?
|
||||
primary: \fIidentifier\fP | constant | \fIstring\fP | '\fB(\fP' expression '\fB)\fP'
|
||||
secundary: primary [index-pack | parameter-pack | selection]*
|
||||
index-pack: '\fB[\fP' expression '\fB]\fP'
|
||||
parameter-pack: '\fB(\fP' parameter-list? '\fB)\fP'
|
||||
selection: ['\fB.\fP' | '\fB\->\fP'] identifier
|
||||
parameter-list: assignment-expression ['\fB,\fP' assignment-expression]*
|
||||
postfixed: secundary postop?
|
||||
unary: cast unary | postfixed | unop unary | size-of
|
||||
size-of: \fBsizeof\fP [cast | unary]
|
||||
binary-expression: unary [binop binary-expression]*
|
||||
conditional-expression: binary-expression ['\fB?\fP' expression '\fB:\fP' assignment-expression]?
|
||||
assignment-expression: conditional-expression [asgnop assignment-expression]?
|
||||
expression: assignment-expression ['\fB,\fP' assignment-expression]*
|
||||
unop: '\fB*\fP' | '\fB&\fP' | '\fB\-\fP' | '\fB!\fP' | '\fB~ \fP' | '\fB++\fP' | '\fB\-\-\fP'
|
||||
postop: '\fB++\fP' | '\fB\-\-\fP'
|
||||
multop: '\fB*\fP' | '\fB/\fP' | '\fB%\fP'
|
||||
addop: '\fB+\fP' | '\fB\-\fP'
|
||||
shiftop: '\fB<<\fP' | '\fB>>\fP'
|
||||
relop: '\fB<\fP' | '\fB>\fP' | '\fB<=\fP' | '\fB>=\fP'
|
||||
eqop: '\fB==\fP' | '\fB!=\fP'
|
||||
arithop: multop | addop | shiftop | '\fB&\fP' | '\fB^ \fP' | '\fB|\fP'
|
||||
binop: arithop | relop | eqop | '\fB&&\fP' | '\fB||\fP'
|
||||
asgnop: '\fB=\fP' | '\fB+\fP' '\fB=\fP' | '\fB\-\fP' '\fB=\fP' | '\fB*\fP' '\fB=\fP' | '\fB/\fP' '\fB=\fP' | '\fB%\fP' '\fB=\fP'
|
||||
| '\fB<<\fP' '\fB=\fP' | '\fB>>\fP' '\fB=\fP' | '\fB&\fP' '\fB=\fP' | '\fB^ \fP' '\fB=\fP' | '\fB|\fP' '\fB=\fP'
|
||||
| '\fB+=\fP' | '\fB\-=\fP' | '\fB*=\fP' | '\fB/=\fP' | '\fB%=\fP'
|
||||
| '\fB<<=\fP' | '\fB>>=\fP' | '\fB&=\fP' | '\fB^=\fP' | '\fB|=\fP'
|
||||
constant: \fIinteger\fP | \fIfloating\fP
|
||||
constant-expression: assignment-expression
|
||||
identifier: \fIidentifier\fP | \fItype-identifier\fP
|
||||
.fi
|
||||
162
doc/ego/bo/bo1
Normal file
162
doc/ego/bo/bo1
Normal file
@@ -0,0 +1,162 @@
|
||||
.bp
|
||||
.NH 1
|
||||
Branch Optimization
|
||||
.NH 2
|
||||
Introduction
|
||||
.PP
|
||||
The Branch Optimization phase (BO) performs two related
|
||||
(branch) optimizations.
|
||||
.NH 3
|
||||
Fusion of basic blocks
|
||||
.PP
|
||||
If two basic blocks B1 and B2 have the following properties:
|
||||
.DS
|
||||
SUCC(B1) = {B2}
|
||||
PRED(B2) = {B1}
|
||||
.DE
|
||||
then B1 and B2 can be combined into one basic block.
|
||||
If B1 ends in an unconditional jump to the beginning of B2, this
|
||||
jump can be eliminated,
|
||||
hence saving a little execution time and object code size.
|
||||
This technique can be used to eliminate some deficiencies
|
||||
introduced by the front ends (for example, the "C" front end
|
||||
translates switch statements inefficiently due to its one pass nature).
|
||||
.NH 3
|
||||
While-loop optimization
|
||||
.PP
|
||||
The straightforward way to translate a while loop is to
|
||||
put the test for loop termination at the beginning of the loop.
|
||||
.DS
|
||||
while cond loop \kyLAB1: \kxTest cond
|
||||
body of the loop --->\h'|\nxu'Branch On False To LAB2
|
||||
end loop\h'|\nxu'code for body of loop
|
||||
\h'|\nxu'Branch To LAB1
|
||||
\h'|\nyu'LAB2:
|
||||
|
||||
Fig. 10.1 Example of Branch Optimization
|
||||
.DE
|
||||
If the condition fails at the Nth iteration, the following code
|
||||
gets executed (dynamically):
|
||||
.DS
|
||||
.TS
|
||||
l l l.
|
||||
N * conditional branch (which fails N-1 times)
|
||||
N-1 * unconditional branch
|
||||
N-1 * body of the loop
|
||||
.TE
|
||||
.DE
|
||||
An alternative translation is:
|
||||
.DS
|
||||
Branch To LAB2
|
||||
LAB1:
|
||||
code for body of loop
|
||||
LAB2:
|
||||
Test cond
|
||||
Branch On True To LAB1
|
||||
.DE
|
||||
This translation results in the following profile:
|
||||
.DS
|
||||
.TS
|
||||
l l l.
|
||||
N * conditional branch (which succeeds N-1 times)
|
||||
1 * unconditional branch
|
||||
N-1 * body of the loop
|
||||
.TE
|
||||
.DE
|
||||
So the second translation will be significantly faster if N >> 2.
|
||||
If N=2, execution time will be slightly increased.
|
||||
On the average, the program will be speeded up.
|
||||
Note that the code sizes of the two translations will be the same.
|
||||
.NH 2
|
||||
Implementation
|
||||
.PP
|
||||
The basic block fusion technique is implemented
|
||||
by traversing the control flow graph of a procedure,
|
||||
looking for basic blocks B with only one successor (S).
|
||||
If one is found, it is checked if S has only one predecessor
|
||||
(which has to be B).
|
||||
If so, the two basic blocks can in principle be combined.
|
||||
However, as one basic block will have to be moved,
|
||||
the textual order of the basic blocks will be altered.
|
||||
This reordering causes severe problems in the presence
|
||||
of conditional jumps.
|
||||
For example, if S ends in a conditional branch,
|
||||
the basic block that comes textually next to S must stay
|
||||
in that position.
|
||||
So the transformation in Fig. 10.2 is illegal.
|
||||
.DS
|
||||
.TS
|
||||
l l l l l.
|
||||
LAB1: S1 LAB1: S1
|
||||
BRA LAB2 S2
|
||||
... --> BEQ LAB3
|
||||
LAB2: S2 ...
|
||||
BEQ LAB3 S3
|
||||
S3
|
||||
.TE
|
||||
|
||||
Fig. 10.2 An illegal transformation of Branch Optimization
|
||||
.DE
|
||||
If B is moved towards S the same problem occurs if the block before B
|
||||
ends in a conditional jump.
|
||||
The problem could be solved by adding one extra branch,
|
||||
but this would reduce the gains of the optimization to zero.
|
||||
Hence the optimization will only be done if the block that
|
||||
follows S (in the textual order) is not a successor of S.
|
||||
This condition assures that S does not end in a conditional branch.
|
||||
The condition always holds for the code generated by the "C"
|
||||
front end for a switch statement.
|
||||
.PP
|
||||
After the transformation has been performed,
|
||||
some attributes of the basic blocks involved (such as successor and
|
||||
predecessor sets and immediate dominator) must be recomputed.
|
||||
.PP
|
||||
The while-loop technique is applied to one loop at a time.
|
||||
The list of basic blocks of the loop is traversed to find
|
||||
a block B that satisfies the following conditions:
|
||||
.IP 1.
|
||||
the textually next block to B is not part of the loop
|
||||
.IP 2.
|
||||
the last instruction of B is an unconditional branch;
|
||||
hence B has only one successor, say S
|
||||
.IP 3.
|
||||
the textually next block of B is a successor of S
|
||||
.IP 4.
|
||||
the last instruction of S is a conditional branch
|
||||
.LP
|
||||
If such a block B is found, the control flow graph is changed
|
||||
as depicted in Fig. 10.3.
|
||||
.DS
|
||||
.ft 5
|
||||
| |
|
||||
| v
|
||||
v |
|
||||
|-----<------| ----->-----|
|
||||
____|____ | |
|
||||
| | | |-------| |
|
||||
| S1 | | | v |
|
||||
| Bcc | | | .... |
|
||||
|--| | | | |
|
||||
| --------- | | ----|---- |
|
||||
| | | | | |
|
||||
| .... ^ | | S2 | |
|
||||
| | | | | |
|
||||
| --------- | | | | |
|
||||
v | | | ^ --------- |
|
||||
| | S2 | | | | |
|
||||
| | BRA | | | |-----<-----
|
||||
| | | | | v
|
||||
| --------- | | ____|____
|
||||
| | | | | |
|
||||
| ------>------ | | S1 |
|
||||
| | | Bnn |
|
||||
|-------| | | |
|
||||
| | ----|----
|
||||
v | |
|
||||
|----<--|
|
||||
|
|
||||
v
|
||||
.ft R
|
||||
|
||||
Fig. 10.3 Transformation of the CFG by Branch Optimization
|
||||
.DE
|
||||
65
doc/ego/ca/ca1
Normal file
65
doc/ego/ca/ca1
Normal file
@@ -0,0 +1,65 @@
|
||||
.bp
|
||||
.NH 1
|
||||
Compact assembly generation
|
||||
.NH 2
|
||||
Introduction
|
||||
.PP
|
||||
The "Compact Assembly generation phase" (CA) transforms the
|
||||
intermediate code of the optimizer into EM code in
|
||||
Compact Assembly Language (CAL) format.
|
||||
In the intermediate code, all program entities
|
||||
(such as procedures, labels, global variables)
|
||||
are denoted by a unique identifying number (see 3.5).
|
||||
In the CAL output of the optimizer these numbers have to
|
||||
be replaced by normal identifiers (strings).
|
||||
The original identifiers of the input program are used whenever possible.
|
||||
Recall that the IC phase generates two files that can be
|
||||
used to map unique identifying numbers to procedure names and
|
||||
global variable names.
|
||||
For instruction labels CA always generates new names.
|
||||
The reasons for doing so are:
|
||||
.IP -
|
||||
instruction labels are only visible inside one procedure, so they can
|
||||
not be referenced in other modules
|
||||
.IP -
|
||||
the names are not very suggestive anyway, as they must be integer numbers
|
||||
.IP -
|
||||
the optimizer considerably changes the control structure of the program,
|
||||
so there is really no one to one mapping of instruction labels in
|
||||
the input and the output program.
|
||||
.LP
|
||||
As the optimizer combines all input modules into one module,
|
||||
visibility problems may occur.
|
||||
Two modules M1 and M2 can both define an identifier X (provided that
|
||||
X is not externally visible in any of these modules).
|
||||
If M1 and M2 are combined into one module M, two distinct
|
||||
entities with the same name would exist in M, which
|
||||
is not allowed.
|
||||
.[~[
|
||||
tanenbaum machine architecture
|
||||
.], section 11.1.4.3]
|
||||
In these cases, CA invents a new unique name for one of the entities.
|
||||
.NH 2
|
||||
Implementation
|
||||
.PP
|
||||
CA first reads the files containing the procedure and global variable names
|
||||
and stores the names in two tables.
|
||||
It scans these tables to make sure that all names are different.
|
||||
Subsequently it reads the EM text, one procedure at a time,
|
||||
and outputs it in CAL format.
|
||||
The major part of the code that does the latter transformation
|
||||
is adapted from the EM Peephole Optimizer.
|
||||
.PP
|
||||
The main problem of the implementation of CA is to
|
||||
assure that the visibility rules are obeyed.
|
||||
If an identifier must be externally visible (i.e.
|
||||
it was externally visible in the input program)
|
||||
and the identifier is defined (in the output program) before
|
||||
being referenced,
|
||||
an EXA or EXP pseudo must be generated for it.
|
||||
(Note that the optimizer may change the order of definitions and
|
||||
references, so some pseudos may be needed that were not
|
||||
present in the input program).
|
||||
On the other hand, an identifier may be only internally visible.
|
||||
If such an identifier is referenced before being defined,
|
||||
an INA or INP pseudo must be emitted prior to its first reference.
|
||||
94
doc/ego/cf/cf1
Normal file
94
doc/ego/cf/cf1
Normal file
@@ -0,0 +1,94 @@
|
||||
.bp
|
||||
.NH
|
||||
The Control Flow Phase
|
||||
.PP
|
||||
In the previous chapter we described the intermediate
|
||||
code of the global optimizer.
|
||||
We also specified which part of this code
|
||||
was constructed by the IC phase of the optimizer.
|
||||
The Control Flow Phase (\fICF\fR) does
|
||||
the remainder of the job,
|
||||
i.e. it determines:
|
||||
.IP -
|
||||
the control flow graphs
|
||||
.IP -
|
||||
the loop tables
|
||||
.IP -
|
||||
the calling, change and use attributes of
|
||||
the procedure table entries
|
||||
.LP
|
||||
CF operates on one procedure at a time.
|
||||
For every procedure it first reads the EM instructions
|
||||
from the EM-text file and groups them into basic blocks.
|
||||
For every basic block, its successors and
|
||||
predecessors are determined,
|
||||
resulting in the control flow graph.
|
||||
Next, the immediate dominator of every basic block
|
||||
is computed.
|
||||
Using these dominators, any loop in the
|
||||
procedure is detected.
|
||||
Finally, interprocedural analysis is done,
|
||||
after which we will know the global effects of
|
||||
every procedure call on its environment.
|
||||
.sp
|
||||
CF uses the same internal data structures
|
||||
for the procedure table and object table as IC.
|
||||
.NH 2
|
||||
Partitioning into basic blocks
|
||||
.PP
|
||||
With regard to flow of control, we distinguish
|
||||
three kinds of EM instructions:
|
||||
jump instructions, instruction label definitions and
|
||||
normal instructions.
|
||||
Jump instructions are all conditional or unconditional
|
||||
branch instructions,
|
||||
the case instructions (CSA/CSB)
|
||||
and the RET (return) instruction.
|
||||
A procedure call (CAL) is not considered to be a jump.
|
||||
A defining occurrence of an instruction label
|
||||
is regarded as an EM instruction.
|
||||
.PP
|
||||
An instruction starts
|
||||
a new basic block, in any of the following cases:
|
||||
.IP 1.
|
||||
It is the first instruction of a procedure
|
||||
.IP 2.
|
||||
It is the first of a list of instruction label
|
||||
defining occurrences
|
||||
.IP 3.
|
||||
It follows a jump
|
||||
.LP
|
||||
If there are several consecutive instruction labels
|
||||
(which is highly unusual),
|
||||
all of them are put in the same basic block.
|
||||
Note that several cases may overlap,
|
||||
e.g. a label definition at the beginning of a procedure
|
||||
or a label following a jump.
|
||||
.PP
|
||||
A simple Finite State Machine is used to model
|
||||
the above rules.
|
||||
It also recognizes the end of a procedure,
|
||||
marked by an END pseudo.
|
||||
The basic blocks are stored internally as a doubly linked
|
||||
linear list.
|
||||
The blocks are linked in textual order.
|
||||
Every node of this list has the attributes described
|
||||
in the previous chapter (see syntax rule for
|
||||
basic_block).
|
||||
Furthermore, every node contains a pointer to its
|
||||
EM instructions,
|
||||
which are represented internally
|
||||
as a linear, doubly linked list,
|
||||
just as in the IC phase.
|
||||
However, instead of one list per procedure (as in IC)
|
||||
there is now one list per basic block.
|
||||
.PP
|
||||
On the fly, a table is build that maps
|
||||
every label identifier to the label definition
|
||||
instruction.
|
||||
This table is used for computing the control flow.
|
||||
The table is stored as a dynamically allocated array.
|
||||
The length of the array is the number of labels
|
||||
of the current procedure;
|
||||
this value can be found in the procedure table,
|
||||
where it was stored by IC.
|
||||
50
doc/ego/cf/cf2
Normal file
50
doc/ego/cf/cf2
Normal file
@@ -0,0 +1,50 @@
|
||||
.NH 2
|
||||
Control Flow
|
||||
.PP
|
||||
A \fIsuccessor\fR of a basic block B is a block C
|
||||
that can be executed immediately after B.
|
||||
C is said to be a \fIpredecessor\fR of B.
|
||||
A block ending with a RET instruction
|
||||
has no successors.
|
||||
Such a block is called a \fIreturn block\fR.
|
||||
Any block that has no predecessors cannot be
|
||||
executed at all (i.e. it is unreachable),
|
||||
unless it is the first block of a procedure,
|
||||
called the \fIprocedure entry block\fR.
|
||||
.PP
|
||||
Internally, the successor and predecessor
|
||||
attributes of a basic block are stored as \fIsets\fR.
|
||||
Alternatively, one may regard all these
|
||||
sets of all basic blocks as a conceptual \fIgraph\fR,
|
||||
in which there is an edge from B to C if C
|
||||
is in the successor set of B.
|
||||
We call this conceptual graph
|
||||
the \fIControl Flow Graph\fR.
|
||||
.PP
|
||||
The only successor of a basic block ending on an
|
||||
unconditional branch instruction is the block that
|
||||
contains the label definition of the target of the jump.
|
||||
The target instruction can be found via the LAB_ID
|
||||
that is the operand of the jump instruction,
|
||||
by using the label-map table mentioned
|
||||
above.
|
||||
If the last instruction of a block is a
|
||||
conditional jump,
|
||||
the successors are the target block and the textually
|
||||
next block.
|
||||
The last instruction can also be a case jump
|
||||
instruction (CSA or CSB).
|
||||
We then analyze the case descriptor,
|
||||
to find all possible target instructions
|
||||
and their associated blocks.
|
||||
We require the case descriptor to be allocated in
|
||||
a ROM, so it cannot be changed dynamically.
|
||||
A case jump via an alterable descriptor could in principle
|
||||
go to any label in the program.
|
||||
In the presence of such an uncontrolled jump,
|
||||
hardly any optimization can be done.
|
||||
We do not expect any front end to generate such a descriptor,
|
||||
however, because of the controlled nature
|
||||
of case statements in high level languages.
|
||||
If the basic block does not end in a jump instruction,
|
||||
its only successor is the textually next block.
|
||||
53
doc/ego/cf/cf3
Normal file
53
doc/ego/cf/cf3
Normal file
@@ -0,0 +1,53 @@
|
||||
.NH 2
|
||||
Immediate dominators
|
||||
.PP
|
||||
A basic block B dominates a block C if every path
|
||||
in the control flow graph from the procedure entry block
|
||||
to C goes through B.
|
||||
The immediate dominator of C is the closest dominator
|
||||
of C on any path from the entry block.
|
||||
See also
|
||||
.[~[
|
||||
aho compiler design
|
||||
.], section 13.1.]
|
||||
.PP
|
||||
There are a number of algorithms to compute
|
||||
the immediate dominator relation.
|
||||
.IP 1.
|
||||
Purdom and Moore give an algorithm that is
|
||||
easy to program and easy to describe (although the
|
||||
description they give is unreadable;
|
||||
it is given in a very messy Algol60 program full of gotos).
|
||||
.[
|
||||
predominators
|
||||
.]
|
||||
.IP 2.
|
||||
Aho and Ullman present a bitvector algorithm, which is also
|
||||
easy to program and to understand.
|
||||
(See
|
||||
.[~[
|
||||
aho compiler design
|
||||
.], section 13.1.]).
|
||||
.IP 3
|
||||
Lengauer and Tarjan introduce a fast algorithm that is
|
||||
hard to understand, yet remarkably easy to implement.
|
||||
.[
|
||||
lengauer dominators
|
||||
.]
|
||||
.LP
|
||||
The Purdom-Moore algorithm is very slow if the
|
||||
number of basic blocks in the flow graph is large.
|
||||
The Aho-Ullman algorithm in fact computes the
|
||||
dominator relation,
|
||||
from which the immediate dominator relation can be computed
|
||||
in time quadratic to the number of basic blocks, worst case.
|
||||
The storage requirement is also quadratic to the number
|
||||
of blocks.
|
||||
The running time of the third algorithm is proportional
|
||||
to:
|
||||
.DS
|
||||
(number of edges in the graph) * log(number of blocks).
|
||||
.DE
|
||||
We have chosen this algorithm because it is fast
|
||||
(as shown by experiments done by Lengauer and Tarjan),
|
||||
it is easy to program and requires little data space.
|
||||
93
doc/ego/cf/cf4
Normal file
93
doc/ego/cf/cf4
Normal file
@@ -0,0 +1,93 @@
|
||||
.NH 2
|
||||
Loop detection
|
||||
.PP
|
||||
Loops are detected by using the loop construction
|
||||
algorithm of.
|
||||
.[~[
|
||||
aho compiler design
|
||||
.], section 13.1.]
|
||||
This algorithm uses \fIback edges\fR.
|
||||
A back edge is an edge from B to C in the CFG,
|
||||
whose head (C) dominates its tail (B).
|
||||
The loop associated with this back edge
|
||||
consists of C plus all nodes in the CFG
|
||||
that can reach B without going through C.
|
||||
.PP
|
||||
As an example of how the algorithm works,
|
||||
consider the piece of program of Fig. 4.1.
|
||||
First just look at the program and try to
|
||||
see what part of the code constitutes the loop.
|
||||
.DS
|
||||
loop
|
||||
if cond then 1
|
||||
-- lots of simple
|
||||
-- assignment
|
||||
-- statements 2 3
|
||||
exit; -- exit loop
|
||||
else
|
||||
S; -- one statement
|
||||
end if;
|
||||
end loop;
|
||||
|
||||
Fig. 4.1 A misleading loop
|
||||
.DE
|
||||
Although a human being may be easily deceived
|
||||
by the brackets "loop" and "end loop",
|
||||
the loop detection algorithm will correctly
|
||||
reply that only the test for "cond" and
|
||||
the single statement in the false-part
|
||||
of the if statement are part of the loop!
|
||||
The statements in the true-part only get
|
||||
executed once, so there really is no reason at all
|
||||
to say they're part of the loop too.
|
||||
The CFG contains one back edge, "3->1".
|
||||
As node 3 cannot be reached from node 2,
|
||||
the latter node is not part of the loop.
|
||||
.PP
|
||||
A source of problems with the algorithm is the fact
|
||||
that different back edges may result in
|
||||
the same loop.
|
||||
Such an ill-structured loop is
|
||||
called a \fImessy\fR loop.
|
||||
After a loop has been constructed, it is checked
|
||||
if it is really a new loop.
|
||||
.PP
|
||||
Loops can partly overlap, without one being nested
|
||||
inside the other.
|
||||
This is the case in the program of Fig. 4.2.
|
||||
.DS
|
||||
1: 1
|
||||
S1;
|
||||
2:
|
||||
S2; 2
|
||||
if cond then
|
||||
goto 4;
|
||||
S3; 3 4
|
||||
goto 1;
|
||||
4:
|
||||
S4;
|
||||
goto 1;
|
||||
|
||||
Fig. 4.2 Partly overlapping loops
|
||||
.DE
|
||||
There are two back edges "3->1" and "4->1",
|
||||
resulting in the loops {1,2,3} and {1,2,4}.
|
||||
With every basic block we associate a set of
|
||||
all loops it is part of.
|
||||
It is not sufficient just to record its
|
||||
most enclosing loop.
|
||||
.PP
|
||||
After all loops of a procedure are detected, we determine
|
||||
the nesting level of every loop.
|
||||
Finally, we find all strong and firm blocks of the loop.
|
||||
If the loop has only one back edge (i.e. it is not messy),
|
||||
the set of firm blocks consists of the
|
||||
head of this back edge and its dominators
|
||||
in the loop (including the loop entry block).
|
||||
A firm block is also strong if it is not a
|
||||
successor of a block that may exit the loop;
|
||||
a block may exit a loop if it has an (immediate) successor
|
||||
that is not part of the loop.
|
||||
For messy loops we do not determine the strong
|
||||
and firm blocks. These loops are expected
|
||||
to occur very rarely.
|
||||
82
doc/ego/cf/cf5
Normal file
82
doc/ego/cf/cf5
Normal file
@@ -0,0 +1,82 @@
|
||||
.NH 2
|
||||
Interprocedural analysis
|
||||
.PP
|
||||
It is often desirable to know the effects
|
||||
a procedure call may have.
|
||||
The optimization below is only possible if
|
||||
we know for sure that the call to P cannot
|
||||
change A.
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
A := 10; A:= 10;
|
||||
P; -- procedure call --> P;
|
||||
B := A + 2; B := 12;
|
||||
.TE
|
||||
.DE
|
||||
Although it is not possible to predict exactly
|
||||
all the effects a procedure call has, we may
|
||||
determine a kind of upper bound for it.
|
||||
So we compute all variables that may be
|
||||
changed by P, although they need not be
|
||||
changed at every invocation of P.
|
||||
We can get hold of this set by just looking
|
||||
at all assignment (store) instructions
|
||||
in the body of P.
|
||||
EM also has a set of \fIindirect\fR assignment
|
||||
instructions,
|
||||
i.e. assignment through a pointer variable.
|
||||
In general, it is not possible to determine
|
||||
which variable is affected by such an assignment.
|
||||
In these cases, we just record the fact that P
|
||||
does an indirect assignment.
|
||||
Note that this does not mean that all variables
|
||||
are potentially affected, as the front ends
|
||||
may generate messages telling that certain
|
||||
variables can never be accessed indirectly.
|
||||
We also set a flag if P does a use (load) indirect.
|
||||
Note that we only have to look at \fIglobal\fR
|
||||
variables.
|
||||
If P changes or uses any of its locals,
|
||||
this has no effect on its environment.
|
||||
Local variables of a lexically enclosing
|
||||
procedure can only be accessed indirectly.
|
||||
.PP
|
||||
A procedure P may of course call another procedure.
|
||||
To determine the effects of a call to P,
|
||||
we also must know the effects of a call to the second procedure.
|
||||
This second one may call a third one, and so on.
|
||||
Effectively, we need to compute the \fItransitive closure\fR
|
||||
of the effects.
|
||||
To do this, we determine for every procedure
|
||||
which other procedures it calls.
|
||||
This set is the "calling" attribute of a procedure.
|
||||
One may regard all these sets as a conceptual graph,
|
||||
in which there is an edge from P to Q
|
||||
if Q is in the calling set of P. This graph will
|
||||
be referred to as the \fIcall graph\fR.
|
||||
(Note the resemblance with the control flow graph).
|
||||
.PP
|
||||
We can detect which procedures are called by P
|
||||
by looking at all CAL instructions in its body.
|
||||
Unfortunately, a procedure may also be
|
||||
called indirectly, via a CAI instruction.
|
||||
Yet, only procedures that are used as operand of an LPI
|
||||
instruction can be called indirect,
|
||||
because this is the only way to take the address of a procedure.
|
||||
We determine for every procedure whether it does
|
||||
a CAI instruction.
|
||||
We also build a set of all procedures used as
|
||||
operand of an LPI.
|
||||
.sp
|
||||
After all procedures have been processed (i.e. all CFGs
|
||||
are constructed, all loops are detected,
|
||||
all procedures are analyzed to see which variables
|
||||
they may change, which procedures they call,
|
||||
whether they do a CAI or are used in an LPI) the
|
||||
transitive closure of all interprocedural
|
||||
information is computed.
|
||||
During the same process,
|
||||
the calling set of every procedure that uses a CAI
|
||||
is extended with the above mentioned set of all
|
||||
procedures that can be called indirect.
|
||||
21
doc/ego/cf/cf6
Normal file
21
doc/ego/cf/cf6
Normal file
@@ -0,0 +1,21 @@
|
||||
.NH 2
|
||||
Source files
|
||||
.PP
|
||||
The sources of CF are in the following files and packages:
|
||||
.IP cf.h: 14
|
||||
declarations of global variables and data structures
|
||||
.IP cf.c:
|
||||
the routine main; interprocedural analysis;
|
||||
transitive closure
|
||||
.IP succ:
|
||||
control flow (successor and predecessor)
|
||||
.IP idom:
|
||||
immediate dominators
|
||||
.IP loop:
|
||||
loop detection
|
||||
.IP get:
|
||||
read object and procedure table;
|
||||
read EM text and partition it into basic blocks
|
||||
.IP put:
|
||||
write tables, CFGs and EM text
|
||||
.LP
|
||||
144
doc/ego/cj/cj1
Normal file
144
doc/ego/cj/cj1
Normal file
@@ -0,0 +1,144 @@
|
||||
.bp
|
||||
.NH 1
|
||||
Cross jumping
|
||||
.NH 2
|
||||
Introduction
|
||||
.PP
|
||||
The "Cross Jumping" optimization technique (CJ)
|
||||
.[
|
||||
wulf design optimizing compiler
|
||||
.]
|
||||
is basically a space optimization technique. It looks for pairs of
|
||||
basic blocks (B1,B2), for which:
|
||||
.DS
|
||||
SUCC(B1) = SUCC(B2) = {S}
|
||||
.DE
|
||||
(So B1 and B2 both have one and the same successor).
|
||||
If the last few non-branch instructions are the same for B1 and B2,
|
||||
one such sequence can be eliminated.
|
||||
.DS
|
||||
Pascal:
|
||||
|
||||
if cond then
|
||||
S1
|
||||
S3
|
||||
else
|
||||
S2
|
||||
S3
|
||||
|
||||
(pseudo) EM:
|
||||
.TS
|
||||
l l l.
|
||||
TEST COND TEST COND
|
||||
BNE *1 BNE *1
|
||||
S1 S1
|
||||
S3 ---> BRA *2
|
||||
BRA *2 1:
|
||||
1: S2
|
||||
S2 2:
|
||||
S3 S3
|
||||
2:
|
||||
.TE
|
||||
|
||||
Fig. 9.1 An example of Cross Jumping
|
||||
.DE
|
||||
As the basic blocks have the same successor,
|
||||
at least one of them ends in an unconditional branch instruction (BRA).
|
||||
Hence no extra branch instruction is ever needed, just the target
|
||||
of an existing branch needs to be changed; neither the program size
|
||||
nor the execution time will ever increase.
|
||||
In general, the execution time will remain the same, unless
|
||||
further optimizations can be applied because of this optimization.
|
||||
.PP
|
||||
This optimization is particularly effective,
|
||||
because it cannot always be done by the programmer at the source level,
|
||||
as demonstrated by the Fig. 8.2.
|
||||
.DS
|
||||
Pascal:
|
||||
|
||||
if cond then
|
||||
x := f(4)
|
||||
else
|
||||
x := g(5)
|
||||
|
||||
|
||||
EM:
|
||||
|
||||
.TS
|
||||
l l.
|
||||
... ...
|
||||
LOC 4 LOC 5
|
||||
CAL F CAL G
|
||||
ASP 2 ASP 2
|
||||
LFR 2 LFR 2
|
||||
STL X STL X
|
||||
.TE
|
||||
|
||||
Fig. 9.2 Effectiveness of Cross Jumping
|
||||
.DE
|
||||
At the source level there is no common tail,
|
||||
but at the EM level there is a common tail.
|
||||
.NH 2
|
||||
Implementation
|
||||
.PP
|
||||
The implementation of cross jumping is rather straightforward.
|
||||
The technique is applied to one procedure at a time.
|
||||
The control flow graph of the procedure
|
||||
is scanned for pairs of basic blocks
|
||||
with the same (single) successor and with common tails.
|
||||
Note that there may be more than two such blocks (e.g. as the result
|
||||
of a case statement).
|
||||
This is dealt with by repeating the entire process until no
|
||||
further optimizations can de done for the current procedure.
|
||||
.sp
|
||||
If a suitable pair of basic blocks has been found, the control flow
|
||||
graph must be altered. One of the basic
|
||||
blocks must be split into two.
|
||||
The control flow graphs before and after the optimization are shown
|
||||
in Fig. 9.3 and Fig. 9.4.
|
||||
.DS
|
||||
.ft 5
|
||||
|
||||
-------- --------
|
||||
| | | |
|
||||
| S1 | | S2 |
|
||||
| S3 | | S3 |
|
||||
| | | |
|
||||
-------- --------
|
||||
| |
|
||||
|------------------|--------------------|
|
||||
|
|
||||
v
|
||||
.ft R
|
||||
|
||||
Fig. 9.3 CFG before optimization
|
||||
.DE
|
||||
.DS
|
||||
.ft 5
|
||||
-------- --------
|
||||
| | | |
|
||||
| S1 | | S2 |
|
||||
| | | |
|
||||
-------- --------
|
||||
| |
|
||||
|--------------------<------------------|
|
||||
v
|
||||
--------
|
||||
| |
|
||||
| S3 |
|
||||
| |
|
||||
--------
|
||||
|
|
||||
v
|
||||
.ft R
|
||||
|
||||
Fig. 9.4 CFG after optimization
|
||||
.DE
|
||||
Some attributes of the three resulting blocks (such as immediate dominator)
|
||||
are updated.
|
||||
.PP
|
||||
In some cases, cross jumping might split the computation of an expression
|
||||
into two, by inserting a branch somewhere in the middle.
|
||||
Most code generators will generate very poor assembly code when
|
||||
presented with such EM code.
|
||||
Therefor, cross jumping is not performed in these cases.
|
||||
45
doc/ego/cs/cs1
Normal file
45
doc/ego/cs/cs1
Normal file
@@ -0,0 +1,45 @@
|
||||
.bp
|
||||
.NH 1
|
||||
Common subexpression elimination
|
||||
.NH 2
|
||||
Introduction
|
||||
.PP
|
||||
The Common Subexpression Elimination optimization technique (CS)
|
||||
tries to eliminate multiple computations of EM expressions
|
||||
that yield the same result.
|
||||
It places the result of one such computation
|
||||
in a temporary variable,
|
||||
and replaces the other computations by a reference
|
||||
to this temporary variable.
|
||||
The primary goal of this technique is to decrease
|
||||
the execution time of the program,
|
||||
but in general it will save space too.
|
||||
.PP
|
||||
As an example of the application of Common Subexpression Elimination,
|
||||
consider the piece of program in Fig. 7.1(a).
|
||||
.DS
|
||||
.TS
|
||||
l l l.
|
||||
x := a * b; TMP := a * b; x := a * b;
|
||||
CODE; x := TMP; CODE
|
||||
y := c + a * b; CODE y := x;
|
||||
y := c + TMP;
|
||||
|
||||
(a) (b) (c)
|
||||
.TE
|
||||
|
||||
Fig. 7.1 Examples of Common Subexpression Elimination
|
||||
.DE
|
||||
If neither a nor b is changed in CODE,
|
||||
the instructions can be replaced by those of Fig. 7.1(b),
|
||||
which saves one multiplication,
|
||||
but costs an extra store instruction.
|
||||
If the value of x is not changed in CODE either,
|
||||
the instructions can be replaced by those of Fig. 7.1(c).
|
||||
In this case
|
||||
the extra store is not needed.
|
||||
.PP
|
||||
In the following sections we will describe
|
||||
which transformations are done
|
||||
by CS and how this phase
|
||||
was implemented.
|
||||
86
doc/ego/cs/cs2
Normal file
86
doc/ego/cs/cs2
Normal file
@@ -0,0 +1,86 @@
|
||||
.NH 2
|
||||
Specification of the Common Subexpression Elimination phase
|
||||
.PP
|
||||
In this section we will describe
|
||||
the window
|
||||
through which CS examines the code,
|
||||
the expressions recognized by CS,
|
||||
and finally the changes made to the code.
|
||||
.NH 3
|
||||
The working window
|
||||
.PP
|
||||
The CS algorithm is applied to the
|
||||
largest sequence of textually adjacent basic blocks
|
||||
B1,..,Bn, for which
|
||||
.DS
|
||||
PRED(Bj) = {Bj-1}, j = 2,..,n.
|
||||
.DE
|
||||
Intuitively, this window consists of straight line code,
|
||||
with only one entry point (at the beginning); it may
|
||||
contain jumps, which should all have their targets outside the window.
|
||||
This is illustrated in Fig. 7.2.
|
||||
.DS
|
||||
x := a * b; (1)
|
||||
if x < 10 then (2)
|
||||
y := a * b; (3)
|
||||
|
||||
Fig. 7.2 The working window of CS
|
||||
.DE
|
||||
Line (2) can only be executed after line (1).
|
||||
Likewise, line (3) can only be executed after
|
||||
line (2).
|
||||
Both a and b have the same values at line (1) and at line (3).
|
||||
.PP
|
||||
Larger windows were avoided.
|
||||
In Fig. 7.3, the value of a at line (4) may have been obtained
|
||||
at more than one point.
|
||||
.DS
|
||||
x := a * b; (1)
|
||||
if x < 10 then (2)
|
||||
a := 100; (3)
|
||||
y := a * b; (4)
|
||||
|
||||
Fig. 7.3 Several working windows
|
||||
.DE
|
||||
.NH 3
|
||||
Recognized expressions.
|
||||
.PP
|
||||
The computations eliminated by CS need not be normal expressions
|
||||
(like "a * b"),
|
||||
but can even consist of a single operand that is expensive to access,
|
||||
such as an array element or a record field.
|
||||
If an array element is used,
|
||||
its address is computed implicitly.
|
||||
CS is able to eliminate either the element itself or its
|
||||
address, whichever one is most profitable.
|
||||
A variable of a textually enclosing procedure may also be
|
||||
expensive to access, depending on the lexical level difference.
|
||||
.NH 3
|
||||
Transformations
|
||||
.PP
|
||||
CS creates a new temporary local variable (TMP)
|
||||
for every eliminated expression,
|
||||
unless it is able to use an existing local variable.
|
||||
It emits code to initialize this variable with the
|
||||
result of the expression.
|
||||
Most recurrences of the expression
|
||||
can simply be replaced by a reference to TMP.
|
||||
If the address of an array element is recognized as
|
||||
a common subexpression,
|
||||
references to the element itself are replaced by
|
||||
indirect references through TMP (see Fig. 7.4).
|
||||
.DS
|
||||
.TS
|
||||
l l l.
|
||||
x := A[i]; TMP := &A[i];
|
||||
. . . --> x := *TMP;
|
||||
A[i] := y; . . .
|
||||
*TMP := y;
|
||||
.TE
|
||||
|
||||
Fig. 7.4 Elimination of an array address computation
|
||||
.DE
|
||||
Here, '&' is the 'address of' operator,
|
||||
and unary '*' is the indirection operator.
|
||||
(Note that EM actually has different instructions to do
|
||||
a use-indirect or an assign-indirect.)
|
||||
250
doc/ego/cs/cs3
Normal file
250
doc/ego/cs/cs3
Normal file
@@ -0,0 +1,250 @@
|
||||
.NH 2
|
||||
Implementation
|
||||
.PP
|
||||
.NH 3
|
||||
The value number method
|
||||
.PP
|
||||
To determine whether two expressions have the same result,
|
||||
there must be some way to determine whether their operands have
|
||||
the same values.
|
||||
We use a system of \fIvalue numbers\fP
|
||||
.[
|
||||
kennedy data flow analysis
|
||||
.]
|
||||
in which each distinct value of whatever type,
|
||||
created or used within the working window,
|
||||
receives a unique identifying number, its value number.
|
||||
Two items have the same value number if and only if,
|
||||
based only upon information from the instructions in the window,
|
||||
their values are provably identical.
|
||||
For example, after processing the statement
|
||||
.DS
|
||||
a := 4;
|
||||
.DE
|
||||
the variable a and the constant 4 have the same value number.
|
||||
.PP
|
||||
The value number of the result of an expression depends only
|
||||
on the kind of operator and the value number(s) of the operand(s).
|
||||
The expressions need not be textually equal, as shown in Fig. 7.5.
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
a := c; (1)
|
||||
use(a * b); (2)
|
||||
d := b; (3)
|
||||
use(c * d); (4)
|
||||
.TE
|
||||
|
||||
Fig. 7.5 Different expressions with the same value number
|
||||
.DE
|
||||
At line (1) a receives the same value number as c.
|
||||
At line (2) d receives the same value number as b.
|
||||
At line (4) the expression "c * d" receives the same value number
|
||||
as the expression "a * b" at line (2),
|
||||
because the value numbers of their left and right operands are the same,
|
||||
and the operator (*) is the same.
|
||||
.PP
|
||||
As another example of the value number method, consider Fig. 7.6.
