Mixing Source and Bytecode a Case for Compilation by Normalization
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The LLVM Instruction Set and Compilation Strategy
The LLVM Instruction Set and Compilation Strategy Chris Lattner Vikram Adve University of Illinois at Urbana-Champaign lattner,vadve ¡ @cs.uiuc.edu Abstract This document introduces the LLVM compiler infrastructure and instruction set, a simple approach that enables sophisticated code transformations at link time, runtime, and in the field. It is a pragmatic approach to compilation, interfering with programmers and tools as little as possible, while still retaining extensive high-level information from source-level compilers for later stages of an application’s lifetime. We describe the LLVM instruction set, the design of the LLVM system, and some of its key components. 1 Introduction Modern programming languages and software practices aim to support more reliable, flexible, and powerful software applications, increase programmer productivity, and provide higher level semantic information to the compiler. Un- fortunately, traditional approaches to compilation either fail to extract sufficient performance from the program (by not using interprocedural analysis or profile information) or interfere with the build process substantially (by requiring build scripts to be modified for either profiling or interprocedural optimization). Furthermore, they do not support optimization either at runtime or after an application has been installed at an end-user’s site, when the most relevant information about actual usage patterns would be available. The LLVM Compilation Strategy is designed to enable effective multi-stage optimization (at compile-time, link-time, runtime, and offline) and more effective profile-driven optimization, and to do so without changes to the traditional build process or programmer intervention. LLVM (Low Level Virtual Machine) is a compilation strategy that uses a low-level virtual instruction set with rich type information as a common code representation for all phases of compilation. -
Emery Berger Curriculum Vitae
College of Information and Computer Sciences Emery Berger University of Massachusetts Amherst [email protected] Amherst, MA 01003 http://www.emeryberger.com RESEARCH INTERESTS Design and implementation of programming languages, with a focus on automatically improving reliability, security, and performance. EDUCATION Ph.D., Computer Science, UNIVERSITY OF TEXAS AT AUSTIN, August 2002 Thesis: Memory Management for High-Performance Applications Advisor: Kathryn S. McKinley M.S., Computer Science, UNIVERSITY OF TEXAS AT AUSTIN, December 1991 B.S., Computer Science, UNIVERSITY OF MIAMI, May 1988 ACADEMIC EXPERIENCE Professor, UNIVERSITY OF MASSACHUSETTS AMHERST, 2014–present Visiting Researcher, UNIVERSITY OF WASHINGTON, 2018–9 Visiting Researcher, MICROSOFT RESEARCH, 2005, 2006, 2011, 2013, 2015, 2016, 2018–9 Associate Professor, UNIVERSITY OF MASSACHUSETTS AMHERST, 2008–2014 Associate Researcher, BARCELONA SUPERCOMPUTING CENTER, 2010–2013 Visiting Professor, UNIVERSITAT POLITÈCNICA DE CATALUNYA, 2008–2009 Assistant Professor, UNIVERSITY OF MASSACHUSETTS AMHERST, 2002–2008 Research Intern, MICROSOFT RESEARCH, Summer 2000 & 2001 Graduate Research Assistant, UNIVERSITY OF TEXAS AT AUSTIN, 1997–2002 PROFESSIONAL EXPERIENCE Systems Analyst, UNIVERSITY OF TEXAS AT AUSTIN, 1995–2000 Teacher, BENJAMIN FRANKLIN INTERNATIONAL SCHOOL, Barcelona, Spain, 1992–1994 Systems Analyst, APPLIED RESEARCH LABORATORIES: UT-AUSTIN, 1990–1992 Instructor, THE PRINCETON REVIEW, Austin, Texas, 1989–1990 Teaching Assistant, UNIVERSITY OF TEXAS AT AUSTIN, 1989–1990 -
Andrew W. Appel, Curriculum Vitae
Case 1:17-cv-02989-AT Document 855-3 *SEALED* Filed 09/01/20 Page 1 of 56 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF GEORGIA ATLANTA DIVISION DONNA CURLING, ET AL., Plaintiffs, v. Civil Action No. 1:17-CV-2989-AT BRAD RAFFENSPERGER, ET AL., Defendants. DECLARATION OF ANDREW W. APPEL IN SUPPORT OF MOTION FOR PRELIMINARY INJUNCTION ANDREW W. APPEL, declares, under penalty of perjury, pursuant to 28 U.S.C. § 1746, that the following is true and correct: 1. My name is Andrew W. Appel. 