Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Awesome Python based MAlice Compiler

Fetching latest commit…

Cannot retrieve the latest commit at this time

Failed to load latest commit information.
milestone2
ply
.gitignore
ASTNodes.py
Makefile
README.pdf
README.tex
__init__.py
codeGenerator.py
grammarExceptions.py
intermediateNodes.py
main.py
semanticAnalysis.py
spec-261-5-0.pdf
spec-261-7-0.pdf
test.sh
testResults.py
tokRules.py
yaccConfig.py

README.tex

\documentclass[a4wide, 11pt]{article}
\usepackage{a4, fullpage}
\setlength{\parskip}{0.3cm}
\setlength{\parindent}{0cm}
\usepackage[T1]{fontenc}
\usepackage{longtable}
\setlength\LTleft\parindent
\setlength\LTright\fill

% This is the preamble section where you can include extra packages etc.

\begin{document}

\title{MAlice Compiler}

\author{Sarah Tattersall \and Peter Hamilton}

\date{\today}         % inserts today's date

\maketitle            % generates the title from the data above

\pagebreak

\section{Introduction}
MAlice is an imperative language, inspired by Lewis Carroll's book `Alice's Adventures in Wonderland'.
\\\\
The syntax of MAlice is based upon events and dialogue which occur throughout the book and loosely follows English prose. The following document outlines our implementation of MAlice and why we made some of our design decisions.

\section{Handling Arithmetic Overflow}
In the MAlice code examples, there are some issues with the 32 bit architecture when you handle arithmetic operations involving the MAX and MIN integers for the architecture. These appear to be caught at compile time (using the sample compiler) in order to output error messages.
\\\\
We have programmed MAlice for a 64 bit environment and so these examples actually run fine, however a similar behaviour is encountered if you use the maximum and minimum numbers for a 64 bit architecture, we kept the way MAlice handles the issues but just extended them to the bounds of a 64 bit architecture.

\section{Handling Register Allocation}

\subsection{Dealing With Register Overflow}
This was a particularly difficult issue owing to the fact that pushing and popping registers from the stack at the right time to ensure there were no conflicts and that all variables would be available when needed was not a trivial task.
\\\\
Therefore the way we dealt with register overflow was that any registers which would overflow were put into memory. We then added these memory addresses to the register map so they could be used in place of normal registers whilst keeping our code for translating intermediate code the same.
\\\\
We had to be slightly careful since for instructions like mov you cannot move an immediate value into a memory address, you have to move it into a register first. As a result, generating the code for the intermediate nodes also takes this into account.                                                                        

\section{Optimisations}

\subsection{Removing Un-necessary Includes}
To reduce the size of the assembly file where possible, we used some logical statements and flags to decide whether to include certain sections of code. These include the 'extern printf' statement, whether we need the statements for formatting integers and characters and the '.bss' section for variable definitions.

\subsection{Temporary Registers and Graph Colouring}
To assist with register allocation we used used temporary registers to work out a worst case scenario for how many individual registers we would need. We then used graph colouring to go through the temporary registers and calculate which ones could be replaced by the same real registers (or memory locations in the case of overflow).
\\\\
This greatly reduced the number needed in the generated assembly code. To perform the calculations we worked out the live ranges for the variables used in the source code and from there worked out when and where they could share registers.

\subsection{Smart `mov' Instructions}
When the intermediate code is generated, some instructions result in mov instructions going from a register to itself, to get around this we added a logical statement to our mov node which will return no instruction if it would have otherwise resulted in a pointless mov instruction.

\section{Coding Style}
\subsection{Functions Within Functions}
In some instances we placed functions within other functions to make them 'private'. For example in code\_generator, we don't really want to be able to call solveDataFlow() by itself, only ever as part of the generate function. As a result, if a parent function depends particularly on several other functions which are unused anywhere else, we nest them.

\subsection{Object Orientation}
We have put similar code and functionality together in classes where possible and throughout our code we have endeavoured to apply an object oriented programming style.
\\
For example, in generating the code, everything takes place inside a CodeGenerator class which reduces the variables we have to pass around, making our code cleaner, more readable and more maintainable.
\\
\subsubsection{ASTNodes and INodes}
For example, in parsing and translating malice programs we have used tree structures built upon different node types. Initially the program is loaded into and ASTNode (Abstract Syntax Tree Node) tree, then this is translates into a generic INode tree (Intermediate Node).

\end{document}


















​
Something went wrong with that request. Please try again.