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
use(a * b); (1)
|
||||
a := 123; (2)
|
||||
use(a * b); (3)
|
||||
.TE
|
||||
|
||||
Fig. 7.6 Identical expressions with the different value numbers
|
||||
.DE
|
||||
Although textually the expressions "a * b" in line 1 and line 3 are equal,
|
||||
a will have different value numbers at line 3 and line 1.
|
||||
The two expressions will not mistakenly be recognized as equivalent.
|
||||
.NH 3
|
||||
Entities
|
||||
.PP
|
||||
The Value Number Method distinguishes between operators and operands.
|
||||
The value numbers of operands are stored in a table,
|
||||
called the \fIsymbol table\fR.
|
||||
The value number of a subexpression depends on the
|
||||
(root) operator of the expression and on the value numbers
|
||||
of its operands.
|
||||
A table of "available expressions" is used to do this mapping.
|
||||
.PP
|
||||
CS recognizes the following kinds of EM operands, called \fIentities\fR:
|
||||
.DS
|
||||
- constant
|
||||
- local variable
|
||||
- external variable
|
||||
- indirectly accessed entity
|
||||
- offsetted entity
|
||||
- address of local variable
|
||||
- address of external variable
|
||||
- address of offsetted entity
|
||||
- address of local base
|
||||
- address of argument base
|
||||
- array element
|
||||
- procedure identifier
|
||||
- floating zero
|
||||
- local base
|
||||
- heap pointer
|
||||
- ignore mask
|
||||
.DE
|
||||
.LP
|
||||
Whenever a new entity is encountered in the working window,
|
||||
it is entered in the symbol table and given a brand new value number.
|
||||
Most entities have attributes (e.g. the offset in
|
||||
the current stackframe for local variables),
|
||||
which are also stored in the symbol table.
|
||||
.PP
|
||||
An entity is called static if its value cannot be changed
|
||||
(e.g. a constant or an address).
|
||||
.NH 3
|
||||
Parsing expressions
|
||||
.PP
|
||||
Common subexpressions are recognized by simulating the behaviour
|
||||
of the EM machine.
|
||||
The EM code is parsed from left to right;
|
||||
as EM is postfix code, this is a bottom up parse.
|
||||
At any point the current state of the EM runtime stack is
|
||||
reflected by a simulated "fake stack",
|
||||
containing descriptions of the parsed operands and expressions.
|
||||
A descriptor consists of:
|
||||
.DS
|
||||
(1) the value number of the operand or expression
|
||||
(2) the size of the operand or expression
|
||||
(3) a pointer to the first line of EM-code
|
||||
that constitutes the operand or expression
|
||||
.DE
|
||||
Note that operands may consist of several EM instructions.
|
||||
Whenever an operator is encountered, the
|
||||
descriptors of its operands are on top of the fake stack.
|
||||
The operator and the value numbers of the operands
|
||||
are used as indices in the table of available expressions,
|
||||
to determine the value number of the expression.
|
||||
.PP
|
||||
During the parsing process,
|
||||
we keep track of the first line of each expression;
|
||||
we need this information when we decide to eliminate the expression.
|
||||
.NH 3
|
||||
Updating entities
|
||||
.PP
|
||||
An entity is assigned a value number when it is
|
||||
used for the first time
|
||||
in the working window.
|
||||
If the entity is used as left hand side of an assignment,
|
||||
it gets the value number of the right hand side.
|
||||
Sometimes the effects of an instruction on an entity cannot
|
||||
be determined exactly;
|
||||
the current value and value number of the entity may become
|
||||
inconsistent.
|
||||
Hence the current value number must be forgotten.
|
||||
This is achieved by giving the entity a new value number
|
||||
that was not used before.
|
||||
The entity is said to be \fIkilled\fR.
|
||||
.PP
|
||||
As information is lost when an entity is killed,
|
||||
CS tries to save as many entities as possible.
|
||||
In case of an indirect assignment through a pointer,
|
||||
some analysis is done to see which variables cannot be altered.
|
||||
For a procedure call, the interprocedural information contained
|
||||
in the procedure table is used to restrict the set of entities that may
|
||||
be changed by the call.
|
||||
Local variables for which the front end generated
|
||||
a register message can never be changed by an indirect assignment
|
||||
or a procedure call.
|
||||
.NH 3
|
||||
Changing the EM text
|
||||
.PP
|
||||
When a new expression comes available,
|
||||
it is checked whether its result is saved in a local
|
||||
that may go in a register.
|
||||
The last line of the expression must be followed
|
||||
by a STL or SDL instruction
|
||||
(depending on the size of the result)
|
||||
and a register message must be present for
|
||||
this local.
|
||||
If there is such a local,
|
||||
it is recorded in the available expressions table.
|
||||
Each time a new occurrence of this expression
|
||||
is found,
|
||||
the value number of the local is compared against
|
||||
the value number of the result.
|
||||
If they are different the local cannot be used and is forgotten.
|
||||
.PP
|
||||
The available expressions are linked in a list.
|
||||
New expressions are linked at the head of the list.
|
||||
In this way expressions that are contained within other
|
||||
expressions appear later in the list,
|
||||
because EM-expressions are postfix.
|
||||
The elimination process walks through the list,
|
||||
starting at the head, to find the largest expressions first.
|
||||
If an expression is eliminated,
|
||||
any expression later on in the list, contained in the former expression,
|
||||
is removed from the list,
|
||||
as expressions can only be eliminated once.
|
||||
.PP
|
||||
A STL or SDL is emitted after the first occurrence of the expression,
|
||||
unless there was an existing local variable that could hold the result.
|
||||
.NH 3
|
||||
Desirability analysis
|
||||
.PP
|
||||
Although the global optimizer works on EM code,
|
||||
the goal is to improve the quality of the object code.
|
||||
Therefore some machine-dependent information is needed
|
||||
to decide whether it is desirable to
|
||||
eliminate a given expression.
|
||||
Because it is impossible for the CS phase to know
|
||||
exactly what code will be generated,
|
||||
some heuristics are used.
|
||||
CS essentially looks for some special cases
|
||||
that should not be eliminated.
|
||||
These special cases can be turned on or off for a given machine,
|
||||
as indicated in a machine descriptor file.
|
||||
.PP
|
||||
Some operators can sometimes be translated
|
||||
into an addressing mode for the machine at hand.
|
||||
Such an operator is only eliminated
|
||||
if its operand is itself expensive,
|
||||
i.e. it is not just a simple load.
|
||||
The machine descriptor file contains a set of such operators.
|
||||
.PP
|
||||
Eliminating the loading of the Local Base or
|
||||
the Argument Base by the LXL resp. LXA instruction
|
||||
is only beneficial if the difference in lexical levels
|
||||
exceeds a certain threshold.
|
||||
The machine descriptor file contains this threshold.
|
||||
.PP
|
||||
Replacing a SAR or a LAR by an AAR followed by a LOI
|
||||
may possibly increase the size of the object code.
|
||||
We assume that this is only possible when the
|
||||
size of the array element is greater than some limit.
|
||||
.PP
|
||||
There are back ends that can very efficiently translate
|
||||
the index computing instruction sequence LOC SLI ADS.
|
||||
If this is the case,
|
||||
the SLI instruction between a LOC
|
||||
and an ADS is not eliminated.
|
||||
.PP
|
||||
To handle unforseen cases, the descriptor file may also contain
|
||||
a set of operators that should never be eliminated.
|
||||
.NH 3
|
||||
The algorithm
|
||||
.PP
|
||||
After these preparatory explanations,
|
||||
the algorithm itself is easy to understand.
|
||||
For each instruction within the current window,
|
||||
the following steps are performed in the given order :
|
||||
.IP 1.
|
||||
Check if this instruction defines an entity.
|
||||
If so, the set of entities is updated accordingly.
|
||||
.IP 2.
|
||||
Kill all entities that might be affected by this instruction.
|
||||
.IP 3.
|
||||
Simulate the instruction on the fake-stack.
|
||||
If this instruction is an operator,
|
||||
update the list of available expressions accordingly.
|
||||
.PP
|
||||
The result of this process is
|
||||
a list of available expressions plus the information
|
||||
needed to eliminate them.
|
||||
Expressions that are desirable to eliminate are eliminated.
|
||||
Next, the window is shifted and the process is repeated.
|
||||
311
doc/ego/cs/cs4
Normal file
311
doc/ego/cs/cs4
Normal file
@@ -0,0 +1,311 @@
|
||||
.NH 2
|
||||
Implementation.
|
||||
.PP
|
||||
In this section we will discuss the implementation of the CS phase.
|
||||
We will first describe the basic actions that are undertaken
|
||||
by the algorithm, than the algorithm itself.
|
||||
.NH 3
|
||||
Partioning the EM instructions
|
||||
.PP
|
||||
There are over 100 EM instructions.
|
||||
For our purpose we partition this huge set into groups of
|
||||
instructions which can be more or less conveniently handled together.
|
||||
.PP
|
||||
There are groups for all sorts of load instructions:
|
||||
simple loads, expensive loads, loads of an array element.
|
||||
A load is considered \fIexpensive\fP when more than one EM instructions
|
||||
are involved in loading it.
|
||||
The load of a lexical entity is also considered expensive.
|
||||
For instance: LOF is expensive, LAL is not.
|
||||
LAR forms a group on its own,
|
||||
because it is not only an expensive load,
|
||||
but also implicitly includes the ternary operator AAR,
|
||||
which computes the address of the array element.
|
||||
.PP
|
||||
There are groups for all sorts of operators:
|
||||
unary, binary, and ternary.
|
||||
The groups of operators are further partitioned according to the size
|
||||
of their operand(s) and result.
|
||||
.\" .PP
|
||||
.\" The distinction between operators and expensive loads is not always clear.
|
||||
.\" The ADP instruction for example,
|
||||
.\" might seem a unary operator because it pops one item
|
||||
.\" (a pointer) from the stack.
|
||||
.\" However, two ADP-instructions which pop an item with the same value number
|
||||
.\" need not have the same result,
|
||||
.\" because the attributes (an offset, to be added to the pointer)
|
||||
.\" can be different.
|
||||
.\" Is it then a binary operator?
|
||||
.\" That would give rise to the strange, and undesirable,
|
||||
.\" situation that some binary operators pop two operands
|
||||
.\" and others pop one.
|
||||
.\" The conclusion is inevitable:
|
||||
.\" we have been fooled by the name (ADd Pointer).
|
||||
.\" The ADP-instruction is an expensive load.
|
||||
.\" In this context LAF, meaning Load Address of oFfsetted,
|
||||
.\" would have been a better name,
|
||||
.\" corresponding to LOF, like LAL,
|
||||
.\" Load Address of Local, corresponds to LOL.
|
||||
.PP
|
||||
There are groups for all sorts of stores:
|
||||
direct, indirect, array element.
|
||||
The SAR forms a group on its own for the same reason
|
||||
as appeared with LAR.
|
||||
.PP
|
||||
The effect of the remaining instructions is less clear.
|
||||
They do not help very much in parsing expressions or
|
||||
in constructing our pseudo symboltable.
|
||||
They are partitioned according to the following criteria:
|
||||
.RS
|
||||
.IP "-"
|
||||
They change the value of an entity without using the stack
|
||||
(e.g. ZRL, DEE).
|
||||
.IP "-"
|
||||
They are subroutine calls (CAI, CAL).
|
||||
.IP "-"
|
||||
They change the stack in some irreproduceable way (e.g. ASP, LFR, DUP).
|
||||
.IP "-"
|
||||
They have no effect whatever on the stack or on the entities.
|
||||
This does not mean they can be deleted,
|
||||
but they can be ignored for the moment
|
||||
(e.g. MES, LIN, NOP).
|
||||
.IP "-"
|
||||
Their effect is too complicate too compute,
|
||||
so we just assume worst case behaviour.
|
||||
Hopefully, they do not occur very often.
|
||||
(e.g. MON, STR, BLM).
|
||||
.IP "-"
|
||||
They signal the end of the basic block (e.g. BLT, RET, TRP).
|
||||
.RE
|
||||
.NH 3
|
||||
Parsing expressions
|
||||
.PP
|
||||
To recognize expressions,
|
||||
we simulate the behaviour of the EM machine,
|
||||
by means of a fake-stack.
|
||||
When we scan the instructions in sequential order,
|
||||
we first encounter the instructions that load
|
||||
the operands on the stack,
|
||||
and then the instruction that indicates the operator,
|
||||
because EM expressions are postfix.
|
||||
When we find an instruction to load an operand,
|
||||
we load on the fake-stack a struct with the following information:
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
(1) the value number of the operand
|
||||
(2) the size of the operand
|
||||
(3) a pointer to the first line of EM-code
|
||||
that constitutes the operand
|
||||
.TE
|
||||
.DE
|
||||
In most cases, (3) will point to the line
|
||||
that loaded the operand (e.g. LOL, LOC),
|
||||
i.e. there is only one line that refers to this operand,
|
||||
but sometimes some information must be popped
|
||||
to load the operand (e.g. LOI, LAR).
|
||||
This information must have been pushed before,
|
||||
so we also pop a pointer to the first line that pushed
|
||||
the information.
|
||||
This line is now the first line that defines the operand.
|
||||
.PP
|
||||
When we find the operator instruction,
|
||||
we pop its operand(s) from the fake-stack.
|
||||
The first line that defines the first operand is
|
||||
now the first line of the expression.
|
||||
We now have all information to determine
|
||||
whether the just parsed expression has occurred before.
|
||||
We also know the first and last line of the expression;
|
||||
we need this when we decide to eliminate it.
|
||||
Associated with each available expression is a set of
|
||||
which the elements contains the first and last line of
|
||||
a recurrence of this expression.
|
||||
.PP
|
||||
Not only will the operand(s) be popped from the fake-stack,
|
||||
but the following will be pushed:
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
(1) the value number of the result
|
||||
(2) the size of the result
|
||||
(3) a pointer to the first line of the expression
|
||||
.TE
|
||||
.DE
|
||||
In this way an item on the fake-stack always contains
|
||||
the necessary information.
|
||||
EM expressions are parsed bottum up.
|
||||
.NH 3
|
||||
Updating entities
|
||||
.PP
|
||||
As said before,
|
||||
we build our private "symboltable",
|
||||
while scanning the EM-instructions.
|
||||
The behaviour of the EM-machine is not only reflected
|
||||
in the fake-stack,
|
||||
but also in the entities.
|
||||
When an entity is created,
|
||||
we do not yet know its value,
|
||||
so we assign a brand new value number to it.
|
||||
Each time a store-instruction is encountered,
|
||||
we change the value number of the target entity of this store
|
||||
to the value number of the token that was popped
|
||||
from the fake-stack.
|
||||
Because entities may overlap,
|
||||
we must also "forget" the value numbers of entities
|
||||
that might be affected by this store.
|
||||
Each such entity will be \fIkilled\fP,
|
||||
i.e. assigned a brand new valuenumber.
|
||||
.PP
|
||||
Because we lose information when we forget
|
||||
the value number of an entity,
|
||||
we try to save as much entities as possible.
|
||||
When we store into an external,
|
||||
we don't have to kill locals and vice versa.
|
||||
Furthermore, we can see whether two locals or
|
||||
two externals overlap,
|
||||
because we know the offset from the local base,
|
||||
resp. the offset within the data block,
|
||||
and the size.
|
||||
The situation becomes more complicated when we have
|
||||
to consider indirection.
|
||||
The worst case is that we store through an unknown pointer.
|
||||
In that case we kill all entities except those locals
|
||||
for which a so-called \fIregister message\fP has been generated;
|
||||
this register message indicates that this local can never be
|
||||
accessed indirectly.
|
||||
If we know this pointer we can be more careful.
|
||||
If it points to a local then the entity that is accessed through
|
||||
this pointer can never overlap with an external.
|
||||
If it points to an external this entity can never overlap with a local.
|
||||
Furthermore, in the latter case,
|
||||
we can find the data block this entity belongs to.
|
||||
Since pointer arithmetic is only defined within a data block,
|
||||
this entity can never overlap with entities that are known to
|
||||
belong to another data block.
|
||||
.PP
|
||||
Not only after a store-instruction but also after a
|
||||
subroutine-call it may be necessary to kill entities;
|
||||
the subroutine may affect global variables or store
|
||||
through a pointer.
|
||||
If a subroutine is called that is not available as EM-text,
|
||||
we assume worst case behaviour,
|
||||
i.e. we kill all entities without register message.
|
||||
.NH 3
|
||||
Additions and replacements.
|
||||
.PP
|
||||
When a new expression comes available,
|
||||
we check whether the result is saved in a local
|
||||
that may go in a register.
|
||||
The last line of the expression must be followed
|
||||
by a STL or SDL instruction,
|
||||
depending on the size of the result
|
||||
(resp. WS and 2*WS),
|
||||
and a register message must be present for
|
||||
this local.
|
||||
If we have found such a local,
|
||||
we store a pointer to it with the available expression.
|
||||
Each time a new occurrence of this expression
|
||||
is found,
|
||||
we compare the value number of the local against
|
||||
the value number of the result.
|
||||
When they are different we remove the pointer to it,
|
||||
because we cannot use it.
|
||||
.PP
|
||||
The available expressions are singly linked in a list.
|
||||
When a new expression comes available,
|
||||
we link it at the head of the list.
|
||||
In this way expressions that are contained within other
|
||||
expressions appear later in the list,
|
||||
because EM-expressions are postfix.
|
||||
When we are going to eliminate expressions,
|
||||
we walk through the list,
|
||||
starting at the head, to find the largest expressions first.
|
||||
When we decide to eliminate an expression,
|
||||
we look at the expressions in the tail of the list,
|
||||
starting from where we are now,
|
||||
to delete expressions that are contained within
|
||||
the chosen one because
|
||||
we cannot eliminate an expression more than once.
|
||||
.PP
|
||||
When we are going to eliminate expressions,
|
||||
and we do not have a local that holds the result,
|
||||
we emit a STL or SDL after the line where the expression
|
||||
was first found.
|
||||
The other occurrences are simply removed,
|
||||
unless they contain instructions that not only have
|
||||
effect on the stack; e.g. messages, stores, calls.
|
||||
Before each instruction that needs the result on the stack,
|
||||
we emit a LOL or LDL.
|
||||
When the expression was an AAR,
|
||||
but the instruction was a LAR or a SAR,
|
||||
we append a LOI resp. a STI of the number of bytes
|
||||
in an array-element after each LOL/LDL.
|
||||
.NH 3
|
||||
Desirability analysis
|
||||
.PP
|
||||
Although the global optimizer works on EM code,
|
||||
the goal is to improve the quality of the object code.
|
||||
Therefore we need some machine dependent information
|
||||
to decide whether it is desirable to
|
||||
eliminate a given expression.
|
||||
Because it is impossible for the CS phase to know
|
||||
exactly what code will be generated,
|
||||
we use some heuristics.
|
||||
In most cases it will save time when we eliminate an
|
||||
operator, so we just do it.
|
||||
We only look for some special cases.
|
||||
.PP
|
||||
Some operators can in some cases be translated
|
||||
into an addressing mode for the machine at hand.
|
||||
We only eliminate such an operator,
|
||||
when its operand is itself "expensive",
|
||||
i.e. not just a simple load.
|
||||
The user of the CS phase has to supply
|
||||
a set of such operators.
|
||||
.PP
|
||||
Eliminating the loading of the Local Base or
|
||||
the Argument Base by the LXL resp. LXA instruction
|
||||
is only beneficial when the number of lexical levels
|
||||
we have to go back exceeds a certain threshold.
|
||||
This threshold will be different when registers
|
||||
are saved by the back end.
|
||||
The user must supply this threshold.
|
||||
.PP
|
||||
Replacing a SAR or a LAR by an AAR followed by a LOI
|
||||
may possibly increase the size of the object code.
|
||||
We assume that this is only possible when the
|
||||
size of the array element is greater than some
|
||||
(user-supplied) limit.
|
||||
.PP
|
||||
There are back ends that can very efficiently translate
|
||||
the index computing instruction sequence LOC SLI ADS.
|
||||
If this is the case,
|
||||
we do not eliminate the SLI instruction between a LOC
|
||||
and an ADS.
|
||||
.PP
|
||||
To handle unforeseen cases, the user may also supply
|
||||
a set of operators that should never be eliminated.
|
||||
.NH 3
|
||||
The algorithm
|
||||
.PP
|
||||
After these preparatory explanations,
|
||||
we can be short about the algorithm itself.
|
||||
For each instruction within our window,
|
||||
the following steps are performed in the order given:
|
||||
.IP 1.
|
||||
We check if this instructin defines an entity.
|
||||
If this is the case the set of entities is updated accordingly.
|
||||
.IP 2.
|
||||
We kill all entities that might be affected by this instruction.
|
||||
.IP 3.
|
||||
The instruction is simulated on the fake-stack.
|
||||
Copy propagation is done.
|
||||
If this instruction is an operator,
|
||||
we update the list of available expressions accordingly.
|
||||
.PP
|
||||
When we have processed all instructions this way,
|
||||
we have built a list of available expressions plus the information we
|
||||
need to eliminate them.
|
||||
Those expressions of which desirability analysis tells us so,
|
||||
we eliminate.
|
||||
The we shift our window and continue.
|
||||
46
doc/ego/cs/cs5
Normal file
46
doc/ego/cs/cs5
Normal file
@@ -0,0 +1,46 @@
|
||||
.NH 2
|
||||
Source files of CS
|
||||
.PP
|
||||
The sources of CS are in the following files and packages:
|
||||
.IP cs.h 14
|
||||
declarations of global variables and data structures
|
||||
.IP cs.c
|
||||
the routine main;
|
||||
a driving routine to process
|
||||
the basic blocks in the right order
|
||||
.IP vnm
|
||||
implements a procedure that performs
|
||||
the value numbering on one basic block
|
||||
.IP eliminate
|
||||
implements a procedure that does the
|
||||
transformations, if desirable
|
||||
.IP avail
|
||||
implements a procedure that manipulates the list of available expressions
|
||||
.IP entity
|
||||
implements a procedure that manipulates the set of entities
|
||||
.IP getentity
|
||||
implements a procedure that extracts the
|
||||
pseudo symboltable information from EM-instructions;
|
||||
uses a small table
|
||||
.IP kill
|
||||
implements several routines that find the entities
|
||||
that might be changed by EM-instructions
|
||||
and kill them
|
||||
.IP partition
|
||||
implements several routines that partition the huge set
|
||||
of EM-instructions into more or less manageable,
|
||||
more or less logical chunks
|
||||
.IP profit
|
||||
implements a procedure that decides whether it
|
||||
is advantageous to eliminate an expression;
|
||||
also removes expressions with side-effects
|
||||
.IP stack
|
||||
implements the fake-stack and operations on it
|
||||
.IP alloc
|
||||
implements several allocation routines
|
||||
.IP aux
|
||||
implements several auxiliary routines
|
||||
.IP debug
|
||||
implements several routines to provide debugging
|
||||
and verbose output
|
||||
.LP
|
||||
57
doc/ego/ic/ic1
Normal file
57
doc/ego/ic/ic1
Normal file
@@ -0,0 +1,57 @@
|
||||
.bp
|
||||
.NH
|
||||
The Intermediate Code and the IC phase
|
||||
.PP
|
||||
In this chapter the intermediate code of the EM global optimizer
|
||||
will be defined.
|
||||
The 'Intermediate Code construction' phase (IC),
|
||||
which builds the initial intermediate code from
|
||||
EM Compact Assembly Language,
|
||||
will be described.
|
||||
.NH 2
|
||||
Introduction
|
||||
.PP
|
||||
The EM global optimizer is a multi pass program,
|
||||
hence there is a need for an intermediate code.
|
||||
Usually, programs in the Amsterdam Compiler Kit use the
|
||||
Compact Assembly Language format
|
||||
.[~[
|
||||
keizer architecture
|
||||
.], section 11.2]
|
||||
for this purpose.
|
||||
Although this code has some convenient features,
|
||||
such as being compact,
|
||||
it is quite unsuitable in our case,
|
||||
because of a number of reasons.
|
||||
At first, the code lacks global information
|
||||
about whole procedures or whole basic blocks.
|
||||
Second, it uses identifiers ('names') to bind
|
||||
defining and applied occurrences of
|
||||
procedures, data labels and instruction labels.
|
||||
Although this is usual in high level programming
|
||||
languages, it is awkward in an intermediate code
|
||||
that must be read many times.
|
||||
Each pass of the optimizer would have
|
||||
to incorporate an identifier look-up mechanism
|
||||
to associate a defining occurrence with each
|
||||
applied occurrence of an identifier.
|
||||
Finally, EM programs are used to declare blocks of bytes,
|
||||
rather than variables. A 'hol 6' instruction may be used to
|
||||
declare three 2-byte variables.
|
||||
Clearly, the optimizer wants to deal with variables, and
|
||||
not with rows of bytes.
|
||||
.PP
|
||||
To overcome these problems, we have developed a new
|
||||
intermediate code.
|
||||
This code does not merely consist of the EM instructions,
|
||||
but also contains global information in the
|
||||
form of tables and graphs.
|
||||
Before describing the intermediate code we will
|
||||
first leap aside to outline
|
||||
the problems one generally encounters
|
||||
when trying to store complex data structures such as
|
||||
graphs outside the program, i.e. in a file.
|
||||
We trust this will enhance the
|
||||
comprehensibility of the
|
||||
intermediate code definition and the design and implementation
|
||||
of the IC phase.
|
||||
150
doc/ego/ic/ic2
Normal file
150
doc/ego/ic/ic2
Normal file
@@ -0,0 +1,150 @@
|
||||
.NH 2
|
||||
Representation of complex data structures in a sequential file
|
||||
.PP
|
||||
Most programmers are quite used to deal with
|
||||
complex data structures, such as
|
||||
arrays, graphs and trees.
|
||||
There are some particular problems that occur
|
||||
when storing such a data structure
|
||||
in a sequential file.
|
||||
We call data that is kept in
|
||||
main memory
|
||||
.UL internal
|
||||
,as opposed to
|
||||
.UL external
|
||||
data
|
||||
that is kept in a file outside the program.
|
||||
.sp
|
||||
We assume a simple data structure of a
|
||||
scalar type (integer, floating point number)
|
||||
has some known external representation.
|
||||
An
|
||||
.UL array
|
||||
having elements of a scalar type can be represented
|
||||
externally easily, by successively
|
||||
representing its elements.
|
||||
The external representation may be preceded by a
|
||||
number, giving the length of the array.
|
||||
Now, consider a linear, singly linked list,
|
||||
the elements of which look like:
|
||||
.DS
|
||||
record
|
||||
data: scalar_type;
|
||||
next: pointer_type;
|
||||
end;
|
||||
.DE
|
||||
It is significant to note that the "next"
|
||||
fields of the elements only have a meaning within
|
||||
main memory.
|
||||
The field contains the address of some location in
|
||||
main memory.
|
||||
If a list element is written to a file in
|
||||
some program,
|
||||
and read by another program,
|
||||
the element will be allocated at a different
|
||||
address in main memory.
|
||||
Hence this address value is completely
|
||||
useless outside the program.
|
||||
.sp
|
||||
One may represent the list by ignoring these "next" fields
|
||||
and storing the data items in the order they are linked.
|
||||
The "next" fields are represented \fIimplicitly\fR.
|
||||
When the file is read again,
|
||||
the same list can be reconstructed.
|
||||
In order to know where the external representation of the
|
||||
list ends,
|
||||
it may be useful to put the length of
|
||||
the list in front of it.
|
||||
.sp
|
||||
Note that arrays and linear lists have the
|
||||
same external representation.
|
||||
.PP
|
||||
A doubly linked, linear list,
|
||||
with elements of the type:
|
||||
.DS
|
||||
record
|
||||
data: scalar_type;
|
||||
next,
|
||||
previous: pointer_type;
|
||||
end
|
||||
.DE
|
||||
can be represented in precisely the same way.
|
||||
Both the "next" and the "previous" fields are represented
|
||||
implicitly.
|
||||
.PP
|
||||
Next, consider a binary tree,
|
||||
the nodes of which have type:
|
||||
.DS
|
||||
record
|
||||
data: scalar_type;
|
||||
left,
|
||||
right: pointer_type;
|
||||
end
|
||||
.DE
|
||||
Such a tree can be represented sequentially,
|
||||
by storing its nodes in some fixed order, e.g. prefix order.
|
||||
A special null data item may be used to
|
||||
denote a missing left or right son.
|
||||
For example, let the scalar type be integer,
|
||||
and let the null item be 0.
|
||||
Then the tree of fig. 3.1(a)
|
||||
can be represented as in fig. 3.1(b).
|
||||
.DS
|
||||
.ft 5
|
||||
4
|
||||
/ \e
|
||||
9 12
|
||||
/ \e / \e
|
||||
12 3 4 6
|
||||
/ \e \e /
|
||||
8 1 5 1
|
||||
.ft R
|
||||
|
||||
Fig. 3.1(a) A binary tree
|
||||
|
||||
|
||||
.ft 5
|
||||
4 9 12 0 0 3 8 0 0 1 0 0 12 4 0 5 0 0 6 1 0 0 0
|
||||
.ft R
|
||||
|
||||
Fig. 3.1(b) Its sequential representation
|
||||
.DE
|
||||
We are still able to represent the pointer fields ("left"
|
||||
and "right") implicitly.
|
||||
.PP
|
||||
Finally, consider a general
|
||||
.UL graph
|
||||
, where each node has a "data" field and
|
||||
pointer fields,
|
||||
with no restriction on where they may point to.
|
||||
Now we're at the end of our tale.
|
||||
There is no way to represent the pointers implicitly,
|
||||
like we did with lists and trees.
|
||||
In order to represent them explicitly,
|
||||
we use the following scheme.
|
||||
Every node gets an extra field,
|
||||
containing some unique number that identifies the node.
|
||||
We call this number its
|
||||
.UL id.
|
||||
A pointer is represented externally as the id of the node
|
||||
it points to.
|
||||
When reading the file we use a table that maps
|
||||
an id to the address of its node.
|
||||
In general this table will not be completely filled in
|
||||
until we have read the entire external representation of
|
||||
the graph and allocated internal memory locations for
|
||||
every node.
|
||||
Hence we cannot reconstruct the graph in one scan.
|
||||
That is, there may be some pointers from node A to B,
|
||||
where B is placed after A in the sequential file than A.
|
||||
When we read the node of A we cannot map the id of B
|
||||
to the address of node B,
|
||||
as we have not yet allocated node B.
|
||||
We can overcome this problem if the size
|
||||
of every node is known in advance.
|
||||
In this case we can allocate memory for a node
|
||||
on first reference.
|
||||
Else, the mapping from id to pointer
|
||||
cannot be done while reading nodes.
|
||||
The mapping can be done either in an extra scan
|
||||
or at every reference to the node.
|
||||
431
doc/ego/ic/ic3
Normal file
431
doc/ego/ic/ic3
Normal file
@@ -0,0 +1,431 @@
|
||||
.NH 2
|
||||
Definition of the intermediate code
|
||||
.PP
|
||||
The intermediate code of the optimizer consists
|
||||
of several components:
|
||||
.IP -
|
||||
the object table
|
||||
.IP -
|
||||
the procedure table
|
||||
.IP -
|
||||
the em code
|
||||
.IP -
|
||||
the control flow graphs
|
||||
.IP -
|
||||
the loop table
|
||||
.LP -
|
||||
.PP
|
||||
These components are described in
|
||||
the next sections.
|
||||
The syntactic structure of every component
|
||||
is described by a set of context free syntax rules,
|
||||
with the following conventions:
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
x a non-terminal symbol
|
||||
A a terminal symbol (in capitals)
|
||||
x: a b c; a grammar rule
|
||||
a | b a or b
|
||||
(a)+ 1 or more occurrences of a
|
||||
{a} 0 or more occurrences of a
|
||||
.TE
|
||||
.DE
|
||||
.NH 3
|
||||
The object table
|
||||
.PP
|
||||
EM programs declare blocks of bytes rather than (global) variables.
|
||||
A typical program may declare 'HOL 7780'
|
||||
to allocate space for 8 I/O buffers,
|
||||
2 large arrays and 10 scalar variables.
|
||||
The optimizer wants to deal with
|
||||
.UL objects
|
||||
like variables, buffers and arrays
|
||||
and certainly not with huge numbers of bytes.
|
||||
Therefore the intermediate code contains information
|
||||
about which global objects are used.
|
||||
This information can be obtained from an EM program
|
||||
by just looking at the operands of instruction
|
||||
such as LOE, LAE, LDE, STE, SDE, INE, DEE and ZRE.
|
||||
.PP
|
||||
The object table consists of a list of
|
||||
.UL datablock
|
||||
entries.
|
||||
Each such entry represents a declaration like HOL, BSS,
|
||||
CON or ROM.
|
||||
There are five kinds of datablock entries.
|
||||
The fifth kind,
|
||||
UNKNOWN, denotes a declaration in a
|
||||
separately compiled file that is not made
|
||||
available to the optimizer.
|
||||
Each datablock entry contains the type of the block,
|
||||
its size, and a description of the objects that
|
||||
belong to it.
|
||||
If it is a rom,
|
||||
it also contains a list of values given
|
||||
as arguments to the rom instruction,
|
||||
provided that this list contains only integer numbers.
|
||||
An object has an offset (within its datablock)
|
||||
and a size.
|
||||
The size need not always be determinable.
|
||||
Both datablock and object contain a unique
|
||||
identifying number
|
||||
(see previous section for their use).
|
||||
.DS
|
||||
.UL syntax
|
||||
.TS
|
||||
lw(1i) l l.
|
||||
object_table:
|
||||
{datablock} ;
|
||||
datablock:
|
||||
D_ID -- unique identifying number
|
||||
PSEUDO -- one of ROM,CON,BSS,HOL,UNKNOWN
|
||||
SIZE -- # bytes declared
|
||||
FLAGS
|
||||
{value} -- contents of rom
|
||||
{object} ; -- objects of the datablock
|
||||
object:
|
||||
O_ID -- unique identifying number
|
||||
OFFSET -- offset within the datablock
|
||||
SIZE ; -- size of the object in bytes
|
||||
value:
|
||||
argument ;
|
||||
.TE
|
||||
.DE
|
||||
A data block has only one flag: "external", indicating
|
||||
whether the data label is externally visible.
|
||||
The syntax for "argument" will be given later on
|
||||
(see em_text).
|
||||
.NH 3
|
||||
The procedure table
|
||||
.PP
|
||||
The procedure table contains global information
|
||||
about all procedures that are made available
|
||||
to the optimizer
|
||||
and that are needed by the EM program.
|
||||
(Library units may not be needed, see section 3.5).
|
||||
The table has one entry for
|
||||
every procedure.
|
||||
.DS
|
||||
.UL syntax
|
||||
.TS
|
||||
lw(1i) l l.
|
||||
procedure_table:
|
||||
{procedure}
|
||||
procedure:
|
||||
P_ID -- unique identifying number
|
||||
#LABELS -- number of instruction labels
|
||||
#LOCALS -- number of bytes for locals
|
||||
#FORMALS -- number of bytes for formals
|
||||
FLAGS -- flag bits
|
||||
calling -- procedures called by this one
|
||||
change -- info about global variables changed
|
||||
use ; -- info about global variables used
|
||||
calling:
|
||||
{P_ID} ; -- procedures called
|
||||
change:
|
||||
ext -- external variables changed
|
||||
FLAGS ;
|
||||
use:
|
||||
FLAGS ;
|
||||
ext:
|
||||
{O_ID} ; -- a set of objects
|
||||
.TE
|
||||
.DE
|
||||
.PP
|
||||
The number of bytes of formal parameters accessed by
|
||||
a procedure is determined by the front ends and
|
||||
passed via a message (parameter message) to the optimizer.
|
||||
If the front end is not able to determine this number
|
||||
(e.g. the parameter may be an array of dynamic size or
|
||||
the procedure may have a variable number of arguments) the attribute
|
||||
contains the value 'UNKNOWN_SIZE'.
|
||||
.sp 0
|
||||
A procedure has the following flags:
|
||||
.IP -
|
||||
external: true if the proc. is externally visible
|
||||
.IP -
|
||||
bodyseen: true if its code is available as EM text
|
||||
.IP -
|
||||
calunknown: true if it calls a procedure that has its bodyseen
|
||||
flag not set
|
||||
.IP -
|
||||
environ: true if it uses or changes a (non-global) variable in
|
||||
a lexically enclosing procedure
|
||||
.IP -
|
||||
lpi: true if is used as operand of an lpi instruction, so
|
||||
it may be called indirect
|
||||
.LP
|
||||
The change and use attributes both have one flag: "indirect",
|
||||
indicating whether the procedure does a 'use indirect'
|
||||
or a 'store indirect' (indirect means through a pointer).
|
||||
.NH 3
|
||||
The EM text
|
||||
.PP
|
||||
The EM text contains the EM instructions.
|
||||
Every EM instruction has an operation code (opcode)
|
||||
and 0 or 1 operands.
|
||||
EM pseudo instructions can have more than
|
||||
1 operand.
|
||||
The opcode is just a small (8 bit) integer.
|
||||
.sp
|
||||
There are several kinds of operands, which we will
|
||||
refer to as
|
||||
.UL types.
|
||||
Many EM instructions can have more than one type of operand.
|
||||
The types and their encodings in Compact Assembly Language
|
||||
are discussed extensively in.
|
||||
.[~[
|
||||
keizer architecture
|
||||
.], section 11.2]
|
||||
Of special interest is the way numeric values
|
||||
are represented.
|
||||
Of prime importance is the machine independency of
|
||||
the representation.
|
||||
Ultimately, one could store every integer
|
||||
just as a string of the characters '0' to '9'.
|
||||
As doing arithmetic on strings is awkward,
|
||||
Compact Assembly Language allows several alternatives.
|
||||
The main idea is to look at the value of the integer.
|
||||
Integers that fit in 16, 32 or 64 bits are
|
||||
represented as a row of resp. 2, 4 and 8 bytes,
|
||||
preceded by an indication of how many bytes are used.
|
||||
Longer integers are represented as strings;
|
||||
this is only allowed within pseudo instructions, however.
|
||||
This concept works very well for target machines
|
||||
with reasonable word sizes.
|
||||
At present, most ACK software cannot be used for word sizes
|
||||
higher than 32 bits,
|
||||
although the handles for using larger word sizes are
|
||||
present in the design of the EM code.
|
||||
In the intermediate code we essentially use the
|
||||
same ideas.
|
||||
We allow three representations of integers.
|
||||
.IP -
|
||||
integers that fit in a short are represented as a short
|
||||
.IP -
|
||||
integers that fit in a long but not in a short are represented
|
||||
as longs
|
||||
.IP -
|
||||
all remaining integers are represented as strings
|
||||
(only allowed in pseudos).
|
||||
.LP
|
||||
The terms short and long are defined in
|
||||
.[~[
|
||||
ritchie reference manual programming language
|
||||
.], section 4]
|
||||
and depend only on the source machine
|
||||
(i.e. the machine on which ACK runs),
|
||||
not on the target machines.
|
||||
For historical reasons a long will often be called an
|
||||
.UL offset.
|
||||
.PP
|
||||
Operands can also be instruction labels,
|
||||
objects or procedures.
|
||||
Instruction labels are denoted by a
|
||||
.UL label
|
||||
.UL identifier,
|
||||
which can be distinguished from a normal identifier.
|
||||
.sp
|
||||
The operand of a pseudo instruction can be a list of
|
||||
.UL arguments.
|
||||
Arguments can have the same type as operands, except
|
||||
for the type short, which is not used for arguments.
|
||||
Furthermore, an argument can be a string or
|
||||
a string representation of a signed integer, unsigned integer
|
||||
or floating point number.
|
||||
If the number of arguments is not fully determined by
|
||||
the pseudo instruction (e.g. a ROM pseudo can have any number
|
||||
of arguments), then the list is terminated by a special
|
||||
argument of type CEND.
|
||||
.DS
|
||||
.UL syntax
|
||||
.TS
|
||||
lw(1i) l l.
|
||||
em_text:
|
||||
{line} ;
|
||||
line:
|
||||
INSTR -- opcode
|
||||
OPTYPE -- operand type
|
||||
operand ;
|
||||
operand:
|
||||
empty | -- OPTYPE = NO
|
||||
SHORT | -- OPTYPE = SHORT
|
||||
OFFSET | -- OPTYPE = OFFSET
|
||||
LAB_ID | -- OPTYPE = INSTRLAB
|
||||
O_ID | -- OPTYPE = OBJECT
|
||||
P_ID | -- OPTYPE = PROCEDURE
|
||||
{argument} ; -- OPTYPE = LIST
|
||||
argument:
|
||||
ARGTYPE
|
||||
arg ;
|
||||
arg:
|
||||
empty | -- ARGTYPE = CEND
|
||||
OFFSET |
|
||||
LAB_ID |
|
||||
O_ID |
|
||||
P_ID |
|
||||
string | -- ARGTYPE = STRING
|
||||
const ; -- ARGTYPE = ICON,UCON or FCON
|
||||
string:
|
||||
LENGTH -- number of characters
|
||||
{CHARACTER} ;
|
||||
const:
|
||||
SIZE -- number of bytes
|
||||
string ; -- string representation of (un)signed
|
||||
-- or floating point constant
|
||||
.TE
|
||||
.DE
|
||||
.NH 3
|
||||
The control flow graphs
|
||||
.PP
|
||||
Each procedure can be divided
|
||||
into a number of basic blocks.
|
||||
A basic block is a piece of code with
|
||||
no jumps in, except at the beginning,
|
||||
and no jumps out, except at the end.
|
||||
.PP
|
||||
Every basic block has a set of
|
||||
.UL successors,
|
||||
which are basic blocks that can follow it immediately in
|
||||
the dynamic execution sequence.
|
||||
The
|
||||
.UL predecessors
|
||||
are the basic blocks of which this one
|
||||
is a successor.
|
||||
The successor and predecessor attributes
|
||||
of all basic blocks of a single procedure
|
||||
are said to form the
|
||||
.UL control
|
||||
.UL flow
|
||||
.UL graph
|
||||
of that procedure.
|
||||
.PP
|
||||
Another important attribute is the
|
||||
.UL immediate
|
||||
.UL dominator.
|
||||
A basic block B dominates a block C if
|
||||
every path in the graph from the procedure entry block
|
||||
to C goes through B.
|
||||
The immediate dominator of C is the closest dominator
|
||||
of C on any path from the entry block.
|
||||
(Note that the dominator relation is transitive,
|
||||
so the immediate dominator is well defined.)
|
||||
.PP
|
||||
A basic block also has an attribute containing
|
||||
the identifiers of every
|
||||
.UL loop
|
||||
that the block belongs to (see next section for loops).
|
||||
.DS
|
||||
.UL syntax
|
||||
.TS
|
||||
lw(1i) l l.
|
||||
control_flow_graph:
|
||||
{basic_block} ;
|
||||
basic_block:
|
||||
B_ID -- unique identifying number
|
||||
#INSTR -- number of EM instructions
|
||||
succ
|
||||
pred
|
||||
idom -- immediate dominator
|
||||
loops -- set of loops
|
||||
FLAGS ; -- flag bits
|
||||
succ:
|
||||
{B_ID} ;
|
||||
pred:
|
||||
{B_ID} ;
|
||||
idom:
|
||||
B_ID ;
|
||||
loops:
|
||||
{LP_ID} ;
|
||||
.TE
|
||||
.DE
|
||||
The flag bits can have the values 'firm' and 'strong',
|
||||
which are explained below.
|
||||
.NH 3
|
||||
The loop tables
|
||||
.PP
|
||||
Every procedure has an associated
|
||||
.UL loop
|
||||
.UL table
|
||||
containing information about all the loops
|
||||
in the procedure.
|
||||
Loops can be detected by a close inspection of
|
||||
the control flow graph.
|
||||
The main idea is to look for two basic blocks,
|
||||
B and C, for which the following holds:
|
||||
.IP -
|
||||
B is a successor of C
|
||||
.IP -
|
||||
B is a dominator of C
|
||||
.LP
|
||||
B is called the loop
|
||||
.UL entry
|
||||
and C is called the loop
|
||||
.UL end.
|
||||
Intuitively, C contains a jump backwards to
|
||||
the beginning of the loop (B).
|
||||
.PP
|
||||
A loop L1 is said to be
|
||||
.UL nested
|
||||
within loop L2 if all basic blocks of L1
|
||||
are also part of L2.
|
||||
It is important to note that loops could
|
||||
originally be written as a well structured for -or
|
||||
while loop or as a messy goto loop.
|
||||
Hence loops may partly overlap without one
|
||||
being nested inside the other.
