1
0
mirror of https://github.com/catseye/SixtyPical.git synced 2024-05-31 21:41:29 +00:00
SixtyPical/README.md

179 lines
6.5 KiB
Markdown
Raw Normal View History

2014-03-31 22:31:30 +00:00
SixtyPical
==========
_Version 0.16. Work-in-progress, everything is subject to change._
2018-03-26 12:16:53 +00:00
**SixtyPical** is a 6502-like programming language with advanced
static analysis.
2018-03-26 12:16:53 +00:00
"6502-like" means that it has similar restrictions as programming
in 6502 assembly (e.g. the programmer must choose the registers that
2018-03-08 15:34:28 +00:00
values will be stored in) and is concomitantly easy for a compiler to
translate it to 6502 machine language code.
"Advanced static analysis" includes _abstract interpretation_, where we
go through the program step by step, tracking not just the changes that
happen during a _specific_ execution of the program, but _sets_ of changes
that could _possibly_ happen in any run of the program. This lets us
2018-03-26 12:16:53 +00:00
determine that certain things can never happen, which we can then formulate
as safety checks.
In practice, this means it catches things like
* you forgot to clear carry before adding something to the accumulator
* a subroutine that you call trashes a register you thought was preserved
* you tried to read or write a byte beyond the end of a byte array
2015-10-22 18:20:48 +00:00
* you tried to write the address of something that was not a routine, to
a jump vector
2018-03-08 15:34:28 +00:00
and suchlike. It also provides some convenient operations based on
machine-language programming idioms, such as
2015-10-22 18:20:48 +00:00
* copying values from one register to another (via a third register when
there are no underlying instructions that directly support it); this
includes 16-bit values, which are copied in two steps
2015-10-22 18:20:48 +00:00
* explicit tail calls
* indirect subroutine calls
The reference implementation can analyze and compile SixtyPical programs to
6502 machine code.
2018-03-08 13:36:30 +00:00
Quick Start
-----------
If you have the [VICE][] emulator installed, from this directory, you can run
./loadngo.sh c64 eg/c64/hearts.60p
and it will compile the [hearts.60p source code](eg/c64/hearts.60p) and
automatically start it in the `x64` emulator, and you should see:
![Screenshot of result of running hearts.60p](images/hearts.png?raw=true)
2018-03-08 13:36:30 +00:00
You can try the `loadngo.sh` script on other sources in the `eg` directory
2018-03-26 12:16:53 +00:00
tree, which contains more extensive examples, including an entire
game(-like program); see [eg/README.md](eg/README.md) for a listing.
2018-03-08 13:36:30 +00:00
2018-04-18 15:46:34 +00:00
[VICE]: http://vice-emu.sourceforge.net/
Documentation
-------------
2014-04-01 13:33:57 +00:00
2017-11-21 11:13:21 +00:00
* [Design Goals](doc/Design%20Goals.md)
* [SixtyPical specification](doc/SixtyPical.md)
2017-11-21 11:13:21 +00:00
* [SixtyPical revision history](HISTORY.md)
2017-11-17 15:48:38 +00:00
* [Literate test suite for SixtyPical syntax](tests/SixtyPical%20Syntax.md)
* [Literate test suite for SixtyPical analysis](tests/SixtyPical%20Analysis.md)
* [Literate test suite for SixtyPical compilation](tests/SixtyPical%20Compilation.md)
* [Literate test suite for SixtyPical fallthru optimization](tests/SixtyPical%20Fallthru.md)
2017-11-17 15:48:38 +00:00
* [6502 Opcodes used/not used in SixtyPical](doc/6502%20Opcodes.md)
* [Output formats supported by `sixtypical`](doc/Output%20Formats.md)
TODO
----
2018-04-18 15:46:34 +00:00
### `low` and `high` address operators
2018-03-08 13:36:30 +00:00
2018-04-18 15:46:34 +00:00
To turn `word` type into `byte`.
