- Static single assignment form
compilerdesign, static single assignment form (often abbreviated as SSA form or SSA) is an intermediate representation(IR) in which every variable is assigned exactly once. Existing variables in the original IR are split into "versions", new variables typically indicated by the original name with a subscript, so that every definition gets its own version. In SSA form, use-def chains are explicit and each contains a single element.
SSA was developed by
Ron Cytron, Jeanne Ferrante, Barry Rosen, Mark Wegman, and Ken Zadeck, researchers at IBM in the 1980s.
functional languagecompilers, such as those for Scheme, ML and Haskell, continuation passing style(CPS) is generally used where one might expect to find SSA in a compiler for Fortranor C. SSA and CPS are formally equivalent, so optimizations and transformations formulated in terms of one immediately apply to the other.
The primary usefulness of SSA comes from how it simultaneously simplifies and improves the results of a variety of
compiler optimizations, by simplifying the properties of variables. For example, consider this piece of code:
y := 1 y := 2 x := y
As humans, we can see that the first assignment is not necessary, and that the value of
ybeing used in the third line comes from the second assignment of
y. A program would have to perform reaching definition analysis to determine this. But if the program is in SSA form, both of these are immediate:
y1 := 1 y2 := 2 x1 := y2
Compiler optimizationalgorithms which are either enabled or strongly enhanced by the use of SSA include:
sparse conditional constant propagation
dead code elimination
global value numbering
partial redundancy elimination
Converting to SSA
Converting ordinary code into SSA form is primarily a simple matter of replacing the target of each assignment with a new variable, and replacing each use of a variable with the "version" of the variable reaching that point. For example, consider the following
control flow graph:
Notice that we could change the name on the left side of "x x - 3", and change the following uses of x to use that new name, and the program would still do the same thing. We exploit this in SSA by creating two new variables, x1 and x2, each of which is assigned only once. We likewise give distinguishing subscripts to all the other variables, and we get this:
We've figured out which definition each use is referring to, except for one thing: the uses of y in the bottom block could be referring to "either" y1 or y2, depending on which way the control flow came from. So how do we know which one to use?
The answer is that we add a special statement, called a "Φ (Phi) function", to the beginning of the last block. This statement will generate a new definition of y, y3, by "choosing" either y1 or y2, depending on which arrow control arrived from:
Now, the uses of y in the last block can simply use y3, and they'll obtain the correct value either way. You might ask at this point, do we need to add a Φ function for x too? The answer is no; only one version of x, namely x2 is reaching this place, so there's no problem.
A more general question along the same lines is, given an arbitrary control flow graph, how can I tell where to insert Φ functions, and for what variables? This is a difficult question, but one that has an efficient solution that can be computed using a concept called "dominance frontiers".
Note: the Φ functions are not actually implemented; instead, they're just markers for the compiler to place the value of all the variables, which are grouped together by the Φ function, in the same location in memory (or same register).
Computing minimal SSA using dominance frontiers
First, we need the concept of a "dominator": we say that a node A "strictly dominates" a different node B in the control flow graph if it's impossible to reach B without passing through A first. This is useful, because if we ever reach B we know that any code in A has run. We say that A "dominates" B if either A strictly dominates B or A = B.
Now we can define the "dominance frontier": a node B is in the dominance frontier of a node A if A does "not" strictly dominate B, but does dominate some immediate predecessor of B (possibly A itself if A is the immediate predecessor of B). From A's point of view, these are the nodes at which other control paths, which don't go through A, make their earliest appearance.
Dominance frontiers capture the precise places at which we need Φ functions: if the node A defines a certain variable, then that definition and that definition alone (or redefinitions) will reach every node A dominates. Only when we leave these nodes and enter the dominance frontier must we account for other flows bringing in other definitions of the same variable. Moreover, no other Φ functions are needed in the control flow graph to deal with A's definitions, and we can do with no less.
One algorithm for computing the dominance frontier set is:
for each node b if the number of predecessors of b ≥ 2 for each p in predecessors of b runner := p while runner ≠ idom(b) add b to runner’s dominance frontier set runner := idom(runner)
Note: in the code above, a predecessor of node n is any node from which control is transferred to node n, and idom(n) is the immediate dominator of node n.
There is an efficient algorithm for finding dominance frontiers of each node. This algorithm was originally described in the paper "Efficiently computing static single assignment form and the control dependence graph", by R. Cytron, J. Ferrante, B. Rosen, M. Wegman and F. Zadeck, "ACM Trans. on Programming Languages and Systems" 13(4) 1991 pp.451–490. Also useful is chapter 19 of the book "Modern compiler implementation in Java" by Andrew Appel (Cambridge University Press, 2002). See the paper for more details.
Keith D. Cooper, Timothy J. Harvey, and Ken Kennedy of
Rice Universitydescribe an algorithm in their paper titled [http://www.hipersoft.rice.edu/grads/publications/dom14.pdf "A Simple, Fast Dominance Algorithm"] . The algorithm uses well engineered data structures to improve performance.