|
||||
The
|
||||
.UL nesting
|
||||
.UL level
|
||||
of a loop is the number of loops in
|
||||
which it is nested (so it is 0 for
|
||||
an outermost loop).
|
||||
The details of loop detection will be discussed later.
|
||||
.PP
|
||||
It is often desirable to know whether a
|
||||
basic block gets executed during every iteration
|
||||
of a loop.
|
||||
This leads to the following definitions:
|
||||
.IP -
|
||||
A basic block B of a loop L is said to be a \fIfirm\fR block
|
||||
of L if B is executed on all successive iterations of L,
|
||||
with the only possible exception of the last iteration.
|
||||
.IP -
|
||||
A basic block B of a loop L is said to be a \fIstrong\fR block
|
||||
of L if B is executed on all successive iterations of L.
|
||||
.LP
|
||||
Note that a strong block is also a firm block.
|
||||
If a block is part of a conditional statement, it is neither
|
||||
strong nor firm, as it may be skipped during some iterations
|
||||
(see Fig. 3.2).
|
||||
.DS
|
||||
loop
|
||||
if cond1 then
|
||||
... \kx-- this code will not
|
||||
\h'|\nxu'-- result in a firm or strong block
|
||||
end if;
|
||||
... -- strong (always executed)
|
||||
exit when cond2;
|
||||
... \kx-- firm (not executed on last iteration).
|
||||
end loop;
|
||||
|
||||
Fig. 3.2 Example of firm and strong block
|
||||
.DE
|
||||
.DS
|
||||
.UL syntax
|
||||
.TS
|
||||
lw(1i) l l.
|
||||
looptable:
|
||||
{loop} ;
|
||||
loop:
|
||||
LP_ID -- unique identifying number
|
||||
LEVEL -- loop nesting level
|
||||
entry -- loop entry block
|
||||
end ;
|
||||
entry:
|
||||
B_ID ;
|
||||
end:
|
||||
B_ID ;
|
||||
.TE
|
||||
.DE
|
||||
83
doc/ego/ic/ic4
Normal file
83
doc/ego/ic/ic4
Normal file
@@ -0,0 +1,83 @@
|
||||
.NH 2
|
||||
External representation of the intermediate code
|
||||
.PP
|
||||
The syntax of the intermediate code was given
|
||||
in the previous section.
|
||||
In this section we will make some remarks about
|
||||
the representation of the code in sequential files.
|
||||
.sp
|
||||
We use sequential files in order to avoid
|
||||
the bookkeeping of complex file indices.
|
||||
As a consequence of this decision
|
||||
we can't store all components
|
||||
of the intermediate code
|
||||
in one file.
|
||||
If a phase wishes to change some attribute
|
||||
of a procedure,
|
||||
or wants to add or delete entire procedures
|
||||
(inline substitution may do the latter),
|
||||
the procedure table will only be fully updated
|
||||
after the entire EM text has been scanned.
|
||||
Yet, the next phase undoubtedly wants
|
||||
to read the procedure table before it
|
||||
starts working on the EM text.
|
||||
Hence there is an ordering problem, which
|
||||
can be solved easily by putting the
|
||||
procedure table in a separate file.
|
||||
Similarly, the data block table is kept
|
||||
in a file of its own.
|
||||
.PP
|
||||
The control flow graphs (CFGs) could be mixed
|
||||
with the EM text.
|
||||
Rather, we have chosen to put them
|
||||
in a separate file too.
|
||||
The control flow graph file should be regarded as a
|
||||
file that imposes some structure on the EM-text file,
|
||||
just as an overhead sheet containing a picture
|
||||
of a Flow Chart may be put on an overhead sheet
|
||||
containing statements.
|
||||
The loop tables are also put in the CFG file.
|
||||
A loop imposes an extra structure on the
|
||||
CFGs and hence on the EM text.
|
||||
So there are four files:
|
||||
.IP -
|
||||
the EM-text file
|
||||
.IP -
|
||||
the procedure table file
|
||||
.IP -
|
||||
the object table file
|
||||
.IP -
|
||||
the CFG and loop tables file
|
||||
.LP
|
||||
Every table is preceded by its length, in order to
|
||||
tell where it ends.
|
||||
The CFG file also contains the number of instructions of
|
||||
every basic block,
|
||||
indicating which part of the EM text belongs
|
||||
to that block.
|
||||
.DS
|
||||
.UL syntax
|
||||
.TS
|
||||
lw(1i) l l.
|
||||
intermediate_code:
|
||||
object_table_file
|
||||
proctable_file
|
||||
em_text_file
|
||||
cfg_file ;
|
||||
object_table_file:
|
||||
LENGTH -- number of objects
|
||||
object_table ;
|
||||
proctable_file:
|
||||
LENGTH -- number of procedures
|
||||
procedure_table ;
|
||||
em_text_file:
|
||||
em_text ;
|
||||
cfg_file:
|
||||
{per_proc} ; -- one for every procedure
|
||||
per_proc:
|
||||
BLENGTH -- number of basic blocks
|
||||
LLENGTH -- number of loops
|
||||
control_flow_graph
|
||||
looptable ;
|
||||
.TE
|
||||
.DE
|
||||
166
doc/ego/ic/ic5
Normal file
166
doc/ego/ic/ic5
Normal file
@@ -0,0 +1,166 @@
|
||||
.NH 2
|
||||
The Intermediate Code construction phase
|
||||
.PP
|
||||
The first phase of the global optimizer,
|
||||
called
|
||||
.UL IC,
|
||||
constructs a major part of the intermediate code.
|
||||
To be specific, it produces:
|
||||
.IP -
|
||||
the EM text
|
||||
.IP -
|
||||
the object table
|
||||
.IP -
|
||||
part of the procedure table
|
||||
.LP
|
||||
The calling, change and use attributes of a procedure
|
||||
and all its flags except the external and bodyseen flags
|
||||
are computed by the next phase (Control Flow phase).
|
||||
.PP
|
||||
As explained before,
|
||||
the intermediate code does not contain
|
||||
any names of variables or procedures.
|
||||
The normal identifiers are replaced by identifying
|
||||
numbers.
|
||||
Yet, the output of the global optimizer must
|
||||
contain normal identifiers, as this
|
||||
output is in Compact Assembly Language format.
|
||||
We certainly want all externally visible names
|
||||
to be the same in the input as in the output,
|
||||
because the optimized EM module may be a library unit,
|
||||
used by other modules.
|
||||
IC dumps the names of all procedures and data labels
|
||||
on two files:
|
||||
.IP -
|
||||
the procedure dump file, containing tuples (P_ID, procedure name)
|
||||
.IP -
|
||||
the data dump file, containing tuples (D_ID, data label name)
|
||||
.LP
|
||||
The names of instruction labels are not dumped,
|
||||
as they are not visible outside the procedure
|
||||
in which they are defined.
|
||||
.PP
|
||||
The input to IC consists of one or more files.
|
||||
Each file is either an EM module in Compact Assembly Language
|
||||
format, or a Unix archive file (library) containing such modules.
|
||||
IC only extracts those modules from a library that are
|
||||
needed somehow, just as a linker does.
|
||||
It is advisable to present as much code
|
||||
of the EM program as possible to the optimizer,
|
||||
although it is not required to present the whole program.
|
||||
If a procedure is called somewhere in the EM text,
|
||||
but its body (text) is not included in the input,
|
||||
its bodyseen flag in the procedure table will still
|
||||
be off.
|
||||
Whenever such a procedure is called,
|
||||
we assume the worst case for everything;
|
||||
it will change and use all variables it has access to,
|
||||
it will call every procedure etc.
|
||||
.sp
|
||||
Similarly, if a data label is used
|
||||
but not defined, the PSEUDO attribute in its data block
|
||||
will be set to UNKNOWN.
|
||||
.NH 3
|
||||
Implementation
|
||||
.PP
|
||||
Part of the code for the EM Peephole Optimizer
|
||||
.[
|
||||
staveren peephole toplass
|
||||
.]
|
||||
has been used for IC.
|
||||
Especially the routines that read and unravel
|
||||
Compact Assembly Language and the identifier
|
||||
lookup mechanism have been used.
|
||||
New code was added to recognize objects,
|
||||
build the object and procedure tables and to
|
||||
output the intermediate code.
|
||||
.PP
|
||||
IC uses singly linked linear lists for both the
|
||||
procedure and object table.
|
||||
Hence there are no limits on the size of such
|
||||
a table (except for the trivial fact that it must fit
|
||||
in main memory).
|
||||
Both tables are outputted after all EM code has
|
||||
been processed.
|
||||
IC reads the EM text of one entire procedure
|
||||
at a time,
|
||||
processes it and appends the modified code to
|
||||
the EM text file.
|
||||
EM code is represented internally as a doubly linked linear
|
||||
list of EM instructions.
|
||||
.PP
|
||||
Objects are recognized by looking at the operands
|
||||
of instructions that reference global data.
|
||||
If we come across the instructions:
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
LDE X+6 -- Load Double External
|
||||
LAE X+20 -- Load Address External
|
||||
.TE
|
||||
.DE
|
||||
we conclude that the data block
|
||||
preceded by the data label X contains an object
|
||||
at offset 6 of size twice the word size,
|
||||
and an object at offset 20 of unknown size.
|
||||
.sp
|
||||
A data block entry of the object table is allocated
|
||||
at the first reference to a data label.
|
||||
If this reference is a defining occurrence
|
||||
or a INA pseudo instruction,
|
||||
the label is not externally visible
|
||||
.[~[
|
||||
keizer architecture
|
||||
.], section 11.1.4.3]
|
||||
In this case, the external flag of the data block
|
||||
is turned off.
|
||||
If the first reference is an applied occurrence
|
||||
or a EXA pseudo instruction, the flag is set.
|
||||
We record this information, because the
|
||||
optimizer may change the order of defining and
|
||||
applied occurrences.
|
||||
The INA and EXA pseudos are removed from the EM text.
|
||||
They may be regenerated by the last phase
|
||||
of the optimizer.
|
||||
.sp
|
||||
Similar rules hold for the procedure table
|
||||
and the INP and EXP pseudos.
|
||||
.NH 3
|
||||
Source files of IC
|
||||
.PP
|
||||
The source files of IC consist
|
||||
of the files ic.c, ic.h and several packages.
|
||||
.UL ic.h
|
||||
contains type definitions, macros and
|
||||
variable declarations that may be used by
|
||||
ic.c and by every package.
|
||||
.UL ic.c
|
||||
contains the definitions of these variables,
|
||||
the procedure
|
||||
.UL main
|
||||
and some high level I/O routines used by main.
|
||||
.sp
|
||||
Every package xxx consists of two files.
|
||||
ic_xxx.h contains type definitions,
|
||||
macros, variable declarations and
|
||||
procedure declarations that may be used by
|
||||
every .c file that includes this .h file.
|
||||
The file ic_xxx.c provides the
|
||||
definitions of these variables and
|
||||
the implementation of the declared procedures.
|
||||
IC uses the following packages:
|
||||
.IP lookup: 18
|
||||
procedures that loop up procedure, data label
|
||||
and instruction label names; procedures to dump
|
||||
the procedure and data label names.
|
||||
.IP lib:
|
||||
one procedure that gets the next useful input module;
|
||||
while scanning archives, it skips unnecessary modules.
|
||||
.IP aux:
|
||||
several auxiliary routines.
|
||||
.IP io:
|
||||
low-level I/O routines that unravel the Compact
|
||||
Assembly Language.
|
||||
.IP put:
|
||||
routines that output the intermediate code
|
||||
.LP
|
||||
112
doc/ego/il/il1
Normal file
112
doc/ego/il/il1
Normal file
@@ -0,0 +1,112 @@
|
||||
.bp
|
||||
.NH 1
|
||||
Inline substitution
|
||||
.NH 2
|
||||
Introduction
|
||||
.PP
|
||||
The Inline Substitution technique (IL)
|
||||
tries to decrease the overhead associated
|
||||
with procedure calls (invocations).
|
||||
During a procedure call, several actions
|
||||
must be undertaken to set up the right
|
||||
environment for the called procedure.
|
||||
.[
|
||||
johnson calling sequence
|
||||
.]
|
||||
On return from the procedure, most of these
|
||||
effects must be undone.
|
||||
This entire process introduces significant
|
||||
costs in execution time as well as
|
||||
in object code size.
|
||||
.PP
|
||||
The inline substitution technique replaces
|
||||
some of the calls by the modified body of
|
||||
the called procedure, hence eliminating
|
||||
the overhead.
|
||||
Furthermore, as the calling and called procedure
|
||||
are now integrated, they can be optimized
|
||||
together, using other techniques of the optimizer.
|
||||
This often leads to extra opportunities for
|
||||
optimization
|
||||
.[
|
||||
ball predicting effects
|
||||
.]
|
||||
.[
|
||||
carter code generation cacm
|
||||
.]
|
||||
.[
|
||||
scheifler inline cacm
|
||||
.]
|
||||
.PP
|
||||
An inline substitution of a call to a procedure P increases
|
||||
the size of the program, unless P is very small or P is
|
||||
called only once.
|
||||
In the latter case, P can be eliminated.
|
||||
In practice, procedures that are called only once occur
|
||||
quite frequently, due to the
|
||||
introduction of structured programming.
|
||||
(Carter
|
||||
.[
|
||||
carter umi ann arbor
|
||||
.]
|
||||
states that almost 50% of the Pascal procedures
|
||||
he analyzed were called just once).
|
||||
.PP
|
||||
Scheifler
|
||||
.[
|
||||
scheifler inline cacm
|
||||
.]
|
||||
has a more general view of inline substitution.
|
||||
In his model, the program under consideration is
|
||||
allowed to grow by a certain amount,
|
||||
i.e. code size is sacrificed to speed up the program.
|
||||
The above two cases are just special cases of
|
||||
his model, obtained by setting the size-change to
|
||||
(approximately) zero.
|
||||
He formulates the substitution problem as follows:
|
||||
.IP
|
||||
"Given a program, a subset of all invocations,
|
||||
a maximum program size, and a maximum procedure size,
|
||||
find a sequence of substitutions that minimizes
|
||||
the expected execution time."
|
||||
.LP
|
||||
Scheifler shows that this problem is NP-complete
|
||||
.[~[
|
||||
aho hopcroft ullman analysis algorithms
|
||||
.], chapter 10]
|
||||
by reduction to the Knapsack Problem.
|
||||
Heuristics will have to be used to find a near-optimal
|
||||
solution.
|
||||
.PP
|
||||
In the following chapters we will extend
|
||||
Scheifler's view and adapt it to the EM Global Optimizer.
|
||||
We will first describe the transformations that have
|
||||
to be applied to the EM text when a call is substituted
|
||||
in line.
|
||||
Next we will examine in which cases inline substitution
|
||||
is not possible or desirable.
|
||||
Heuristics will be developed for
|
||||
chosing a good sequence of substitutions.
|
||||
These heuristics make no demand on the user
|
||||
(such as making profiles
|
||||
.[
|
||||
scheifler inline cacm
|
||||
.]
|
||||
or giving pragmats
|
||||
.[~[
|
||||
ichbiah ada military standard
|
||||
.], section 6.3.2]),
|
||||
although the model could easily be extended
|
||||
to use such information.
|
||||
Finally, we will discuss the implementation
|
||||
of the IL phase of the optimizer.
|
||||
.PP
|
||||
We will often use the term inline expansion
|
||||
as a synonym of inline substitution.
|
||||
.sp 0
|
||||
The inverse technique of procedure abstraction
|
||||
(automatic subroutine generation)
|
||||
.[
|
||||
shaffer subroutine generation
|
||||
.]
|
||||
will not be discussed in this report.
|
||||
93
doc/ego/il/il2
Normal file
93
doc/ego/il/il2
Normal file
@@ -0,0 +1,93 @@
|
||||
.NH 2
|
||||
Parameters and local variables.
|
||||
.PP
|
||||
In the EM calling sequence, the calling procedure
|
||||
pushes its parameters on the stack
|
||||
before doing the CAL.
|
||||
The called routine first saves some
|
||||
status information on the stack and then
|
||||
allocates space for its own locals
|
||||
(also on the stack).
|
||||
Usually, one special purpose register,
|
||||
the Local Base (LB) register,
|
||||
is used to access both the locals and the
|
||||
parameters.
|
||||
If memory is highly segmented,
|
||||
the stack frames of the caller and the callee
|
||||
may be allocated in different fragments;
|
||||
an extra Argument Base (AB) register is used
|
||||
in this case to access the actual parameters.
|
||||
See 4.2 of
|
||||
.[
|
||||
keizer architecture
|
||||
.]
|
||||
for further details.
|
||||
.PP
|
||||
If a procedure call is expanded in line,
|
||||
there are two problems:
|
||||
.IP 1. 3
|
||||
No stack frame will be allocated for the called procedure;
|
||||
we must find another place to put its locals.
|
||||
.IP 2.
|
||||
The LB register cannot be used to access the actual
|
||||
parameters;
|
||||
as the CAL instruction is deleted, the LB will
|
||||
still point to the local base of the \fIcalling\fR procedure.
|
||||
.LP
|
||||
The local variables of the called procedure will
|
||||
be put in the stack frame of the calling procedure,
|
||||
just after its own locals.
|
||||
The size of the stack frame of the
|
||||
calling procedure will be increased
|
||||
during its entire lifetime.
|
||||
Therefore our model will allow a
|
||||
limit to be set on the number of bytes
|
||||
for locals that the called procedure may have
|
||||
(see next section).
|
||||
.PP
|
||||
There are several alternatives to access the parameters.
|
||||
An actual parameter may be any auxiliary expression,
|
||||
which we will refer to as
|
||||
the \fIactual parameter expression\fR.
|
||||
The value of this expression is stored
|
||||
in a location on the stack (see above),
|
||||
the \fIparameter location\fR.
|
||||
.sp 0
|
||||
The alternatives for accessing parameters are:
|
||||
.IP -
|
||||
save the value of the stackpointer at the point of the CAL
|
||||
in a temporary variable X;
|
||||
this variable can be used to simulate the AB register, i.e.
|
||||
parameter locations are accessed via an offset to
|
||||
the value of X.
|
||||
.IP -
|
||||
create a new temporary local variable T for
|
||||
the parameter (in the stack frame of the caller);
|
||||
every access to the parameter location must be changed
|
||||
into an access to T.
|
||||
.IP -
|
||||
do not evaluate the actual parameter expression before the call;
|
||||
instead, substitute this expression for every use of the
|
||||
parameter location.
|
||||
.LP
|
||||
The first method may be expensive if X is not
|
||||
put in a register.
|
||||
We will not use this method.
|
||||
The time required to evaluate and access the
|
||||
parameters when the second method is used
|
||||
will not differ much from the normal
|
||||
calling sequence (i.e. not in line call).
|
||||
It is not expensive, but there are no
|
||||
extra savings either.
|
||||
The third method is essentially the 'by name'
|
||||
parameter mechanism of Algol60.
|
||||
If the actual parameter is just a numeric constant,
|
||||
it is advantageous to use it.
|
||||
Yet, there are several circumstances
|
||||
under which it cannot or should not be used.
|
||||
We will deal with this in the next section.
|
||||
.sp 0
|
||||
In general we will use the third method,
|
||||
if it is possible and desirable.
|
||||
Such parameters will be called \fIin line parameters\fR.
|
||||
In all other cases we will use the second method.
|
||||
164
doc/ego/il/il3
Normal file
164
doc/ego/il/il3
Normal file
@@ -0,0 +1,164 @@
|
||||
.NH 2
|
||||
Feasibility and desirability analysis
|
||||
.PP
|
||||
Feasibility and desirability analysis
|
||||
of in line substitution differ
|
||||
somewhat from most other techniques.
|
||||
Usually, much effort is needed to find
|
||||
a feasible opportunity for optimization
|
||||
(e.g. a redundant subexpression).
|
||||
Desirability analysis then checks
|
||||
if it is really advantageous to do
|
||||
the optimization.
|
||||
For IL, opportunities are easy to find.
|
||||
To see if an in line expansion is
|
||||
desirable will not be hard either.
|
||||
Yet, the main problem is to find the most
|
||||
desirable ones.
|
||||
We will deal with this problem later and
|
||||
we will first attend feasibility and
|
||||
desirability analysis.
|
||||
.PP
|
||||
There are several reasons why a procedure invocation
|
||||
cannot or should not be expanded in line.
|
||||
.sp
|
||||
A call to a procedure P cannot be expanded in line
|
||||
in any of the following cases:
|
||||
.IP 1. 3
|
||||
The body of P is not available as EM text.
|
||||
Clearly, there is no way to do the substitution.
|
||||
.IP 2.
|
||||
P, or any procedure called by P (transitively),
|
||||
follows the chain of statically enclosing
|
||||
procedures (via a LXL or LXA instruction)
|
||||
or follows the chain of dynamically enclosing
|
||||
procedures (via a DCH).
|
||||
If the call were expanded in line,
|
||||
one level would be removed from the chains,
|
||||
leading to total chaos.
|
||||
This chaos could be solved by patching up
|
||||
every LXL, LXA or DCH in all procedures
|
||||
that could be part of the chains,
|
||||
but this is hard to implement.
|
||||
.IP 3.
|
||||
P, or any procedure called by P (transitively),
|
||||
calls a procedure whose body is not
|
||||
available as EM text.
|
||||
The unknown procedure may use an LXL, LXA or DCH.
|
||||
However, in several languages a separately
|
||||
compiled procedure has no access to the
|
||||
static or dynamic chain.
|
||||
In this case
|
||||
this point does not apply.
|
||||
.IP 4.
|
||||
P, or any procedure called by P (transitively),
|
||||
uses the LPB instruction, which converts a
|
||||
local base to an argument base;
|
||||
as the locals and parameters are stored
|
||||
in a non-standard way (differing from the
|
||||
normal EM calling sequence) this instruction
|
||||
would yield incorrect results.
|
||||
.IP 5.
|
||||
The total number of bytes of the parameters
|
||||
of P is not known.
|
||||
P may be a procedure with a variable number
|
||||
of parameters or may have an array of dynamic size
|
||||
as value parameter.
|
||||
.LP
|
||||
It is undesirable to expand a call to a procedure P in line
|
||||
in any of the following cases:
|
||||
.IP 1. 3
|
||||
P is large, i.e. the number of EM instructions
|
||||
of P exceeds some threshold.
|
||||
The expanded code would be large too.
|
||||
Furthermore, several programs in ACK,
|
||||
including the global optimizer itself,
|
||||
may run out of memory if they they have to run
|
||||
in a small address space and are provided
|
||||
very large procedures.
|
||||
The threshold may be set to infinite,
|
||||
in which case this point does not apply.
|
||||
.IP 2.
|
||||
P has many local variables.
|
||||
All these variables would have to be allocated
|
||||
in the stack frame of the calling procedure.
|
||||
.PP
|
||||
If a call may be expanded in line, we have to
|
||||
decide how to access its parameters.
|
||||
In the previous section we stated that we would
|
||||
use in line parameters whenever possible and desirable.
|
||||
There are several reasons why a parameter
|
||||
cannot or should not be expanded in line.
|
||||
.sp
|
||||
No parameter of a procedure P can be expanded in line,
|
||||
in any of the following cases:
|
||||
.IP 1. 3
|
||||
P, or any procedure called by P (transitively),
|
||||
does a store-indirect or a use-indirect (i.e. through
|
||||
a pointer).
|
||||
However, if the front-end has generated messages
|
||||
telling that certain parameters can not be accessed
|
||||
indirectly, those parameters may be expanded in line.
|
||||
.IP 2.
|
||||
P, or any procedure called by P (transitively),
|
||||
calls a procedure whose body is not available as EM text.
|
||||
The unknown procedure may do a store-indirect
|
||||
or a use-indirect.
|
||||
However, the same remark about front-end messages
|
||||
as for 1. holds here.
|
||||
.IP 3.
|
||||
The address of a parameter location is taken (via a LAL).
|
||||
In the normal calling sequence, all parameters
|
||||
are stored sequentially. If the address of one
|
||||
parameter location is taken, the address of any
|
||||
other parameter location can be computed from it.
|
||||
Hence we must put every parameter in a temporary location;
|
||||
furthermore, all these locations must be in
|
||||
the same order as for the normal calling sequence.
|
||||
.IP 4.
|
||||
P has overlapping parameters; for example, it uses
|
||||
the parameter at offset 10 both as a 2 byte and as a 4 byte
|
||||
parameter.
|
||||
Such code may be produced by the front ends if
|
||||
the formal parameter is of some record type
|
||||
with variants.
|
||||
.PP
|
||||
Sometimes a specific parameter must not be expanded in line.
|
||||
.sp 0
|
||||
An actual parameter expression cannot be expanded in line
|
||||
in any of the following cases:
|
||||
.IP 1. 3
|
||||
P stores into the parameter location.
|
||||
Even if the actual parameter expression is a simple
|
||||
variable, it is incorrect to change the 'store into
|
||||
formal' into a 'store into actual', because of
|
||||
the parameter mechanism used.
|
||||
In Pascal, the following expansion is incorrect:
|
||||
.DS
|
||||
procedure p (x:integer);
|
||||
begin
|
||||
x := 20;
|
||||
end;
|
||||
\&...
|
||||
a := 10; \kxa := 10;
|
||||
p(a); ---> \h'|\nxu'a := 20;
|
||||
write(a); \h'|\nxu'write(a);
|
||||
.DE
|
||||
.IP 2.
|
||||
P changes any of the operands of the
|
||||
actual parameter expression.
|
||||
If the expression is expanded and evaluated
|
||||
after the operand has been changed,
|
||||
the wrong value will be used.
|
||||
.IP 3.
|
||||
The actual parameter expression has side effects.
|
||||
It must be evaluated only once,
|
||||
at the place of the call.
|
||||
.LP
|
||||
It is undesirable to expand an actual parameter in line
|
||||
in the following case:
|
||||
.IP 1. 3
|
||||
The parameter is used more than once
|
||||
(dynamically) and the actual parameter expression
|
||||
is not just a simple variable or constant.
|
||||
.LP
|
||||
135
doc/ego/il/il4
Normal file
135
doc/ego/il/il4
Normal file
@@ -0,0 +1,135 @@
|
||||
.NH 2
|
||||
Heuristic rules
|
||||
.PP
|
||||
Using the information described
|
||||
in the previous section,
|
||||
we can find all calls that can
|
||||
be expanded in line, and for which
|
||||
this expansion is desirable.
|
||||
In general, we cannot expand all these calls,
|
||||
so we have to choose the 'best' ones.
|
||||
With every CAL instruction
|
||||
that may be expanded, we associate
|
||||
a \fIpay off\fR,
|
||||
which expresses how desirable it is
|
||||
to expand this specific CAL.
|
||||
.sp
|
||||
Let Tc denote the portion of EM text involved
|
||||
in a specific call, i.e. the pushing of the actual
|
||||
parameter expressions, the CAL itself,
|
||||
the popping of the parameters and the
|
||||
pushing of the result (if any, via an LFR).
|
||||
Let Te denote the EM text that would be obtained
|
||||
by expanding the call in line.
|
||||
Let Pc be the original program and Pe the program
|
||||
with Te substituted for Tc.
|
||||
The pay off of the CAL depends on two factors:
|
||||
.IP -
|
||||
T = execution_time(Pe) - execution_time(Pc)
|
||||
.IP -
|
||||
S = code_size(Pe) - code_size(Pc)
|
||||
.LP
|
||||
The change in execution time (T) depends on:
|
||||
.IP -
|
||||
T1 = execution_time(Te) - execution_time(Tc)
|
||||
.IP -
|
||||
N = number of times Te or Tc get executed.
|
||||
.LP
|
||||
We assume that T1 will be the same every
|
||||
time the code gets executed.
|
||||
This is a reasonable assumption.
|
||||
(Note that we are talking about one CAL,
|
||||
not about different calls to the same procedure).
|
||||
Hence
|
||||
.DS
|
||||
T = N * T1
|
||||
.DE
|
||||
T1 can be estimated by a careful analysis
|
||||
of the transformations that are performed.
|
||||
Below, we list everything that will be
|
||||
different when a call is expanded in line:
|
||||
.IP -
|
||||
The CAL instruction is not executed.
|
||||
This saves a subroutine jump.
|
||||
.IP -
|
||||
The instructions in the procedure prolog
|
||||
are not executed.
|
||||
These instructions, generated from the PRO pseudo,
|
||||
save some machine registers
|
||||
(including the old LB), set the new LB and allocate space
|
||||
for the locals of the called routine.
|
||||
The savings may be less if there are no
|
||||
locals to allocate.
|
||||
.IP -
|
||||
In line parameters are not evaluated before the call
|
||||
and are not pushed on the stack.
|
||||
.IP -
|
||||
All remaining parameters are stored in local variables,
|
||||
instead of being pushed on the stack.
|
||||
.IP -
|
||||
If the number of parameters is nonzero,
|
||||
the ASP instruction after the CAL is not executed.
|
||||
.IP -
|
||||
Every reference to an in line parameter is
|
||||
substituted by the parameter expression.
|
||||
.IP -
|
||||
RET (return) instructions are replaced by
|
||||
BRA (branch) instructions.
|
||||
If the called procedure 'falls through'
|
||||
(i.e. it has only one RET, at the end of its code),
|
||||
even the BRA is not needed.
|
||||
.IP -
|
||||
The LFR (fetch function result) is not executed
|
||||
.PP
|
||||
Besides these changes, which are caused directly by IL,
|
||||
other changes may occur as IL influences other optimization
|
||||
techniques, such as Register Allocation and Constant Propagation.
|
||||
Our heuristic rules do not take into account the quite
|
||||
inpredictable effects on Register Allocation.
|
||||
It does, however, favour calls that have numeric \fIconstants\fR
|
||||
as parameter; especially the constant "0" as an inline
|
||||
parameter gets high scores,
|
||||
as further optimizations may often be possible.
|
||||
.PP
|
||||
It cannot be determined statically how often a CAL instruction gets
|
||||
executed.
|
||||
We will use \fIloop nesting\fR information here.
|
||||
The nesting level of the loop in which
|
||||
the CAL appears (if any) will be used as an
|
||||
indication for the number of times it gets executed.
|
||||
.PP
|
||||
Based on all these facts,
|
||||
the pay off of a call will be computed.
|
||||
The following model was developed empirically.
|
||||
Assume procedure P calls procedure Q.
|
||||
The call takes place in basic block B.
|
||||
.DS
|
||||
.TS
|
||||
l l l.
|
||||
ZP \&= # zero parameters
|
||||
CP \&= # constant parameters - ZP
|
||||
LN \&= Loop Nesting level (0 if outside any loop)
|
||||
F \&= \fIif\fR # formal parameters of Q > 0 \fIthen\fR 1 \fIelse\fR 0
|
||||
FT \&= \fIif\fR Q falls through \fIthen\fR 1 \fIelse\fR 0
|
||||
S \&= size(Q) - 1 - # inline_parameters - F
|
||||
L \&= \fIif\fR # local variables of P > 0 \fIthen\fR 0 \fIelse\fR -1
|
||||
A \&= CP + 2 * ZP
|
||||
N \&= \fIif\fR LN=0 and P is never called from a loop \fIthen\fR 0 \fIelse\fR (LN+1)**2
|
||||
FM \&= \fIif\fR B is a firm block \fIthen\fR 2 \fIelse\fR 1
|
||||
|
||||
pay_off \&= (100/S + FT + F + L + A) * N * FM
|
||||
.TE
|
||||
.DE
|
||||
S stands for the size increase of the program,
|
||||
which is slightly less than the size of Q.
|
||||
The size of a procedure is taken to be its number
|
||||
of (non-pseudo) EM instructions.
|
||||
The terms "loop nesting level" and "firm" were defined
|
||||
in the chapter on the Intermediate Code (section "loop tables").
|
||||
If a call is not inside a loop and the calling procedure
|
||||
is itself never called from a loop (transitively),
|
||||
then the call will probably be executed at most once.
|
||||
Such a call is never expanded in line (its pay off is zero).
|
||||
If the calling procedure doesn't have local variables, a penalty (L)
|
||||
is introduced, as it will most likely get local variables if the
|
||||
call gets expanded.
|
||||
446
doc/ego/il/il5
Normal file
446
doc/ego/il/il5
Normal file
@@ -0,0 +1,446 @@
|
||||
.NH 2
|
||||
Implementation
|
||||
.PP
|
||||
A major factor in the implementation
|
||||
of Inline Substitution is the requirement
|
||||
not to use an excessive amount of memory.
|
||||
IL essentially analyzes the entire program;
|
||||
it makes decisions based on which procedure calls
|
||||
appear in the whole program.
|
||||
Yet, because of the memory restriction, it is
|
||||
not feasible to read the entire program
|
||||
in main memory.
|
||||
To solve this problem, the IL phase has been
|
||||
split up into three subphases that are executed sequentially:
|
||||
.IP 1.
|
||||
analyze every procedure; see how it accesses its parameters;
|
||||
simultaneously collect all calls
|
||||
appearing in the whole program an put them
|
||||
in a \fIcall-list\fR.
|
||||
.IP 2.
|
||||
use the call-list and decide which calls will be substituted
|
||||
in line.
|
||||
.IP 3.
|
||||
take the decisions of subphase 2 and modify the
|
||||
program accordingly.
|
||||
.LP
|
||||
Subphases 1 and 3 scan the input program; only
|
||||
subphase 3 modifies it.
|
||||
It is essential that the decisions can be made
|
||||
in subphase 2
|
||||
without using the input program,
|
||||
provided that subphase 1 puts enough information
|
||||
in the call-list.
|
||||
Subphase 2 keeps the entire call-list in main memory
|
||||
and repeatedly scans it, to
|
||||
find the next best candidate for expansion.
|
||||
.PP
|
||||
We will specify the
|
||||
data structures used by IL before
|
||||
describing the subphases.
|
||||
.NH 3
|
||||
Data structures
|
||||
.NH 4
|
||||
The procedure table
|
||||
.PP
|
||||
In subphase 1 information is gathered about every procedure
|
||||
and added to the procedure table.
|
||||
This information is used by the heuristic rules.
|
||||
A proctable entry for procedure p has
|
||||
the following extra information:
|
||||
.IP -
|
||||
is it allowed to substitute an invocation of p in line?
|
||||
.IP -
|
||||
is it allowed to put any parameter of such a call in line?
|
||||
.IP -
|
||||
the size of p (number of EM instructions)
|
||||
.IP -
|
||||
does p 'fall through'?
|
||||
.IP -
|
||||
a description of the formal parameters that p accesses; this information
|
||||
is obtained by looking at the code of p. For every parameter f,
|
||||
we record:
|
||||
.RS
|
||||
.IP -
|
||||
the offset of f
|
||||
.IP -
|
||||
the type of f (word, double word, pointer)
|
||||
.IP -
|
||||
may the corresponding actual parameter be put in line?
|
||||
.IP -
|
||||
is f ever accessed indirectly?
|
||||
.IP -
|
||||
if f used: never, once or more than once?
|
||||
.RE
|
||||
.IP -
|
||||
the number of times p is called (see below)
|
||||
.IP -
|
||||
the file address of its call-count information (see below).
|
||||
.LP
|
||||
.NH 4
|
||||
Call-count information
|
||||
.PP
|
||||
As a result of Inline Substitution, some procedures may
|
||||
become useless, because all their invocations have been
|
||||
substituted in line.
|
||||
One of the tasks of IL is to keep track which
|
||||
procedures are no longer called.
|
||||
Note that IL is especially keen on procedures that are
|
||||
called only once
|
||||
(possibly as a result of expanding all other calls to it).
|
||||
So we want to know how many times a procedure
|
||||
is called \fIduring\fR Inline Substitution.
|
||||
It is not good enough to compute this
|
||||
information afterwards.
|
||||
The task is rather complex, because
|
||||
the number of times a procedure is called
|
||||
varies during the entire process:
|
||||
.IP 1.
|
||||
If a call to p is substituted in line,
|
||||
the number of calls to p gets decremented by 1.
|
||||
.IP 2.
|
||||
If a call to p is substituted in line,
|
||||
and p contains n calls to q, then the number of calls to q
|
||||
gets incremented by n.
|
||||
.IP 3.
|
||||
If a procedure p is removed (because it is no
|
||||
longer called) and p contains n calls to q,
|
||||
then the number of calls to q gets decremented by n.
|
||||
.LP
|
||||
(Note that p may be the same as q, if p is recursive).
|
||||
.sp 0
|
||||
So we actually want to have the following information:
|
||||
.DS
|
||||
NRCALL(p,q) = number of call to q appearing in p,
|
||||
|
||||
for all procedures p and q that may be put in line.
|
||||
.DE
|
||||
This information, called \fIcall-count information\fR is
|
||||
computed by the first subphase.
|
||||
It is stored in a file.
|
||||
It is represented as a number of lists, rather than as
|
||||
a (very sparse) matrix.
|
||||
Every procedure has a list of (proc,count) pairs,
|
||||
telling which procedures it calls, and how many times.
|
||||
The file address of its call-count list is stored
|
||||
in its proctable entry.
|
||||
Whenever this information is needed, it is fetched from
|
||||
the file, using direct access.
|
||||
The proctable entry also contains the number of times
|
||||
a procedure is called, at any moment.
|
||||
.NH 4
|
||||
The call-list
|
||||
.PP
|
||||
The call-list is the major data structure use by IL.
|
||||
Every item of the list describes one procedure call.
|
||||
It contains the following attributes:
|
||||
.IP -
|
||||
the calling procedure (caller)
|
||||
.IP -
|
||||
the called procedure (callee)
|
||||
.IP -
|
||||
identification of the CAL instruction (sequence number)
|
||||
.IP -
|
||||
the loop nesting level; our heuristic rules appreciate
|
||||
calls inside a loop (or even inside a loop nested inside
|
||||
another loop, etc.) more than other calls
|
||||
.IP -
|
||||
the actual parameter expressions involved in the call;
|
||||
for every actual, we record:
|
||||
.RS
|
||||
.IP -
|
||||
the EM code of the expression
|
||||
.IP -
|
||||
the number of bytes of its result (size)
|
||||
.IP -
|
||||
an indication if the actual may be put in line
|
||||
.RE
|
||||
.LP
|
||||
The structure of the call-list is rather complex.
|
||||
Whenever a call is expanded in line, new calls
|
||||
will suddenly appear in the program,
|
||||
that were not contained in the original body
|
||||
of the calling subroutine.
|
||||
These calls are inherited from the called procedure.
|
||||
We will refer to these invocations as \fInested calls\fR
|
||||
(see Fig. 5.1).
|
||||
.DS
|
||||
.TS
|
||||
lw(2.5i) l.
|
||||
procedure p is
|
||||
begin .
|
||||
a(); .
|
||||
b(); .
|
||||
end;
|
||||
.TE
|
||||
|
||||
.TS
|
||||
lw(2.5i) l.
|
||||
procedure r is procedure r is
|
||||
begin begin
|
||||
x(); x();
|
||||
p(); -- in line a(); -- nested call
|
||||
y(); b(); -- nested call
|
||||
end; y();
|
||||
end;
|
||||
.TE
|
||||
|
||||
Fig. 5.1 Example of nested procedure calls
|
||||
.DE
|
||||
Nested calls may subsequently be put in line too
|
||||
(probably resulting in a yet deeper nesting level, etc.).
|
||||
So the call-list does not always reflect the source program,
|
||||
but changes dynamically, as decisions are made.
|
||||
If a call to p is expanded, all calls appearing in p
|
||||
will be added to the call-list.
|
||||
.sp 0
|
||||
A convenient and elegant way to represent
|
||||
the call-list is to use a LISP-like list.
|
||||
.[
|
||||
poel lisp trac
|
||||
.]
|
||||
Calls that appear at the same level
|
||||
are linked in the CDR direction. If a call C
|
||||
to a procedure p is expanded,
|
||||
all calls appearing in p are put in a sub-list
|
||||
of C, i.e. in its CAR.
|
||||
In the example above, before the decision
|
||||
to expand the call to p is made, the
|
||||
call-list of procedure r looks like:
|
||||
.DS
|
||||
(call-to-x, call-to-p, call-to-y)
|
||||
.DE
|
||||
After the decision, it looks like:
|
||||
.DS
|
||||
(call-to-x, (call-to-p*, call-to-a, call-to-b), call-to-y)
|
||||
.DE
|
||||
The call to p is marked, because it has been
|
||||
substituted.
|
||||
Whenever IL wants to traverse the call-list of some procedure,
|
||||
it uses the well-known LISP technique of
|
||||
recursion in the CAR direction and
|
||||
iteration in the CDR direction
|
||||
(see page 1.19-2 of
|
||||
.[
|
||||
poel lisp trac
|
||||
.]
|
||||
).
|
||||
All list traversals look like:
|
||||
.DS
|
||||
traverse(list)
|
||||
{
|
||||
for (c = first(list); c != 0; c = CDR(c)) {
|
||||
if (c is marked) {
|
||||
traverse(CAR(c));
|
||||
} else {
|
||||
do something with c
|
||||
}
|
||||
}
|
||||
}
|
||||
.DE
|
||||
The entire call-list consists of a number of LISP-like lists,
|
||||
one for every procedure.
|
||||
The proctable entry of a procedure contains a pointer
|
||||
to the beginning of the list.
|
||||
.NH 3
|
||||
The first subphase: procedure analysis
|
||||
.PP
|
||||
The tasks of the first subphase are to determine
|
||||
several attributes of every procedure
|
||||
and to construct the basic call-list,
|
||||
i.e. without nested calls.
|
||||
The size of a procedure is determined
|
||||
by simply counting its EM instructions.
|
||||
Pseudo instructions are skipped.
|
||||
A procedure does not 'fall through' if its CFG
|
||||
contains a basic block
|
||||
that is not the last block of the CFG and
|
||||
that ends on a RET instruction.
|
||||
The formal parameters of a procedure are determined
|
||||
by inspection of
|
||||
its code.
|
||||
.PP
|
||||
The call-list in constructed by looking at all CAL instructions
|
||||
appearing in the program.
|
||||
The call-list should only contain calls to procedures
|
||||
that may be put in line.
|
||||
This fact is only known if the procedure was
|
||||
analyzed earlier.
|
||||
If a call to a procedure p appears in the program
|
||||
before the body of p,
|
||||
the call will always be put in the call-list.
|
||||
If p is later found to be unsuitable,
|
||||
the call will be removed from the list by the
|
||||
second subphase.
|
||||
.PP
|
||||
An important issue is the recognition
|
||||
of the actual parameter expressions of the call.
|
||||
The front ends produces messages telling how many
|
||||
bytes of formal parameters every procedure accesses.
|
||||
(If there is no such message for a procedure, it
|
||||
cannot be put in line).
|
||||
The actual parameters together must account for
|
||||
the same number of bytes.A recursive descent parser is used
|
||||
to parse side-effect free EM expressions.
