SlideShare ist ein Scribd-Unternehmen logo
1 von 65
 Currently, the most commonly-used language for
embedded systems
 “High-level assembly”
 Very portable: compilers exist for virtually every
processor
 Easy-to-understand compilation
 Produces efficient code
 Fairly concise
 Developed between 1969 and 1973 along with
Unix
 Due mostly to Dennis Ritchie
 Designed for systems programming
◦ Operating systems
◦ Utility programs
◦ Compilers
◦ Filters
 Evolved from B, which evolved from BCPL
 Designed by Martin Richards (Cambridge) in 1967
 Typeless
◦ Everything an n-bit integer (a machine word)
◦ Pointers (addresses) and integers identical
 Memory is an undifferentiated array of words
 Natural model for word-addressed machines
 Local variables depend on frame-pointer-relative
addressing: dynamically-sized automatic objects not
permitted
 Strings awkward
◦ Routines expand and pack bytes to/from word arrays
 Original machine (DEC PDP-
11) was very small
◦ 24K bytes of memory, 12K used
for operating system
 Written when computers were
big, capital equipment
◦ Group would get one, develop new
language, OS
 Many language features designed to reduce
memory
◦ Forward declarations required for everything
◦ Designed to work in one pass: must know everything
◦ No function nesting
 PDP-11 was byte-addressed
◦ Now standard
◦ Meant BCPL’s word-based model was insufficient
#include <stdio.h>
void main()
{
printf(“Hello, world!n”);
}
Preprocessor used to
share information among
source files
- Clumsy
+ Cheaply implemented
+ Very flexible
#include <stdio.h>
void main()
{
printf(“Hello, world!n”);
}
Program mostly a
collection of functions
“main” function special:
the entry point
“void” qualifier indicates
function does not return
anything
I/O performed by a library
function: not included in
the language
int gcd(int m, int n)
{
int r;
while ( (r = m % n) != 0) {
m = n;
n = r;
}
return n;
}
“New Style” function
declaration lists
number and type of
arguments
Originally only listed
return type.
Generated code did
not care how many
arguments were
actually passed.
Arguments are call-
by-value
int gcd(int m, int n)
{
int r;
while ( (r = m % n) != 0) {
m = n;
n = r;
}
return n;
}
Automatic variable
Storage allocated on
stack when function
entered, released
when it returns.
All parameters,
automatic variables
accessed w.r.t.
frame pointer.
Extra storage
needed while
evaluating large
expressions also
placed on the stack
n
m
ret. addr.
r
Frame
pointer Stack
pointer
Excess
arguments
simply
ignored
int gcd(int m, int n)
{
int r;
while ( (r = m % n) != 0) {
m = n;
n = r;
}
return n;
}
Expression: C’s
basic type of
statement.
Arithmetic and
logical
Assignment (=)
returns a value, so
can be used in
expressions
% is remainder
!= is not equal
int gcd(int m, int n)
{
int r;
while ( (r = m % n) != 0) {
m = n;
n = r;
}
return n;
}
High-level control-flow
statement. Ultimately
becomes a conditional
branch.
Supports “structured
programming”
Each function
returns a single
value, usually an
integer. Returned
through a specific
register by
convention.
.globl _gcd r0-r7
.text PC is r7, SP is r6, FP is r5
_gcd:
jsr r5,rsave save sp in frame pointer r5
L2:mov 4(r5),r1 r1 = n
sxt r0 sign extend
div 6(r5),r0 m / n = r0,r1
mov r1,-10(r5) r = m % n
jeq L3
mov 6(r5),4(r5) m = n
mov -10(r5),6(r5) n = r
jbr L2
L3:mov 6(r5),r0 return n in r0
jbr L1
L1:jmp rretrn restore sp ptr, return
int gcd(int m, int n)
{
int r;
while ( (r = m % n) != 0) {
m = n;
n = r;
}
return n;
}
.globl _gcd
.text
_gcd:
jsr r5,rsave
L2:mov 4(r5),r1
sxt r0
div 6(r5),r0
mov r1,-10(r5)
jeq L3
mov 6(r5),4(r5)
mov -10(r5),6(r5)
jbr L2
L3:mov 6(r5),r0
jbr L1
L1:jmp rretrn
Very natural mapping from C into
PDP-11 instructions.