2. I am the Eugene Higgins Professor of Computer Science at Princeton University, where I have been on the faculty since 1986 and served as Department Chair from 2009-2015. I have also served as Director of Undergraduate Studies, Director of Graduate Studies, and Associate Chair in that department. I have served as Editor in Chief of ACM Transactions on Programming Languages and Systems, the leading journal in my field. In 1998 I was elected a Fellow of the 1 ny-1984930 v3 Case 1:17-cv-02989-AT Document 855-3 *SEALED* Filed 09/01/20 Page 2 of 56 Association for Computing Machinery, the leading scientific and professional society in Computer Science. 3. I previously provided a Declaration in support of the Curling Plaintiffs’ Reply in Support of their Motion for Preliminary Injunction on December 13, 2019 (Dkt. No. 681-3). My 2019 Declaration is attached as Exhibit A. I have reviewed my 2019 Declaration and my previous findings and analyses remain the same; accordingly, I incorporate by reference my prior Declaration in its entirety, subject to the additional opinions I offer here. -
Beyond AOP: Toward Naturalistic Programming
Beyond AOP: Toward Naturalistic Programming Cristina Videira Lopes, Paul Dourish, David H. Lorenz and Karl Lieberherr lopes, jpd @ ics.uci.edu lorenz, lieber @ ccs.neu.edu This paper has been accepted for publication in the proceedings of the OOPSLA Onward! track, 2003, and will be subjected to copyright. This document is still not in its final version, and should not be referenced or cited until its official publication. It has been made available to you in response to a personal request. Additional distribution requests should be made directly to the authors. PLEASE DO NOT DISTRIBUTE. Beyond AOP: Toward Naturalistic Programming Cristina Videira Lopes1, Paul Dourish1, David H. Lorenz2, Karl Lieberherr2 1University of California, Irvine 2Northeastern University School of Information and Computer Science College of Computer & Information Science Irvine, CA 92697 Boston, MA 02115 {lopes,jpd}@ics.uci.edu {lorenz,lieber}@ccs.neu.edu Abstract Software understanding (for documentation, maintenance or evolution) is one of the longest-standing problems in Computer Science. The use of “high-level” programming paradigms and object-oriented languages helps, but fundamentally remains far from solving the problem. Most programming languages and systems have fallen prey to the assumption that they are supposed to capture idealized models of computation inspired by deceptively simple metaphors such as objects and mathematical functions. Aspect-oriented programming languages have made a significant break through by noticing that, in many situations, humans think and describe in crosscutting terms. In this paper we suggest that the next break through would require looking even closer to the way humans have been thinking and describing complex systems for thousand of years using natural languages. -
Toward IFVM Virtual Machine: a Model Driven IFML Interpretation
Toward IFVM Virtual Machine: A Model Driven IFML Interpretation Sara Gotti and Samir Mbarki MISC Laboratory, Faculty of Sciences, Ibn Tofail University, BP 133, Kenitra, Morocco Keywords: Interaction Flow Modelling Language IFML, Model Execution, Unified Modeling Language (UML), IFML Execution, Model Driven Architecture MDA, Bytecode, Virtual Machine, Model Interpretation, Model Compilation, Platform Independent Model PIM, User Interfaces, Front End. Abstract: UML is the first international modeling language standardized since 1997. It aims at providing a standard way to visualize the design of a system, but it can't model the complex design of user interfaces and interactions. However, according to MDA approach, it is necessary to apply the concept of abstract models to user interfaces too. IFML is the OMG adopted (in March 2013) standard Interaction Flow Modeling Language designed for abstractly expressing the content, user interaction and control behaviour of the software applications front-end. IFML is a platform independent language, it has been designed with an executable semantic and it can be mapped easily into executable applications for various platforms and devices. In this article we present an approach to execute the IFML. We introduce a IFVM virtual machine which translate the IFML models into bytecode that will be interpreted by the java virtual machine. 1 INTRODUCTION a fundamental standard fUML (OMG, 2011), which is a subset of UML that contains the most relevant The software development has been affected by the part of class diagrams for modeling the data apparition of the MDA (OMG, 2015) approach. The structure and activity diagrams to specify system trend of the 21st century (BRAMBILLA et al., behavior; it contains all UML elements that are 2014) which has allowed developers to build their helpful for the execution of the models. -