|
||||
It uses a table and some
|
||||
auxiliary routines to determine
|
||||
how many bytes every EM instruction pops from the stack
|
||||
and how many bytes it pushes onto the stack.
|
||||
These numbers depend on the EM instruction, its argument,
|
||||
and the wordsize and pointersize of the target machine.
|
||||
Initially, the parser has to recognize the
|
||||
number of bytes specified in the formals-message,
|
||||
say N.
|
||||
Assume the first instruction before the CAL pops S bytes
|
||||
and pushes R bytes.
|
||||
If R > N, too many bytes are recognized
|
||||
and the parser fails.
|
||||
Else, it calls itself recursively to recognize the
|
||||
S bytes used as operand of the instruction.
|
||||
If it succeeds in doing so, it continues with the next instruction,
|
||||
i.e. the first instruction before the code recognized by
|
||||
the recursive call, to recognize N-R more bytes.
|
||||
The result is a number of EM instructions that collectively push N bytes.
|
||||
If an instruction is come across that has side-effects
|
||||
(e.g. a store or a procedure call) or of which R and S cannot
|
||||
be computed statically (e.g. a LOS), it fails.
|
||||
.sp 0
|
||||
Note that the parser traverses the code backwards.
|
||||
As EM code is essentially postfix code, the parser works top down.
|
||||
.PP
|
||||
If the parser fails to recognize the parameters, the call will not
|
||||
be substituted in line.
|
||||
If the parameters can be determined, they still have to
|
||||
match the formal parameters of the called procedure.
|
||||
This check is performed by the second subphase; it cannot be
|
||||
done here, because it is possible that the called
|
||||
procedure has not been analyzed yet.
|
||||
.PP
|
||||
The entire call-list is written to a file,
|
||||
to be processed by the second subphase.
|
||||
.NH 3
|
||||
The second subphase: making decisions
|
||||
.PP
|
||||
The task of the second subphase is quite easy
|
||||
to understand.
|
||||
It reads the call-list file,
|
||||
builds an incore call-list and deletes every
|
||||
call that may not be expanded in line (either because the called
|
||||
procedure may not be put in line, or because the actual parameters
|
||||
of the call do not match the formal parameters of the called procedure).
|
||||
It assigns a \fIpay-off\fR to every call,
|
||||
indicating how desirable it is to expand it.
|
||||
.PP
|
||||
The subphase repeatedly scans the call-list and takes
|
||||
the call with the highest ratio.
|
||||
The chosen one gets marked,
|
||||
and the call-list is extended with the nested calls,
|
||||
as described above.
|
||||
These nested calls are also assigned a ratio,
|
||||
and will be considered too during the next scans.
|
||||
.sp 0
|
||||
After every decision the number of times
|
||||
every procedure is called is updated, using
|
||||
the call-count information.
|
||||
Meanwhile, the subphase keeps track of the amount of space left
|
||||
available.
|
||||
If all space is used, or if there are no more calls left to
|
||||
be expanded, it exits this loop.
|
||||
Finally, calls to procedures that are called only
|
||||
once are also chosen.
|
||||
.PP
|
||||
The actual parameters of a call are only needed by
|
||||
this subphase to assign a ratio to a call.
|
||||
To save some space, these actuals are not kept in main memory.
|
||||
They are removed after the call has been read and a ratio
|
||||
has been assigned to it.
|
||||
So this subphase works with \fIabstracts\fR of calls.
|
||||
After all work has been done,
|
||||
the actual parameters of the chosen calls are retrieved
|
||||
from a file,
|
||||
as they are needed by the transformation subphase.
|
||||
.NH 3
|
||||
The third subphase: doing transformations
|
||||
.PP
|
||||
The third subphase makes the actual modifications to
|
||||
the EM text.
|
||||
It is directed by the decisions made in the previous subphase,
|
||||
as expressed via the call-list.
|
||||
The call-list read by this subphase contains
|
||||
only calls that were selected for expansion.
|
||||
The list is ordered in the same way as the EM text,
|
||||
i.e. if a call C1 appears before a call C2 in the call-list,
|
||||
C1 also appears before C2 in the EM text.
|
||||
So the EM text is traversed linearly,
|
||||
the calls that have to be substituted are determined
|
||||
and the modifications are made.
|
||||
If a procedure is come across that is no longer needed,
|
||||
it is simply not written to the output EM file.
|
||||
The substitution of a call takes place in distinct steps:
|
||||
.IP "change the calling sequence" 7
|
||||
.sp 0
|
||||
The actual parameter expressions are changed.
|
||||
Parameters that are put in line are removed.
|
||||
All remaining ones must store their result in a
|
||||
temporary local variable, rather than
|
||||
push it on the stack.
|
||||
The CAL instruction and any ASP (to pop actual parameters)
|
||||
or LFR (to fetch the result of a function)
|
||||
are deleted.
|
||||
.IP "fetch the text of the called procedure"
|
||||
.sp 0
|
||||
Direct disk access is used to to read the text of the
|
||||
called procedure.
|
||||
The file offset is obtained from the proctable entry.
|
||||
.IP "allocate bytes for locals and temporaries"
|
||||
.sp 0
|
||||
The local variables of the called procedure will be put in the
|
||||
stack frame of the calling procedure.
|
||||
The same applies to any temporary variables
|
||||
that hold the result of parameters
|
||||
that were not put in line.
|
||||
The proctable entry of the caller is updated.
|
||||
.IP "put a label after the CAL"
|
||||
.sp 0
|
||||
If the called procedure contains a RET (return) instruction
|
||||
somewhere in the middle of its text (i.e. it does
|
||||
not fall through), the RET must be changed into
|
||||
a BRA (branch), to jump over the
|
||||
remainder of the text.
|
||||
This label is not needed if the called
|
||||
procedure falls through.
|
||||
.IP "copy the text of the called procedure and modify it"
|
||||
.sp 0
|
||||
References to local variables of the called routine
|
||||
and to parameters that are not put in line
|
||||
are changed to refer to the
|
||||
new local of the caller.
|
||||
References to in line parameters are replaced
|
||||
by the actual parameter expression.
|
||||
Returns (RETs) are either deleted or
|
||||
replaced by a BRA.
|
||||
Messages containing information about local
|
||||
variables or parameters are changed.
|
||||
Global data declarations and the PRO and END pseudos
|
||||
are removed.
|
||||
Instruction labels and references to them are
|
||||
changed to make sure they do not have the
|
||||
same identifying number as
|
||||
labels in the calling procedure.
|
||||
.IP "insert the modified text"
|
||||
.sp 0
|
||||
The pseudos of the called procedure are put after the pseudos
|
||||
of the calling procedure.
|
||||
The real text of the callee is put at
|
||||
the place where the CAL was.
|
||||
.IP "take care of nested substitutions"
|
||||
.sp 0
|
||||
The expanded procedure may contain calls that
|
||||
have to be expanded too (nested calls).
|
||||
If the descriptor of this call contains actual
|
||||
parameter expressions,
|
||||
the code of the expressions has to be changed
|
||||
the same way as the code of the callee was changed.
|
||||
Next, the entire process of finding CALs and doing
|
||||
the substitutions is repeated recursively.
|
||||
.LP
|
||||
27
doc/ego/il/il6
Normal file
27
doc/ego/il/il6
Normal file
@@ -0,0 +1,27 @@
|
||||
.NH 2
|
||||
Source files of IL
|
||||
.PP
|
||||
The sources of IL are in the following files
|
||||
and packages (the prefixes 1_, 2_ and 3_ refer to the three subphases):
|
||||
.IP il.h: 14
|
||||
declarations of global variables and
|
||||
data structures
|
||||
.IP il.c:
|
||||
the routine main; the driving routines of the three subphases
|
||||
.IP 1_anal:
|
||||
contains a subroutine that analyzes a procedure
|
||||
.IP 1_cal:
|
||||
contains a subroutine that analyzes a call
|
||||
.IP 1_aux:
|
||||
implements auxiliary procedures used by subphase 1
|
||||
.IP 2_aux:
|
||||
implements auxiliary procedures used by subphase 2
|
||||
.IP 3_subst:
|
||||
the driving routine for doing the substitution
|
||||
.IP 3_change:
|
||||
lower level routines that do certain modifications
|
||||
.IP 3_aux:
|
||||
implements auxiliary procedures used by subphase 3
|
||||
.IP aux:
|
||||
implements auxiliary procedures used by several subphases.
|
||||
.LP
|
||||
10
doc/ego/intro/head
Normal file
10
doc/ego/intro/head
Normal file
@@ -0,0 +1,10 @@
|
||||
.ND
|
||||
.\".ll 80m
|
||||
.\".nr LL 80m
|
||||
.\".nr tl 78m
|
||||
.tr ~
|
||||
.ds >. .
|
||||
.ds >, ,
|
||||
.ds [. " [
|
||||
.ds .] ]
|
||||
.cs 5 22
|
||||
79
doc/ego/intro/intro1
Normal file
79
doc/ego/intro/intro1
Normal file
@@ -0,0 +1,79 @@
|
||||
.TL
|
||||
The design and implementation of
|
||||
the EM Global Optimizer
|
||||
.AU
|
||||
H.E. Bal
|
||||
.AI
|
||||
Vrije Universiteit
|
||||
Wiskundig Seminarium, Amsterdam
|
||||
.AB
|
||||
The EM Global Optimizer is part of the Amsterdam Compiler Kit,
|
||||
a toolkit for making retargetable compilers.
|
||||
It optimizes the intermediate code common to all compilers of
|
||||
the toolkit (EM),
|
||||
so it can be used for all programming languages and
|
||||
all processors supported by the kit.
|
||||
.PP
|
||||
The optimizer is based on well-understood concepts like
|
||||
control flow analysis and data flow analysis.
|
||||
It performs the following optimizations:
|
||||
Inline Substitution, Strength Reduction, Common Subexpression Elimination,
|
||||
Stack Pollution, Cross Jumping, Branch Optimization, Copy Propagation,
|
||||
Constant Propagation, Dead Code Elimination and Register Allocation.
|
||||
.PP
|
||||
This report describes the design of the optimizer and several
|
||||
of its implementation issues.
|
||||
.AE
|
||||
.bp
|
||||
.NH 1
|
||||
Introduction
|
||||
.PP
|
||||
.FS
|
||||
This work was supported by the
|
||||
Stichting Technische Wetenschappen (STW)
|
||||
under grant VWI00.0001.
|
||||
.FE
|
||||
The EM Global Optimizer is part of a software toolkit
|
||||
for making production-quality retargetable compilers.
|
||||
This toolkit,
|
||||
called the Amsterdam Compiler Kit
|
||||
.[
|
||||
tanenbaum toolkit rapport
|
||||
.]
|
||||
.[
|
||||
tanenbaum toolkit cacm
|
||||
.]
|
||||
runs under the Unix*
|
||||
.FS
|
||||
*Unix is a Trademark of Bell Laboratories
|
||||
.FE
|
||||
operating system.
|
||||
.sp 0
|
||||
The main design philosophy of the toolkit is to use
|
||||
a language- and machine-independent
|
||||
intermediate code, called EM.
|
||||
.[
|
||||
keizer architecture
|
||||
.]
|
||||
The basic compilation process can be split up into
|
||||
two parts.
|
||||
A language-specific front end translates the source program into EM.
|
||||
A machine-specific back end transforms EM to assembly code
|
||||
of the target machine.
|
||||
.PP
|
||||
The global optimizer is an optional phase of the
|
||||
compilation process, and can be used to obtain
|
||||
machine code of a higher quality.
|
||||
The optimizer transforms EM-code to better EM-code,
|
||||
so it comes between the front end and the back end.
|
||||
It can be used with any combination of languages
|
||||
and machines, as far as they are supported by
|
||||
the compiler kit.
|
||||
.PP
|
||||
This report describes the design of the
|
||||
global optimizer and several of its
|
||||
implementation issues.
|
||||
Measurements can be found in.
|
||||
.[
|
||||
bal tanenbaum global
|
||||
.]
|
||||
17
doc/ego/intro/tail
Normal file
17
doc/ego/intro/tail
Normal file
@@ -0,0 +1,17 @@
|
||||
.SH
|
||||
Acknowledgements
|
||||
.PP
|
||||
The author would like to thank Andy Tanenbaum for his guidance,
|
||||
Duk Bekema for implementing the Common Subexpression Elimination phase
|
||||
and writing the initial documentation of that phase,
|
||||
Dick Grune for reading the manuscript of this report
|
||||
and Ceriel Jacobs, Ed Keizer, Martin Kersten, Hans van Staveren
|
||||
and the members of the S.T.W. user's group for their
|
||||
interest and assistance.
|
||||
.bp
|
||||
.SH
|
||||
References
|
||||
.LP
|
||||
.[
|
||||
$LIST$
|
||||
.]
|
||||
95
doc/ego/lv/lv1
Normal file
95
doc/ego/lv/lv1
Normal file
@@ -0,0 +1,95 @@
|
||||
.bp
|
||||
.NH 1
|
||||
Live-Variable analysis
|
||||
.NH 2
|
||||
Introduction
|
||||
.PP
|
||||
The "Live-Variable analysis" optimization technique (LV)
|
||||
performs some code improvements and computes information that may be
|
||||
used by subsequent optimizations.
|
||||
The main task of this phase is the
|
||||
computation of \fIlive-variable information\fR.
|
||||
.[~[
|
||||
aho compiler design
|
||||
.] section 14.4]
|
||||
A variable A is said to be \fIdead\fR at some point p of the
|
||||
program text, if on no path in the control flow graph
|
||||
from p to a RET (return), A can be used before being changed;
|
||||
else A is said to be \fIlive\fR.
|
||||
.PP
|
||||
A statement of the form
|
||||
.DS
|
||||
VARIABLE := EXPRESSION
|
||||
.DE
|
||||
is said to be dead if the left hand side variable is dead just after
|
||||
the statement and the right hand side expression has no
|
||||
side effects (i.e. it doesn't change any variable).
|
||||
Such a statement can be eliminated entirely.
|
||||
Dead code will seldom be present in the original program,
|
||||
but it may be the result of earlier optimizations,
|
||||
such as copy propagation.
|
||||
.PP
|
||||
Live-variable information is passed to other phases via
|
||||
messages in the EM code.
|
||||
Live/dead messages are generated at points in the EM text where
|
||||
variables become dead or live.
|
||||
This information is especially useful for the Register
|
||||
Allocation phase.
|
||||
.NH 2
|
||||
Implementation
|
||||
.PP
|
||||
The implementation uses algorithm 14.6 of.
|
||||
.[
|
||||
aho compiler design
|
||||
.]
|
||||
First two sets DEF and USE are computed for every basic block b:
|
||||
.IP DEF(b) 9
|
||||
the set of all variables that are assigned a value in b before
|
||||
being used
|
||||
.IP USE(b) 9
|
||||
the set of all variables that may be used in b before being changed.
|
||||
.LP
|
||||
(So variables that may, but need not, be used resp. changed via a procedure
|
||||
call or through a pointer are included in USE but not in DEF).
|
||||
The next step is to compute the sets IN and OUT :
|
||||
.IP IN[b] 9
|
||||
the set of all variables that are live at the beginning of b
|
||||
.IP OUT[b] 9
|
||||
the set of all variables that are live at the end of b
|
||||
.LP
|
||||
IN and OUT can be computed for all blocks simultaneously by solving the
|
||||
data flow equations:
|
||||
.DS
|
||||
(1) IN[b] = OUT[b] - DEF[b] + USE[b]
|
||||
[2] OUT[b] = IN[s1] + ... + IN[sn] ;
|
||||
where SUCC[b] = {s1, ... , sn}
|
||||
.DE
|
||||
The equations are solved by a similar algorithm as for
|
||||
the Use Definition equations (see previous chapter).
|
||||
.PP
|
||||
Finally, each basic block is visited in turn to remove its dead code
|
||||
and to emit the live/dead messages.
|
||||
Every basic block b is traversed from its last
|
||||
instruction backwards to the beginning of b.
|
||||
Initially, all variables that are dead at the end
|
||||
of b are marked dead. All others are marked live.
|
||||
If we come across an assignment to a variable X that
|
||||
was marked live, a live-message is put after the
|
||||
assignment and X is marked dead;
|
||||
if X was marked dead, the assignment may be removed, provided that
|
||||
the right hand side expression contains no side effects.
|
||||
If we come across a use of a variable X that
|
||||
was marked dead, a dead-message is put after the
|
||||
use and X is marked live.
|
||||
So at any point, the mark of X tells whether X is
|
||||
live or dead immediately before that point.
|
||||
A message is also generated at the start of a basic block
|
||||
for every variable that was live at the end of the (textually)
|
||||
previous block, but dead at the entry of this block, or v.v.
|
||||
.PP
|
||||
Only local variables are considered.
|
||||
This significantly reduces the memory needed by this phase,
|
||||
eases the implementation and is hardly less efficient than
|
||||
considering all variables.
|
||||
(Note that it is very hard to prove that an assignment to
|
||||
a global variable is dead).
|
||||
374
doc/ego/ov/ov1
Normal file
374
doc/ego/ov/ov1
Normal file
@@ -0,0 +1,374 @@
|
||||
.bp
|
||||
.NH 1
|
||||
Overview of the global optimizer
|
||||
.NH 2
|
||||
The ACK compilation process
|
||||
.PP
|
||||
The EM Global Optimizer is one of three optimizers that are
|
||||
part of the Amsterdam Compiler Kit (ACK).
|
||||
The phases of ACK are:
|
||||
.IP 1.
|
||||
A Front End translates a source program to EM
|
||||
.IP 2.
|
||||
The Peephole Optimizer
|
||||
.[
|
||||
tanenbaum staveren peephole toplass
|
||||
.]
|
||||
reads EM code and produces 'better' EM code.
|
||||
It performs a number of optimizations (mostly peephole
|
||||
optimizations)
|
||||
such as constant folding, strength reduction and unreachable code
|
||||
elimination.
|
||||
.IP 3.
|
||||
The Global Optimizer further improves the EM code.
|
||||
.IP 4.
|
||||
The Code Generator transforms EM to assembly code
|
||||
of the target computer.
|
||||
.IP 5.
|
||||
The Target Optimizer improves the assembly code.
|
||||
.IP 6.
|
||||
An Assembler/Loader generates an executable file.
|
||||
.LP
|
||||
For a more extensive overview of the ACK compilation process,
|
||||
we refer to.
|
||||
.[
|
||||
tanenbaum toolkit rapport
|
||||
.]
|
||||
.[
|
||||
tanenbaum toolkit cacm
|
||||
.]
|
||||
.PP
|
||||
The input of the Global Optimizer may consist of files and
|
||||
libraries.
|
||||
Every file or module in the library must contain EM code in
|
||||
Compact Assembly Language format.
|
||||
.[~[
|
||||
tanenbaum machine architecture
|
||||
.], section 11.2]
|
||||
The output consists of one such EM file.
|
||||
The input files and libraries together need not
|
||||
constitute an entire program,
|
||||
although as much of the program as possible should be supplied.
|
||||
The more information about the program the optimizer
|
||||
gets, the better its output code will be.
|
||||
.PP
|
||||
The Global Optimizer is language- and machine-independent,
|
||||
i.e. it can be used for all languages and machines supported by ACK.
|
||||
Yet, it puts some unavoidable restrictions on the EM code
|
||||
produced by the Front End (see below).
|
||||
It must have some knowledge of the target machine.
|
||||
This knowledge is expressed in a machine description table
|
||||
which is passed as argument to the optimizer.
|
||||
This table does not contain very detailed information about the
|
||||
target (such as its instruction set and addressing modes).
|
||||
.NH 2
|
||||
The EM code
|
||||
.PP
|
||||
The definition of EM, the intermediate code of all ACK compilers,
|
||||
is given in a separate document.
|
||||
.[
|
||||
tanenbaum machine architecture
|
||||
.]
|
||||
We will only discuss some features of EM that are most relevant
|
||||
to the Global Optimizer.
|
||||
.PP
|
||||
EM is the assembly code of a virtual \fIstack machine\fR.
|
||||
All operations are performed on the top of the stack.
|
||||
For example, the statement "A := B + 3" may be expressed in EM as:
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
LOL -4 -- push local variable B
|
||||
LOC 3 -- push constant 3
|
||||
ADI 2 -- add two 2-byte items on top of
|
||||
-- the stack and push the result
|
||||
STL -2 -- pop A
|
||||
.TE
|
||||
.DE
|
||||
So EM is essentially a \fIpostfix\fR code.
|
||||
.PP
|
||||
EM has a rich instruction set, containing several arithmetic
|
||||
and logical operators.
|
||||
It also contains special-case instructions (such as INCrement).
|
||||
.PP
|
||||
EM has \fIglobal\fR (\fIexternal\fR) variables, accessible
|
||||
by all procedures and \fIlocal\fR variables, accessible by a few
|
||||
(nested) procedures.
|
||||
The local variables of a lexically enclosing procedure may
|
||||
be accessed via a \fIstatic link\fR.
|
||||
EM has instructions to follow the static chain.
|
||||
There are EM instruction to allow a procedure
|
||||
to access its local variables directly (such as LOL and STL above).
|
||||
Local variables are referenced via an offset in the stack frame
|
||||
of the procedure, rather than by their names (e.g. -2 and -4 above).
|
||||
The EM code does not contain the (source language) type
|
||||
of the variables.
|
||||
.PP
|
||||
All structured statements in the source program are expressed in
|
||||
low level jump instructions.
|
||||
Besides conditional and unconditional branch instructions, there are
|
||||
two case instructions (CSA and CSB),
|
||||
to allow efficient translation of case statements.
|
||||
.NH 2
|
||||
Requirements on the EM input
|
||||
.PP
|
||||
As the optimizer should be useful for all languages,
|
||||
it clearly should not put severe restrictions on the EM code
|
||||
of the input.
|
||||
There is, however, one immovable requirement:
|
||||
it must be possible to determine the \fIflow of control\fR of the
|
||||
input program.
|
||||
As virtually all global optimizations are based on control flow information,
|
||||
the optimizer would be totally powerless without it.
|
||||
For this reason we restrict the usage of the case jump instructions (CSA/CSB)
|
||||
of EM.
|
||||
Such an instruction is always called with the address of a case descriptor
|
||||
on top the the stack.
|
||||
.[~[
|
||||
tanenbaum machine architecture
|
||||
.] section 7.4]
|
||||
This descriptor contains the labels of all possible
|
||||
destinations of the jump.
|
||||
We demand that all case descriptors are allocated in a global
|
||||
data fragment of type ROM, i.e. the case descriptors
|
||||
may not be modifyable.
|
||||
Furthermore, any case instruction should be immediately preceded by
|
||||
a LAE (Load Address External) instruction, that loads the
|
||||
address of the descriptor,
|
||||
so the descriptor can be uniquely identified.
|
||||
.PP
|
||||
The optimizer will work improperly if the user deceives the control flow.
|
||||
We will give two methods to do this.
|
||||
.PP
|
||||
In "C" the notorious library routines "setjmp" and "longjmp"
|
||||
.[
|
||||
unix programmer's manual McIlroy
|
||||
.]
|
||||
may be used to jump out of a procedure,
|
||||
but can also be used for a number of other stuffy purposes,
|
||||
for example, to create an extra entry point in a loop.
|
||||
.DS
|
||||
while (condition) {
|
||||
....
|
||||
setjmp(buf);
|
||||
...
|
||||
}
|
||||
...
|
||||
longjmp(buf);
|
||||
.DE
|
||||
The invocation to longjmp actually is a jump to the place of
|
||||
the last call to setjmp with the same argument (buf).
|
||||
As the calls to setjmp and longjmp are indistinguishable from
|
||||
normal procedure calls, the optimizer will not see the danger.
|
||||
No need to say that several loop optimizations will behave
|
||||
unexpectedly when presented with such pathological input.
|
||||
.PP
|
||||
Another way to deceive the flow of control is
|
||||
by using exception handling routines.
|
||||
Ada*
|
||||
.FS
|
||||
* Ada is a registered trademark of the U.S. Government
|
||||
(Ada Joint Program Office).
|
||||
.FE
|
||||
has clearly recognized the dangers of exception handling,
|
||||
but other languages (such as PL/I) have not.
|
||||
.[
|
||||
ada rationale
|
||||
.]
|
||||
.PP
|
||||
The optimizer will be more effective if the EM input contains
|
||||
some extra information about the source program.
|
||||
Especially the \fIregister message\fR is very important.
|
||||
These messages indicate which local variables may never be
|
||||
accessed indirectly.
|
||||
Most optimizations benefit significantly by this information.
|
||||
.PP
|
||||
The Inline Substitution technique needs to know how many bytes
|
||||
of formal parameters every procedure accesses.
|
||||
Only calls to procedures for which the EM code contains this information
|
||||
will be substituted in line.
|
||||
.NH 2
|
||||
Structure of the optimizer
|
||||
.PP
|
||||
The Global Optimizer is organized as a number of \fIphases\fR,
|
||||
each one performing some task.
|
||||
The main structure is as follows:
|
||||
.IP IC 6
|
||||
the Intermediate Code construction phase transforms EM into the
|
||||
intermediate code (ic) of the optimizer
|
||||
.IP CF
|
||||
the Control Flow phase extends the ic with control flow
|
||||
information and interprocedural information
|
||||
.IP OPTs
|
||||
zero or more optimization phases, each one performing one or
|
||||
more related optimizations
|
||||
.IP CA
|
||||
the Compact Assembly phase generates Compact Assembly Language EM code
|
||||
out of ic.
|
||||
.LP
|
||||
.PP
|
||||
An important issue in the design of a global optimizer is the
|
||||
interaction between optimization techniques.
|
||||
It is often advantageous to combine several techniques in
|
||||
one algorithm that takes into account all interactions between them.
|
||||
Ideally, one single algorithm should be developed that does
|
||||
all optimizations simultaneously and deals with all possible interactions.
|
||||
In practice, such an algorithm is still far out of reach.
|
||||
Instead some rather ad hoc (albeit important) combinations are chosen,
|
||||
such as Common Subexpression Elimination and Register Allocation.
|
||||
.[
|
||||
prabhala sethi common subexpressions
|
||||
.]
|
||||
.[
|
||||
sethi ullman optimal code
|
||||
.]
|
||||
.PP
|
||||
In the Em Global Optimizer there is one separate algorithm for
|
||||
every technique.
|
||||
Note that this does not mean that all techniques are independent
|
||||
of each other.
|
||||
.PP
|
||||
In principle, the optimization phases can be run in any order;
|
||||
a phase may even be run more than once.
|
||||
However, the following rules should be obeyed:
|
||||
.IP -
|
||||
the Live Variable analysis phase (LV) must be run prior to
|
||||
Register Allocation (RA), as RA uses information outputted by LV.
|
||||
.IP -
|
||||
RA should be the last phase; this is a consequence of the way
|
||||
the interface between RA and the Code Generator is defined.
|
||||
.LP
|
||||
The ordering of the phases has significant impact on
|
||||
the quality of the produced code.
|
||||
In
|
||||
.[
|
||||
wulf overview production quality carnegie-mellon
|
||||
.]
|
||||
two kinds of phase ordering problems are distinguished.
|
||||
If two techniques A and B both take away opportunities of each other,
|
||||
there is a "negative" ordering problem.
|
||||
If, on the other hand, both A and B introduce new optimization
|
||||
opportunities for each other, the problem is called "positive".
|
||||
In the Global Optimizer the following interactions must be
|
||||
taken into account:
|
||||
.IP -
|
||||
Inline Substitution (IL) may create new opportunities for most
|
||||
other techniques, so it should be run as early as possible
|
||||
.IP -
|
||||
Use Definition analysis (UD) may introduce opportunities for LV.
|
||||
.IP -
|
||||
Strength Reduction may create opportunities for UD
|
||||
.LP
|
||||
The optimizer has a default phase ordering, which can
|
||||
be changed by the user.
|
||||
.NH 2
|
||||
Structure of this document
|
||||
.PP
|
||||
The remaining chapters of this document each describe one
|
||||
phase of the optimizer.
|
||||
For every phase, we describe its task, its design,
|
||||
its implementation, and its source files.
|
||||
The latter two sections are intended to aid the
|
||||
maintenance of the optimizer and
|
||||
can be skipped by the initial reader.
|
||||
.NH 2
|
||||
References
|
||||
.PP
|
||||
There are very
|
||||
few modern textbooks on optimization.
|
||||
Chapters 12, 13, and 14 of
|
||||
.[
|
||||
aho compiler design
|
||||
.]
|
||||
are a good introduction to the subject.
|
||||
Wulf et. al.
|
||||
.[
|
||||
wulf optimizing compiler
|
||||
.]
|
||||
describe one specific optimizing (Bliss) compiler.
|
||||
Anklam et. al.
|
||||
.[
|
||||
anklam vax-11
|
||||
.]
|
||||
discuss code generation and optimization in
|
||||
compilers for one specific machine (a Vax-11).
|
||||
Kirchgaesner et. al.
|
||||
.[
|
||||
optimizing ada compiler
|
||||
.]
|
||||
present a brief description of many
|
||||
optimizations; the report also contains a lengthy (over 60 pages)
|
||||
bibliography.
|
||||
.PP
|
||||
The number of articles on optimization is quite impressive.
|
||||
The Lowry and Medlock paper on the Fortran H compiler
|
||||
.[
|
||||
object code optimization Lowry Medlock
|
||||
.]
|
||||
is a classical one.
|
||||
Other papers on global optimization are.
|
||||
.[
|
||||
faiman optimizing pascal
|
||||
.]
|
||||
.[
|
||||
perkins sites
|
||||
.]
|
||||
.[
|
||||
harrison general purpose optimizing
|
||||
.]
|
||||
.[
|
||||
morel partial redundancies
|
||||
.]
|
||||
.[
|
||||
Mintz global optimizer
|
||||
.]
|
||||
Freudenberger
|
||||
.[
|
||||
freudenberger setl optimizer
|
||||
.]
|
||||
describes an optimizer for a Very High Level Language (SETL).
|
||||
The Production-Quality Compiler-Compiler (PQCC) project uses
|
||||
very sophisticated compiler techniques, as described in.
|
||||
.[
|
||||
wulf overview ieee
|
||||
.]
|
||||
.[
|
||||
wulf overview carnegie-mellon
|
||||
.]
|
||||
.[
|
||||
wulf machine-relative
|
||||
.]
|
||||
.PP
|
||||
Several Ph.D. theses are dedicated to optimization.
|
||||
Davidson
|
||||
.[
|
||||
davidson simplifying
|
||||
.]
|
||||
outlines a machine-independent peephole optimizer that
|
||||
improves assembly code.
|
||||
Katkus
|
||||
.[
|
||||
katkus
|
||||
.]
|
||||
describes how efficient programs can be obtained at little cost by
|
||||
optimizing only a small part of a program.
|
||||
Photopoulos
|
||||
.[
|
||||
photopoulos mixed code
|
||||
.]
|
||||
discusses the idea of generating interpreted intermediate code as well
|
||||
as assembly code, to obtain programs that are both small and fast.
|
||||
Shaffer
|
||||
.[
|
||||
shaffer automatic
|
||||
.]
|
||||
describes the theory of automatic subroutine generation.
|
||||
.]
|
||||
Leverett
|
||||
.[
|
||||
leverett register allocation compilers
|
||||
.]
|
||||
deals with register allocation in the PQCC compilers.
|
||||
.PP
|
||||
References to articles about specific optimization techniques
|
||||
will be given in later chapters.
|
||||
64
doc/ego/proto.make
Normal file
64
doc/ego/proto.make
Normal file
@@ -0,0 +1,64 @@
|
||||
# $Id$
|
||||
|
||||
#PARAMS do not remove this line!
|
||||
|
||||
SRC_DIR = $(SRC_HOME)/doc/ego
|
||||
|
||||
REFS=-p $(SRC_DIR)/refs.opt -p $(SRC_DIR)/refs.stat -p $(SRC_DIR)/refs.gen
|
||||
REFFILES = $(SRC_DIR)/refs.opt $(SRC_DIR)/refs.stat $(SRC_DIR)/refs.gen
|
||||
INTRO=$(SRC_DIR)/intro/intro?
|
||||
OV=$(SRC_DIR)/ov/ov?
|
||||
IC=$(SRC_DIR)/ic/ic?
|
||||
CF=$(SRC_DIR)/cf/cf?
|
||||
IL=$(SRC_DIR)/il/il?
|
||||
SR=$(SRC_DIR)/sr/sr?
|
||||
CS=$(SRC_DIR)/cs/cs?
|
||||
SP=$(SRC_DIR)/sp/sp?
|
||||
UD=$(SRC_DIR)/ud/ud?
|
||||
LV=$(SRC_DIR)/lv/lv?
|
||||
CJ=$(SRC_DIR)/cj/cj?
|
||||
BO=$(SRC_DIR)/bo/bo?
|
||||
RA=$(SRC_DIR)/ra/ra?
|
||||
CA=$(SRC_DIR)/ca/ca?
|
||||
EGO=$(INTRO) $(OV) $(IC) $(CF) $(IL) $(SR) $(CS) $(SP) $(CJ) $(BO) \
|
||||
$(UD) $(LV) $(RA) $(CA)
|
||||
REFER=refer
|
||||
TROFF=troff
|
||||
TBL=tbl
|
||||
TARGET=-Tlp
|
||||
HEAD = $(SRC_DIR)/intro/head
|
||||
TAIL = $(SRC_DIR)/intro/tail
|
||||
|
||||
$(TARGET_HOME)/doc/ego.doc: $(REFFILES) $(HEAD) $(TAIL) $(EGO)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(EGO) $(TAIL) | $(TBL) > $(TARGET_HOME)/doc/ego.doc
|
||||
|
||||
ego.f: $(REFFILES) $(HEAD) $(TAIL) $(EGO)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(EGO) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > ego.f
|
||||
intro.f: $(REFFILES) $(HEAD) $(TAIL) $(INTRO)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(INTRO) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > intro.f
|
||||
ov.f: $(REFFILES) $(HEAD) $(TAIL) $(OV)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(OV) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > ov.f
|
||||
ic.f: $(REFFILES) $(HEAD) $(TAIL) $(IC)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(IC) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > ic.f
|
||||
cf.f: $(REFFILES) $(HEAD) $(TAIL) $(CF)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(CF) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > cf.f
|
||||
il.f: $(REFFILES) $(HEAD) $(TAIL) $(IL)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(IL) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > il.f
|
||||
sr.f: $(REFFILES) $(HEAD) $(TAIL) $(SR)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(SR) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > sr.f
|
||||
cs.f: $(REFFILES) $(HEAD) $(TAIL) $(CS)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(CS) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > cs.f
|
||||
sp.f: $(REFFILES) $(HEAD) $(TAIL) $(SP)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(SP) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > sp.f
|
||||
cj.f: $(REFFILES) $(HEAD) $(TAIL) $(CJ)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(CJ) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > cj.f
|
||||
bo.f: $(REFFILES) $(HEAD) $(TAIL) $(BO)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(BO) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > bo.f
|
||||
ud.f: $(REFFILES) $(HEAD) $(TAIL) $(UD)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(UD) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > ud.f
|
||||
lv.f: $(REFFILES) $(HEAD) $(TAIL) $(LV)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(LV) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > lv.f
|
||||
ra.f: $(REFFILES) $(HEAD) $(TAIL) $(RA)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(RA) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > ra.f
|
||||
ca.f: $(REFFILES) $(HEAD) $(TAIL) $(CA)
|
||||
$(REFER) -sA+T -l4,2 $(REFS) $(HEAD) $(CA) $(TAIL) | $(TBL) | $(TROFF) $(TARGET) -ms > ca.f
|
||||
33
doc/ego/ra/ra1
Normal file
33
doc/ego/ra/ra1
Normal file
@@ -0,0 +1,33 @@
|
||||
.bp
|
||||
.NH 1
|
||||
Register Allocation
|
||||
.NH 2
|
||||
Introduction
|
||||
.PP
|
||||
The efficient usage of the general purpose registers
|
||||
of the target machine plays a key role in any optimizing compiler.
|
||||
This subject, often referred to as \fIRegister Allocation\fR,
|
||||
has great impact on both the code generator and the
|
||||
optimizing part of such a compiler.
|
||||
The code generator needs registers for at least the evaluation of
|
||||
arithmetic expressions;
|
||||
the optimizer uses the registers to decrease the access costs
|
||||
of frequently used entities (such as variables).
|
||||
The design of an optimizing compiler must pay great
|
||||
attention to the cooperation of optimization, register allocation
|
||||
and code generation.
|
||||
.PP
|
||||
Register allocation has received much attention in literature (see
|
||||
.[
|
||||
leverett register allocation compilers
|
||||
.]
|
||||
.[
|
||||
chaitin register coloring
|
||||
.]
|
||||
.[
|
||||
freiburghouse usage counts
|
||||
.]
|
||||
and
|
||||
.[~[
|
||||
sites register
|
||||
.]]).
|
||||
139
doc/ego/ra/ra2
Normal file
139
doc/ego/ra/ra2
Normal file
@@ -0,0 +1,139 @@
|
||||
.NH 2
|
||||
Usage of registers in ACK compilers
|
||||
.PP
|
||||
We will first describe the major design decisions
|
||||
of the Amsterdam Compiler Kit,
|
||||
as far as they concern register allocation.
|
||||
Subsequently we will outline
|
||||
the role of the Global Optimizer in the register
|
||||
allocation process and the interface
|
||||
between the code generator and the optimizer.
|
||||
.NH 3
|
||||
Usage of registers without the intervention of the Global Optimizer
|
||||
.PP
|
||||
Registers are used for two purposes:
|
||||
.IP 1.
|
||||
for the evaluation of arithmetic expressions
|
||||
.IP 2.
|
||||
to hold local variables, for the duration of the procedure they
|
||||
are local to.
|
||||
.LP
|
||||
It is essential to note that no translation part of the compilers,
|
||||
except for the code generator, knows anything at all
|
||||
about the register set of the target computer.
|
||||
Hence all decisions about registers are ultimately made by
|
||||
the code generator.
|
||||
Earlier phases of a compiler can only \fIadvise\fR the code generator.
|
||||
.PP
|
||||
The code generator splits the register set into two:
|
||||
a fixed part for the evaluation of expressions (called \fIscratch\fR
|
||||
registers) and a fixed part to store local variables.
|
||||
This partitioning, which depends only on the target computer, significantly
|
||||
reduces the complexity of register allocation, at the penalty
|
||||
of some loss of code quality.
|
||||
.PP
|
||||
The code generator has some (machine-dependent) knowledge of the access costs
|
||||
of memory locations and registers and of the costs of saving and
|
||||
restoring registers. (Registers are always saved by the \fIcalled\fR
|
||||
procedure).
|
||||
This knowledge is expressed in a set of procedures for each target machine.
|
||||
The code generator also knows how many registers there are and of
|
||||
which type they are.
|
||||
A register can be of type \fIpointer\fR, \fIfloating point\fR
|
||||
or \fIgeneral\fR.
|
||||
.PP
|
||||
The front ends of the compilers determine which local variables may
|
||||
be put in a register;
|
||||
such a variable may never be accessed indirectly (i.e. through a pointer).
|
||||
The front end also determines the types and sizes of these variables.
|
||||
The type can be any of the register types or the type \fIloop variable\fR,
|
||||
which denotes a general-typed variable that is used as loop variable
|
||||
in a for-statement.
|
||||
All this information is collected in a \fIregister message\fR in
|
||||
the EM code.
|
||||
Such a message is a pseudo EM instruction.
|
||||
This message also contains a \fIscore\fR field,
|
||||
indicating how desirable it is to put this variable in a register.
|
||||
A front end may assign a high score to a variable if it
|
||||
was declared as a register variable (which is only possible in
|
||||
some languages, such as "C").
|
||||
Any compiler phase before the code generator may change this score field,
|
||||
if it has reason to do so.
|
||||
The code generator bases its decisions on the information contained
|
||||
in the register message, most notably on the score.
|
||||
.PP
|
||||
If the global optimizer is not used,
|
||||
the score fields are set by the Peephole Optimizer.
|
||||
This optimizer simply counts the number of occurrences
|
||||
of every local (register) variable and adds this count
|
||||
to the score provided by the front end.
|
||||
In this way a simple, yet quite effective
|
||||
register allocation scheme is achieved.
|
||||
.NH 3
|
||||
The role of the Global Optimizer
|
||||
.PP
|
||||
The Global Optimizer essentially tries to improve the scheme
|
||||
outlined above.
|
||||
It uses the following principles for this purpose:
|
||||
.IP -
|
||||
Entities are not always assigned a register for the duration
|
||||
of an entire procedure; smaller regions of the program text
|
||||
may be considered too.
|
||||
.IP -
|
||||
several variables may be put in the same register simultaneously,
|
||||
provided at most one of them is live at any point.
|
||||
.IP -
|
||||
besides local variables, other entities (such as constants and addresses of
|
||||
variables and procedures) may be put in a register.
|
||||
.IP -
|
||||
more accurate cost estimates are used.
|
||||
.LP
|
||||
To perform its task, the optimizer must have some
|
||||
knowledge of the target machine.
|
||||
.NH 3
|
||||
The interface between the register allocator and the code generator
|
||||
.PP
|
||||
The RA phase of the optimizer must somehow be able to express its
|
||||
decisions.
|
||||
Such decisions may look like: 'put constant 1283 in a register from
|
||||
line 12 to line 40'.
|
||||
To be precise, RA must be able to tell the code generator to:
|
||||
.IP -
|
||||
initialize a register with some value
|
||||
.IP -
|
||||
update an entity from a register
|
||||
.IP -
|
||||
replace all occurrences of an entity in a certain region
|
||||
of text by a reference to the register.
|
||||
.LP
|
||||
At least three problems occur here: the code generator is only used to
|
||||
put local variables in registers,
|
||||
it only assigns a register to a variable for the duration of an entire
|
||||
procedure and it is not used to have some earlier compiler phase
|
||||
make all the decisions.
|
||||
.PP
|
||||
All problems are solved by one mechanism, that involves no changes
|
||||
to the code generator.
|
||||
With every (non-scratch) register R that will be used in
|
||||
a procedure P, we associate a new variable T, local to P.
|
||||
The size of T is the same as the size of R.
|
||||
A register message is generated for T with an exceptionally high score.
|
||||
The scores of all original register messages are set to zero.
|
||||
Consequently, the code generator will always assign precisely those new
|
||||
variables to a register.
|
||||
If the optimizer wants to put some entity, say the constant 1283, in
|
||||
a register, it emits the code "T := 1283" and replaces all occurrences
|
||||
of '1283' by T.