Variations that reduce the number of Φ functions
"Minimal" SSA inserts the minimal number of Φ functions required to ensure that each name is assigned a value exactly once and that each reference (use) of a name in the original program can still refer to a unique name. (The latter requirementis needed to ensure that the compiler can write down a name for each operand in each operation.)
However, some of these Φ functions could be "dead". For this reason, minimal SSA does not necessarily produce the fewest number of Φ functions that are needed by a specific procedure. For some types of analysis, these Φ functions are superfluous and can cause the analysis to run less efficiently.
Pruned SSA form is based on a simple observation: Φ functions are only needed for variables that are "live" after the Φ function.(Here, "live" means that the value is used along some path that begins at the Φ function in question.) If a variable is not live,the result of the Φ function cannot be used and the assignment by the Φ function is dead.
Construction of pruned SSA form uses live variable information in the Φ function insertion phase to decide whether a given Φ function is needed. If the original variable name isn't live at the Φ function insertion point, the Φ function isn't inserted.
Another possibility is to treat pruning as a
dead code eliminationproblem. Then, a Φ function is live only if any use in the input program will be rewritten to it, or if it will be used as an argument in another Φ function. When entering SSA form, each use is rewritten to the nearest definition that dominates it. A Φ function will then be considered live as long as it is the nearest definition that dominates at least one use, or at least one argument of a live Φ.
Semi-pruned SSA form [Practical Improvements to the Construction and Destruction of Static Single Assignment Form (1998), Preston Briggs, Keith D. Cooper, Timothy J. Harvey, L. Taylor Simpson.] is an attempt to reduce the number of Φ functions without incurring the relatively high cost of computing live variable information. It is based on the following observation: if a variable is never live upon entry into a basic block, it never needs a Φ function. During SSA construction, Φ functions for any "block-local" variables are omitted.
Computing the set of block-local variables is a simpler and faster procedure than full live variable analysis, making semi-pruned SSA form more efficient to compute than pruned SSA form. On the other hand, pruned SSA form will contain fewer unnecessary Φ functions.
Converting out of SSA form
As SSA form is no longer useful for direct execution, it is frequently used "on top of" another IR with which it remains in direct correspondence. This can be accomplished by "constructing" SSA as a set of functions which map between parts of the existing IR (basic blocks, instructions, operands, "etc.") and its SSA counterpart. When the SSA form is no longer needed, these mapping functions may be discarded, leaving only the now-optimized IR.
Performing optimizations on SSA form usually leads to entangled SSA-Webs, meaning there are phi instructions whose operands do not all have the same root operand. In such cases color-out algorithms are used to come out of SSA. Naive algorithms introduce a copy along each predecessor path which caused a source of different root symbol to be put in phi than the destination of phi. There are multiple algorithms for coming out of SSA with fewer copies, most use interference graphs or some approximation of it to do copy coalescing.
Extensions to SSA form can be divided into two categories.
"Renaming scheme" extensions alter the renaming criterion. Recall that SSA form renames each variable when it is assigned a value. Alternative schemes include static single use form (which renames each variable at each statement when it is used) and static single information form (which renames each variable when it is assigned a value, and in each conditional context in which that variable is used).
"Feature-specific" extensions retain the single assignment property for variables, but incorporate new semantics to model additional features. Some feature-specific extensions model high-level programming language features like arrays, objects and aliased pointers. Other feature-specific extensions model low-level architectural features like speculation and predication.
Compilers using SSA form
SSA form is a relatively recent development in the compiler community. As such, many older compilers only use SSA form for some part of the compilation or optimization process, but most do not rely on it. Examples of compilers that rely heavily on SSA form include:
Oberon-2compiler was one of the first public projects to incorporate "GSA", a variant of SSA.
LLVMCompiler Infrastructure uses SSA form for all scalar register values (everything except memory) in its primary code representation. SSA form is only eliminated once register allocation occurs, late in the compile process (often at link time).
*The open source SGI compiler [http://ipf-orc.sourceforge.net/ ORC] uses SSA form in its global scalar optimizer, though the code is brought into SSA form before and taken out of SSA form afterwards. ORC uses extensions to SSA form to represent memory in SSA form as well as scalar values.
*As of version 4 (released in April 2005) GCC, the
GNU Compiler Collection, makes extensive use of SSA. The frontends generate GENERICcode which is then converted into SSA form by the " gimplifier" and optimized by the " middle-end". The backendeventually translates the optimized intermediate code into RTL, executes some more low-level optimizations and finally turns RTL into assembly language.
IBM's open source adaptive Java virtual machine, JikesRVM, uses extended Array SSA, an extension of SSA that allows analysis of scalars, arrays, and object fields in a unified framework. Extended Array SSA analysis is only enabled at the maximum optimization level, which is applied to the most frequently executed portions of code.
*In 2002, [http://citeseer.ist.psu.edu/721276.html researchers modified] IBM's JikesRVM (named Jalapeño at the time) to run both standard Java
byte-codeand a typesafe SSA ( SafeTSA) byte-code class files, and demonstrated significant performance benefits to using the SSA byte-code.