Superoptimization of Webassembly Bytecode
Superoptimization of WebAssembly Bytecode Javier Cabrera Arteaga Shrinish Donde Jian Gu Orestis Floros [email protected] [email protected] [email protected] [email protected] Lucas Satabin Benoit Baudry Martin Monperrus [email protected] [email protected] [email protected] ABSTRACT 2 BACKGROUND Motivated by the fast adoption of WebAssembly, we propose the 2.1 WebAssembly first functional pipeline to support the superoptimization of Web- WebAssembly is a binary instruction format for a stack-based vir- Assembly bytecode. Our pipeline works over LLVM and Souper. tual machine [17]. As described in the WebAssembly Core Specifica- We evaluate our superoptimization pipeline with 12 programs from tion [7], WebAssembly is a portable, low-level code format designed the Rosetta code project. Our pipeline improves the code section for efficient execution and compact representation. WebAssembly size of 8 out of 12 programs. We discuss the challenges faced in has been first announced publicly in 2015. Since 2017, it has been superoptimization of WebAssembly with two case studies. implemented by four major web browsers (Chrome, Edge, Firefox, and Safari). A paper by Haas et al. [11] formalizes the language and 1 INTRODUCTION its type system, and explains the design rationale. The main goal of WebAssembly is to enable high performance After HTML, CSS, and JavaScript, WebAssembly (WASM) has be- applications on the web. WebAssembly can run as a standalone VM come the fourth standard language for web development [7]. This or in other environments such as Arduino [10]. It is independent new language has been designed to be fast, platform-independent, of any specific hardware or languages and can be compiled for and experiments have shown that WebAssembly can have an over- modern architectures or devices, from a wide variety of high-level head as low as 10% compared to native code [11]. -
Anomaly-Free Component Adaptation with Class Overriding Atanas Radenski Chapman University, [email protected]
Chapman University Chapman University Digital Commons Mathematics, Physics, and Computer Science Science and Technology Faculty Articles and Faculty Articles and Research Research 2004 Anomaly-Free Component Adaptation with Class Overriding Atanas Radenski Chapman University, [email protected] Follow this and additional works at: http://digitalcommons.chapman.edu/scs_articles Part of the Programming Languages and Compilers Commons Recommended Citation Radenski, A. Anomaly-Free Component Adaptation with Class Overriding. Journal of Systems and Software, Elsevier Science, Vol. 71, Issues 1-2, 2004, 37-48. doi: 10.1016/S0164-1212(02)00137-1 This Article is brought to you for free and open access by the Science and Technology Faculty Articles and Research at Chapman University Digital Commons. It has been accepted for inclusion in Mathematics, Physics, and Computer Science Faculty Articles and Research by an authorized administrator of Chapman University Digital Commons. For more information, please contact [email protected]. Anomaly-Free Component Adaptation with Class Overriding Comments This is a pre-copy-editing, author-produced PDF of an article accepted for publication in Journal of Systems and Software, volume 71, issues 1-2, 2004 following peer review. The definitive publisher-authenticated version is available online at DOI:10.1016/S0164-1212(02)00137-1 The rC eative Commons license below applies only to this version of the article. Creative Commons License This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License. Copyright Elsevier This article is available at Chapman University Digital Commons: http://digitalcommons.chapman.edu/scs_articles/211 Page 1: Atanas Radenski: Anomaly-Free Component Adaptation with Class Overriding Anomaly-Free Component Adaptation with Class Overriding Atanas Radenski Chapman University Department of Computer Science, Mathematics, and Physics One University Drive Orange, CA 92866, U.S.A. -
Verified Three-Way Program Merge