|
||||
Similarly, it can put the address of a procedure in T and replace all
|
||||
calls to that procedure by indirect calls.
|
||||
Furthermore, it can put several different entities in T (and thus in R)
|
||||
during the lifetime of P.
|
||||
.PP
|
||||
In principle, the code generated by the optimizer in this way would
|
||||
always be valid EM code, even if the optimizer would be presented
|
||||
a totally wrong description of the target computer register set.
|
||||
In practice, it would be a waste of data as well as text space to
|
||||
allocate memory for these new variables, as they will always be assigned
|
||||
a register (in the correct order of events).
|
||||
Hence, no memory locations are allocated for them.
|
||||
For this reason they are called pseudo local variables.
|
||||
386
doc/ego/ra/ra3
Normal file
386
doc/ego/ra/ra3
Normal file
@@ -0,0 +1,386 @@
|
||||
.NH 2
|
||||
The register allocation phase
|
||||
.PP
|
||||
.NH 3
|
||||
Overview
|
||||
.PP
|
||||
The RA phase deals with one procedure at a time.
|
||||
For every procedure, it first determines which entities
|
||||
may be put in a register. Such an entity
|
||||
is called an \fIitem\fR.
|
||||
For every item it decides during which parts of the procedure it
|
||||
might be assigned a register.
|
||||
Such a region is called a \fItimespan\fR.
|
||||
For any item, several (possibly overlapping) timespans may
|
||||
be considered.
|
||||
A pair (item,timespan) is called an \fIallocation\fR.
|
||||
If the items of two allocations are both live at some
|
||||
point of time in the intersections of their timespans,
|
||||
these allocations are said to be \fIrivals\fR of each other,
|
||||
as they cannot be assigned the same register.
|
||||
The rivals-set of every allocation is computed.
|
||||
Next, the gains of assigning a register to an allocation are estimated,
|
||||
for every allocation.
|
||||
With all this information, decisions are made which allocations
|
||||
to store in which registers (\fIpacking\fR).
|
||||
Finally, the EM text is transformed to reflect these decisions.
|
||||
.NH 3
|
||||
The item recognition subphase
|
||||
.PP
|
||||
RA tries to put the following entities in a register:
|
||||
.IP -
|
||||
a local variable for which a register message was found
|
||||
.IP -
|
||||
the address of a local variable for which no
|
||||
register message was found
|
||||
.IP -
|
||||
the address of a global variable
|
||||
.IP -
|
||||
the address of a procedure
|
||||
.IP -
|
||||
a numeric constant.
|
||||
.LP
|
||||
Only the \fIaddress\fR of a global variable
|
||||
may be put in a register, not the variable itself.
|
||||
This approach avoids the very complex problems that would be
|
||||
caused by procedure calls and indirect pointer references (see
|
||||
.[~[
|
||||
aho design compiler
|
||||
.] sections 14.7 and 14.8]
|
||||
and
|
||||
.[~[
|
||||
spillman side-effects
|
||||
.]]).
|
||||
Still, on most machines accessing a global variable using indirect
|
||||
addressing through a register is much cheaper than
|
||||
accessing it via its address.
|
||||
Similarly, if the address of a procedure is put in a register, the
|
||||
procedure can be called via an indirect call.
|
||||
.PP
|
||||
With every item we associate a register type.
|
||||
This type is
|
||||
.DS
|
||||
for local variables: the type contained in the register message
|
||||
for addresses of variables and procedures: the pointer type
|
||||
for constants: the general type
|
||||
.DE
|
||||
An entity other than a local variable is not taken to be an item
|
||||
if it is used only once within the current procedure.
|
||||
.PP
|
||||
An item is said to be \fIlive\fR at some point of the program text
|
||||
if its value may be used before it is changed.
|
||||
As addresses and constants are never changed, all items but local
|
||||
variables are always live.
|
||||
The region of text during which a local variable is live is
|
||||
determined via the live/dead messages generated by the
|
||||
Live Variable analysis phase of the Global Optimizer.
|
||||
.NH 3
|
||||
The allocation determination subphase
|
||||
.PP
|
||||
If a procedure has more items than registers,
|
||||
it may be advantageous to put an item in a register
|
||||
only during those parts of the procedure where it is most
|
||||
heavily used.
|
||||
Such a part will be called a timespan.
|
||||
With every item we may associate a set of timespans.
|
||||
If two timespans of an item overlap,
|
||||
at most one of them may be granted a register,
|
||||
as there is no use in putting the same item in two
|
||||
registers simultaneously.
|
||||
If two timespans of an item are distinct,
|
||||
both may be chosen;
|
||||
the item will possibly be put in two
|
||||
different registers during different parts of the procedure.
|
||||
The timespan may also consist
|
||||
of the whole procedure.
|
||||
.PP
|
||||
A list of (item,timespan) pairs (allocations)
|
||||
is build, which will be the input to the decision making
|
||||
subphase of RA (packing subphase).
|
||||
This allocation list is the main data structure of RA.
|
||||
The description of the remainder of RA will be in terms
|
||||
of allocations rather than items.
|
||||
The phrase "to assign a register to an allocation" means "to assign
|
||||
a register to the item of the allocation for the duration of
|
||||
the timespan of the allocation".
|
||||
Subsequent subphases will add more information
|
||||
to this list.
|
||||
.PP
|
||||
Several factors must be taken into account when a
|
||||
timespan for an item is constructed:
|
||||
.IP 1.
|
||||
At any \fIentry point\fR of the timespan where the
|
||||
item is live,
|
||||
the register must be initialized with the item
|
||||
.IP 2.
|
||||
At any exit point of the timespan where the item is live,
|
||||
the item must be updated.
|
||||
.LP
|
||||
In order to decrease these costs, we will only consider timespans with
|
||||
one entry point
|
||||
and no live exit points.
|
||||
.NH 3
|
||||
The rivals computation subphase
|
||||
.PP
|
||||
As stated before, several different items may be put in the
|
||||
same register, provided they are not live simultaneously.
|
||||
For every allocation we determine the intersection
|
||||
of its timespan and the lifetime of its item (i.e. the part of the
|
||||
procedure during which the item is live).
|
||||
The allocation is said to be busy during this intersection.
|
||||
If two allocations are ever busy simultaneously they are
|
||||
said to be rivals of each other.
|
||||
The rivals information is added to the allocation list.
|
||||
.NH 3
|
||||
The profits computation subphase
|
||||
.PP
|
||||
To make good decisions, the packing subphase needs to
|
||||
know which allocations can be assigned the same register
|
||||
(rivals information) and how much is gained by
|
||||
granting an allocation a register.
|
||||
.PP
|
||||
Besides the gains of using a register instead of an
|
||||
item,
|
||||
two kinds of overhead costs must be
|
||||
taken into account:
|
||||
.IP -
|
||||
the register must be initialized with the item
|
||||
.IP -
|
||||
the register must be saved at procedure entry
|
||||
and restored at procedure exit.
|
||||
.LP
|
||||
The latter costs should not be due to a single
|
||||
allocation, as several allocations can be assigned the same register.
|
||||
These costs are dealt with after packing has been done.
|
||||
They do not influence the decisions of the packing algorithm,
|
||||
they may only undo them.
|
||||
.PP
|
||||
The actual profits consist of improvements
|
||||
of execution time and code size.
|
||||
As the former is far more difficult to estimate , we will
|
||||
discuss code size improvements first.
|
||||
.PP
|
||||
The gains of putting a certain item in a register
|
||||
depends on how the item is used.
|
||||
Suppose the item is
|
||||
a pointer variable.
|
||||
On machines that do not have a
|
||||
double-indirect addressing mode,
|
||||
two instructions are needed to dereference the variable
|
||||
if it is not in a register, but only one if it is put in a register.
|
||||
If the variable is not dereferenced, but simply copied, one instruction
|
||||
may be sufficient in both cases.
|
||||
So the gains of putting a pointer variable in a register are higher
|
||||
if the variable is dereferenced often.
|
||||
.PP
|
||||
To make accurate estimates, detailed knowledge of
|
||||
the target machine and of the code generator
|
||||
would be needed.
|
||||
Therefore, a simplification has been made that substantially limits
|
||||
the amount of target machine information that is needed.
|
||||
The estimation of the number of bytes saved does
|
||||
not take into account how an item is used.
|
||||
Rather, an average number is used.
|
||||
So these gains are computed as follows:
|
||||
.DS
|
||||
#bytes_saved = #occurrences * gains_per_occurrence
|
||||
.DE
|
||||
The number of occurrences is derived from
|
||||
the EM code.
|
||||
Note that this is not exact either,
|
||||
as there is no one-to-one correspondence between occurrences in
|
||||
the EM code and in the assembler code.
|
||||
.PP
|
||||
The gains of one occurrence depend on:
|
||||
.IP 1.
|
||||
the type of the item
|
||||
.IP 2.
|
||||
the size of the item
|
||||
.IP 3.
|
||||
the type of the register
|
||||
.LP
|
||||
and for local variables and addresses of local variables:
|
||||
.IP 4.
|
||||
the type of the local variable
|
||||
.IP 5.
|
||||
the offset of the variable in the stackframe
|
||||
.LP
|
||||
For every allocation we try two types of registers: the register type
|
||||
of the item and the general register type.
|
||||
Only the type with the highest profits will subsequently be used.
|
||||
This type is added to the allocation information.
|
||||
.PP
|
||||
To compute the gains, RA uses a machine-dependent table
|
||||
that is read from a machine descriptor file.
|
||||
By means of this table the number of bytes saved can be computed
|
||||
as a function of the five properties.
|
||||
.PP
|
||||
The costs of initializing a register with an item
|
||||
is determined in a similar way.
|
||||
The cost of one initialization is also
|
||||
obtained from the descriptor file.
|
||||
Note that there can be at most one initialization for any
|
||||
allocation.
|
||||
.PP
|
||||
To summarize, the number of bytes a certain allocation would
|
||||
save is computed as follows:
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
net_bytes_saved = bytes_saved - init_cost
|
||||
bytes_saved = #occurrences * gains_per_occ
|
||||
init_cost = #initializations * costs_per_init
|
||||
.TE
|
||||
.DE
|
||||
.PP
|
||||
It is inherently more difficult to estimate the execution
|
||||
time saved by putting an item in a register,
|
||||
because it is impossible to predict how
|
||||
many times an item will be used dynamically.
|
||||
If an occurrence is part of a loop,
|
||||
it may be executed many times.
|
||||
If it is part of a conditional statement,
|
||||
it may never be executed at all.
|
||||
In the latter case, the speed of the program may even get
|
||||
worse if an initialization is needed.
|
||||
As a clear example, consider the piece of "C" code in Fig. 13.1.
|
||||
.DS
|
||||
switch(expr) {
|
||||
case 1: p(); break;
|
||||
case 2: p(); p(); break;
|
||||
case 3: p(); break;
|
||||
default: break;
|
||||
}
|
||||
|
||||
Fig. 13.1 A "C" switch statement
|
||||
.DE
|
||||
Lots of bytes may be saved by putting the address of procedure p
|
||||
in a register, as p is called four times (statically).
|
||||
Dynamically, p will be called zero, one or two times,
|
||||
depending on the value of the expression.
|
||||
.PP
|
||||
The optimizer uses the following strategy for optimizing
|
||||
execution time:
|
||||
.IP 1.
|
||||
try to put items in registers during \fIloops\fR first
|
||||
.IP 2.
|
||||
always keep the initializing code outside the loop
|
||||
.IP 3.
|
||||
if an item is not used in a loop, do not put it in a register if
|
||||
the initialization costs may be higher than the gains
|
||||
.LP
|
||||
The latter condition can be checked by determining the
|
||||
minimal number of usages (dynamically) of the item during the procedure,
|
||||
via a shortest path algorithm.
|
||||
In the example above, this minimal number is zero, so the address of
|
||||
p is not put in a register.
|
||||
.PP
|
||||
The costs of one occurrence is estimated as described above for the
|
||||
code size.
|
||||
The number of dynamic occurrences is guessed by looking at the
|
||||
loop nesting level of every occurrence.
|
||||
If the item is never used in a loop,
|
||||
the minimal number of occurrences is used.
|
||||
From these facts, the execution time improvement is assessed
|
||||
for every allocation.
|
||||
.NH 3
|
||||
The packing subphase
|
||||
.PP
|
||||
The packing subphase takes as input the allocation
|
||||
list and outputs a
|
||||
description of which allocations should be put
|
||||
in which registers.
|
||||
So it is essentially the decision making part of RA.
|
||||
.PP
|
||||
The packing system tries to assign a register to allocations one
|
||||
at a time, in some yet to be defined order.
|
||||
For every allocation A, it first checks if there is a register
|
||||
(of the right type)
|
||||
that is already assigned to one or more allocations,
|
||||
none of which are rivals of A.
|
||||
In this case A is assigned the same register.
|
||||
Else, A is assigned a new register, if one exists.
|
||||
A table containing the number of free registers for every type
|
||||
is maintained.
|
||||
It is initialized with the number of non-scratch registers of
|
||||
the target computer and updated whenever a
|
||||
new register is handed out.
|
||||
The packing algorithm stops when no more allocations can
|
||||
or need be assigned a register.
|
||||
.PP
|
||||
After an allocation A has been packed,
|
||||
all allocations with non-disjunct timespans (including
|
||||
A itself) are removed from the allocation list.
|
||||
.PP
|
||||
In case the number of items exceeds the number of registers, it
|
||||
is important to choose the most profitable allocations.
|
||||
Due to the possibility of having several allocations
|
||||
occupying the same register,
|
||||
this problem is quite complex.
|
||||
Our packing algorithm uses simple heuristic rules
|
||||
and avoids any combinatorial search.
|
||||
It has distinct rules for different costs measures.
|
||||
.PP
|
||||
If object code size is the most important factor,
|
||||
the algorithm is greedy and chooses allocations in
|
||||
decreasing order of their profits attribute.
|
||||
It does not take into account the fact that
|
||||
other allocations may be passed over because of
|
||||
this decision.
|
||||
.PP
|
||||
If execution time is at prime stake, the algorithm
|
||||
first considers allocations whose timespans consist of loops.
|
||||
After all these have been packed, it considers the remaining
|
||||
allocations.
|
||||
Within the two subclasses, it considers allocations
|
||||
with the highest profits first.
|
||||
When assigning a register to an allocation with a loop
|
||||
as timespan, the algorithm checks if the item has
|
||||
already been put in a register during another loop.
|
||||
If so, it tries to use the same register for the
|
||||
new allocation.
|
||||
After all packing has been done,
|
||||
it checks if the item has always been assigned the same
|
||||
register (although not necessarily during all loops).
|
||||
If so, it tries to put the item in that register during
|
||||
the entire procedure. This is possible
|
||||
if the allocation (item,whole_procedure) is not a rival
|
||||
of any allocation with a different item that has been
|
||||
assigned to the same register.
|
||||
Note that this approach is essentially 'bottom up',
|
||||
as registers are first assigned over small regions
|
||||
of text which are later collapsed into larger regions.
|
||||
The advantage of this approach is the fact that
|
||||
the decisions for one loop can be made independently
|
||||
of all other loops.
|
||||
.PP
|
||||
After the entire packing process has been completed,
|
||||
we compute for each register how much is gained in using
|
||||
this register, by simply adding the net profits
|
||||
of all allocations assigned to it.
|
||||
This total yield should outweigh the costs of
|
||||
saving/restoring the register at procedure entry/exit.
|
||||
As most modern processors (e.g. 68000, Vax) have special
|
||||
instructions to save/restore several registers,
|
||||
the differential costs of saving one extra register are by
|
||||
no means constant.
|
||||
The costs are read from the machine descriptor file and
|
||||
compared to the total yields of the registers.
|
||||
As a consequence of this analysis, some allocations
|
||||
may have their registers taken away.
|
||||
.NH 3
|
||||
The transformation subphase
|
||||
.PP
|
||||
The final subphase of RA transforms the EM text according to the
|
||||
decisions made by the packing system.
|
||||
It traverses the text of the currently optimized procedure and
|
||||
changes all occurrences of items at points where
|
||||
they are assigned a register.
|
||||
It also clears the score field of the register messages for
|
||||
normal local variables and emits register messages with a very
|
||||
high score for the pseudo locals.
|
||||
At points where registers have to be initialized with items,
|
||||
it generates EM code to do so.
|
||||
Finally it tries to decrease the size of the stackframe
|
||||
of the procedure by looking at which local variables need not
|
||||
be given memory locations.
|
||||
28
doc/ego/ra/ra4
Normal file
28
doc/ego/ra/ra4
Normal file
@@ -0,0 +1,28 @@
|
||||
.NH 2
|
||||
Source files of RA
|
||||
.PP
|
||||
The sources of RA are in the following files and packages:
|
||||
.IP ra.h: 14
|
||||
declarations of global variables and data structures
|
||||
.IP ra.c:
|
||||
the routine main; initialization of target machine-dependent tables
|
||||
.IP items:
|
||||
a routine to build the list of items of one procedure;
|
||||
routines to manipulate items
|
||||
.IP lifetime:
|
||||
contains a subroutine that determines when items are live/dead
|
||||
.IP alloclist:
|
||||
contains subroutines that build the initial allocations list
|
||||
and that compute the rivals sets.
|
||||
.IP profits:
|
||||
contains a subroutine that computes the profits of the allocations
|
||||
and a routine that determines the costs of saving/restoring registers
|
||||
.IP pack:
|
||||
contains the packing subphase
|
||||
.IP xform:
|
||||
contains the transformation subphase
|
||||
.IP interval:
|
||||
contains routines to manipulate intervals of time
|
||||
.IP aux:
|
||||
contains auxiliary routines
|
||||
.LP
|
||||
120
doc/ego/refs.gen
Normal file
120
doc/ego/refs.gen
Normal file
@@ -0,0 +1,120 @@
|
||||
%T A Practical Toolkit for Making Portable Compilers
|
||||
%A A.S. Tanenbaum
|
||||
%A H. van Staveren
|
||||
%A E.G. Keizer
|
||||
%A J.W. Stevenson
|
||||
%I Vrije Universiteit, Amsterdam
|
||||
%R Rapport nr IR-74
|
||||
%D October 1981
|
||||
|
||||
%T A Practical Toolkit for Making Portable Compilers
|
||||
%A A.S. Tanenbaum
|
||||
%A H. van Staveren
|
||||
%A E.G. Keizer
|
||||
%A J.W. Stevenson
|
||||
%J CACM
|
||||
%V 26
|
||||
%N 9
|
||||
%P 654-660
|
||||
%D September 1983
|
||||
|
||||
%T A Unix Toolkit for Making Portable Compilers
|
||||
%A A.S. Tanenbaum
|
||||
%A H. van Staveren
|
||||
%A E.G. Keizer
|
||||
%A J.W. Stevenson
|
||||
%J Proceedings USENIX conf.
|
||||
%C Toronto, Canada
|
||||
%V 26
|
||||
%D July 1983
|
||||
%P 255-261
|
||||
|
||||
%T Using Peephole Optimization on Intermediate Code
|
||||
%A A.S. Tanenbaum
|
||||
%A H. van Staveren
|
||||
%A J.W. Stevenson
|
||||
%J TOPLAS
|
||||
%V 4
|
||||
%N 1
|
||||
%P 21-36
|
||||
%D January 1982
|
||||
|
||||
%T Language- and Machine-independent Global Optimization on Intermediate Code
|
||||
%A H.E. Bal
|
||||
%A A.S. Tanenbaum
|
||||
%J Computer Languages
|
||||
%V 11
|
||||
%N 2
|
||||
%P 105-121
|
||||
%D April 1986
|
||||
|
||||
%T Description of a machine architecture for use with
|
||||
block structured languages
|
||||
%A A.S. Tanenbaum
|
||||
%A H. van Staveren
|
||||
%A E.G. Keizer
|
||||
%A J.W. Stevenson
|
||||
%I Vrije Universiteit, Amsterdam
|
||||
%R Rapport nr IR-81
|
||||
%D August 1983
|
||||
|
||||
%T Amsterdam Compiler Kit documentation
|
||||
%A A.S. Tanenbaum et. al.
|
||||
%I Vrije Universiteit, Amsterdam
|
||||
%R Rapport nr IR-90
|
||||
%D June 1984
|
||||
|
||||
%T The C Programming Language - Reference Manual
|
||||
%A D.M. Ritchie
|
||||
%I Bell Laboratories
|
||||
%C Murray Hill, New Jersey
|
||||
%D 1978
|
||||
|
||||
%T Unix programmer's manual, Seventh Edition
|
||||
%A B.W. Kernighan
|
||||
%A M.D. McIlroy
|
||||
%I Bell Laboratories
|
||||
%C Murray Hill, New Jersey
|
||||
%V 1
|
||||
%D January 1979
|
||||
|
||||
%T A Tour Through the Portable C Compiler
|
||||
%A S.C. Johnson
|
||||
%I Bell Laboratories
|
||||
%B Unix programmer's manual, Seventh Edition
|
||||
%C Murray Hill, New Jersey
|
||||
%D January 1979
|
||||
|
||||
|
||||
%T Ada Programming Language - MILITARY STANDARD
|
||||
%A J.D. Ichbiah
|
||||
%I U.S. Department of Defense
|
||||
%R ANSI/MIL-STD-1815A
|
||||
%D 22 January 1983
|
||||
|
||||
%T Rationale for the Design of the Ada Programming Language
|
||||
%A J.D. Ichbiah
|
||||
%J SIGPLAN Notices
|
||||
%V 14
|
||||
%N 6
|
||||
%D June 1979
|
||||
|
||||
%T The Programming Languages LISP and TRAC
|
||||
%A W.L. van der Poel
|
||||
%I Technische Hogeschool Delft
|
||||
%C Delft
|
||||
%D 1972
|
||||
|
||||
%T Compiler construction
|
||||
%A W.M. Waite
|
||||
%A G. Goos
|
||||
%I Springer-Verlag
|
||||
%C New York
|
||||
%D 1984
|
||||
|
||||
%T The C Programming Language
|
||||
%A B.W. Kernighan
|
||||
%A D.M. Ritchie
|
||||
%I Prentice-Hall, Inc
|
||||
%C Englewood Cliffs,NJ
|
||||
%D 1978
|
||||
546
doc/ego/refs.opt
Normal file
546
doc/ego/refs.opt
Normal file
@@ -0,0 +1,546 @@
|
||||
%T Principles of compiler design
|
||||
%A A.V. Aho
|
||||
%A J.D. Ullman
|
||||
%I Addison-Wesley
|
||||
%C Reading, Massachusetts
|
||||
%D 1978
|
||||
|
||||
%T The Design and Analysis of Computer Algorithms
|
||||
%A A.V. Aho
|
||||
%A J.E. Hopcroft
|
||||
%A J.D. Ullman
|
||||
%I Addison-Wesley
|
||||
%C Reading, Massachusetts
|
||||
%D 1974
|
||||
|
||||
%T Code generation in a machine-independent compiler
|
||||
%A R.G.G. Cattell
|
||||
%A J.M. Newcomer
|
||||
%A B.W. Leverett
|
||||
%J SIGPLAN Notices
|
||||
%V 14
|
||||
%N 8
|
||||
%P 65-75
|
||||
%D August 1979
|
||||
|
||||
%T An algorithm for Reduction of Operator Strength
|
||||
%A J. Cocke
|
||||
%A K. Kennedy
|
||||
%J CACM
|
||||
%V 20
|
||||
%N 11
|
||||
%P 850-856
|
||||
%D November 1977
|
||||
|
||||
%T Reduction of Operator Strength
|
||||
%A F.E. Allen
|
||||
%A J. Cocke
|
||||
%A K. Kennedy
|
||||
%B Program Flow Analysis
|
||||
%E S.S. Muchnick and D. Jones
|
||||
%I Prentice-Hall
|
||||
%C Englewood Cliffs, N.J.
|
||||
%D 1981
|
||||
|
||||
%T Simplifying Code Generation Through Peephole Optimization
|
||||
%A J.W. Davidson
|
||||
%R Ph.D. thesis
|
||||
%I Dept. of Computer Science
|
||||
%C Univ. of Arizona
|
||||
%D December 1981
|
||||
|
||||
%T A study of selective optimization techniques
|
||||
%A G.R. Katkus
|
||||
%R Ph.D. Thesis
|
||||
%C University of Southern California
|
||||
%D 1973
|
||||
|
||||
%T Automatic subroutine generation in an optimizing compiler
|
||||
%A J.B. Shaffer
|
||||
%R Ph.D. Thesis
|
||||
%C University of Maryland
|
||||
%D 1978
|
||||
|
||||
%T Optimal mixed code generation for microcomputers
|
||||
%A D.S. Photopoulos
|
||||
%R Ph.D. Thesis
|
||||
%C Northeastern University
|
||||
%D 1981
|
||||
|
||||
%T The Design of an Optimizing Compiler
|
||||
%A W.A. Wulf
|
||||
%A R.K. Johnsson
|
||||
%A C.B. Weinstock
|
||||
%A S.O. Hobbs
|
||||
%A C.M. Geschke
|
||||
%I American Elsevier Publishing Company
|
||||
%C New York
|
||||
%D 1975
|
||||
|
||||
%T Retargetable Compiler Code Generation
|
||||
%A M. Ganapathi
|
||||
%A C.N. Fischer
|
||||
%A J.L. Hennessy
|
||||
%J ACM Computing Surveys
|
||||
%V 14
|
||||
%N 4
|
||||
%P 573-592
|
||||
%D December 1982
|
||||
|
||||
%T An Optimizing Pascal Compiler
|
||||
%A R.N. Faiman
|
||||
%A A.A. Kortesoja
|
||||
%J IEEE Trans. on Softw. Eng.
|
||||
%V 6
|
||||
%N 6
|
||||
%P 512-518
|
||||
%D November 1980
|
||||
|
||||
%T Experience with the SETL Optimizer
|
||||
%A S.M. Freudenberger
|
||||
%A J.T. Schwartz
|
||||
%J TOPLAS
|
||||
%V 5
|
||||
%N 1
|
||||
%P 26-45
|
||||
%D Januari 1983
|
||||
|
||||
%T An Optimizing Ada Compiler
|
||||
%A W. Kirchgaesner
|
||||
%A J. Uhl
|
||||
%A G. Winterstein
|
||||
%A G. Goos
|
||||
%A M. Dausmann
|
||||
%A S. Drossopoulou
|
||||
%I Institut fur Informatik II, Universitat Karlsruhe
|
||||
%D February 1983
|
||||
|
||||
%T A Fast Algorithm for Finding Dominators
|
||||
in a Flowgraph
|
||||
%A T. Lengauer
|
||||
%A R.E. Tarjan
|
||||
%J TOPLAS
|
||||
%V 1
|
||||
%N 1
|
||||
%P 121-141
|
||||
%D July 1979
|
||||
|
||||
%T Optimization of hierarchical directed graphs
|
||||
%A M.T. Lepage
|
||||
%A D.T. Barnard
|
||||
%A A. Rudmik
|
||||
%J Computer Languages
|
||||
%V 6
|
||||
%N 1
|
||||
%P 19-34
|
||||
%D Januari 1981
|
||||
|
||||
%T Object Code Optimization
|
||||
%A E.S. Lowry
|
||||
%A C.W. Medlock
|
||||
%J CACM
|
||||
%V 12
|
||||
%N 1
|
||||
%P 13-22
|
||||
%D Januari 1969
|
||||
|
||||
%T Automatic Program Improvement:
|
||||
Variable Usage Transformations
|
||||
%A B. Maher
|
||||
%A D.H. Sleeman
|
||||
%J TOPLAS
|
||||
%V 5
|
||||
%N 2
|
||||
%P 236-264
|
||||
%D April 1983
|
||||
|
||||
%T The design of a global optimizer
|
||||
%A R.J. Mintz
|
||||
%A G.A. Fisher
|
||||
%A M. Sharir
|
||||
%J SIGPLAN Notices
|
||||
%V 14
|
||||
%N 9
|
||||
%P 226-234
|
||||
%D September 1979
|
||||
|
||||
%T Global Optimization by Suppression of Partial Redundancies
|
||||
%A E. Morel
|
||||
%A C. Renvoise
|
||||
%J CACM
|
||||
%V 22
|
||||
%N 2
|
||||
%P 96-103
|
||||
%D February 1979
|
||||
|
||||
%T Efficient Computation of Expressions with Common Subexpressions
|
||||
%A B. Prabhala
|
||||
%A R. Sethi
|
||||
%J JACM
|
||||
%V 27
|
||||
%N 1
|
||||
%P 146-163
|
||||
%D Januari 1980
|
||||
|
||||
%T An Analysis of Inline Substitution for a Structured
|
||||
Programming Language
|
||||
%A R.W. Scheifler
|
||||
%J CACM
|
||||
%V 20
|
||||
%N 9
|
||||
%P 647-654
|
||||
%D September 1977
|
||||
|
||||
%T Immediate Predominators in a Directed Graph
|
||||
%A P.W. Purdom
|
||||
%A E.F. Moore
|
||||
%J CACM
|
||||
%V 15
|
||||
%N 8
|
||||
%P 777-778
|
||||
%D August 1972
|
||||
|
||||
%T The Generation of Optimal Code for Arithmetic Expressions
|
||||
%A R. Sethi
|
||||
%A J.D. Ullman
|
||||
%J JACM
|
||||
%V 17
|
||||
%N 4
|
||||
%P 715-728
|
||||
%D October 1970
|
||||
|
||||
%T Exposing side-effects in a PL/I optimizing compiler
|
||||
%A T.C. Spillman
|
||||
%B Information Processing 1971
|
||||
%I North-Holland Publishing Company
|
||||
%C Amsterdam
|
||||
%P 376-381
|
||||
%D 1971
|
||||
|
||||
%T Inner Loops in Flowgraphs and Code Optimization
|
||||
%A S. Vasudevan
|
||||
%J Acta Informatica
|
||||
%N 17
|
||||
%P 143-155
|
||||
%D 1982
|
||||
|
||||
%T A New Strategy for Code Generation - the General-Purpose
|
||||
Optimizing Compiler
|
||||
%A W.H. Harrison
|
||||
%J IEEE Trans. on Softw. Eng.
|
||||
%V 5
|
||||
%N 4
|
||||
%P 367-373
|
||||
%D July 1979
|
||||
|
||||
%T PQCC: A Machine-Relative Compiler Technology
|
||||
%A W.M. Wulf
|
||||
%R CMU-CS-80-144
|
||||
%I Carnegie-Mellon University
|
||||
%C Pittsburgh
|
||||
%D 25 september 1980
|
||||
|
||||
%T Machine-independent Pascal code optimization
|
||||
%A D.R. Perkins
|
||||
%A R.L. Sites
|
||||
%J SIGPLAN Notices
|
||||
%V 14
|
||||
%N 8
|
||||
%P 201-207
|
||||
%D August 1979
|
||||
|
||||
%T A Case Study of a New Code Generation Technique for Compilers
|
||||
%A J.L. Carter
|
||||
%J CACM
|
||||
%V 20
|
||||
%N 12
|
||||
%P 914-920
|
||||
%D December 1977
|
||||
|
||||
%T Table-driven Code Generation
|
||||
%A S.L. Graham
|
||||
%J IEEE Computer
|
||||
%V 13
|
||||
%N 8
|
||||
%P 25-33
|
||||
%D August 1980
|
||||
|
||||
%T Register Allocation in Optimizing Compilers
|
||||
%A B.W. Leverett
|
||||
%R Ph.D. Thesis, CMU-CS-81-103
|
||||
%I Carnegie-Mellon University
|
||||
%C Pittsburgh
|
||||
%D February 1981
|
||||
|
||||
%T Register Allocation via Coloring
|
||||
%A G.J. Chaitin
|
||||
%A M.A. Auslander
|
||||
%A A.K. Chandra
|
||||
%A J. Cocke
|
||||
%A M.E. Hopkins
|
||||
%A P.W. Markstein
|
||||
%J Computer Languages
|
||||
%V 6
|
||||
%N 1
|
||||
%P 47-57
|
||||
%D January 1981
|
||||
|
||||
%T How to Call Procedures, or Second Thoughts on
|
||||
Ackermann's Function
|
||||
%A B.A. Wichmann
|
||||
%J Software - Practice and Experience
|
||||
%V 7
|
||||
%P 317-329
|
||||
%D 1977
|
||||
|
||||
%T Register Allocation Via Usage Counts
|
||||
%A R.A. Freiburghouse
|
||||
%J CACM
|
||||
%V 17
|
||||
%N 11
|
||||
%P 638-642
|
||||
%D November 1974
|
||||
|
||||
%T Machine-independent register allocation
|
||||
%A R.L. Sites
|
||||
%J SIGPLAN Notices
|
||||
%V 14
|
||||
%N 8
|
||||
%P 221-225
|
||||
%D August 1979
|
||||
|
||||
%T An Overview of the Production-Quality Compiler-Compiler Project
|
||||
%A B.W. Leverett
|
||||
%A R.G.G Cattell
|
||||
%A S.O. Hobbs
|
||||
%A J.M. Newcomer
|
||||
%A A.H. Reiner
|
||||
%A B.R. Schatz
|
||||
%A W.A. Wulf
|
||||
%J IEEE Computer
|
||||
%V 13
|
||||
%N 8
|
||||
%P 38-49
|
||||
%D August 1980
|
||||
|
||||
%T An Overview of the Production-Quality Compiler-Compiler Project
|
||||
%A B.W. Leverett
|
||||
%A R.G.G Cattell
|
||||
%A S.O. Hobbs
|
||||
%A J.M. Newcomer
|
||||
%A A.H. Reiner
|
||||
%A B.R. Schatz
|
||||
%A W.A. Wulf
|
||||
%R CMU-CS-79-105
|
||||
%I Carnegie-Mellon University
|
||||
%C Pittsburgh
|
||||
%D 1979
|
||||
|
||||
%T Topics in Code Generation and Register Allocation
|
||||
%A B.W. Leverett
|
||||
%R CMU-CS-82-130
|
||||
%I Carnegie-Mellon University
|
||||
%C Pittsburgh
|
||||
%D 28 July 1982
|
||||
|
||||
%T Predicting the Effects of Optimization on a Procedure Body
|
||||
%A J.E. Ball
|
||||
%J SIGPLAN Notices
|
||||
%V 14
|
||||
%N 8
|
||||
%P 214-220
|
||||
%D August 1979
|
||||
|
||||
%T The C Language Calling Sequence
|
||||
%A S.C. Johnson
|
||||
%A D.M. Ritchie
|
||||
%I Bell Laboratories
|
||||
%C Murray Hill, New Jersey
|
||||
%D September 1981
|
||||
|
||||
%T A Generalization of Two Code Ordering Optimizations
|
||||
%A C.W. Fraser
|
||||
%R TR 82-11
|
||||
%I Department of Computer Science
|
||||
%C The University of Arizona, Tucson
|
||||
%D October 1982
|
||||
|
||||
%T A Survey of Data Flow Analysis Techniques
|
||||
%A K. Kennedy
|
||||
%B Program Flow Analysis
|
||||
%E S.S. Muchnick and D. Jones
|
||||
%I Prentice-Hall
|
||||
%C Englewood Cliffs
|
||||
%D 1981
|
||||
|
||||
%T Delayed Binding in PQCC Generated Compilers
|
||||
%A W.A. Wulf
|
||||
%A K.V. Nori
|
||||
%R CMU-CS-82-138
|
||||
%I Carnegie-Mellon University
|
||||
%C Pittsburgh
|
||||
%D 1982
|
||||
|
||||
%T Interprocedural Data Flow Analysis in the presence
|
||||
of Pointers, Procedure Variables, and Label Variables
|
||||
%A W.E. Weihl
|
||||
%J Conf. Rec. of the 7th ACM Symp. on Principles of
|
||||
Programming Languages
|
||||
%C Las Vegas, Nevada
|
||||
%P 83-94
|
||||
%D 1980
|
||||
|
||||
%T Low-Cost, High-Yield Code Optimization
|
||||
%A D.R. Hanson
|
||||
%R TR 82-17
|
||||
%I Department of Computer Science
|
||||
%C The University of Arizona, Tucson
|
||||
%D November 1982
|
||||
|
||||
%T Program Flow Analysis
|
||||
%E S.S. Muchnick and D. Jones
|
||||
%I Prentice-Hall
|
||||
%C Englewood Cliffs
|
||||
%D 1981
|
||||
|
||||
%T A machine independent algorithm for code generation and its
|
||||
use in retargetable compilers
|
||||
%A R. Glanville
|
||||
%R Ph.D. thesis
|
||||
%C University of California, Berkeley
|
||||
%D December 1977
|
||||
|
||||
%T A formal framework for the derivation of machine-specific optimizers
|
||||
%A R. Giegerich
|
||||
%J TOPLAS
|
||||
%V 5
|
||||
%N 3
|
||||
%P 478-498
|
||||
%D July 1983
|
||||
|
||||
%T Engineering a compiler: Vax-11 code generation and optimization
|
||||
%A P. Anklam
|
||||
%A D. Cutler
|
||||
%A R. Heinen
|
||||
%A M. MacLaren
|
||||
%I Digital Equipment Corporation
|
||||
%D 1982
|
||||
|
||||
%T Analyzing exotic instructions for a retargetable code generator
|
||||
%A T.M. Morgan
|
||||
%A L.A. Rowe
|
||||
%J SIGPLAN Notices
|
||||
%V 17
|
||||
%N 6
|
||||
%P 197-204
|
||||
%D June 1982
|
||||
|
||||
%T TCOLAda and the Middle End of the PQCC Ada Compiler
|
||||
%A B.M. Brosgol
|
||||
%J SIGPLAN Notices
|
||||
%V 15
|
||||
%N 11
|
||||
%P 101-112
|
||||
%D November 1980
|
||||
|
||||
%T Implementation Implications of Ada Generics
|
||||
%A G. Bray
|
||||
%J Ada Letters
|
||||
%V III
|
||||
%N 2
|
||||
%P 62-71
|
||||
%D September 1983
|
||||
|
||||
%T Attributed Linear Intermediate Representations for Retargetable
|
||||
Code Generators
|
||||
%A M. Ganapathi
|
||||
%A C.N. Fischer
|
||||
%J Software-Practice and Experience
|
||||
%V 14
|
||||
%N 4
|
||||
%P 347-364
|
||||
%D April 1984
|
||||
|
||||
%T UNCOL: The myth and the fact
|
||||
%A T.B. Steel
|
||||
%J Annu. Rev. Autom. Program.
|
||||
%V 2
|
||||
%D 1960
|
||||
%P 325-344
|
||||
|
||||
%T Experience with a Graham-Glanville Style Code Generator
|
||||
%A P. Aigrain
|
||||
%A S.L. Graham
|
||||
%A R.R. Henry
|
||||
%A M.K. McKusick
|
||||
%A E.P. Llopart
|
||||
%J SIGPLAN Notices
|
||||
%V 19
|
||||
%N 6
|
||||
%D June 1984
|
||||
%P 13-24
|
||||
|
||||
%T Using Dynamic Programming to generate Optimized Code in a
|
||||
Graham-Glanville Style Code Generator
|
||||
%A T.W. Christopher
|
||||
%A P.J. Hatcher
|
||||
%A R.C. Kukuk
|
||||
%J SIGPLAN Notices
|
||||
%V 19
|
||||
%N 6
|
||||
%D June 1984
|
||||
%P 25-36
|
||||
|
||||
%T Peep - An Architectural Description Driven Peephole Optimizer
|
||||
%A R.R. Kessler
|
||||
%J SIGPLAN Notices
|
||||
%V 19
|
||||
%N 6
|
||||
%D June 1984
|
||||
%P 106-110
|
||||
|
||||
%T Automatic Generation of Peephole Optimizations
|
||||
%A J.W. Davidson
|
||||
%A C.W. Fraser
|
||||
%J SIGPLAN Notices
|
||||
%V 19
|
||||
%N 6
|
||||
%D June 1984
|
||||
%P 111-116
|
||||
|
||||
%T Analysing and Compressing Assembly Code
|
||||
%A C.W. Fraser
|
||||
%A E.W. Myers
|
||||
%A A.L. Wendt
|
||||
%J SIGPLAN Notices
|
||||
%V 19
|
||||
%N 6
|
||||
%D June 1984
|
||||
%P 117-121
|
||||
|
||||
%T Register Allocation by Priority-based Coloring
|
||||
%A F. Chow
|
||||
%A J. Hennessy
|
||||
%J SIGPLAN Notices
|
||||
%V 19
|
||||
%N 6
|
||||
%D June 1984
|
||||
%P 222-232
|
||||
%V 19
|
||||
%N 6
|
||||
%D June 1984
|
||||
%P 117-121
|
||||
|
||||
%T Code Selection through Object Code Optimization
|
||||
%A J.W. Davidson
|
||||
%A C.W. Fraser
|
||||
%I Dept. of Computer Science
|
||||
%C Univ. of Arizona
|
||||
%D November 1981
|
||||
|
||||
%T A Portable Machine-Independent Global Optimizer - Design
|
||||
and Measurements
|
||||
%A F.C. Chow
|
||||
%I Computer Systems Laboratory
|
||||
%C Stanford University
|
||||
%D December 1983
|
||||
29
doc/ego/refs.stat
Normal file
29
doc/ego/refs.stat
Normal file
@@ -0,0 +1,29 @@
|
||||
%T An analysis of Pascal Programs
|
||||
%A L.R. Carter
|
||||
%I UMI Research Press
|
||||
%C Ann Arbor, Michigan
|
||||
%D 1982
|
||||
|
||||
%T An Emperical Study of FORTRAN Programs
|
||||
%A D.E. Knuth
|
||||
%J Software - Practice and Experience
|
||||
%V 1
|
||||
%P 105-133
|
||||
%D 1971
|
||||
|
||||
%T F77 Performance
|
||||
%A D.A. Mosher
|
||||
%A R.P. Corbett
|
||||
%J ;login:
|
||||
%V 7
|
||||
%N 3
|
||||
%D June 1982
|
||||
|
||||
%T Ada Language Statistics for the iMAX 432 Operating System
|
||||
%A S.F. Zeigler
|
||||
%A R.P. Weicker
|
||||
%J Ada LETTERS
|
||||
%V 2
|
||||
%N 6
|
||||
%P 63-67
|
||||
%D May 1983
|
||||
184
doc/ego/sp/sp1
Normal file
184
doc/ego/sp/sp1
Normal file
@@ -0,0 +1,184 @@
|
||||
.bp
|
||||
.NH 1
|
||||
Stack pollution
|
||||
.NH 2
|
||||
Introduction
|
||||
.PP
|
||||
The "Stack Pollution" optimization technique (SP) decreases the costs
|
||||
(time as well as space) of procedure calls.
|
||||
In the EM calling sequence, the actual parameters are popped from
|
||||
the stack by the \fIcalling\fR procedure.
|
||||
The ASP (Adjust Stack Pointer) instruction is used for this purpose.
|
||||
A call in EM is shown in Fig. 8.1
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
Pascal: EM:
|
||||
|
||||
f(a,2) LOC 2
|
||||
LOE A
|
||||
CAL F
|
||||
ASP 4 -- pop 4 bytes
|
||||
.TE
|
||||
|
||||
Fig. 8.1 An example procedure call in Pascal and EM
|
||||
.DE
|
||||
As procedure calls occur often in most programs,
|
||||
the ASP is one of the most frequently used EM instructions.
|
||||
.PP
|
||||
The main intention of removing the actual parameters after a procedure call
|
||||
is to avoid the stack size to increase rapidly.
|
||||
Yet, in some cases, it is possible to \fIdelay\fR or even \fIavoid\fR the
|
||||
removal of the parameters without letting the stack grow
|
||||
significantly.
|
||||
In this way, considerable savings in code size and execution time may
|
||||
be achieved, at the cost of a slightly increased stack size.
|
||||
.PP
|
||||
A stack adjustment may be delayed if there is some other stack adjustment
|
||||
later on in the same basic block.
|
||||
The two ASPs can be combined into one.
|
||||
.DS
|
||||
.TS
|
||||
l l l.
|
||||
Pascal: EM: optimized EM:
|
||||
|
||||
f(a,2) LOC 2 LOC 2
|
||||
g(3,b,c) LOE A LOE A
|
||||
CAL F CAL F
|
||||
ASP 4 LOE C
|
||||
LOE C LOE B
|
||||
LOE B LOC 3
|
||||
LOC 3 CAL G
|
||||
CAL G ASP 10
|
||||
ASP 6
|
||||
.TE
|
||||
|
||||
Fig. 8.2 An example of local Stack Pollution
|
||||
.DE
|
||||
The stacksize will be increased only temporarily.
|
||||
If the basic block contains another ASP, the ASP 10 may subsequently be
|
||||
combined with that next ASP, and so on.
|
||||
.PP
|
||||
For some back ends, a stack adjustment also takes place
|
||||
at the point of a procedure return.
|
||||
There is no need to specify the number of bytes to be popped at a
|
||||
return.
|
||||
This provides an opportunity to remove ASPs more globally.
|
||||
If all ASPs outside any loop are removed, the increase of the
|
||||
stack size will still only be small, as no such ASP is executed more
|
||||
than once without an intervening return from the procedure it is part of.
|
||||
.PP
|
||||
This second approach is not generally applicable to all target machines,
|
||||
as some back ends require the stack to be cleaned up at the point of
|
||||
a procedure return.
|
||||
.NH 2
|
||||
Implementation
|
||||
.PP
|
||||
There is one main problem the implementation has to solve.
|
||||
In EM, the stack is not only used for passing parameters,
|
||||
but also for evaluating expressions.
|
||||
Hence, ASP instructions can only be combined or removed
|
||||
if certain conditions are satisfied.
|
||||
.PP
|
||||
Two consecutive ASPs of one basic block can only be combined
|
||||
(as described above) if:
|
||||
.IP 1.
|
||||
On no point of text in between the two ASPs, any item is popped from
|
||||
the stack that was pushed onto it before the first ASP.
|
||||
.IP 2.
|
||||
The number of bytes popped from the stack by the second ASP must equal
|
||||
the number of bytes pushed since the first ASP.
|
||||
.LP
|
||||
Condition 1. is not satisfied in Fig. 8.3.