Sun Microsystems' Java HotSpot Virtual Machineuses an SSA-based intermediate language in its JIT compiler.
* [http://www.mono-project.com/Main_Page Mono] uses SSA in its JIT compiler called Mini.
* [http://jackcc.sf.net jackcc] is an open-source compiler for the academic instruction set Jackal 3.0. It uses a simple 3-operand code with SSA for its intermediate representation. As an interesting variant, it replaces Φ functions with a so-called SAME instruction, which instructs the register allocator to place the two live ranges into the same physical register.
*Although not a compiler, the [http://boomerang.sourceforge.net/ Boomerang]
decompileruses SSA form in its internal representation. SSA is used to simplify expression propagation, identifying parameters and returns, preservation analysis, and more.
* [http://www.dotgnu.org Portable.NET] uses SSA in its JIT compiler.
* [http://www.info.uni-karlsruhe.de/software/libfirm libFirm] a completely graph based SSA intermediate representation for compilers. libFirm uses SSA form for all scalar register values until code generation by use of a SSA-aware register allocator.
*The Illinois Concert Compiler circa 1994 [http://www-csag.ucsd.edu/projects/concert.html] used a variant of SSA called SSU (Static Single Use) which renames each variable when it is assigned a value, and in each conditional context in which that variable is used; essentially the static single information form mentioned above. The SSU form is documented in [http://www-csag.ucsd.edu/papers/jplevyak-thesis.ps John Plevyak's Ph.D Thesis] .
*cite book | author=Appel, Andrew W. | title=Modern Compiler Implementation in ML | publisher=Cambridge University Press | year=1999 | id=ISBN 0-521-58274-1 Also available in Java (ISBN 0-521-82060-X 2002) and C (ISBN 0-521-60765-5, 199 8) versions.
*cite book | author=Cooper, Keith D.; & Torczon, Linda. | title=Engineering a Compiler | publisher=Morgan Kaufmann | year=2003 | id=ISBN 1-55860-698-X
*cite book | author=Muchnick, Steven S. | title=Advanced Compiler Design and Implementation | publisher=Morgan Kaufmann | year=1997 | id=ISBN 1-55860-320-4
*Steven Bosscher and Diego Novillo. [http://lwn.net/Articles/84888/ GCC gets a new Optimizer Framework] . An article about GCC's use of SSA and how it improves over older IRs.
* [http://www.cs.man.ac.uk/~jsinger/ssa.html The SSA Bibliography] . Extensive catalogue of SSA research papers.
Wikimedia Foundation. 2010.
См. также в других словарях:
Static single assignment form — En compilation, Static single assignement form (abrégé en SSA) est une représentation intermédiaire (abrégé RI) du code source d un programme dont la particularité est de ne permettre à une variable d être affectée qu une et une seule fois. Les… … Wikipédia en Français
Static Single Assignment — Zwischencode ist Code, der im Verlauf eines Übersetzungsprozesses auf einer Abstraktionsebene zwischen der höheren Ausgangssprache und der in der Regel maschinennahen Zielsprache generiert wird. Es handelt sich in erster Linie um einen im… … Deutsch Wikipedia
Single assignment — is used to describe a programming language or representation in which one cannot bind a value to a name if a value has already been bound to that name. In other words, a variable is initialized with (i.e. bound to) a value at the time that it is… … Wikipedia
Assignment (computer science) — In computer programming, an assignment statement sets or re sets the value stored in the storage location(s) denoted by a variable name. In most imperative computer programming languages, assignment statements are one of the basic statements.… … Wikipedia
Definite assignment analysis — In computer science, definite assignment analysis is a data flow analysis used by compilers to conservatively ensure that a variable or location is always assigned to before it is used. Contents 1 Motivation 2 Terminology 3 The analysis … Wikipedia
Use-define chain — A Use Definition Chain (UD Chain) is a data structure that consists of a use, U, of a variable, and all the definitions, D, of that variable that can reach that use without any other intervening definitions. A definition can have many forms, but… … Wikipedia
Continuation-passing style — In functional programming, continuation passing style (CPS) is a style of programming in which control is passed explicitly in the form of a continuation. Gerald Jay Sussman and Guy L. Steele, Jr. coined the phrase in AI Memo 349 (1975), which… … Wikipedia
Dead code elimination — In compiler theory, dead code elimination is a compiler optimization to remove code which does not affect the program results. Removing such code has two benefits: it shrinks program size, an important consideration in some contexts, and it… … Wikipedia
SafeTSA — is a static single assignment form (SSA) intermediate representation capable of representing all of the type safety of the Java programming language and the standard Java Virtual Machine (JVM) byte code.As of 2005, many optimizing compilers… … Wikipedia
Dominator (graph theory) — For Dominating set problem, see Dominating set. In computer science, in control flow graphs, a node d dominates a node n if every path from the start node to n must go through d. Notationally, this is written as d dom n (or sometimes d n). By… … Wikipedia