Verified Three-Way Program Merge MARCELO SOUSA, University of Oxford, United Kingdom ISIL DILLIG, University of Texas at Austin, United States SHUVENDU K. LAHIRI, Microsoft Research, United States Even though many programmers rely on 3-way merge tools to integrate changes from different branches, such tools can introduce subtle bugs in the integration process. This paper aims to mitigate this problem by defining a semantic notion of conflict-freedom, which ensures that the merged program does not introduce new unwanted behaviors. We also show how to verify this property using a novel, compositional algorithm that combines lightweight summarization for shared program fragments with precise relational reasoning for the modifications. Towards this goal, our method uses a 4-way differencing algorithm on abstract syntax trees to represent different program versions as edits applied to a shared program with holes. This representation allows our verification algorithm to reason about different edits in isolation and compose them toobtain an overall proof of conflict freedom. We have implemented the proposed technique in a new tool called SafeMerge for Java and evaluate it on 52 real-world merge scenarios obtained from Github. The experimental results demonstrate the benefits of our approach over syntactic conflict-freedom and indicate that SafeMerge is both precise and practical. CCS Concepts: • Software and its engineering → Formal software verification; Additional Key Words and Phrases: Three-way program merge, relational verification, product programs ACM Reference Format: Marcelo Sousa, Isil Dillig, and Shuvendu K. Lahiri. 2018. Verified Three-Way Program Merge. Proc. ACM Program. Lang. 2, OOPSLA, Article 165 (November 2018), 29 pages. -
Richard Paul Gabriel Educational Background
Richard Paul Gabriel Address: 3636 Altamont Way Redwood City, CA 94062 Telephone: Voice: (650)298-8735 Fax: (650)216-6755 E-Mail: rpg at dreamsongs.com Web: http://dreamsongs.com Educational Background Warren Wilson College 1995–1998 M.F.A. in Creative Writing (Poetry) Stanford University 1975–1981 Ph.D. in Computer Science University of Illinois 1973–1975 M.S. in Mathematics MIT 1972–1973 Graduate studies in Mathematics Northeastern University 1967–1972 B.A. in Mathematics Recent Experience Researcher, IBM Research, February 2007– Vice Chair, Aspect-Oriented Software Association (AOSA), 2011–2013 Member of the Editorial Board, Transactions on Pattern Languages of Programs, 2007– Chair of the Steering OOPSLA Committee, October 2008–October 2011 Notable Experience School Visitor, Australian National University, December 2010 President, Hillside Group, February 2002–November 2006 Distinguished Engineer, IBM Research February 2007–April 2011 Distinguished Engineer, Sun Microsystems, November 1998–January 2007 Principal Investigator, Sun Microsystems Laboratories July 2004–September 2006 Chief Scientist, Laboratory for Self-Sustaining Systems, July 2000–July 2004 Consultant, Aspen Smallworks, Sun Microsystems, February 1997–November 1998 Distinguished Computer Scientist, ParcPlace-Digitalk, Inc, Dec. 1993–Oct. 1996 Vice President of Development, ParcPlace Systems, Inc, June 1994–August 1995 Lucid Fellow, Lucid Inc, October 1992–November 1993 Chairman of the Board, Lucid Inc, October 1992–December 1994 Chief Technical Officer, Lucid Inc, August 1984–November 1993 Richard P. Gabriel 1 Consulting Full Professor of Computer Science, Stanford University, April 1991–August 2001 Founding Joint Editor-in-Chief, “Lisp and Symbolic Computation: An International Journal,” October 1986–1992 President and Chief Technical Officer, Lucid Inc, August 1984–October 1987 Founder, Lucid, Inc, August 1984 Noteworthy Accomplishments Wrote and promulgated the so-called “Gabriel Benchmarks” for the performance measurement of a variety of Lisp and Lisp-like systems. -
Coqjvm: an Executable Specification of the Java Virtual Machine Using