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
Pascal: EM:
|
||||
|
||||
5 + f(10) + g(30) LOC 5
|
||||
LOC 10
|
||||
CAL F
|
||||
ASP 2 -- cannot be removed
|
||||
LFR 2 -- push function result
|
||||
ADI 2
|
||||
LOC 30
|
||||
CAL G
|
||||
ASP 2
|
||||
LFR 2
|
||||
ADI 2
|
||||
.TE
|
||||
|
||||
Fig. 8.3 An illegal transformation
|
||||
.DE
|
||||
If the first ASP were removed (delayed), the first ADI would add
|
||||
10 and f(10), instead of 5 and f(10).
|
||||
.sp
|
||||
Condition 2. is not satisfied in Fig. 8.4.
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
Pascal: EM:
|
||||
|
||||
f(10) + 5 * g(30) LOC 10
|
||||
CAL F
|
||||
ASP 2
|
||||
LFR 2
|
||||
LOC 5
|
||||
LOC 30
|
||||
CAL G
|
||||
ASP 2
|
||||
LFR 2
|
||||
MLI 2 -- 5 * g(30)
|
||||
ADI 2
|
||||
.TE
|
||||
|
||||
Fig. 8.4 A second illegal transformation
|
||||
.DE
|
||||
If the two ASPs were combined into one 'ASP 4', the constant 5 would
|
||||
have been popped, rather than the parameter 10 (so '10 + f(10)*g(30)'
|
||||
would have been computed).
|
||||
.PP
|
||||
The second approach to deleting ASPs (i.e. let the procedure return
|
||||
do the stack clean-up)
|
||||
is only applied to the last ASP of every basic block.
|
||||
Any preceding ASPs are dealt with by the first approach.
|
||||
The last ASP of a basic block B will only be removed if:
|
||||
.IP -
|
||||
on no path in the control flow graph from B to any block containing a
|
||||
RET (return) there is a basic block that, at some point of its text, pops
|
||||
items from the stack that it has not itself pushed earlier.
|
||||
.LP
|
||||
Clearly, if this condition is satisfied, no harm can be done; no
|
||||
other basic block will ever access items that were pushed
|
||||
on the stack before the ASP.
|
||||
.PP
|
||||
The number of bytes pushed onto or popped from the stack can be
|
||||
easily encoded in a so called "pop-push table".
|
||||
The numbers in general depend on the target machine word- and pointer
|
||||
size and on the argument given to the instruction.
|
||||
For example, an ADS instruction is described by:
|
||||
.DS
|
||||
-a-p+p
|
||||
.DE
|
||||
which means: an 'ADS n' first pops an n-byte value (n being the argument),
|
||||
next pops a pointer-size value and finally pushes a pointer-size value.
|
||||
For some infrequently used EM instructions the pop-push numbers
|
||||
cannot be computed statically.
|
||||
.PP
|
||||
The stack pollution algorithm first performs a depth first search over
|
||||
the control flow graph and marks all blocks that do not satisfy
|
||||
the global condition.
|
||||
Next it visits all basic blocks in turn.
|
||||
For every pair of adjacent ASPs, it checks conditions 1. and 2. and
|
||||
combines the ASPs if they are satisfied.
|
||||
The new ASP may be used as first ASP in the next pair.
|
||||
If a condition fails, it simply continues with the next ASP.
|
||||
Finally, the last ASP is removed if:
|
||||
.IP -
|
||||
nothing has been popped from the stack after the last ASP that was
|
||||
pushed before it
|
||||
.IP -
|
||||
the block was not marked by the depth first search
|
||||
.IP -
|
||||
the block is not in a loop
|
||||
.LP
|
||||
47
doc/ego/sr/sr1
Normal file
47
doc/ego/sr/sr1
Normal file
@@ -0,0 +1,47 @@
|
||||
.bp
|
||||
.NH 1
|
||||
Strength reduction
|
||||
.NH 2
|
||||
Introduction
|
||||
.PP
|
||||
The Strength Reduction optimization technique (SR)
|
||||
tries to replace expensive operators
|
||||
by cheaper ones,
|
||||
in order to decrease the execution time
|
||||
of the program.
|
||||
A classical example is replacing a 'multiplication by 2'
|
||||
by an addition or a shift instruction.
|
||||
These kinds of local transformations are already
|
||||
done by the EM Peephole Optimizer.
|
||||
Strength reduction can also be applied
|
||||
more generally to operators used in a loop.
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
i := 1; i := 1;
|
||||
while i < 100 loop\ \ \ \ \ \ \ --> TMP := i * 118;
|
||||
put(i * 118); while i < 100 loop
|
||||
i := i + 1; put(TMP);
|
||||
end loop; i := i + 1;
|
||||
TMP := TMP + 118;
|
||||
end loop;
|
||||
.TE
|
||||
|
||||
Fig. 6.1 An example of Strenght Reduction
|
||||
.DE
|
||||
In Fig. 6.1, a multiplication inside a loop is
|
||||
replaced by an addition inside the loop and a multiplication
|
||||
outside the loop.
|
||||
Clearly, this is a global optimization; it cannot
|
||||
be done by a peephole optimizer.
|
||||
.PP
|
||||
In some cases a related technique, \fItest replacement\fR,
|
||||
can be used to eliminate the
|
||||
loop variable i.
|
||||
This technique will not be discussed in this report.
|
||||
.sp 0
|
||||
In the example above, the resulting code
|
||||
can be further optimized by using
|
||||
constant propagation.
|
||||
Obviously, this is not the task of the
|
||||
Strength Reduction phase.
|
||||
223
doc/ego/sr/sr2
Normal file
223
doc/ego/sr/sr2
Normal file
@@ -0,0 +1,223 @@
|
||||
.NH 2
|
||||
The model of strength reduction
|
||||
.PP
|
||||
In this section we will describe
|
||||
the transformations performed by
|
||||
Strength Reduction (SR).
|
||||
Before doing so, we will introduce the
|
||||
central notion of an induction variable.
|
||||
.NH 3
|
||||
Induction variables
|
||||
.PP
|
||||
SR looks for variables whose
|
||||
values form an arithmetic progression
|
||||
at the beginning of a loop.
|
||||
These variables are called induction variables.
|
||||
The most frequently occurring example of such
|
||||
a variable is a loop-variable in a high-order
|
||||
programming language.
|
||||
Several quite sophisticated models of strength
|
||||
reduction can be found in the literature.
|
||||
.[
|
||||
cocke reduction strength cacm
|
||||
.]
|
||||
.[
|
||||
allen cocke kennedy reduction strength
|
||||
.]
|
||||
.[
|
||||
lowry medlock cacm
|
||||
.]
|
||||
.[
|
||||
aho compiler design
|
||||
.]
|
||||
In these models the notion of an induction variable
|
||||
is far more general than the intuitive notion
|
||||
of a loop-variable.
|
||||
The definition of an induction variable we present here
|
||||
is more restricted,
|
||||
yielding a simpler model and simpler transformations.
|
||||
We think the principle source for strength reduction lies in
|
||||
expressions using a loop-variable,
|
||||
i.e. a variable that is incremented or decremented
|
||||
by the same amount after every loop iteration,
|
||||
and that cannot be changed in any other way.
|
||||
.PP
|
||||
Of course, the EM code does not contain high level constructs
|
||||
such as for-statements.
|
||||
We will define an induction variable in terms
|
||||
of the Intermediate Code of the optimizer.
|
||||
Note that the notions of a loop in the
|
||||
EM text and of a firm basic block
|
||||
were defined in section 3.3.5.
|
||||
.sp
|
||||
.UL definition
|
||||
.sp 0
|
||||
An induction variable i of a loop L is a local variable
|
||||
that is never accessed indirectly,
|
||||
whose size is the word size of the target machine, and
|
||||
that is assigned exactly once within L,
|
||||
the assignment:
|
||||
.IP -
|
||||
being of the form i := i + c or i := c +i,
|
||||
c is a constant
|
||||
called the \fIstep value\fR of i.
|
||||
.IP -
|
||||
occurring in a firm block of L.
|
||||
.LP
|
||||
(Note that the first restriction on the assignment
|
||||
is not described in terms of the Intermediate Code;
|
||||
we will give such a description later; the current
|
||||
definition is easier to understand however).
|
||||
.NH 3
|
||||
Recognized expressions
|
||||
.PP
|
||||
SR recognizes certain expressions using
|
||||
an induction variable and replaces
|
||||
them by cheaper ones.
|
||||
Two kinds of expensive operations are recognized:
|
||||
multiplication and array address computations.
|
||||
The expressions that are simplified must
|
||||
use an induction variable
|
||||
as an operand of
|
||||
a multiplication or as index in an array expression.
|
||||
.PP
|
||||
Often a linear function of an induction variable is used,
|
||||
rather than the variable itself.
|
||||
In these cases optimization is still possible.
|
||||
We call such expressions \fIiv-expressions\fR.
|
||||
.sp
|
||||
.UL definition:
|
||||
.sp 0
|
||||
An iv-expression of an induction variable i of a loop L is
|
||||
an expression that:
|
||||
.IP -
|
||||
uses only the operators + and - (unary as well as binary)
|
||||
.IP -
|
||||
uses i as operand exactly once
|
||||
.IP -
|
||||
uses (besides i) only constants or variables that are
|
||||
never changed in L as operands.
|
||||
.LP
|
||||
.PP
|
||||
The expressions recognized by SR are of the following forms:
|
||||
.IP (1)
|
||||
iv_expression * constant
|
||||
.IP (2)
|
||||
constant * iv_expression
|
||||
.IP (3)
|
||||
A[iv-expression] := \kx(assign to array element)
|
||||
.IP (4)
|
||||
A[iv-expression] \h'|\nxu'(use array element)
|
||||
.IP (5)
|
||||
& A[iv-expression] \h'|\nxu'(take address of array element)
|
||||
.LP
|
||||
(Note that EM has different instructions to use an array element,
|
||||
store into one, or take the address of one, resp. LAR, SAR, and AAR).
|
||||
.sp 0
|
||||
The size of the elements of A must
|
||||
be known statically.
|
||||
In cases (3) and (4) this size
|
||||
must equal the word size of the
|
||||
target machine.
|
||||
.NH 3
|
||||
Transformations
|
||||
.PP
|
||||
With every recognized expression we associate
|
||||
a new temporary local variable TMP,
|
||||
allocated in the stack frame of the
|
||||
procedure containing the expression.
|
||||
At any program point within the loop, TMP will
|
||||
contain the following value:
|
||||
.IP multiplication: 18
|
||||
the current value of iv-expression * constant
|
||||
.IP arrays:
|
||||
the current value of &A[iv-expression].
|
||||
.LP
|
||||
In the second case, TMP essentially is a pointer variable,
|
||||
pointing to the element of A that is currently in use.
|
||||
.sp 0
|
||||
If the same expression occurs several times in the loop,
|
||||
the same temporary local is used each time.
|
||||
.PP
|
||||
Three transformations are applied to the EM text:
|
||||
.IP (1)
|
||||
TMP is initialized with the right value.
|
||||
This initialization takes place just
|
||||
before the loop.
|
||||
.IP (2)
|
||||
The recognized expression is simplified.
|
||||
.IP (3)
|
||||
TMP is incremented; this takes place just
|
||||
after the induction variable is incremented.
|
||||
.LP
|
||||
For multiplication, the initial value of TMP
|
||||
is the value of the recognized expression at
|
||||
the program point immediately before the loop.
|
||||
For arrays, TMP is initialized with the address
|
||||
of the first array element that is accessed.
|
||||
So the initialization code is:
|
||||
.DS
|
||||
TMP := iv-expression * constant; or
|
||||
TMP := &A[iv-expression]
|
||||
.DE
|
||||
At the point immediately before the loop,
|
||||
the induction variable will already have been
|
||||
initialized,
|
||||
so the value used in the code above will be the
|
||||
value it has during the first iteration.
|
||||
.PP
|
||||
For multiplication, the recognized expression can simply be
|
||||
replaced by TMP.
|
||||
For array optimizations, the replacement
|
||||
depends on the form:
|
||||
.DS
|
||||
.TS
|
||||
l l l.
|
||||
\fIform\fR \fIreplacement\fR
|
||||
(3) A[iv-expr] := *TMP := (assign indirect)
|
||||
(4) A[iv-expr] *TMP (use indirect)
|
||||
(5) &A[iv-expr] TMP
|
||||
.TE
|
||||
.DE
|
||||
The '*' denotes the indirect operator. (Note that
|
||||
EM has different instructions to do
|
||||
an assign-indirect and a use-indirect).
|
||||
As the size of the array elements is restricted
|
||||
to be the word size in case (3) and (4),
|
||||
only one EM instruction needs to
|
||||
be generated in all cases.
|
||||
.PP
|
||||
The amount by which TMP is incremented is:
|
||||
.IP multiplication: 18
|
||||
step value * constant
|
||||
.IP arrays:
|
||||
step value * element size
|
||||
.LP
|
||||
Note that the step value (see definition of induction variable above),
|
||||
the constant, and the element size (see previous section) can all
|
||||
be determined statically.
|
||||
If the sign of the induction variable in the
|
||||
iv-expression is negative, the amount
|
||||
must be negated.
|
||||
.PP
|
||||
The transformations are demonstrated by an example.
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
i := 100; i := 100;
|
||||
while i > 1 loop TMP := (6-i) * 5;
|
||||
X := (6-i) * 5 + 2; while i > 1 loop
|
||||
Y := (6-i) * 5 - 8;\ \ \ \ \ \ \ --> X := TMP + 2;
|
||||
i := i - 3; Y := TMP - 8;
|
||||
end loop; i := i - 3;
|
||||
TMP := TMP + 15;
|
||||
end loop;
|
||||
.TE
|
||||
|
||||
Fig. 6.2 Example of complex Strength Reduction transformations
|
||||
.DE
|
||||
The expression '(6-i)*5' is recognized twice. The constant
|
||||
is 5.
|
||||
The step value is -3.
|
||||
The sign of i in the recognized expression is '-'.
|
||||
So the increment value of TMP is -(-3*5) = +15.
|
||||
244
doc/ego/sr/sr3
Normal file
244
doc/ego/sr/sr3
Normal file
@@ -0,0 +1,244 @@
|
||||
.NH 2
|
||||
Implementation
|
||||
.PP
|
||||
Like most phases, SR deals with one procedure
|
||||
at a time.
|
||||
Within a procedure, SR works on one loop at a time.
|
||||
Loops are processed in textual order.
|
||||
If loops are nested inside each other,
|
||||
SR starts with the outermost loop and proceeds in the
|
||||
inwards direction.
|
||||
This order is chosen,
|
||||
because it enables the optimization
|
||||
of multi-dimensional array address computations,
|
||||
if the elements are accessed in the usual way
|
||||
(i.e. row after row, rather than column after column).
|
||||
For every loop, SR first detects all induction variables
|
||||
and then tries to recognize
|
||||
expressions that can be optimized.
|
||||
.NH 3
|
||||
Finding induction variables
|
||||
.PP
|
||||
The process of finding induction variables
|
||||
can conveniently be split up
|
||||
into two parts.
|
||||
First, the EM text of the loop is scanned to find
|
||||
all \fIcandidate\fR induction variables,
|
||||
which are word-sized local variables
|
||||
that are assigned precisely once
|
||||
in the loop, within a firm block.
|
||||
Second, for every candidate, the single assignment
|
||||
is inspected, to see if it has the form
|
||||
required by the definition of an induction variable.
|
||||
.PP
|
||||
Candidates are found by scanning the EM code of the loop.
|
||||
During this scan, two sets are maintained.
|
||||
The set "cand" contains all variables that were
|
||||
assigned exactly once so far, within a firm block.
|
||||
The set "dismiss" contains all variables that
|
||||
should not be made a candidate.
|
||||
Initially, both sets are empty.
|
||||
If a variable is assigned to, it is put
|
||||
in the cand set, if three conditions are met:
|
||||
.IP 1.
|
||||
the variable was not in cand or dismiss already
|
||||
.IP 2.
|
||||
the assignment takes place in a firm block
|
||||
.IP 3.
|
||||
the assignment is not a ZRL instruction (assignment by zero)
|
||||
or a SDL instruction (store double local).
|
||||
.LP
|
||||
If any condition fails, the variable is dismissed from cand
|
||||
(if it was there already) and put in dismiss
|
||||
(if it was not there already).
|
||||
.sp 0
|
||||
All variables for which no register message was generated (i.e. those
|
||||
variables that may be accessed indirectly) are assumed
|
||||
to be changed in the loop.
|
||||
.sp 0
|
||||
All variables that remain in cand are candidate induction variables.
|
||||
.PP
|
||||
From the set of candidates, the induction variables can
|
||||
be determined, by inspecting the single assignment.
|
||||
The assignment must match one of the EM patterns below.
|
||||
('x' is the candidate. 'ws' is the word size of the target machine.
|
||||
'n' is any number.)
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
\fIpattern\fR \fIstep size\fR
|
||||
INL x | +1
|
||||
DEL x | -1
|
||||
LOL x ; (INC | DEC) ; STL x | +1 | -1
|
||||
LOL x ; LOC n ; (ADI ws | SBI ws) ; STL x | +n | -n
|
||||
LOC n ; LOL x ; ADI ws ; STL x +n
|
||||
.TE
|
||||
.DE
|
||||
From the patterns the step size of the induction variable
|
||||
can also be determined.
|
||||
These step sizes are displayed on the right hand side.
|
||||
.sp
|
||||
For every induction variable we maintain the following information:
|
||||
.IP -
|
||||
the offset of the variable in the stackframe of its procedure
|
||||
.IP -
|
||||
a pointer to the EM text of the assignment statement
|
||||
.IP -
|
||||
the step value
|
||||
.LP
|
||||
.NH 3
|
||||
Optimizing expressions
|
||||
.PP
|
||||
If any induction variables of the loop were found,
|
||||
the EM text of the loop is scanned again,
|
||||
to detect expressions that can be optimized.
|
||||
SR scans for multiplication and array instructions.
|
||||
Whenever it finds such an instruction, it analyses the
|
||||
code in front of it.
|
||||
If an expression is to be optimized, it must
|
||||
be generated by the following syntax rules.
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
optimizable_expr:
|
||||
iv_expr const mult |
|
||||
const iv_expr mult |
|
||||
address iv_expr address array_instr;
|
||||
mult:
|
||||
MLI ws |
|
||||
MLU ws ;
|
||||
array_instr:
|
||||
LAR ws |
|
||||
SAR ws |
|
||||
AAR ws ;
|
||||
const:
|
||||
LOC n ;
|
||||
.TE
|
||||
.DE
|
||||
An 'address' is an EM instruction that loads an
|
||||
address on the stack.
|
||||
An instruction like LOL may be an 'address', if
|
||||
the size of an address (pointer size, =ps) is
|
||||
the same as the word size.
|
||||
If the pointer size is twice the word size,
|
||||
instructions like LDL are an 'address'.
|
||||
(The addresses in the third grammar rule
|
||||
denote resp. the array address and the
|
||||
array descriptor address).
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
address:
|
||||
LAE |
|
||||
LAL |
|
||||
LOL if ps=ws |
|
||||
LOE ,, |
|
||||
LIL ,, |
|
||||
LDL if ps=2*ws |
|
||||
LDE ,, ;
|
||||
.TE
|
||||
.DE
|
||||
The notion of an iv-expression was introduced earlier.
|
||||
.DS
|
||||
.TS
|
||||
l l.
|
||||
iv_expr:
|
||||
iv_expr unair_op |
|
||||
iv_expr iv_expr binary_op |
|
||||
loopconst |
|
||||
iv ;
|
||||
unair_op:
|
||||
NGI ws |
|
||||
INC |
|
||||
DEC ;
|
||||
binary_op:
|
||||
ADI ws |
|
||||
ADU ws |
|
||||
SBI ws |
|
||||
SBU ws ;
|
||||
loopconst:
|
||||
const |
|
||||
LOL x if x is not changed in loop ;
|
||||
iv:
|
||||
LOL x if x is an induction variable ;
|
||||
.TE
|
||||
.DE
|
||||
An iv_expression must satisfy one additional constraint:
|
||||
it must use exactly one operand that is an induction
|
||||
variable.
|
||||
A simple, hand written, top-down parser is used
|
||||
to recognize an iv-expression.
|
||||
It scans the EM code from right to left
|
||||
(recall that EM is essentially postfix).
|
||||
It uses semantic attributes (inherited as well as
|
||||
derived) to check the additional constraint.
|
||||
.PP
|
||||
All information assembled during the recognition
|
||||
process is put in a 'code_info' structure.
|
||||
This structure contains the following information:
|
||||
.IP -
|
||||
the optimizable code itself
|
||||
.IP -
|
||||
the loop and basic block the code is part of
|
||||
.IP -
|
||||
the induction variable
|
||||
.IP -
|
||||
the iv-expression
|
||||
.IP -
|
||||
the sign of the induction variable in the
|
||||
iv-expression
|
||||
.IP -
|
||||
the offset and size of the temporary local variable
|
||||
.IP -
|
||||
the expensive operator (MLI, LAR etc.)
|
||||
.IP -
|
||||
the instruction that loads the constant
|
||||
(for multiplication) or the array descriptor
|
||||
(for arrays).
|
||||
.LP
|
||||
The entire transformation process is driven
|
||||
by this information.
|
||||
As the EM text is represented internally
|
||||
as a list, this process consists
|
||||
mainly of straightforward list manipulations.
|
||||
.sp 0
|
||||
The initialization code must be put
|
||||
immediately before the loop entry.
|
||||
For this purpose a \fIheader block\fR is
|
||||
created that has the loop entry block as
|
||||
its only successor and that dominates the
|
||||
entry block.
|
||||
The CFG and all relations (SUCC,PRED, IDOM, LOOPS etc.)
|
||||
are updated.
|
||||
.sp 0
|
||||
An EM instruction that will
|
||||
replace the optimizable code
|
||||
is created and put at the place of the old code.
|
||||
The list representing the old optimizable code
|
||||
is used to create a list for the initializing code,
|
||||
as they are similar.
|
||||
Only two modifications are required:
|
||||
.IP -
|
||||
if the expensive operator is a LAR or SAR,
|
||||
it must be replaced by an AAR, as the initial value
|
||||
of TMP is the \fIaddress\fR of the first
|
||||
array element that is accessed.
|
||||
.IP -
|
||||
code must be appended to store the result of the
|
||||
expression in TMP.
|
||||
.LP
|
||||
Finally, code to increment TMP is created and put after
|
||||
the code of the single assignment to the
|
||||
induction variable.
|
||||
The generated code uses either an integer addition
|
||||
(ADI) or an integer-to-pointer addition (ADS)
|
||||
to do the increment.
|
||||
.PP
|
||||
SR maintains a set of all expressions that have already
|
||||
been recognized in the present loop.
|
||||
Such expressions are said to be \fIavailable\fR.
|
||||
If an expression is recognized that is
|
||||
already available,
|
||||
no new temporary local variable is allocated for it,
|
||||
and the code to initialize and increment the local
|
||||
is not generated.
|
||||
28
doc/ego/sr/sr4
Normal file
28
doc/ego/sr/sr4
Normal file
@@ -0,0 +1,28 @@
|
||||
.NH 2
|
||||
Source files of SR
|
||||
.PP
|
||||
The sources of SR are in the following files
|
||||
and packages:
|
||||
.IP sr.h: 14
|
||||
declarations of global variables and
|
||||
data structures
|
||||
.IP sr.c:
|
||||
the routine main; a driving routine to process
|
||||
(possibly nested) loops in the right order
|
||||
.IP iv
|
||||
implements a procedure that finds the induction variables
|
||||
of a loop
|
||||
.IP reduce
|
||||
implements a procedure that finds optimizable expressions
|
||||
and that does the transformations
|
||||
.IP cand
|
||||
implements a procedure that finds the candidate induction
|
||||
variables; used to implement iv
|
||||
.IP xform
|
||||
implements several useful routines that transform
|
||||
lists of EM text or a CFG; used to implement reduce
|
||||
.IP expr
|
||||
implements a procedure that parses iv-expressions
|
||||
.IP aux
|
||||
implements several auxiliary procedures.
|
||||
.LP
|
||||
58
doc/ego/ud/ud1
Normal file
58
doc/ego/ud/ud1
Normal file
@@ -0,0 +1,58 @@
|
||||
.bp
|
||||
.NH 1
|
||||
Use-Definition analysis
|
||||
.NH 2
|
||||
Introduction
|
||||
.PP
|
||||
The "Use-Definition analysis" phase (UD) consists of two related optimization
|
||||
techniques that both depend on "Use-Definition" information.
|
||||
The techniques are Copy Propagation and Constant Propagation.
|
||||
They are best explained via an example (see Figs. 11.1 and 11.2).
|
||||
.DS
|
||||
(1) A := B A := B
|
||||
... --> ...
|
||||
(2) use(A) use(B)
|
||||
|
||||
Fig. 11.1 An example of Copy Propagation
|
||||
.DE
|
||||
.DS
|
||||
(1) A := 12 A := 12
|
||||
... --> ...
|
||||
(2) use(A) use(12)
|
||||
|
||||
Fig. 11.2 An example of Constant Propagation
|
||||
.DE
|
||||
Both optimizations have to check that the value of A at line (2)
|
||||
can only be obtained at line (1).
|
||||
Copy Propagation also has to assure that the value of B is
|
||||
the same at line (1) as at line (2).
|
||||
.PP
|
||||
One purpose of both transformations is to introduce
|
||||
opportunities for the Dead Code Elimination optimization.
|
||||
If the variable A is used nowhere else, the assignment A := B
|
||||
becomes useless and can be eliminated.
|
||||
.sp 0
|
||||
If B is less expensive to access than A (e.g. this is sometimes the case
|
||||
if A is a local variable and B is a global variable),
|
||||
Copy Propagation directly improves the code itself.
|
||||
If A is cheaper to access the transformation will not be performed.
|
||||
Likewise, a constant as operand may be cheeper than a variable.
|
||||
Having a constant as operand may also facilitate other optimizations.
|
||||
.PP
|
||||
The design of UD is based on the theory described in section
|
||||
14.1 and 14.3 of.
|
||||
.[
|
||||
aho compiler design
|
||||
.]
|
||||
As a main departure from that theory,
|
||||
we do not demand the statement A := B to become redundant after
|
||||
Copy Propagation.
|
||||
If B is cheaper to access than A, the optimization is always performed;
|
||||
if B is more expensive than A, we never do the transformation.
|
||||
If A and B are equally expensive UD uses the heuristic rule to
|
||||
replace infrequently used variables by frequently used ones.
|
||||
This rule increases the chances of the assignment to become useless.
|
||||
.PP
|
||||
In the next section we will give a brief outline of the data
|
||||
flow theory used
|
||||
for the implementation of UD.
|
||||
64
doc/ego/ud/ud2
Normal file
64
doc/ego/ud/ud2
Normal file
@@ -0,0 +1,64 @@
|
||||
.NH 2
|
||||
Data flow information
|
||||
.PP
|
||||
.NH 3
|
||||
Use-Definition information
|
||||
.PP
|
||||
A \fIdefinition\fR of a variable A is an assignment to A.
|
||||
A definition is said to \fIreach\fR a point p if there is a
|
||||
path in the control flow graph from the definition to p, such that
|
||||
A is not redefined on that path.
|
||||
.PP
|
||||
For every basic block B, we define the following sets:
|
||||
.IP GEN[b] 9
|
||||
the set of definitions in b that reach the end of b.
|
||||
.IP KILL[b]
|
||||
the set of definitions outside b that define a variable that
|
||||
is changed in b.
|
||||
.IP IN[b]
|
||||
the set of all definitions reaching the beginning of b.
|
||||
.IP OUT[b]
|
||||
the set of all definitions reaching the end of b.
|
||||
.LP
|
||||
GEN and KILL can be determined by inspecting the code of the procedure.
|
||||
IN and OUT are computed by solving the following data flow equations:
|
||||
.DS
|
||||
(1) OUT[b] = IN[b] - KILL[b] + GEN[b]
|
||||
(2) IN[b] = OUT[p1] + ... + OUT[pn],
|
||||
where PRED(b) = {p1, ... , pn}
|
||||
.DE
|
||||
.NH 3
|
||||
Copy information
|
||||
.PP
|
||||
A \fIcopy\fR is a definition of the form "A := B".
|
||||
A copy is said to be \fIgenerated\fR in a basic block n if
|
||||
it occurs in n and there is no subsequent assignment to B in n.
|
||||
A copy is said to be \fIkilled\fR in n if:
|
||||
.IP (i)
|
||||
it occurs in n and there is a subsequent assignment to B within n, or
|
||||
.IP (ii)
|
||||
it occurs outside n, the definition A := B reaches the beginning of n
|
||||
and B is changed in n (note that a copy also is a definition).
|
||||
.LP
|
||||
A copy \fIreaches\fR a point p, if there are no assignments to B
|
||||
on any path in the control flow graph from the copy to p.
|
||||
.PP
|
||||
We define the following sets:
|
||||
.IP C_GEN[b] 11
|
||||
the set of all copies in b generated in b.
|
||||
.IP C_KILL[b]
|
||||
the set of all copies killed in b.
|
||||
.IP C_IN[b]
|
||||
the set of all copies reaching the beginning of b.
|
||||
.IP C_OUT[b]
|
||||
the set of all copies reaching the end of b.
|
||||
.LP
|
||||
C_IN and C_OUT are computed by solving the following equations:
|
||||
(root is the entry node of the current procedure; '*' denotes
|
||||
set intersection)
|
||||
.DS
|
||||
(1) C_OUT[b] = C_IN[b] - C_KILL[b] + C_GEN[b]
|
||||
(2) C_IN[b] = C_OUT[p1] * ... * C_OUT[pn],
|
||||
where PRED(b) = {p1, ... , pn} and b /= root
|
||||
C_IN[root] = {all copies}
|
||||
.DE
|
||||
26
doc/ego/ud/ud3
Normal file
26
doc/ego/ud/ud3
Normal file
@@ -0,0 +1,26 @@
|
||||
.NH 2
|
||||
Pointers and subroutine calls
|
||||
.PP
|
||||
The theory outlined above assumes that variables can
|
||||
only be changed by a direct assignment.
|
||||
This condition does not hold for EM.
|
||||
In case of an assignment through a pointer variable,
|
||||
it is in general impossible to see which variable is affected
|
||||
by the assignment.
|
||||
Similar problems occur in the presence of procedure calls.
|
||||
Therefore we distinguish two kinds of definitions:
|
||||
.IP -
|
||||
an \fIexplicit\fR definition is a direct assignment to one
|
||||
specific variable
|
||||
.IP -
|
||||
an \fIimplicit\fR definition is the potential alteration of
|
||||
a variable as a result of a procedure call or an indirect assignment.
|
||||
.LP
|
||||
An indirect assignment causes implicit definitions to
|
||||
all variables that may be accessed indirectly, i.e.
|
||||
all local variables for which no register message was generated
|
||||
and all global variables.
|
||||
If a procedure contains an indirect assignment it may change the
|
||||
same set of variables, else it may change some global variables directly.
|
||||
The KILL, GEN, IN and OUT sets contain explicit as well
|
||||
as implicit definitions.
|
||||
78
doc/ego/ud/ud4
Normal file
78
doc/ego/ud/ud4
Normal file
@@ -0,0 +1,78 @@
|
||||
.NH 2
|
||||
Implementation
|
||||
.PP
|
||||
UD first builds a number of tables:
|
||||
.IP locals: 9
|
||||
contains information about the local variables of the
|
||||
current procedure (offset,size,whether a register message was found
|
||||
for it and, if so, the score field of that message)
|
||||
.IP defs:
|
||||
a table of all explicit definitions appearing in the
|
||||
current procedure.
|
||||
.IP copies:
|
||||
a table of all copies appearing in the
|
||||
current procedure.
|
||||
.LP
|
||||
Every variable (local as well as global), definition and copy
|
||||
is identified by a unique number, which is the index
|
||||
in the table.
|
||||
All tables are constructed by traversing the EM code.
|
||||
A fourth table, "vardefs" is used, indexed by a 'variable number',
|
||||
which contains for every variable the set of explicit definitions of it.
|
||||
Also, for each basic block b, the set CHGVARS containing all variables
|
||||
changed by it is computed.
|
||||
.PP
|
||||
The GEN sets are obtained in one scan over the EM text,
|
||||
by analyzing every EM instruction.
|
||||
The KILL set of a basic block b is computed by looking at the
|
||||
set of variables
|
||||
changed by b (i.e. CHGVARS[b]).
|
||||
For every such variable v, all explicit definitions to v
|
||||
(i.e. vardefs[v]) that are not in GEN[b] are added to KILL[b].
|
||||
Also, the implicit defininition of v is added to KILL[b].
|
||||
Next, the data flow equations for use-definition information
|
||||
are solved,
|
||||
using a straight forward, iterative algorithm.
|
||||
All sets are represented as bitvectors, so the operations
|
||||
on sets (union, difference) can be implemented efficiently.
|
||||
.PP
|
||||
The C_GEN and C_KILL sets are computed simultaneously in one scan
|
||||
over the EM text.
|
||||
For every copy A := B appearing in basic block b we do
|
||||
the following:
|
||||
.IP 1.
|
||||
for every basic block n /= b that changes B, see if the definition A := B
|
||||
reaches the beginning of n (i.e. check if the index number of A := B in
|
||||
the "defs" table is an element of IN[n]);
|
||||
if so, add the copy to C_KILL[n]
|
||||
.IP 2.
|
||||
if B is redefined later on in b, add the copy to C_KILL[b], else
|
||||
add it to C_GEN[b]
|
||||
.LP
|
||||
C_IN and C_OUT are computed from C_GEN and C_KILL via the second set of
|
||||
data flow equations.
|
||||
.PP
|
||||
Finally, in one last scan all opportunities for optimization are
|
||||
detected.
|
||||
For every use u of a variable A, we check if
|
||||
there is a unique explicit definition d reaching u.
|
||||
.sp
|
||||
If the definition is a copy A := B and B has the same value at d as
|
||||
at u, then the use of A at u may be changed into B.
|
||||
The latter condition can be verified as follows:
|
||||
.IP -
|
||||
if u and d are in the same basic block, see if there is
|
||||
any assignment to B in between d and u
|
||||
.IP -
|
||||
if u and d are in different basic blocks, the condition is
|
||||
satisfied if there is no assignment to B in the block of u prior to u
|
||||
and d is in C_IN[b].
|
||||
.LP
|
||||
Before the transformation is actually done, UD first makes sure the
|
||||
alteration is really desirable, as described before.
|
||||
The information needed for this purpose (access costs of local and
|
||||
global variables) is read from a machine descriptor file.
|
||||
.sp
|
||||
If the only definition reaching u has the form "A := constant", the use
|
||||
of A at u is replaced by the constant.
|
||||
|
||||
19
doc/ego/ud/ud5
Normal file
19
doc/ego/ud/ud5
Normal file
@@ -0,0 +1,19 @@
|
||||
|
||||
.NH 2
|
||||
Source files of UD
|
||||
.PP
|
||||
The sources of UD are in the following files and packages:
|
||||
.IP ud.h: 14
|
||||
declarations of global variables and data structures
|
||||
.IP ud.c:
|
||||
the routine main; initialization of target machine dependent tables
|
||||
.IP defs:
|
||||
routines to compute the GEN and KILL sets and routines to analyse
|
||||
EM instructions
|
||||
.IP const:
|
||||
routines involved in constant propagation
|
||||
.IP copy:
|
||||
routines involved in copy propagation
|
||||
.IP aux:
|
||||
contains auxiliary routines
|
||||
.LP
|
||||
6
doc/em/READ_ME
Normal file
6
doc/em/READ_ME
Normal file
@@ -0,0 +1,6 @@
|
||||
This it the text of IR-81,
|
||||
DESCRIPTION OF A MACHINE ARCHITECTURE FOR USE WITH BLOCK STRUCTURED LANGUAGES
|
||||
|
||||
The file em.i (text of the defining interpreter) was hand-edited from int/em.p
|
||||
|
||||
The directory int contains the interpreter.
|
||||
153
doc/em/app.codes.nr
Normal file
153
doc/em/app.codes.nr
Normal file
@@ -0,0 +1,153 @@
|
||||
.bp
|
||||
.AP "EM CODE TABLES"
|
||||
The following table is used by the assembler for EM machine
|
||||
language.
|
||||
It specifies the opcodes used for each instruction and
|
||||
how arguments are mapped to machine language arguments.
|
||||
The table is presented in three columns,
|
||||
each line in each column contains three or four fields.
|
||||
Each line describes a range of interpreter opcodes by
|
||||
specifying for which instruction the range is used, the type of the
|
||||
opcodes (mini, shortie, etc..) and range for the instruction
|
||||
argument.
|
||||
.QQ
|
||||
The first field on each line gives the EM instruction mnemonic,
|
||||
the second field gives some flags.
|
||||
If the opcodes are minis or shorties the third field specifies
|
||||
how many minis/shorties are used.
|
||||
The last field gives the number of the (first) interpreter
|
||||
opcode.
|
||||
.LP
|
||||
Flags :
|
||||
.IP ""
|
||||
Opcode type, only one of the following may be specified.
|
||||
.RS
|
||||
.IP \-
|
||||
opcode without argument
|
||||
.IP m
|
||||
mini
|
||||
.IP s
|
||||
shortie
|
||||
.IP 2
|
||||
opcode with 2-byte signed argument
|
||||
.IP 4
|
||||
opcode with 4-byte signed argument
|
||||
.IP 8
|
||||
opcode with 8-byte signed argument
|
||||
.IP u
|
||||
opcode with 2-byte unsigned argument
|
||||
.RE
|
||||
.IP ""
|
||||
Secondary (escaped) opcodes.
|
||||
.RS
|
||||
.IP e
|
||||
The opcode thus marked is in the secondary opcode group instead
|
||||
of the primary
|
||||
.RE
|
||||
.IP ""
|
||||
restrictions on arguments
|
||||
.RS
|
||||
.IP N
|
||||
Negative arguments only
|
||||
.IP P
|
||||
Positive and zero arguments only
|
||||
.RE
|
||||
.IP ""
|
||||
mapping of arguments
|
||||
.RS
|
||||
.IP w
|
||||
argument must be divisible by the wordsize and is divided by the
|
||||
wordsize before use as opcode argument.
|
||||
.IP o
|
||||
argument ( possibly after division ) must be >= 1 and is
|
||||
decremented before use as opcode argument
|
||||
.RE
|
||||
.LP
|
||||
If the opcode type is 2,4 or 8 the resulting argument is used as
|
||||
opcode argument (least significant byte first).
|
||||
If the opcode type is mini, the argument is added
|
||||
to the first opcode \- if in range \- .
|
||||
If the argument is negative, the absolute value minus one is
|
||||
used in the algorithm above.
|
||||
.br
|
||||
For shorties with positive arguments the first opcode is used
|
||||
for arguments in the range 0..255, the second for the range
|
||||
256..511, etc..
|
||||
For shorties with negative arguments the first opcode is used
|
||||
for arguments in the range \-1..\-256, the second for the range
|
||||
\-257..\-512, etc..
|
||||
The byte following the opcode contains the least significant
|
||||
byte of the argument.
|
||||
First some examples of these specifications.