2018-04-18 16:59:42 +00:00
Trying to remember if we have a compelling case for this or now. The best I can think
of is for implementing 16-bit `cmp` in an efficient way. Maybe we should see if we
can get by with 16-bit `cmp` instead though.
The problem is that once a byte is extracted, putting it back into a word is awkward.
The address operators have to modify a destination in a special way. That is, when
you say `st a, >word`, you are updating `word` to be `word & $ff | a << 8`, somelike.
Is that consistent with `st`? Well, probably it is, but we have to explain it.
2018-04-19 08:54:24 +00:00
It might make more sense, then, for it to be "part of the operation" instead of "part of
the reference"; something like `st.hi x, word`; `st.lo y, word`. Dunno.
2018-04-18 16:59:42 +00:00
2018-05-08 11:48:15 +00:00
### Save multiple values in single block
2018-04-18 15:46:34 +00:00
2018-05-08 11:48:15 +00:00
As a shortcut for the idiom
2018-04-19 09:35:21 +00:00
save a { save var {
...
} }
2018-05-08 11:48:15 +00:00
allow
2018-04-19 09:35:21 +00:00
save a, var {
...
}
2018-05-08 11:48:15 +00:00
### Save values to other-than-the-stack
Allow
save a to temp_a {
...
}
Which uses some other storage location instead of the stack. A local static
would be a good candidate for such.
2018-04-19 09:35:21 +00:00
### Make all symbols forward-referencable
Basically, don't do symbol-table lookups when parsing, but do have a more formal
"symbol resolution" (linking) phase right after parsing.
2018-04-18 15:46:34 +00:00
### Associate each pointer with the buffer it points into
2018-04-19 08:54:24 +00:00
Check that the buffer being read or written to through pointer, appears in appropriate
inputs or outputs set.
2018-04-18 15:46:34 +00:00
2018-04-19 08:54:24 +00:00
In the analysis, when we obtain a pointer, we need to record, in contect, what buffer
that pointer came from.
When we write through that pointer, we need to set that buffer as written.
When we read through the pointer, we need to check that the buffer is readable.
2018-04-19 09:35:21 +00:00
### Table overlays
2018-04-18 15:46:34 +00:00
They are uninitialized, but the twist is, the address is a buffer that is
an input to and/or output of the routine. So, they are defined (insofar
as the buffer is defined.)
They are therefore a "view" of a section of a buffer.
This is slightly dangerous since it does permit aliases: the buffer and the
table refer to the same memory.
2018-04-19 08:54:24 +00:00
Although, if they are `static`, you could say, in the routine in which they
are `static`, as soon as you've established one, you can no longer use the
buffer; and the ones you establish must be disjoint.
(That seems to be the most compelling case for restricting them to `static`.)
An alternative would be `static` pointers, which are currently not possible because
pointers must be zero-page, thus `@`, thus uninitialized.
2018-04-18 15:46:34 +00:00
### Question "consistent initialization"
Question the value of the "consistent initialization" principle for `if` statement analysis.
2018-04-19 09:35:21 +00:00
Part of this is the trashes at the end; I think what it should be is that the trashes
after the `if` is the union of the trashes in each of the branches; this would obviate the
need to `trash` values explicitly, but if you tried to access them afterwards, it would still
error.
2018-04-18 15:46:34 +00:00
### Tail-call optimization
More generally, define a block as having zero or one `goto`s at the end. (and `goto`s cannot
appear elsewhere.)
If a block ends in a `call` can that be converted to end in a `goto`? Why not? I think it can.
The constraints should iron out the same both ways.
And - once we have this - why do we need `goto` to be in tail position, strictly?
As long as the routine has consistent type context every place it exits, that should be fine.
2018-04-19 09:35:21 +00:00
### "Include" directives
2018-04-18 15:46:34 +00:00
Search a searchlist of include paths. And use them to make libraries of routines.
One such library routine might be an `interrupt routine` type for various architectures.
Since "the supervisor" has stored values on the stack, we should be able to trash them
with impunity, in such a routine.