CoqJVM: An Executable Specification of the Java Virtual Machine using Dependent Types Robert Atkey LFCS, School of Informatics, University of Edinburgh Mayfield Rd, Edinburgh EH9 3JZ, UK [email protected] Abstract. We describe an executable specification of the Java Virtual Machine (JVM) within the Coq proof assistant. The principal features of the development are that it is executable, meaning that it can be tested against a real JVM to gain confidence in the correctness of the specification; and that it has been written with heavy use of dependent types, this is both to structure the model in a useful way, and to constrain the model to prevent spurious partiality. We describe the structure of the formalisation and the way in which we have used dependent types. 1 Introduction Large scale formalisations of programming languages and systems in mechanised theorem provers have recently become popular [4–6, 9]. In this paper, we describe a formalisation of the Java virtual machine (JVM) [8] in the Coq proof assistant [11]. The principal features of this formalisation are that it is executable, meaning that a purely functional JVM can be extracted from the Coq development and – with some O’Caml glue code – executed on real Java bytecode output from the Java compiler; and that it is structured using dependent types. The motivation for this development is to act as a basis for certified consumer- side Proof-Carrying Code (PCC) [12]. We aim to prove the soundness of program logics and correctness of proof checkers against the model, and extract the proof checkers to produce certified stand-alone tools. -
Program Dynamic Analysis Overview
4/14/16 Program Dynamic Analysis Overview • Dynamic Analysis • JVM & Java Bytecode [2] • A Java bytecode engineering library: ASM [1] 2 1 4/14/16 What is dynamic analysis? [3] • The investigation of the properties of a running software system over one or more executions 3 Has anyone done dynamic analysis? [3] • Loggers • Debuggers • Profilers • … 4 2 4/14/16 Why dynamic analysis? [3] • Gap between run-time structure and code structure in OO programs Trying to understand one [structure] from the other is like trying to understand the dynamism of living ecosystems from the static taxonomy of plants and animals, and vice-versa. -- Erich Gamma et al., Design Patterns 5 Why dynamic analysis? • Collect runtime execution information – Resource usage, execution profiles • Program comprehension – Find bugs in applications, identify hotspots • Program transformation – Optimize or obfuscate programs – Insert debugging or monitoring code – Modify program behaviors on the fly 6 3 4/14/16 How to do dynamic analysis? • Instrumentation – Modify code or runtime to monitor specific components in a system and collect data – Instrumentation approaches • Source code modification • Byte code modification • VM modification • Data analysis 7 A Running Example • Method call instrumentation – Given a program’s source code, how do you modify the code to record which method is called by main() in what order? public class Test { public static void main(String[] args) { if (args.length == 0) return; if (args.length % 2 == 0) printEven(); else printOdd(); } public -
A New JIT Compiler in Zing JVM Agenda
Falcon a new JIT compiler in Zing JVM Agenda • What is Falcon? Why do we need a new compiler? • Why did we decide to use LLVM? • What does it take to make a Java JIT from LLVM? • How does it fit with exiting technology, like ReadyNow? 2 Zing JVM Zing: A better JVM • Commercial server JVM • Key features • C4 GC, ReadyNow!, Falcon 5 What is Falcon? • Top tier JIT compiler in Zing JVM • Replacement for С2 compiler • Based on LLVM 6 Development Timeline PoC GA on by default Apr Dec Apr 2014 2016 2017 Estimated resource investment ~20 man-years (team of 4-6 people) 7 Why do we need a new compiler? • Zing used to have C2 like OpenJDK • C2 is aging poorly — difficult to maintain and evolve • Looking for competitive advantage over competition 8 Alternatives • Writing compiler from scratch? Too hard • Open-source compilers • GCC, Open64, Graal, LLVM… 9 Alternatives • Writing compiler from scratch? Too hard • Open-source compilers short list • Graal vs LLVM 10 “The LLVM Project is a collection of modular and reusable compiler and toolchain technologies” – llvm.org Where LLVM is used? • C/C++/Objective C • Swift • Haskell • Rust • … 12 Who makes LLVM? More than 500 developers 13 LLVM • Started in 2000 • Stable and mature • Proven performance for C/C++ code 14 LLVM IR General-purpose high-level assembler int mul_add(int x, int y, int z) { return x * y + z; } define i32 @mul_add(i32 %x, i32 %y, i32 %z) { entry: %tmp = mul i32 %x, %y %tmp2 = add i32 %tmp, %z ret i32 %tmp2 } 15 Infrastructure provides • Analysis, transformations • LLVM IR => LLVM IR •