|
||||
.IP "aar mwPo 1 34"
|
||||
.br
|
||||
Indicates that opcode 34 is used as a mini for Positive
|
||||
instruction arguments only.
|
||||
The w and o indicate division and decrementing of the
|
||||
instruction argument.
|
||||
Because the resulting argument must be zero ( only opcode 34 may be used),
|
||||
this mini can only be used for instruction argument 2.
|
||||
Conclusion: opcode 34 is for "AAR 2".
|
||||
.IP "adp sP 1 41"
|
||||
.br
|
||||
Opcode 41 is used as shortie for ADP with arguments in the range
|
||||
0..255.
|
||||
.IP "bra sN 2 60"
|
||||
.br
|
||||
Opcode 60 is used as shortie for BRA with arguments \-1..\-256,
|
||||
61 is used for arguments \-257..\-512.
|
||||
.IP "zer e\- 145"
|
||||
.br
|
||||
Escaped opcode 145 is used for ZER.
|
||||
.LP
|
||||
The interpreter opcode table:
|
||||
.DS
|
||||
.so itables
|
||||
.DE
|
||||
.PP
|
||||
The table above results in the following dispatch tables.
|
||||
Dispatch tables are used by interpreters to jump to the
|
||||
routines implementing the EM instructions, indexed by the next opcode.
|
||||
Each line of the dispatch tables gives the routine names
|
||||
of eight consecutive opcodes, preceded by the first opcode number
|
||||
on that line.
|
||||
Routine names consist of an EM mnemonic followed by a suffix.
|
||||
The suffices show the encoding used for each opcode.
|
||||
.LP
|
||||
The following suffices exist:
|
||||
.TS
|
||||
tab(:);
|
||||
l l.
|
||||
.z:no arguments
|
||||
.l:16-bit argument
|
||||
.L:32-bit argument
|
||||
.u:16-bit unsigned argument
|
||||
.lw:16-bit argument divided by the wordsize
|
||||
.Lw:32-bit argument divided by the wordsize
|
||||
.p:positive 16-bit argument
|
||||
.P:positive 32-bit argument
|
||||
.pw:positive 16-bit argument divided by the wordsize
|
||||
.Pw:positive 32-bit argument divided by the wordsize
|
||||
.n:negative 16-bit argument
|
||||
.N:negative 32-bit argument
|
||||
.nw:negative 16-bit argument divided by the wordsize
|
||||
.Nw:negative 32-bit argument divided by the wordsize
|
||||
.s<num>:shortie with <num> as high order argument byte
|
||||
.w<num>:shortie with argument divided by the wordsize
|
||||
.<num>:mini with <num> as argument
|
||||
.<num>W:mini with <num>*wordsize as argument
|
||||
.TE
|
||||
.LP
|
||||
<num> is a possibly negative integer.
|
||||
.LP
|
||||
The dispatch table for the 256 primary opcodes:
|
||||
.sp 1
|
||||
.so dispat1
|
||||
.sp 2
|
||||
The list of secondary opcodes (escape1):
|
||||
.sp 1
|
||||
.so dispat2
|
||||
.sp 2
|
||||
Finally, the list of opcodes with four byte arguments (escape2).
|
||||
.sp 1
|
||||
.so dispat3
|
||||
275
doc/em/app.exam.nr
Normal file
275
doc/em/app.exam.nr
Normal file
@@ -0,0 +1,275 @@
|
||||
.bp
|
||||
.AP "AN EXAMPLE PROGRAM"
|
||||
.PP
|
||||
.na
|
||||
.ta 4n 8n 12n 16n 20n
|
||||
.nf
|
||||
1 program example(output);
|
||||
2 {This program just demonstrates typical EM code.}
|
||||
3 type rec = record r1: integer; r2:real; r3: boolean end;
|
||||
4 var mi: integer; mx:real; r:rec;
|
||||
5
|
||||
6 function sum(a,b:integer):integer;
|
||||
7 begin
|
||||
8 sum := a + b
|
||||
9 end;
|
||||
10
|
||||
11 procedure test(var r: rec);
|
||||
12 label 1;
|
||||
13 var i,j: integer;
|
||||
14 x,y: real;
|
||||
15 b: boolean;
|
||||
16 c: char;
|
||||
17 a: array[1..100] of integer;
|
||||
18
|
||||
19 begin
|
||||
20 j := 1;
|
||||
21 i := 3 * j + 6;
|
||||
22 x := 4.8;
|
||||
23 y := x/0.5;
|
||||
24 b := true;
|
||||
25 c := 'z';
|
||||
26 for i:= 1 to 100 do a[i] := i * i;
|
||||
27 r.r1 := j+27;
|
||||
28 r.r3 := b;
|
||||
29 r.r2 := x+y;
|
||||
30 i := sum(r.r1, a[j]);
|
||||
31 while i > 0 do begin j := j + r.r1; i := i - 1 end;
|
||||
32 with r do begin r3 := b; r2 := x+y; r1 := 0 end;
|
||||
33 goto 1;
|
||||
34 1: writeln(j, i:6, x:9:3, b)
|
||||
35 end; {test}
|
||||
36 begin {main program}
|
||||
37 mx := 15.96;
|
||||
38 mi := 99;
|
||||
39 test(r)
|
||||
40 end.
|
||||
.fi
|
||||
.ad
|
||||
.bp
|
||||
The EM code as produced by the Pascal-VU compiler is given below. Comments
|
||||
have been added manually. Note that this code has already been optimized.
|
||||
.LP
|
||||
.na
|
||||
.nf
|
||||
.ta 1n 24n
|
||||
mes 2,2,2 ; wordsize 2, pointersize 2
|
||||
\&.1
|
||||
rom 't.p\e000' ; the name of the source file
|
||||
hol 552,\-32768,0 ; externals and buf occupy 552 bytes
|
||||
exp $sum ; sum can be called from other modules
|
||||
pro $sum,2 ; procedure sum ; 2 bytes local storage
|
||||
lin 8 ; code from source line 8
|
||||
ldl 0 ; load two locals ( a and b )
|
||||
adi 2 ; add them
|
||||
ret 2 ; return the result
|
||||
end 2 ; end of procedure ( still two bytes local storage )
|
||||
\&.2
|
||||
rom 1,99,2 ; descriptor of array a[]
|
||||
exp $test ; the compiler exports all level 0 procedures
|
||||
pro $test,226 ; procedure test, 226 bytes local storage
|
||||
\&.3
|
||||
rom 4.8F8 ; assemble Floating point 4.8 (8 bytes) in
|
||||
\&.4 ; global storage
|
||||
rom 0.5F8 ; same for 0.5
|
||||
mes 3,\-226,2,2 ; compiler temporary not referenced by address
|
||||
mes 3,\-24,2,0 ; the same is true for i, j, b and c in test
|
||||
mes 3,\-22,2,0
|
||||
mes 3,\-4,2,0
|
||||
mes 3,\-2,2,0
|
||||
mes 3,\-20,8,0 ; and for x and y
|
||||
mes 3,\-12,8,0
|
||||
lin 20 ; maintain source line number
|
||||
loc 1
|
||||
stl \-4 ; j := 1
|
||||
lni ; lin 21 prior to optimization
|
||||
lol \-4
|
||||
loc 3
|
||||
mli 2
|
||||
loc 6
|
||||
adi 2
|
||||
stl \-2 ; i := 3 * j + 6
|
||||
lni ; lin 22 prior to optimization
|
||||
lae .3
|
||||
loi 8
|
||||
lal \-12
|
||||
sti 8 ; x := 4.8
|
||||
lni ; lin 23 prior to optimization
|
||||
lal \-12
|
||||
loi 8
|
||||
lae .4
|
||||
loi 8
|
||||
dvf 8
|
||||
lal \-20
|
||||
sti 8 ; y := x / 0.5
|
||||
lni ; lin 24 prior to optimization
|
||||
loc 1
|
||||
stl \-22 ; b := true
|
||||
lni ; lin 25 prior to optimization
|
||||
loc 122
|
||||
stl \-24 ; c := 'z'
|
||||
lni ; lin 26 prior to optimization
|
||||
loc 1
|
||||
stl \-2 ; for i:= 1
|
||||
2
|
||||
lol \-2
|
||||
dup 2
|
||||
mli 2 ; i*i
|
||||
lal \-224
|
||||
lol \-2
|
||||
lae .2
|
||||
sar 2 ; a[i] :=
|
||||
lol \-2
|
||||
loc 100
|
||||
beq *3 ; to 100 do
|
||||
inl \-2 ; increment i and loop
|
||||
bra *2
|
||||
3
|
||||
lin 27
|
||||
lol \-4
|
||||
loc 27
|
||||
adi 2 ; j + 27
|
||||
sil 0 ; r.r1 :=
|
||||
lni ; lin 28 prior to optimization
|
||||
lol \-22 ; b
|
||||
lol 0
|
||||
stf 10 ; r.r3 :=
|
||||
lni ; lin 29 prior to optimization
|
||||
lal \-20
|
||||
loi 16
|
||||
adf 8 ; x + y
|
||||
lol 0
|
||||
adp 2
|
||||
sti 8 ; r.r2 :=
|
||||
lni ; lin 30 prior to optimization
|
||||
lal \-224
|
||||
lol \-4
|
||||
lae .2
|
||||
lar 2 ; a[j]
|
||||
lil 0 ; r.r1
|
||||
cal $sum ; call now
|
||||
asp 4 ; remove parameters from stack
|
||||
lfr 2 ; get function result
|
||||
stl \-2 ; i :=
|
||||
4
|
||||
lin 31
|
||||
lol \-2
|
||||
zle *5 ; while i > 0 do
|
||||
lol \-4
|
||||
lil 0
|
||||
adi 2
|
||||
stl \-4 ; j := j + r.r1
|
||||
del \-2 ; i := i - 1
|
||||
bra *4 ; loop
|
||||
5
|
||||
lin 32
|
||||
lol 0
|
||||
stl \-226 ; make copy of address of r
|
||||
lol \-22
|
||||
lol \-226
|
||||
stf 10 ; r3 := b
|
||||
lal \-20
|
||||
loi 16
|
||||
adf 8
|
||||
lol \-226
|
||||
adp 2
|
||||
sti 8 ; r2 := x + y
|
||||
loc 0
|
||||
sil \-226 ; r1 := 0
|
||||
lin 34 ; note the absence of the unnecessary jump
|
||||
lae 22 ; address of output structure
|
||||
lol \-4
|
||||
cal $_wri ; write integer with default width
|
||||
asp 4 ; pop parameters
|
||||
lae 22
|
||||
lol \-2
|
||||
loc 6
|
||||
cal $_wsi ; write integer width 6
|
||||
asp 6
|
||||
lae 22
|
||||
lal \-12
|
||||
loi 8
|
||||
loc 9
|
||||
loc 3
|
||||
cal $_wrf ; write fixed format real, width 9, precision 3
|
||||
asp 14
|
||||
lae 22
|
||||
lol \-22
|
||||
cal $_wrb ; write boolean, default width
|
||||
asp 4
|
||||
lae 22
|
||||
cal $_wln ; writeln
|
||||
asp 2
|
||||
ret 0 ; return, no result
|
||||
end 226
|
||||
exp $_main
|
||||
pro $_main,0 ; main program
|
||||
\&.6
|
||||
con 2,\-1,22 ; description of external files
|
||||
\&.5
|
||||
rom 15.96F8
|
||||
fil .1 ; maintain source file name
|
||||
lae .6 ; description of external files
|
||||
lae 0 ; base of hol area to relocate buffer addresses
|
||||
cal $_ini ; initialize files, etc...
|
||||
asp 4
|
||||
lin 37
|
||||
lae .5
|
||||
loi 8
|
||||
lae 2
|
||||
sti 8 ; mx := 15.96
|
||||
lni ; lin 38 prior to optimization
|
||||
loc 99
|
||||
ste 0 ; mi := 99
|
||||
lni ; lin 39 prior to optimization
|
||||
lae 10 ; address of r
|
||||
cal $test
|
||||
asp 2
|
||||
loc 0 ; normal exit
|
||||
cal $_hlt ; cleanup and finish
|
||||
asp 2
|
||||
end 0
|
||||
mes 5 ; reals were used
|
||||
.fi
|
||||
.ad
|
||||
.PP
|
||||
The compact code corresponding to the above program is listed below.
|
||||
Read it horizontally, line by line, not column by column.
|
||||
Each number represents a byte of compact code, printed in decimal.
|
||||
The first two bytes form the magic word.
|
||||
.LP
|
||||
.Dr 33
|
||||
173 0 159 122 122 122 255 242 1 161 250 124 116 46 112 0
|
||||
255 156 245 40 2 245 0 128 120 155 249 123 115 117 109 160
|
||||
249 123 115 117 109 122 67 128 63 120 3 122 88 122 152 122
|
||||
242 2 161 121 219 122 255 155 249 124 116 101 115 116 160 249
|
||||
124 116 101 115 116 245 226 0 242 3 161 253 128 123 52 46
|
||||
56 255 242 4 161 253 128 123 48 46 53 255 159 123 245 30
|
||||
255 122 122 255 159 123 96 122 120 255 159 123 98 122 120 255
|
||||
159 123 116 122 120 255 159 123 118 122 120 255 159 123 100 128
|
||||
120 255 159 123 108 128 120 255 67 140 69 121 113 116 68 73
|
||||
116 69 123 81 122 69 126 3 122 113 118 68 57 242 3 72
|
||||
128 58 108 112 128 68 58 108 72 128 57 242 4 72 128 44
|
||||
128 58 100 112 128 68 69 121 113 98 68 69 245 122 0 113
|
||||
96 68 69 121 113 118 182 73 118 42 122 81 122 58 245 32
|
||||
255 73 118 57 242 2 94 122 73 118 69 220 10 123 54 118
|
||||
18 122 183 67 147 73 116 69 147 3 122 104 120 68 73 98
|
||||
73 120 111 130 68 58 100 72 136 2 128 73 120 4 122 112
|
||||
128 68 58 245 32 255 73 116 57 242 2 59 122 65 120 20
|
||||
249 123 115 117 109 8 124 64 122 113 118 184 67 151 73 118
|
||||
128 125 73 116 65 120 3 122 113 116 41 118 18 124 185 67
|
||||
152 73 120 113 245 30 255 73 98 73 245 30 255 111 130 58
|
||||
100 72 136 2 128 73 245 30 255 4 122 112 128 69 120 104
|
||||
245 30 255 67 154 57 142 73 116 20 249 124 95 119 114 105
|
||||
8 124 57 142 73 118 69 126 20 249 124 95 119 115 105 8
|
||||
126 57 142 58 108 72 128 69 129 69 123 20 249 124 95 119
|
||||
114 102 8 134 57 142 73 98 20 249 124 95 119 114 98 8
|
||||
124 57 142 20 249 124 95 119 108 110 8 122 88 120 152 245
|
||||
226 0 155 249 125 95 109 97 105 110 160 249 125 95 109 97
|
||||
105 110 120 242 6 151 122 119 142 255 242 5 161 253 128 125
|
||||
49 53 46 57 54 255 50 242 1 57 242 6 57 120 20 249
|
||||
124 95 105 110 105 8 124 67 157 57 242 5 72 128 57 122
|
||||
112 128 68 69 219 110 120 68 57 130 20 249 124 116 101 115
|
||||
116 8 122 69 120 20 249 124 95 104 108 116 8 122 152 120
|
||||
159 124 160 255 159 125 255
|
||||
.De
|
||||
802
doc/em/assem.nr
Normal file
802
doc/em/assem.nr
Normal file
@@ -0,0 +1,802 @@
|
||||
.bp
|
||||
.P1 "EM ASSEMBLY LANGUAGE"
|
||||
.PP
|
||||
We use two representations for assembly language programs,
|
||||
one is in ASCII and the other is the compact assembly language.
|
||||
The latter needs less space than the first for the same program
|
||||
and therefore allows faster processing.
|
||||
Our only program accepting ASCII assembly
|
||||
language converts it to the compact form.
|
||||
All other programs expect compact assembly input.
|
||||
The first part of the chapter describes the ASCII assembly
|
||||
language and its semantics.
|
||||
The second part describes the syntax of the compact assembly
|
||||
language.
|
||||
The last part lists the EM instructions with the type of
|
||||
arguments allowed and an indication of the function.
|
||||
Appendix A gives a detailed description of the effect of all
|
||||
instructions in the form of a Pascal program.
|
||||
.P2 "ASCII assembly language"
|
||||
.PP
|
||||
An assembly language program consists of a series of lines, each
|
||||
line may be blank, contain one (pseudo)instruction or contain one
|
||||
label.
|
||||
Input to the assembler is in lower case.
|
||||
Upper case is used in this
|
||||
document merely to distinguish keywords from the surrounding prose.
|
||||
Comment is allowed at the end of each line and starts with a semicolon ";".
|
||||
This kind of comment does not exist in the compact form.
|
||||
.QQ
|
||||
Labels must be placed all by themselves on a line and start in
|
||||
column 1.
|
||||
There are two kinds of labels, instruction and data labels.
|
||||
Instruction labels are unsigned positive integers.
|
||||
The scope of an instruction label is its procedure.
|
||||
.QQ
|
||||
The pseudoinstructions CON, ROM and BSS may be preceded by a
|
||||
line containing a
|
||||
1\-8 character data label, the first character of which is a
|
||||
letter, period or underscore.
|
||||
The period may only be followed by
|
||||
digits, the others may be followed by letters, digits and underscores.
|
||||
The use of the character "." followed by a constant,
|
||||
which must be in the range 1 to 32767 (e.g. ".40") is recommended
|
||||
for compiler
|
||||
generated programs.
|
||||
These labels are considered as a special case and handled
|
||||
more efficiently in compact assembly language (see below).
|
||||
Note that a data label on its own or two consecutive labels are not
|
||||
allowed.
|
||||
.PP
|
||||
Each statement may contain an instruction mnemonic or pseudoinstruction.
|
||||
These must begin in column 2 or later (not column 1) and must be followed
|
||||
by a space, tab, semicolon or LF.
|
||||
Everything on the line following a semicolon is
|
||||
taken as a comment.
|
||||
.PP
|
||||
Each input file contains one module.
|
||||
A module may contain many procedures,
|
||||
which may be nested.
|
||||
A procedure consists of
|
||||
a PRO statement, a (possibly empty)
|
||||
collection of instructions and pseudoinstructions and finally an END
|
||||
statement.
|
||||
Pseudoinstructions are also allowed between procedures.
|
||||
They do not belong to a specific procedure.
|
||||
.PP
|
||||
All constants in EM are interpreted in the decimal base.
|
||||
The ASCII assembly language accepts constant expressions
|
||||
wherever constants are allowed.
|
||||
The operators recognized are: +, \-, *, % and / with the usual
|
||||
precedence order.
|
||||
Use of the parentheses ( and ) to alter the precedence order is allowed.
|
||||
.P3 "Instruction arguments"
|
||||
.PP
|
||||
Unlike many other assembly languages, the EM assembly
|
||||
language requires all arguments of normal and pseudoinstructions
|
||||
to be either a constant or an identifier, but not a combination
|
||||
of these two.
|
||||
There is one exception to this rule: when a data label is used
|
||||
for initialization or as an instruction argument,
|
||||
expressions of the form 'label+constant' and 'label-constant'
|
||||
are allowed.
|
||||
This makes it possible to address, for example, the
|
||||
third word of a ten word BSS block
|
||||
directly.
|
||||
Thus LOE LABEL+4 is permitted and so is CON LABEL+3.
|
||||
The resulting address is must be in the same fragment as the label.
|
||||
It is not allowed to add or subtract from instruction labels or procedure
|
||||
identifiers,
|
||||
which certainly is not a severe restriction and greatly aids
|
||||
optimization.
|
||||
.PP
|
||||
Instruction arguments can be constants,
|
||||
data labels, data labels offsetted by a constant, instruction
|
||||
labels and procedure identifiers.
|
||||
The range of integers allowed depends on the instruction.
|
||||
Most instructions allow only integers
|
||||
(signed or unsigned)
|
||||
that fit in a word.
|
||||
Arguments used as offsets to pointers should fit in a
|
||||
pointer-sized integer.
|
||||
Finally, arguments to LDC should fit in a double-word integer.
|
||||
.PP
|
||||
Several instructions have two possible forms:
|
||||
with an explicit argument and with an implicit argument on top of the stack.
|
||||
The size of the implicit argument is the wordsize.
|
||||
The implicit argument is always popped before all other operands.
|
||||
For example: 'CMI 4' specifies that two four-byte signed
|
||||
integers on top of the stack are to be compared.
|
||||
\&'CMI' without an argument expects a wordsized integer
|
||||
on top of the stack that specifies the size of the integers to
|
||||
be compared.
|
||||
Thus the following two sequences are equivalent:
|
||||
.KS
|
||||
.TS
|
||||
center, tab(:) ;
|
||||
l r 30 l r.
|
||||
LDL:\-10:LDL:\-10
|
||||
LDL:\-14:LDL:\-14
|
||||
::LOC:4
|
||||
CMI:4:CMI:
|
||||
ZEQ:*1:ZEQ:*1
|
||||
.TE
|
||||
.KE
|
||||
Section 11.1.6 shows the arguments allowed for each instruction.
|
||||
.P3 "Pseudoinstruction arguments"
|
||||
.PP
|
||||
Pseudoinstruction arguments can be divided in two classes:
|
||||
Initializers and others.
|
||||
The following initializers are allowed: signed integer constants,
|
||||
unsigned integer constants, floating-point constants, strings,
|
||||
data labels, data labels offsetted by a constant, instruction
|
||||
labels and procedure identifiers.
|
||||
.PP
|
||||
Constant initializers in BSS, HOL, CON and ROM pseudoinstructions
|
||||
can be followed by a letter I, U or F.
|
||||
This indicator
|
||||
specifies the type of the initializer: Integer, Unsigned or Float.
|
||||
If no indicator is present I is assumed.
|
||||
The size of the initializer is the wordsize unless
|
||||
the indicator is followed by an integer specifying the
|
||||
initializer's size.
|
||||
This integer is governed by the same restrictions as for
|
||||
transfer of objects to/from memory.
|
||||
As in instruction arguments, initializers include expressions of the form:
|
||||
\&"LABEL+offset" and "LABEL\-offset".
|
||||
The offset must be an unsigned decimal constant.
|
||||
The 'IUF' indicators cannot be used in the offsets.
|
||||
.PP
|
||||
Data labels are referred to by their name.
|
||||
.PP
|
||||
Strings are surrounded by double quotes (").
|
||||
Semicolon's in string do not indicate the start of comment.
|
||||
In the ASCII representation the escape character \e (backslash)
|
||||
alters the meaning of subsequent character(s).
|
||||
This feature allows inclusion of zeroes, graphic characters and
|
||||
the double quote in the string.
|
||||
The following escape sequences exist:
|
||||
.TS
|
||||
center, tab(:);
|
||||
l l l.
|
||||
newline:NL\|(LF):\en
|
||||
horizontal tab:HT:\et
|
||||
backspace:BS:\eb
|
||||
carriage return:CR:\er
|
||||
form feed:FF:\ef
|
||||
backslash:\e:\e\e
|
||||
double quote:":\e"
|
||||
bit pattern:\fBddd\fP:\e\fBddd\fP
|
||||
.TE
|
||||
The escape \fB\eddd\fP consists of the backslash followed by 1,
|
||||
2, or 3 octal digits specifying the value of
|
||||
the desired character.
|
||||
If the character following a backslash is not one of those
|
||||
specified,
|
||||
the backslash is ignored.
|
||||
Example: CON "hello\e012\e0".
|
||||
Each string element initializes a single byte.
|
||||
The ASCII character set is used to map characters onto values.
|
||||
.PP
|
||||
Instruction labels are referred to as *1, *2, etc. in both branch
|
||||
instructions and as initializers.
|
||||
.PP
|
||||
The notation $procname means the identifier for the procedure
|
||||
with the specified name.
|
||||
This identifier has the size of a pointer.
|
||||
.P3 Notation
|
||||
.PP
|
||||
First, the notation used for the arguments, classes of
|
||||
instructions and pseudoinstructions.
|
||||
.DS
|
||||
.TS
|
||||
tab(:);
|
||||
l l l.
|
||||
<cst>:\&=:integer constant (current range \-2**31..2**31\-1)
|
||||
<dlb>:\&=:data label
|
||||
<arg>:\&=:<cst> or <dlb> or <dlb>+<cst> or <dlb>\-<cst>
|
||||
<con>:\&=:integer constant, unsigned constant, floating-point constant
|
||||
<str>:\&=:string constant (surrounded by double quotes),
|
||||
<ilb>:\&=:instruction label
|
||||
::'*' followed by an integer in the range 0..32767.
|
||||
<pro>:\&=:procedure number ('$' followed by a procedure name)
|
||||
<val>:\&=:<arg>, <con>, <pro> or <ilb>.
|
||||
<par>:\&=:<val> or <str>
|
||||
<...>*:\&=:zero or more of <...>
|
||||
<...>+:\&=:one or more of <...>
|
||||
[...]:\&=:optional ...
|
||||
.TE
|
||||
.DE
|
||||
.P3 "Pseudoinstructions"
|
||||
.P4 "Storage declaration"
|
||||
.PP
|
||||
Initialized global data is allocated by the pseudoinstruction CON,
|
||||
which needs at least one argument.
|
||||
Each argument is used to allocate and initialize a number of
|
||||
consecutive bytes in data memory.
|
||||
The number of bytes to be allocated and the alignment depend on the type
|
||||
of the argument.
|
||||
For each argument, an integral number of words,
|
||||
determined by the argument type, is allocated and initialized.
|
||||
.PP
|
||||
The pseudoinstruction ROM is the same as CON,
|
||||
except that it guarantees that the initialized words
|
||||
will not change during the execution of the program.
|
||||
This information allows optimizers to do
|
||||
certain calculations such as array indexing and
|
||||
subrange checking at compile time instead
|
||||
of at run time.
|
||||
.PP
|
||||
The pseudoinstruction BSS allocates
|
||||
uninitialized global data or large blocks of data initialized
|
||||
by the same value.
|
||||
The first argument to this pseudo is the number
|
||||
of bytes required, which must be a multiple of the wordsize.
|
||||
The other arguments specify the value used for initialization and
|
||||
whether the initialization is only for convenience or a strict necessity.
|
||||
The pseudoinstruction HOL is similar to BSS in that it requests an
|
||||
(un)initialized global data block.
|
||||
Addressing of a HOL block, however, is quasi absolute.
|
||||
The first byte is addressed by 0,
|
||||
the second byte by 1 etc. in assembly language.
|
||||
The assembler/loader adds the base address of
|
||||
the HOL block to these numbers to obtain the
|
||||
absolute address in the machine language.
|
||||
.PP
|
||||
The scope of a HOL block starts at the HOL pseudo and
|
||||
ends at the next HOL pseudo or at the end of a module
|
||||
whatever comes first.
|
||||
Each instruction falls in the scope of at most one
|
||||
HOL block, the current HOL block.
|
||||
It is not allowed to have more than one HOL block per procedure.
|
||||
.PP
|
||||
The alignment restrictions are enforced by the
|
||||
pseudoinstructions.
|
||||
All initializers are aligned on a multiple of their size or the wordsize
|
||||
whichever is smaller.
|
||||
Strings form an exception, they are to be seen as a sequence of initializers
|
||||
each for one byte, i.e. strings are not padded with zero bytes.
|
||||
Switching to another type of fragment or placing a label forces
|
||||
word-alignment.
|
||||
There are three types of fragments in global data space: CON, ROM and
|
||||
BSS/HOL.
|
||||
.IP "BSS <cst1>,<val>,<cst2>"
|
||||
.br
|
||||
Reserve <cst1> bytes.
|
||||
<val> is the value used to initialize the area.
|
||||
<cst1> must be a multiple of the size of <val>.
|
||||
<cst2> is 0 if the initialization is not strictly necessary,
|
||||
1 if it is.
|
||||
.IP "HOL <cst1>,<val>,<cst2>"
|
||||
.br
|
||||
Idem, but all following absolute global data references will
|
||||
refer to this block.
|
||||
Only one HOL is allowed per procedure,
|
||||
it has to be placed before the first instruction.
|
||||
.IP "CON <val>+"
|
||||
.br
|
||||
Assemble global data words initialized with the <val> constants.
|
||||
.IP "ROM <val>+"
|
||||
.br
|
||||
Idem, but the initialized data will never be changed by the program.
|
||||
.P4 "Partitioning"
|
||||
.PP
|
||||
Two pseudoinstructions partition the input into procedures:
|
||||
.IP "PRO <pro>[,<cst>]"
|
||||
.br
|
||||
Start of procedure.
|
||||
<pro> is the procedure name.
|
||||
<cst> is the number of bytes for locals.
|
||||
The number of bytes for locals must be specified in the PRO or
|
||||
END pseudoinstruction.
|
||||
When specified in both, they must be identical.
|
||||
.IP "END [<cst>]"
|
||||
.br
|
||||
End of Procedure.
|
||||
<cst> is the number of bytes for locals.
|
||||
The number of bytes for locals must be specified in either the PRO or
|
||||
END pseudoinstruction or both.
|
||||
.P4 "Visibility"
|
||||
.PP
|
||||
Names of data and procedures in an EM module can either be
|
||||
internal or external.
|
||||
External names are known outside the module and are used to link
|
||||
several pieces of a program.
|
||||
Internal names are not known outside the modules they are used in.
|
||||
Other modules will not 'see' an internal name.
|
||||
.QQ
|
||||
To reduce the number of passes needed,
|
||||
it must be known at the first occurrence whether
|
||||
a name is internal or external.
|
||||
If the first occurrence of a name is in a definition,
|
||||
the name is considered to be internal.
|
||||
If the first occurrence of a name is a reference,
|
||||
the name is considered to be external.
|
||||
If the first occurrence is in one of the following pseudoinstructions,
|
||||
the effect of the pseudo has precedence.
|
||||
.IP "EXA <dlb>"
|
||||
.br
|
||||
External name.
|
||||
<dlb> is known, possibly defined, outside this module.
|
||||
Note that <dlb> may be defined in the same module.
|
||||
.IP "EXP <pro>"
|
||||
.br
|
||||
External procedure identifier.
|
||||
Note that <pro> may be defined in the same module.
|
||||
.IP "INA <dlb>"
|
||||
.br
|
||||
Internal name.
|
||||
<dlb> is internal to this module and must be defined in this module.
|
||||
.IP "INP <pro>"
|
||||
.br
|
||||
Internal procedure.
|
||||
<pro> is internal to this module and must be defined in this module.
|
||||
.P4 "Miscellaneous"
|
||||
.PP
|
||||
Two other pseudoinstructions provide miscellaneous features:
|
||||
.IP "EXC <cst1>,<cst2>"
|
||||
.br
|
||||
Two blocks of instructions preceding this one are
|
||||
interchanged before being processed.
|
||||
<cst1> gives the number of lines of the first block.
|
||||
<cst2> gives the number of lines of the second one.
|
||||
Blank and pure comment lines do not count.
|
||||
This instruction is obsolete. Its use is strongly discouraged.
|
||||
.IP "MES <cst>[,<par>]*"
|
||||
.br
|
||||
A special type of comment.
|
||||
Used by compilers to communicate with the
|
||||
optimizer, assembler, etc. as follows:
|
||||
.RS
|
||||
.IP "MES 0"
|
||||
.br
|
||||
An error has occurred, stop further processing.
|
||||
.IP "MES 1"
|
||||
.br
|
||||
Suppress optimization.
|
||||
.IP "MES 2,<cst1>,<cst2>"
|
||||
.br
|
||||
Use wordsize <cst1> and pointer size <cst2>.
|
||||
.IP "MES 3,<cst1>,<cst2>,<cst3>,<cst4>"
|
||||
.br
|
||||
Indicates that a local variable is never referenced indirectly.
|
||||
Used to indicate that a register may be used for a specific
|
||||
variable.
|
||||
<cst1> is offset in bytes from AB if positive
|
||||
and offset from LB if negative.
|
||||
<cst2> gives the size of the variable.
|
||||
<cst3> indicates the class of the variable.
|
||||
The following values are currently recognized:
|
||||
.br
|
||||
0\0\0\0The variable can be used for anything.
|
||||
.br
|
||||
1\0\0\0The variable is used as a loopindex.
|
||||
.br
|
||||
2\0\0\0The variable is used as a pointer.
|
||||
.br
|
||||
3\0\0\0The variable is used as a floating point number.
|
||||
.br
|
||||
<cst4> gives the priority of the variable,
|
||||
higher numbers indicate better candidates.
|
||||
.IP "MES 4,<cst>,<str>"
|
||||
.br
|
||||
Number of source lines in file <str> (for profiler).
|
||||
.IP "MES 5"
|
||||
.br
|
||||
Floating point used.
|
||||
.IP "MES 6,<val>*"
|
||||
.br
|
||||
Comment. Used to provide comments in compact assembly language.
|
||||
.IP "MES 7,....."
|
||||
.br
|
||||
Reserved.
|
||||
.IP "MES 8,<pro>[,<dlb>]..."
|
||||
.br
|
||||
Library module. Indicates that the module may only be loaded
|
||||
if it is useful, that is, if it can satisfy any unresolved
|
||||
references during the loading process.
|
||||
May not be preceded by any other pseudo, except MES's.
|
||||
.IP "MES 9,<cst>"
|
||||
.br
|
||||
Guarantees that no more than <cst> bytes of parameters are
|
||||
accessed, either directly or indirectly.
|
||||
.IP "MES 10,<cst>[,<par>]*
|
||||
.br
|
||||
This message number is reserved for the global optimizer.
|
||||
It inserts these messages in its output as hints to backends.
|
||||
<cst> indicates the type of hint.
|
||||
.IP "MES 11"
|
||||
.br
|
||||
Procedures containing this message are possible destinations of
|
||||
non-local goto's with the GTO instruction.
|
||||
Some backends keep locals in registers,
|
||||
the locals in this procedure should not be kept in registers and
|
||||
all registers containing locals of other procedures should be
|
||||
saved upon entry to this procedure.
|
||||
.RE
|
||||
.IP ""
|
||||
Each backend is free to skip irrelevant MES pseudos.
|
||||
.P2 "The Compact Assembly Language"
|
||||
.PP
|
||||
The assembler accepts input in a highly encoded form.
|
||||
This
|
||||
form is intended to reduce the amount of file transport between the
|
||||
front ends, optimizers
|
||||
and back ends, and also reduces the amount of storage required for storing
|
||||
libraries.
|
||||
Libraries are stored as archived compact assembly language, not machine
|
||||
language.
|
||||
.PP
|
||||
When beginning to read the input, the assembler is in neutral state, and
|
||||
expects either a label or an instruction (including the pseudoinstructions).
|
||||
The meaning of the next byte(s) when in neutral state is as follows, where
|
||||
b1, b2
|
||||
etc. represent the succeeding bytes.
|
||||
.TS
|
||||
tab(:);
|
||||
rw17 4 l.
|
||||
0:Reserved for future use
|
||||
1\-129:Machine instructions, see Appendix A, alphabetical list
|
||||
130\-149:Reserved for future use
|
||||
150\-161:BSS,CON,END,EXA,EXC,EXP,HOL,INA,INP,MES,PRO,ROM
|
||||
162\-179:Reserved for future pseudoinstructions
|
||||
180\-239:Instruction labels 0 \- 59 (180 is local label 0 etc.)
|
||||
240\-244:See the Common Table below
|
||||
245\-255:Not used
|
||||
.TE
|
||||
After a label, the assembler is back in neutral state; it can immediately
|
||||
accept another label or an instruction in the next byte.
|
||||
No linefeeds are used to separate lines.
|
||||
.PP
|
||||
If an opcode expects no arguments,
|
||||
the assembler is back in neutral state after
|
||||
reading the one byte containing the instruction number.
|
||||
If it has one or
|
||||
more arguments (only pseudos have more than 1), the arguments follow directly,
|
||||
encoded as follows:
|
||||
.TS
|
||||
tab(:);
|
||||
r l.
|
||||
0\-239:Offsets from \-120 to 119
|
||||
240\-255:See the Common Table below
|
||||
.TE
|
||||
Absence of an optional argument is indicated by a special
|
||||
byte.
|
||||
.TS
|
||||
tab(:);
|
||||
c s s s
|
||||
c c s c
|
||||
l4 l l4 l.
|
||||
Common Table for Neutral State and Arguments
|
||||
class:bytes:description
|
||||
|
||||
<ilb>:240:b1:Instruction label b1 (Not used for branches)
|
||||
<ilb>:241:b1 b2:16 bit instruction label (256*b2 + b1)
|
||||
<dlb>:242:b1:Global label .0\-.255, with b1 being the label
|
||||
<dlb>:243:b1 b2:Global label .0\-.32767
|
||||
:::with 256*b2+b1 being the label
|
||||
<dlb>:244:<string>:Global symbol not of the form .nnn
|
||||
<cst>:245:b1 b2:16 bit constant
|
||||
<cst>:246:b1 b2 b3 b4:32 bit constant
|
||||
<cst>:247:b1 .. b8:64 bit constant
|
||||
<arg>:248:<dlb><cst>:Global label + (possibly negative) constant
|
||||
<pro>:249:<string>:Procedure name (not including $)
|
||||
<str>:250:<string>:String used in CON or ROM (no quotes-no escapes)
|
||||
<con>:251:<cst><string>:Integer constant, size <cst> bytes
|
||||
<con>:252:<cst><string>:Unsigned constant, size <cst> bytes
|
||||
<con>:253:<cst><string>:Floating constant, size <cst> bytes
|
||||
:254::unused
|
||||
<end>:255::Delimiter for argument lists or
|
||||
:::indicates absence of optional argument
|
||||
.TE 1
|
||||
.PP
|
||||
The bytes specifying the value of a 16, 32 or 64 bit constant
|
||||
are presented in two's complement notation, with the least
|
||||
significant byte first. For example: the value of a 32 bit
|
||||
constant is ((s4*256+b3)*256+b2)*256+b1, where s4 is b4\-256 if
|
||||
b4 is greater than 128 else s4 takes the value of b4.
|
||||
A <string> consists of a <cst> immediately followed by
|
||||
a sequence of bytes with length <cst>.
|
||||
.PP
|
||||
.ne 8
|
||||
The pseudoinstructions fall into several categories, depending on their
|
||||
arguments:
|
||||
.DS
|
||||
Group 1 \- EXC, BSS, HOL have a known number of arguments
|
||||
Group 2 \- EXA, EXP, INA, INP have a string as argument
|
||||
Group 3 \- CON, MES, ROM have a variable number of various things
|
||||
Group 4 \- END, PRO have a trailing optional argument.
|
||||
.DE
|
||||
Groups 1 and 2
|
||||
use the encoding described above.
|
||||
Group 3 also uses the encoding listed above, with an <end> byte after the
|
||||
last argument to indicate the end of the list.
|
||||
Group 4 uses
|
||||
an <end> byte if the trailing argument is not present.
|
||||
.TS
|
||||
tab(|);
|
||||
l s l
|
||||
l s s
|
||||
l 2 lw(30) l.
|
||||
Example ASCII|Example compact
|
||||
(LOC = 69, BRA = 18 here):
|
||||
|
||||
2||182
|
||||
1||181
|
||||
\0LOC|10|69 130
|
||||
\0LOC|\-10|69 110
|
||||
\0LOC|300|69 245 44 1
|
||||
\0BRA|*19|18 139
|
||||
300||241 44 1
|
||||
.3||242 3
|
||||
\0CON|4,9,*2,$foo|151 124 129 240 2 249 123 102 111 111 255
|
||||
\0CON|.35|151 242 35 255
|
||||
.TE
|
||||
.P2 "Assembly language instruction list"
|
||||
.PP
|
||||
For each instruction in the list the range of argument values
|
||||
in the assembly language is given.
|
||||
The column headed \fIassem\fP contains the mnemonics defined
|
||||
in 11.1.3.
|
||||
The following column specifies restrictions of the argument
|
||||
value.
|
||||
Addresses have to obey the restrictions mentioned in chapter 2.
|
||||
The classes of arguments
|
||||
are indicated by letters:
|
||||
.ds b \fBb\fP
|
||||
.ds c \fBc\fP
|
||||
.ds d \fBd\fP
|
||||
.ds g \fBg\fP
|
||||
.ds f \fBf\fP
|
||||
.ds l \fBl\fP
|
||||
.ds n \fBn\fP
|
||||
.ds w \fBw\fP
|
||||
.ds p \fBp\fP
|
||||
.ds r \fBr\fP
|
||||
.ds s \fBs\fP
|
||||
.ds z \fBz\fP
|
||||
.ds o \fBo\fP
|
||||
.ds - \fB\-\fP
|
||||
.sp
|
||||
.TS
|
||||
tab(:);
|
||||
c s l l
|
||||
l l 15 l l.
|
||||
\fIassem\fP:constraints:rationale
|
||||
|
||||
\&\*c:cst:fits word:constant
|
||||
\&\*d:cst:fits double word:constant
|
||||
\&\*l:cst::local offset
|
||||
\&\*g:arg:>= 0:global offset
|
||||
\&\*f:cst::fragment offset
|
||||
\&\*n:cst:>= 0:counter
|
||||
\&\*s:cst:>0 , word multiple:object size
|
||||
\&\*z:cst:>= 0 , zero or word multiple:object size
|
||||
\&\*o:cst:> 0 , word multiple or fraction:object size
|
||||
\&\*w:cst:> 0 , word multiple:object size *
|
||||
\&\*p:pro::pro identifier
|
||||
\&\*b:ilb:>= 0:label number
|
||||
\&\*r:cst:0,1,2:register number
|
||||
\&\*-:::no argument
|
||||
.TE
|
||||
.PP
|
||||
The * at the rationale for \*w indicates that the argument
|
||||
can either be given as argument or on top of the stack.
|
||||
If the argument is omitted, the argument is fetched from the
|
||||
stack;
|
||||
it is assumed to be a wordsized unsigned integer.
|
||||
Instructions that check for undefined integer or floating-point
|
||||
values and underflow or overflow
|
||||
are indicated below by (*).
|
||||
.sp 1
|
||||
.DS
|
||||
.ta 12n
|
||||
GROUP 1 \- LOAD
|
||||
|
||||
LOC \*c : Load constant (i.e. push one word onto the stack)
|
||||
LDC \*d : Load double constant ( push two words )
|
||||
LOL \*l : Load word at \*l-th local (\*l<0) or parameter (\*l>=0)
|
||||
LOE \*g : Load external word \*g
|
||||
LIL \*l : Load word pointed to by \*l-th local or parameter
|
||||
LOF \*f : Load offsetted (top of stack + \*f yield address)
|
||||
LAL \*l : Load address of local or parameter
|
||||
LAE \*g : Load address of external
|
||||
LXL \*n : Load lexical (address of LB \*n static levels back)
|
||||
LXA \*n : Load lexical (address of AB \*n static levels back)
|
||||
LOI \*o : Load indirect \*o bytes (address is popped from the stack)
|
||||
LOS \*w : Load indirect, \*w-byte integer on top of stack gives object size
|
||||
LDL \*l : Load double local or parameter (two consecutive words are stacked)
|
||||
LDE \*g : Load double external (two consecutive externals are stacked)
|
||||
LDF \*f : Load double offsetted (top of stack + \*f yield address)
|
||||
LPI \*p : Load procedure identifier
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 2 \- STORE
|
||||
|
||||
STL \*l : Store local or parameter
|
||||
STE \*g : Store external
|
||||
SIL \*l : Store into word pointed to by \*l-th local or parameter
|
||||
STF \*f : Store offsetted
|
||||
STI \*o : Store indirect \*o bytes (pop address, then data)
|
||||
STS \*w : Store indirect, \*w-byte integer on top of stack gives object size
|
||||
SDL \*l : Store double local or parameter
|
||||
SDE \*g : Store double external
|
||||
SDF \*f : Store double offsetted
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 3 \- INTEGER ARITHMETIC
|
||||
|
||||
ADI \*w : Addition (*)
|
||||
SBI \*w : Subtraction (*)
|
||||
MLI \*w : Multiplication (*)
|
||||
DVI \*w : Division (*)
|
||||
RMI \*w : Remainder (*)
|
||||
NGI \*w : Negate (two's complement) (*)
|
||||
SLI \*w : Shift left (*)
|
||||
SRI \*w : Shift right (*)
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 4 \- UNSIGNED ARITHMETIC
|
||||
|
||||
ADU \*w : Addition
|
||||
SBU \*w : Subtraction
|
||||
MLU \*w : Multiplication
|
||||
DVU \*w : Division
|
||||
RMU \*w : Remainder
|
||||
SLU \*w : Shift left
|
||||
SRU \*w : Shift right
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 5 \- FLOATING POINT ARITHMETIC
|
||||
|
||||
ADF \*w : Floating add (*)
|
||||
SBF \*w : Floating subtract (*)
|
||||
MLF \*w : Floating multiply (*)
|
||||
DVF \*w : Floating divide (*)
|
||||
NGF \*w : Floating negate (*)
|
||||
FIF \*w : Floating multiply and split integer and fraction part (*)
|
||||
FEF \*w : Split floating number in exponent and fraction part (*)
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 6 \- POINTER ARITHMETIC
|
||||
|
||||
ADP \*f : Add \*f to pointer on top of stack
|
||||
ADS \*w : Add \*w-byte value and pointer
|
||||
SBS \*w : Subtract pointers in same fragment and push diff as size \*w integer
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 7 \- INCREMENT/DECREMENT/ZERO
|
||||
|
||||
INC \*- : Increment word on top of stack by 1 (*)
|
||||
INL \*l : Increment local or parameter (*)
|
||||
INE \*g : Increment external (*)
|
||||
DEC \*- : Decrement word on top of stack by 1 (*)
|
||||
DEL \*l : Decrement local or parameter (*)
|
||||
DEE \*g : Decrement external (*)
|
||||
ZRL \*l : Zero local or parameter
|
||||
ZRE \*g : Zero external
|
||||
ZRF \*w : Load a floating zero of size \*w
|
||||
ZER \*w : Load \*w zero bytes
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 8 \- CONVERT (stack: source, source size, dest. size (top))
|
||||
|
||||
CII \*- : Convert integer to integer (*)
|
||||
CUI \*- : Convert unsigned to integer (*)
|
||||
CFI \*- : Convert floating to integer (*)
|
||||
CIF \*- : Convert integer to floating (*)
|
||||
CUF \*- : Convert unsigned to floating (*)
|
||||
CFF \*- : Convert floating to floating (*)
|
||||
CIU \*- : Convert integer to unsigned
|
||||
CUU \*- : Convert unsigned to unsigned
|
||||
CFU \*- : Convert floating to unsigned
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 9 \- LOGICAL
|
||||
|
||||
AND \*w : Boolean and on two groups of \*w bytes
|
||||
IOR \*w : Boolean inclusive or on two groups of \*w bytes
|
||||
XOR \*w : Boolean exclusive or on two groups of \*w bytes
|
||||
COM \*w : Complement (one's complement of top \*w bytes)
|
||||
ROL \*w : Rotate left a group of \*w bytes
|
||||
ROR \*w : Rotate right a group of \*w bytes
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 10 \- SETS
|
||||
|
||||
INN \*w : Bit test on \*w byte set (bit number on top of stack)
|
||||
SET \*w : Create singleton \*w byte set with bit n on (n is top of stack)
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 11 \- ARRAY
|
||||
|
||||
LAR \*w : Load array element, descriptor contains integers of size \*w
|
||||
SAR \*w : Store array element
|
||||
AAR \*w : Load address of array element
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 12 \- COMPARE
|
||||
|
||||
CMI \*w : Compare \*w byte integers, Push negative, zero, positive for <, = or >
|
||||
CMF \*w : Compare \*w byte reals
|
||||
CMU \*w : Compare \*w byte unsigneds
|
||||
CMS \*w : Compare \*w byte values, can only be used for bit for bit equality test
|
||||
CMP \*- : Compare pointers
|
||||
|
||||
TLT \*- : True if less, i.e. iff top of stack < 0
|
||||
TLE \*- : True if less or equal, i.e. iff top of stack <= 0
|
||||
TEQ \*- : True if equal, i.e. iff top of stack = 0
|
||||
TNE \*- : True if not equal, i.e. iff top of stack non zero
|
||||
TGE \*- : True if greater or equal, i.e. iff top of stack >= 0
|
||||
TGT \*- : True if greater, i.e. iff top of stack > 0
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 13 \- BRANCH
|
||||
|
||||
BRA \*b : Branch unconditionally to label \*b
|
||||
|
||||
BLT \*b : Branch less (pop 2 words, branch if top > second)
|
||||
BLE \*b : Branch less or equal
|
||||
BEQ \*b : Branch equal
|
||||
BNE \*b : Branch not equal
|
||||
BGE \*b : Branch greater or equal
|
||||
BGT \*b : Branch greater
|
||||
|
||||
ZLT \*b : Branch less than zero (pop 1 word, branch negative)
|
||||
ZLE \*b : Branch less or equal to zero
|
||||
ZEQ \*b : Branch equal zero
|
||||
ZNE \*b : Branch not zero
|
||||
ZGE \*b : Branch greater or equal zero
|
||||
ZGT \*b : Branch greater than zero
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 14 \- PROCEDURE CALL
|
||||
|
||||
CAI \*- : Call procedure (procedure identifier on stack)
|
||||
CAL \*p : Call procedure (with identifier \*p)
|
||||
LFR \*s : Load function result
|
||||
RET \*z : Return (function result consists of top \*z bytes)
|
||||
.DE
|
||||
|
||||
.DS
|
||||
GROUP 15 \- MISCELLANEOUS
|
||||
|
||||
ASP \*f : Adjust the stack pointer by \*f
|
||||
ASS \*w : Adjust the stack pointer by \*w-byte integer
|
||||
BLM \*z : Block move \*z bytes; first pop destination addr, then source addr
|
||||
BLS \*w : Block move, size is in \*w-byte integer on top of stack
|
||||
CSA \*w : Case jump; address of jump table at top of stack
|
||||
CSB \*w : Table lookup jump; address of jump table at top of stack
|
||||
DCH \*- : Follow dynamic chain, convert LB to LB of caller
|
||||
DUP \*s : Duplicate top \*s bytes
|
||||
DUS \*w : Duplicate top \*w bytes
|
||||
EXG \*w : Exchange top \*w bytes
|
||||
FIL \*g : File name (external 4 := \*g)
|
||||
GTO \*g : Non-local goto, descriptor at \*g
|
||||
LIM \*- : Load 16 bit ignore mask
|
||||
LIN \*n : Line number (external 0 := \*n)
|
||||
LNI \*- : Line number increment
|
||||
LOR \*r : Load register (0=LB, 1=SP, 2=HP)
|
||||
LPB \*- : Convert local base to argument base
|
||||
MON \*- : Monitor call
|
||||
NOP \*- : No operation
|
||||
RCK \*w : Range check; trap on error
|
||||
RTT \*- : Return from trap
|
||||
SIG \*- : Trap errors to proc identifier on top of stack, \-2 resets default
|
||||
SIM \*- : Store 16 bit ignore mask
|
||||
STR \*r : Store register (0=LB, 1=SP, 2=HP)
|
||||
TRP \*- : Cause trap to occur (Error number on stack)
|
||||
.DE
|
||||
4
doc/em/cont.nr
Normal file
4
doc/em/cont.nr
Normal file
@@ -0,0 +1,4 @@
|
||||
.de PT
|
||||
..
|
||||
.bp
|
||||
.Ct
|
||||
153
doc/em/descr.nr
Normal file
153
doc/em/descr.nr
Normal file
@@ -0,0 +1,153 @@
|
||||
.bp
|
||||
.P1 "DESCRIPTORS"
|
||||
.PP
|
||||
Several instructions use descriptors, notably the range check instruction,
|
||||
the array instructions, the goto instruction and the case jump instructions.
|
||||
Descriptors reside in data space.
|
||||
They may be constructed at run time, but
|
||||
more often they are fixed and allocated in ROM data.
|
||||
.PP
|
||||
All instructions using descriptors, except GTO, have as argument
|
||||
the size of the integers in the descriptor.
|
||||
All implementations have to allow integers of the size of a
|
||||
word in descriptors.
|
||||
All integers popped from the stack and used for indexing or comparing
|
||||
must have the same size as the integers in the descriptor.
|
||||
.P2 "Range check descriptors"
|
||||
.PP
|
||||
Range check descriptors consist of two integers:
|
||||
.IP 1.
|
||||
lower bound signed
|
||||
.IP 2.
|
||||
upper bound signed
|
||||
.LP
|
||||
The range check instruction checks an integer on the stack against
|
||||
these bounds and causes a trap if the value is outside the interval.
|
||||
The value itself is neither changed nor removed from the stack.
|
||||
.P2 "Array descriptors"
|
||||
.PP
|
||||
Each array descriptor describes a single dimension.
|
||||
For multi-dimensional arrays, several array instructions are
|
||||
needed to access a single element.
|
||||
Array descriptors contain the following three integers:
|
||||
.IP 1.
|
||||
lower bound signed
|
||||
.IP 2.
|
||||
upper bound \- lower bound unsigned
|
||||
.IP 3.
|
||||
number of bytes per element unsigned
|
||||
.LP
|
||||
The array instructions LAR, SAR and AAR have the pointer to the start
|
||||
of the descriptor as operand on the stack.
|
||||
.LP
|
||||
The element A[I] is fetched as follows:
|
||||
.IP 1.
|
||||
Stack the address of A (e.g., using LAE or LAL)
|
||||
.IP 2.
|
||||
Stack the value of I (n-byte integer)
|
||||
.IP 3.
|
||||
Stack the pointer to the descriptor (e.g., using LAE)
|
||||
.IP 4.
|
||||
LAR n (n is the size of the integers in the descriptor and I)
|
||||
.LP
|
||||
All array instructions first pop the address of the descriptor
|
||||
and the index.
|
||||
If the index is not within the bounds specified, a trap occurs.
|
||||
If ok, (I~\-~lower bound) is multiplied
|
||||
by the number of bytes per element (the third word). The result is added
|
||||
to the address of A and replaces A on the stack.
|
||||
.QQ
|
||||
At this point LAR, SAR and AAR diverge.
|
||||
AAR is finished. LAR pops the address and fetches the data
|
||||
item,
|
||||
the size being specified by the descriptor.
|
||||
The usual restrictions for memory access must be obeyed.
|
||||
SAR pops the address and stores the
|
||||
data item now exposed.
|
||||
.P2 "Non-local goto descriptors"
|
||||
.PP
|
||||
The GTO instruction provides a way of returning directly to any
|
||||
active procedure invocation.
|
||||
The argument of the instruction is the address of a descriptor
|
||||
containing three pointers:
|
||||
.IP 1.
|
||||
value of PC after the jump
|
||||
.IP 2.
|
||||
value of SP after the jump
|
||||
.IP 3.
|
||||
value of LB after the jump
|
||||
.LP
|
||||
GTO replaces the loads PC, SP and LB from the descriptor,
|
||||
thereby jumping to a procedure
|
||||
and removing zero or more frames from the stack.
|
||||
The LB, SP and PC in the descriptor must belong to a
|
||||
dynamically enclosing procedure,
|
||||
because some EM implementations will need to backtrack through
|
||||
the dynamic chain and use the implementation dependent data
|
||||
in frames to restore registers etc.
|
||||
.P2 "Case descriptors"
|
||||
.PP
|
||||
The case jump instructions CSA and CSB both
|
||||
provide multiway branches selected by a case index.
|
||||
Both fetch two operands from the stack:
|
||||
first a pointer to the low address of the case descriptor
|
||||
and then the case index.
|
||||
CSA uses the case index as index in the descriptor table, but CSB searches
|
||||
the table for an occurrence of the case index.
|
||||
Therefore, the descriptors for CSA and CSB,
|
||||
as shown in figure 4, are different.
|
||||
All pointers in the table must be addresses of instructions in the
|
||||
procedure executing the case instruction.
|
||||
.PP
|
||||
CSA selects the new PC by indexing.
|
||||
If the index, a signed integer, is greater than or equal to
|
||||
the lower bound and less than or equal to the upper bound,
|
||||
then fetch the new PC from the list of instruction pointers by indexing with
|
||||
index-lower.
|
||||
The table does not contain the value of the upper bound,
|
||||
but the value of upper-lower as an unsigned integer.
|
||||
The default instruction pointer is used when the index is out of bounds.
|
||||
If the resulting PC is 0, then trap.
|
||||
.PP
|
||||
CSB selects the new PC by searching.
|
||||
The table is searched for an entry with index value equal to the case index.
|
||||
That entry or, if none is found, the default entry contains the
|
||||
new PC.
|
||||
When the resulting PC is 0, a trap is performed.
|
||||
.PP
|
||||
The choice of which case instruction to use for
|
||||
each source language case statement
|
||||
is up to the front end.
|
||||
If the range of the index value is dense, i.e
|
||||
.DS
|
||||
(highest value \- lowest value) / number of cases
|
||||
.DE
|
||||
is less than some threshold, then CSA is the obvious choice.
|
||||
If the range is sparse, CSB is better.
|
||||
.Dr 30
|
||||
|--------------------| |--------------------| high address
|
||||
| pointer for upb | | pointer n-1 |
|
||||
|--------------------| |- - - - - - - |
|
||||
| . | | index n-1 |
|
||||
| . | |--------------------|
|
||||
| . | | . |
|
||||
| . | | . |
|
||||
| . | | . |
|
||||
| . | |--------------------|
|
||||
| . | | pointer 1 |
|
||||
|--------------------| |- - - - - - - |
|
||||
| pointer for lwb+1 | | index 1 |
|
||||
|--------------------| |--------------------|
|
||||
| pointer for lwb | | pointer 0 |
|
||||
|--------------------| |- - - - - - - |
|
||||
| upper - lower | | index 0 |
|
||||
|--------------------| |--------------------|
|
||||
| lower bound | | number of entries |
|
||||
|--------------------| |--------------------|
|
||||
| default pointer | | default pointer | low address
|
||||
|--------------------| |--------------------|
|
||||
|
||||
CSA descriptor CSB descriptor
|
||||
.Df
|
||||
Figure 4. Descriptor layout for CSA and CSB
|
||||
.De
|
||||
6
doc/em/dispat1.sed
Normal file
6
doc/em/dispat1.sed
Normal file
@@ -0,0 +1,6 @@
|
||||
1c\
|
||||
.TS\
|
||||
r l l l l l l l l.
|
||||
s/-/\\-/g
|
||||
/DISPATCH2/,$c\
|
||||
.TE
|
||||
6
doc/em/dispat2.sed
Normal file
6
doc/em/dispat2.sed
Normal file
@@ -0,0 +1,6 @@
|
||||
1,/DISPATCH2/c\
|
||||
.TS\
|
||||
r l l l l l l l l.
|
||||
s/-/\\-/g
|
||||
/DISPATCH3/,$c\
|
||||
.TE
|
||||
6
doc/em/dispat3.sed
Normal file
6
doc/em/dispat3.sed
Normal file
@@ -0,0 +1,6 @@
|
||||
1,/DISPATCH3/c\
|
||||
.TS\
|
||||
r l l l l l l l l.
|
||||
s/-/\\-/g
|
||||
$a\
|
||||
.TE
|
||||
376
doc/em/dspace.nr
Normal file
376
doc/em/dspace.nr
Normal file
@@ -0,0 +1,376 @@
|
||||
.bp
|
||||
.P1 "DATA ADDRESS SPACE"
|
||||
.PP
|
||||
The data address space is divided into three parts, called 'areas',
|
||||
each with its own addressing method:
|
||||
global data area,
|
||||
local data area (including the stack),
|
||||
and heap data area.
|
||||
These data areas must be part of the same
|
||||
address space because all data is accessed by
|
||||
the same type of pointers.
|
||||
.PP
|
||||
Space for global data is reserved using several pseudoinstructions in the
|
||||
assembly language, as described in
|
||||
the next paragraph and chapter 11.
|
||||
The size of the global data area is fixed per program.
|
||||
.QQ
|
||||
Global data is addressed absolutely in the machine language.
|
||||
Many instructions are available to address global data.
|
||||
They all have an absolute address as argument.
|
||||
Examples are LOE, LAE and STE.
|
||||
.PP
|
||||
Part of the global data area is initialized by the
|
||||
compiler, the
|
||||
rest is not initialized at all or is initialized
|
||||
with a value, typically \-32768 or 0.
|
||||
Part of the initialized global data may be made read-only
|
||||
if the implementation supports protection.
|
||||
.PP
|
||||
The local data area is used as a stack,
|
||||
which grows from high to low addresses
|
||||
and contains some data for each active procedure
|
||||
invocation, called a 'frame'.
|
||||
The size of the local data area varies dynamically during
|
||||
execution.
|
||||
Below the current procedure frame resides the operand stack.
|
||||
The stack pointer SP always points to the bottom of
|
||||
the local data area.
|
||||
Local data is addressed by offsetting from the local base pointer LB.
|
||||
LB always points to the frame of the current procedure.
|
||||
Only the words of the current frame and the parameters
|
||||
can be addressed directly.
|
||||
Variables in other active procedures are addressed by following
|
||||
the chain of statically enclosing procedures using the LXL or LXA instruction.
|
||||
The variables in dynamically enclosing procedures can be
|
||||
addressed with the use of the DCH instruction.
|
||||
.QQ
|
||||
Many instructions have offsets to LB as argument,
|
||||
for instance LOL, LAL and STL.
|
||||
The arguments of these instructions range from \-1 to some
|
||||
(negative) minimum
|
||||
for the access of local storage and from 0 to some (positive)
|
||||
maximum for parameter access.
|
||||
.PP
|
||||
The procedure call instructions CAL and CAI each create a new frame
|
||||
on the stack.
|
||||
Each procedure has an assembly-time parameter specifying
|
||||
the number of bytes needed for local storage.
|
||||
This storage is allocated each time the procedure is called and
|
||||
must be a multiple of the wordsize.
|
||||
Each procedure, therefore, starts with a stack with the local variables
|
||||
already allocated.
|
||||
The return instructions RET and RTT remove a frame.
|
||||
The actual parameters must be removed by the calling procedure.
|
||||
.PP
|
||||
RET may copy some words from the stack of
|
||||
the returning procedure to an unnamed 'function return area'.
|
||||
This area is available for 'READ-ONCE' access using the LFR instruction.
|
||||
The result of a LFR is only defined if the size used to fetch
|
||||
is identical to the size used in the last return.
|
||||
The instruction ASP, used to remove the parameters from the
|
||||
stack, the branch instruction BRA and the non-local goto
|
||||
instruction GTO are the only ones that leave the contents of
|
||||
the 'function return area' intact.
|
||||
All other instructions are allowed to destroy the function
|
||||
return area.
|
||||
Thus parameters can be popped before fetching the function result.
|
||||
The maximum size of all function return areas is
|
||||
implementation dependent,
|
||||
but should allow procedure instance identifiers and all
|
||||
implemented objects of type integer, unsigned, float
|
||||
and pointer to be returned.
|
||||
In most implementations
|
||||
the maximum size of the function return
|
||||
area is twice the pointer size,
|
||||
because we want to be able to handle 'procedure instance
|
||||
identifiers' which consist of a procedure identifier and the LB
|
||||
of a frame belonging to that procedure.
|
||||
.PP
|
||||
The heap data area grows upwards, to higher numbered
|
||||
addresses.
|
||||
It is initially empty.
|
||||
The initial value of the heap pointer HP
|
||||
marks the low end.
|
||||
The heap pointer may be manipulated
|
||||
by the LOR and STR instructions.
|
||||
The heap can only be addressed indirectly,
|
||||
by pointers derived from previous values of HP.
|
||||
.P2 "Global data area"
|
||||
.PP
|
||||
The initial size of the global data area is determined at assembly time.
|
||||
Global data is allocated by several
|
||||
pseudoinstructions in the EM assembly
|
||||
language.
|
||||
Each pseudoinstruction allocates one or more bytes.
|
||||
The bytes allocated for a single pseudo form
|
||||
a 'block'.
|
||||
A block differs from a fragment, because,
|
||||
under certain conditions, several blocks are allocated
|
||||
in a single fragment.
|
||||
This guarantees that the bytes of these blocks
|
||||
are consecutive.
|
||||
.PP
|
||||
Global data is addressed absolutely in binary
|
||||
machine language.
|
||||
Most compilers, however,
|
||||
cannot assign absolute addresses to their global variables,
|
||||
especially not if the language
|
||||
allows programs to be composed of several separately compiled modules.
|
||||
The assembly language therefore allows the compiler to name
|
||||
the first address of a global data block with an alphanumeric label.
|
||||
Moreover, the only way to address such a named global data block
|
||||
in the assembly language is by using its name.
|
||||
It is the task of the assembler/loader to
|
||||
translate these labels into absolute addresses.
|
||||
These labels may also be used
|
||||
in CON and ROM pseudoinstructions to initialize pointers.
|
||||
.PP
|
||||
The pseudoinstruction CON allocates initialized data.
|
||||
ROM acts like CON but indicates that the initialized data will
|
||||
not change during execution of the program.
|
||||
The pseudoinstruction BSS allocates a block of uninitialized
|
||||
or identically initialized
|
||||
data.
|
||||
The pseudoinstruction HOL is similar to BSS,
|
||||
but it alters the meaning of subsequent absolute addressing in
|
||||
the assembly language.
|
||||
.PP
|
||||
Another type of global data is a small block,
|
||||
called the ABS block, with an implementation defined size.
|
||||
Storage in this type of block can only be addressed
|
||||
absolutely in assembly language.
|
||||
The first word has address 0 and is used to maintain the
|
||||
source line number.
|
||||
Special instructions LIN and LNI are provided to
|
||||
update this counter.
|
||||
A pointer at location 4 points to a string containing the
|
||||
current source file name.
|
||||
The instruction FIL can be used to update the pointer.
|
||||
.PP
|
||||
All numeric arguments of the instructions that address
|
||||
the global data area refer to locations in the
|
||||
ABS block unless
|
||||
they are preceded by at least one HOL pseudo in the same
|
||||
module,
|
||||
in which case they refer to the storage area allocated by the
|
||||
last HOL pseudoinstruction.
|
||||
Thus LOE 0 loads the zeroth word of the most recent HOL, unless no HOL has
|
||||
appeared in the current file so
|
||||
far, in which case it loads the zeroth word of the
|
||||
ABS fragment.
|
||||
.PP
|
||||
The global data area is highly fragmented.
|
||||
The ABS block and each HOL and BSS block are separate fragments.
|
||||
The way fragments are formed from CON and ROM blocks is more complex.
|
||||
The assemblers group several blocks into a single fragment.
|
||||
A fragment only contains blocks of the same type: CON or ROM.
|
||||
It is guaranteed that the bytes allocated for two consecutive CON pseudos are
|
||||
allocated consecutively in a single fragment, unless
|
||||
these CON pseudos are separated in the assembly language program
|
||||
by a data label definition or one or more of the following pseudos:
|
||||
.DS
|
||||
ROM, BSS, HOL and END
|
||||
.DE
|
||||
An analogous rule holds for ROM pseudos.
|
||||
.P2 "Local data area"
|
||||
.PP
|
||||
The local data area consists of a sequence of frames, one for
|
||||
each active procedure.
|
||||
Below the frame of the current procedure resides the
|
||||
expression stack.
|
||||
Frames are generated by procedure calls and are
|
||||
removed by procedure returns.
|
||||
A procedure frame consists of six 'zones':
|
||||
.DS
|
||||
1. The return status block
|
||||
2. The local variables and compiler temporaries
|
||||
3. The register save block
|
||||
4. The dynamic local generators
|
||||
5. The operand stack.
|
||||
6. The parameters of a procedure one level deeper
|
||||
.DE
|
||||
A sample frame is shown in Figure 1.
|
||||
.PP
|
||||
Before a procedure call is performed the actual
|
||||
parameters are pushed onto the stack of the calling procedure.
|
||||
The exact details are compiler dependent.
|
||||
EM allows procedures to be called with a variable number of
|
||||
parameters.
|
||||
The implementation of the C-language almost forces its runtime
|
||||
system to push the parameters in reverse order, that is,
|
||||
the first positional parameter last.
|
||||
Most compilers use the C calling convention to be compatible.
|
||||
The parameters of a procedure belong to the frame of the
|
||||
calling procedure.
|
||||
Note that the evaluation of the actual parameters may imply
|
||||
the calling of procedures.
|
||||
The parameters can be accessed with certain instructions using
|
||||
offsets of 0 and greater.
|
||||
The first byte of the last parameter pushed has offset 0.
|
||||
Note that the parameter at offset 0 has a special use in the
|
||||
instructions following the static chain (LXL and LXA).
|
||||
These instructions assume that this parameter contains the LB of
|
||||
the statically enclosing procedure.
|
||||
Procedures that do not have a dynamically enclosing procedure
|
||||
do not need a static link at offset 0.
|
||||
.PP
|
||||
Two instructions are available to perform procedure calls, CAL
|
||||
and CAI.
|
||||
Several tasks are performed by these call instructions.
|
||||
.QQ
|
||||
First, a part of the status of the calling procedure is
|
||||
saved on the stack in the return status block.
|
||||
This block should contain the return address of the calling
|
||||
procedure, its LB and other implementation dependent data.
|
||||
The size of this block is fixed for any given implementation
|
||||
because the lexical instructions LPB, LXL and LXA must be able to
|
||||
obtain the base addresses of the procedure parameters \fBand\fP local
|
||||
variables.
|
||||
An alternative solution can be used on machines with a highly
|
||||
segmented address space.
|
||||
The stack frames need not be contiguous then and the first
|
||||
status save area can contain the parameter base AB,
|
||||
which has the value of SP just after the last parameter has
|
||||
been pushed.
|
||||
.QQ
|
||||
Second, the LB is changed to point to the
|
||||
first word above the local variables.
|
||||
The new LB is a copy of the SP after the return status
|
||||
block has been pushed.
|
||||
.QQ
|
||||
Third, the amount of local storage needed by the procedure is
|
||||
reserved.
|
||||
The parameters and local storage are accessed by the same instructions.
|
||||
Negative offsets are used for access to local variables.
|
||||
The highest byte, that is the byte nearest
|
||||
to LB, has to be accessed with offset \-1.
|
||||
The pseudoinstruction specifying the entry point of a
|
||||
procedure, has an argument that specifies the amount of local
|
||||
storage needed.
|
||||
The local variables allocated by the CAI or CAL instructions
|
||||
are the only ones that can be accessed with a fixed negative offset.
|
||||
The initial value of the allocated words is
|
||||
not defined, but implementations that check for undefined
|
||||
values will probably initialize them with a
|
||||
special 'undefined' pattern, typically \-32768.
|
||||
.QQ
|
||||
Fourth, any EM implementation is allowed to reserve a variable size
|
||||
block beneath the local variables.
|
||||
This block could, for example, be used to save a variable number
|
||||
of registers.
|
||||
.QQ
|
||||
Finally, the address of the entry point of the called procedure
|
||||
is loaded into the Program Counter.
|
||||
.PP
|
||||
The ASP instruction can be used to allocate further (dynamic)
|
||||
local storage.
|
||||
The base address of such storage must be obtained with a LOR~SP
|
||||
instruction.
|
||||
This same instruction ASP may also be used
|
||||
to remove some words from the stack.
|
||||
.PP
|
||||
There is a version of ASP, called ASS, which fetches the number
|
||||
of bytes to allocate from the stack.
|
||||
It can be used to allocate space for local
|
||||
objects whose size is unknown at compile time,
|
||||
so called 'dynamic local generators'.
|
||||
.PP
|
||||
Control is returned to the calling procedure with a RET instruction.
|
||||
Any return value is then copied to the 'function return area'.
|
||||
The frame created by the call is deallocated and the status of
|
||||
the calling procedure is restored.
|
||||
The value of SP just after the return value has been popped must
|
||||
be the same as the
|
||||
value of SP just before executing the first instruction of this
|
||||
invocation.
|
||||
This means that when a RET is executed the operand stack can
|
||||
only contain the return value and all dynamically generated locals must be
|
||||
deallocated.
|
||||
Violating this restriction might result in hard to detect
|
||||
errors.
|
||||
The calling procedure has to remove the parameters from the stack.
|
||||
This can be done with the aforementioned ASP instruction.
|
||||
.PP
|
||||
Each procedure frame is a separate fragment.
|
||||
Because any fragment may be placed anywhere in memory,
|
||||
procedure frames need not be contiguous.
|
||||
.Dr 47
|
||||
|===============================|
|
||||
| actual parameter n-1 |
|
||||
|-------------------------------|
|
||||
| . |
|
||||
| . |
|
||||
| . |
|
||||
|-------------------------------|
|
||||
| actual parameter 0 | ( <\- AB )
|
||||
|===============================|
|
||||
|
||||
|
||||
|===============================|
|
||||
|///////////////////////////////|
|
||||
|///// return status block /////|
|
||||
|///////////////////////////////| <\- LB
|
||||
|===============================|
|
||||
| |
|
||||
| local variables |
|
||||
| |
|
||||
|-------------------------------|
|
||||
| |
|
||||
| compiler temporaries |
|
||||
| |
|
||||
|===============================|
|
||||
|///////////////////////////////|
|
||||
|///// register save block /////|
|
||||
|///////////////////////////////|
|
||||
|===============================|
|
||||
| |
|
||||
| dynamic local generators |
|
||||
| |
|
||||
|===============================|
|
||||
| operand |
|
||||
|-------------------------------|
|
||||
| operand |
|
||||
|===============================|
|
||||
| parameter m-1 |
|
||||
|-------------------------------|
|
||||
| . |
|
||||
| . |
|
||||
| . |
|
||||
|-------------------------------|
|
||||
| parameter 0 | <\- SP
|
||||
|===============================|
|
||||
.Df
|
||||
Figure 1. A sample procedure frame and parameters.
|
||||
.De
|
||||
.P2 "Heap data area"
|
||||
.PP
|
||||
The heap area starts empty, with HP
|
||||
pointing to the low end of it.
|
||||
HP always contains a word address.
|
||||
A copy of HP can always be obtained with the LOR instruction.
|
||||
A new value may be stored in the heap pointer using the STR instruction.
|
||||
If the new value is greater than the old one,
|
||||
then the heap grows.
|
||||
If it is smaller, then the heap shrinks.
|
||||
HP may never point below its original value.
|
||||
All words between the current HP and the original HP
|
||||
are allocated to the heap.
|
||||
The heap may not grow into a part of memory that is already allocated.
|
||||
When this is attempted, the STR instruction will cause a trap to occur.
|
||||
In this case, HP retains its old value.
|
||||
.PP
|
||||
The only way to address the heap is indirectly.
|
||||
Whenever an object is allocated by increasing HP,
|
||||
then the old HP value must be saved and can be used later to address
|
||||
the allocated object.
|
||||
If, in the meantime, HP is decreased so that the object
|
||||
is no longer part of the heap, then an attempt to access
|
||||
the object is not allowed.
|
||||
Furthermore, if the heap pointer is increased again to above
|
||||
the object address, then access to the old object gives undefined results.
|
||||
.PP
|
||||
The heap is a single fragment.
|
||||
All bytes have consecutive addresses.
|
||||
No limits are imposed on the size of the heap as long as it fits
|
||||
in the available data address space.
|
||||
1678
doc/em/em.i
Normal file
1678
doc/em/em.i
Normal file
File diff suppressed because it is too large
Load Diff
193
doc/em/env.nr
Normal file
193
doc/em/env.nr
Normal file
@@ -0,0 +1,193 @@
|
||||
.bp
|
||||
.P1 "ENVIRONMENT INTERACTIONS"
|
||||
.PP
|
||||
EM programs can interact with their environment in three ways.
|
||||
Two, starting/stopping and monitor calls, are dealt with in this chapter.
|
||||
The remaining way to interact, interrupts, will be treated
|
||||
together with traps in chapter 9.
|
||||
.P2 "Program starting and stopping"
|
||||
.PP
|
||||
EM user programs start with a call to a procedure called
|
||||
_m_a_i_n.
|
||||
The assembler and backends look for the definition of a procedure
|
||||
with this name in their input.
|
||||
The call passes three parameters to the procedure.
|
||||
The parameters are similar to the parameters supplied by the
|
||||
.UX
|
||||
operating system to C programs.
|
||||
These parameters are often called \fBargc\fP, \fBargv\fP and \fBenvp\fP.
|
||||
Argc is the parameter nearest to LB and is a wordsized integer.
|
||||
The other two are pointers to the first element of an array of
|
||||
string pointers.
|
||||
The \fBargv\fP array contains \fBargc\fP
|
||||
strings, the first of which contains the program call name.
|
||||
The other strings in the \fBargv\fP
|
||||
array are the program parameters.
|
||||
.PP
|
||||
The \fBenvp\fP
|
||||
array contains strings in the form "name=string", where 'name'
|
||||
is the name of an environment variable and string its value.
|
||||
The \fBenvp\fP
|
||||
is terminated by a zero pointer.
|
||||
.PP
|
||||
An EM user program stops if the program returns from the first
|
||||
invocation of _m_a_i_n.
|
||||
The contents of the function return area are used to procure a
|
||||
wordsized program return code.
|
||||
EM programs also stop when traps and interrupts occur that are
|
||||
not caught and when the exit monitor call is executed.
|
||||
.P2 "Input/Output and other monitor calls"
|
||||
.PP
|
||||
EM differs from most conventional machines in that it has high level i/o
|
||||
instructions.
|
||||
Typical instructions are OPEN FILE and READ FROM FILE instead
|
||||
of low level instructions such as setting and clearing
|
||||
bits in device registers.
|
||||
By providing such high level i/o primitives, the task of implementing
|
||||
EM on various non EM machines is made considerably easier.
|
||||
.PP
|
||||
I/O is initiated by the MON instruction, which expects an iocode on top
|
||||
of the stack.
|
||||
Often there are also parameters which are pushed on the
|
||||
stack in reverse order, that is: last
|
||||
parameter first.
|
||||
Some i/o functions also provide results, which are returned on the stack.
|
||||
In the list of monitor calls we use several types of parameters and results,
|
||||
these types consist of integers and unsigneds of varying sizes, but never
|
||||
smaller than the wordsize, and the two pointer types.
|
||||
.LP
|
||||
The names of the types used are:
|
||||
.DS
|
||||
.TS
|
||||
tab(:);
|
||||
l l.
|
||||
int:an integer of wordsize
|
||||
int2:an integer whose size is the maximum of the wordsize and 2 bytes
|
||||
int4:an integer whose size is the maximum of the wordsize and 4 bytes
|
||||
intp:an integer with the size of a pointer
|
||||
uns2:an unsigned integer whose size is the maximum of the wordsize and 2
|
||||
unsp:an unsigned integer with the size of a pointer
|
||||
ptr:a pointer into data space
|
||||
.TE
|
||||
.DE
|
||||
.LP
|
||||
The table below lists the i/o codes with their results and
|
||||
parameters.
|
||||
This list is similar to the system calls of the UNIX Version 7
|
||||
operating system.
|
||||
.QQ
|
||||
To execute a monitor call, proceed as follows:
|
||||
.IP a)
|
||||
Stack the parameters, in reverse order, last parameter first.
|
||||
.IP b)
|
||||
Push the monitor call number (iocode) onto the stack.
|
||||
.IP c)
|
||||
Execute the MON instruction.
|
||||
.LP
|
||||
An error code is present on the top of the stack after
|
||||
execution of most monitor calls.
|
||||
If this error code is zero, the call performed the action
|
||||
requested and the results are available on top of the stack.
|
||||
Non-zero error codes indicate a failure, in this case no
|
||||
results are available and the error code has been pushed twice.
|
||||
This construction enables programs to test for failure with a
|
||||
single instruction (~TEQ or TNE~) and still find out the cause of
|
||||
the failure.
|
||||
The result name 'e' is reserved for the error code.
|
||||
.ne 5
|
||||
.LP
|
||||
List of monitor calls.
|
||||
.LP
|
||||
.nf
|
||||
.na
|
||||
.ta 4n 13n 29n 52n
|
||||
nr name parameters results function
|
||||
|
||||
1 Exit status:int Terminate this process
|
||||
2 Fork e,flag,pid:int Spawn new process
|
||||
3 Read fildes:int;buf:ptr;nbytes:unsp
|
||||
e:int;rbytes:unsp Read from file
|
||||
4 Write fildes:int;buf:ptr;nbytes:unsp
|
||||
e:int;wbytes:unsp Write on a file
|
||||
5 Open string:ptr;flag:int
|
||||
e,fildes:int Open file for read and/or write
|
||||
6 Close fildes:int e:int Close a file
|
||||
7 Wait e:int;status,pid:int2
|
||||
Wait for child
|
||||
8 Creat string:ptr;mode:int
|
||||
e,fildes:int Create a new file
|
||||
9 Link string1,string2:ptr
|
||||
e:int Link to a file
|
||||
10 Unlink string:ptr e:int Remove directory entry
|
||||
12 Chdir string:ptr e:int Change default directory
|
||||
14 Mknod string:ptr;mode,addr:int2
|
||||
e:int Make a special file
|
||||
15 Chmod string:ptr;mode:int2
|
||||
e:int Change mode of file
|
||||
16 Chown string:ptr;owner,group:int2
|
||||
e:int Change owner/group of a file
|
||||
18 Stat string,statbuf:ptr
|
||||
e:int Get file status
|
||||
19 Lseek fildes:int;off:int4;whence:int
|
||||
e:int;oldoff:int4 Move read/write pointer
|
||||
20 Getpid pid:int2 Get process identification
|
||||
21 Mount special,string:ptr;rwflag:int
|
||||
e:int Mount file system
|
||||
22 Umount special:ptr e:int Unmount file system
|
||||
23 Setuid userid:int2 e:int Set user ID
|
||||
24 Getuid e_uid,r_uid:int2 Get user ID
|
||||
25 Stime time:int4 e:int Set time and date
|
||||
26 Ptrace request:int;pid:int2;addr:ptr;data:int
|
||||
e,value:int Process trace
|
||||
27 Alarm seconds:uns2 previous:uns2 Schedule signal
|
||||
28 Fstat fildes:int;statbuf:ptr
|
||||
e:int Get file status
|
||||
29 Pause Stop until signal
|
||||
30 Utime string,timep:ptr
|
||||
e:int Set file times
|
||||
33 Access string:ptr;mode:int
|
||||
e:int Determine file accessibility
|
||||
34 Nice incr:int Set program priority
|
||||
35 Ftime bufp:ptr e:int Get date and time
|
||||
36 Sync Update filesystem
|
||||
37 Kill pid:int2;sig:int
|
||||
e:int Send signal to a process
|
||||
41 Dup fildes,newfildes:int
|
||||
e,fildes:int Duplicate a file descriptor
|
||||
42 Pipe e,w_des,r_des:int Create a pipe
|
||||
43 Times buffer:ptr Get process times
|
||||
44 Profil buff:ptr;bufsiz,offset,scale:intp
|
||||
Execution time profile
|
||||
46 Setgid gid:int2 e:int Set group ID
|
||||
47 Getgid e_gid,r_gid:int Get group ID
|
||||
48 Sigtrp trapno,signo:int
|
||||
e,prevtrap:int See below
|
||||
51 Acct file:ptr e:int Turn accounting on or off
|
||||
53 Lock flag:int e:int Lock a process
|
||||
54 Ioctl fildes,request:int;argp:ptr
|
||||
e:int Control device
|
||||
56 Mpxcall cmd:int;vec:ptr e:int Multiplexed file handling
|
||||
59 Exece name,argv,envp:ptr
|
||||
e:int Execute a file
|
||||
60 Umask mask:int2 oldmask:int2 Set file creation mode mask
|
||||
61 Chroot string:ptr e:int Change root directory
|
||||
.fi
|
||||
.ad
|
||||
.LP
|
||||
Codes 0, 11, 13, 17, 31, 32, 38, 39, 40, 45, 49, 50, 52,
|
||||
55, 57, 58, 62, and 63 are
|
||||
not used.
|
||||
.PP
|
||||
All monitor calls, except fork and sigtrp
|
||||
are the same as the UNIX version 7 system calls.
|
||||
.PP
|
||||
The sigtrp entry maps UNIX signals onto EM interrupts.
|
||||
Normally, trapno is in the range 0 to 252.
|
||||
In that case it requests that signal signo
|
||||
will cause trap trapno to occur.
|
||||
When given trap number \-2, default signal handling is reset, and when given
|
||||
trap number \-3, the signal is ignored.
|
||||
.PP
|
||||
The flag returned by fork is 1 in the child process and 0 in
|
||||
the parent.
|
||||
The pid returned is the process-id of the other process.
|
||||
9
doc/em/even.c
Normal file
9
doc/em/even.c
Normal file
@@ -0,0 +1,9 @@
|
||||
main() {
|
||||
register int l,j ;
|
||||
|
||||
for ( j=0 ; (l=getchar()) != -1 ; j++ ) {
|
||||
if ( j%16 == 15 ) printf("%3d\n",l&0377 ) ;
|
||||
else printf("%3d ",l&0377 ) ;
|
||||
}
|
||||
printf("\n") ;
|
||||
}
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user