Complex addressing modes make
frame-pointer-relative accesses
easy.
Another idiosyncrasy: registers
were memory-mapped, so taking
address of a variable in a register
is straightforward.
 Types and Variables
◦ Definitions of data in memory
 Expressions
◦ Arithmetic, logical, and assignment operators in an infix
notation
 Statements
◦ Sequences of conditional, iteration, and branching
instructions
 Functions
◦ Groups of statements and variables invoked recursively
 Basic types: char, int, float, and double
 Meant to match the processor’s native types
◦ Natural translation into assembly
◦ Fundamentally nonportable
 Declaration syntax: string of specifiers followed by
a declarator
 Declarator’s notation matches that in an
expression
 Access a symbol using its declarator and get the
basic type back
int i;
int *j, k;
unsigned char *ch;
float f[10];
char nextChar(int,
char*);
int a[3][5][10];
int *func1(float);
int (*func2)(void);
Integer
j: pointer to integer, int k
ch: pointer to unsigned char
Array of 10 floats
2-arg function
Array of three arrays of five …
function returning int *
pointer to function returning int
 Type declarations recursive, complicated.
 Name new types with typedef
 Instead of
int (*func2)(void)
use
typedef int func2t(void);
func2t *func2;
 A struct is an object with named fields:
struct {
char *name;
int x, y;
int h, w;
} box;
 Accessed using “dot” notation:
box.x = 5;
box.y = 2;
 Way to aggressively pack data in memory
struct {
unsigned int baud : 5;
unsigned int div2 : 1;
unsigned int use_external_clock : 1;
} flags;
 Compiler will pack these fields into words
 Very implementation dependent: no guarantees of
ordering, packing, etc.
 Usually less efficient
◦ Reading a field requires masking and shifting
 Can store objects of different types at different times
union {
int ival;
float fval;
char *sval;
};
 Useful for arrays of dissimilar objects
 Potentially very dangerous
 Good example of C’s philosophy
◦ Provide powerful mechanisms that can be abused
 Most processors require n-byte objects to be in
memory at address n*k
 Side effect of wide memory busses
 E.g., a 32-bit memory bus
 Read from address 3 requires two accesses,
shifting
4 3 2
1
4 3 2 1
 Compilers add “padding” to structs to ensure proper
alignment, especially for arrays
 Pad to ensure alignment of largest object (with biggest
requirement)
struct {
char a;
int b;
char c;
}
 Moral: rearrange to save memory
a
bbbb
c
a
bbbb
c
Pad
#include <stdlib.h>
int global_static;
static int file_static;
void foo(int auto_param)
{
static int func_static;
int auto_i, auto_a[10];
double *auto_d =
malloc(sizeof(double)*5);
}
Linker-visible.
Allocated at fixed
location
Visible within file.
Allocated at fixed
location.
Visible within func.
Allocated at fixed
location.
#include <stdlib.h>
int global_static;
static int file_static;
void foo(int auto_param)
{
static int func_static;
int auto_i, auto_a[10];
double *auto_d =
malloc(sizeof(double)*5);
}
Space allocated on
stack by function.
Space allocated on
stack by caller.
Space allocated on
heap by library routine.
 Library routines for managing the heap
int *a;
a = (int *) malloc(sizeof(int) * k);
a[5] = 3;
free(a);
 Allocate and free arbitrary-sized chunks of
memory in any order
 More flexible than automatic variables (stacked)
 More costly in time and space
◦ malloc() and free() use complicated non-constant-time
algorithms
◦ Each block generally consumes two additional words of
memory
 Pointer to next empty block
 Size of this block
 Common source of errors
◦ Using uninitialized memory
◦ Using freed memory
◦ Not allocating enough
 Memory usage errors so pervasive, entire
successful company (Pure Software) founded to
sell tool to track them down
 Purify tool inserts code that verifies each memory
access
 Reports accesses of uninitialized memory,
unallocated memory, etc.
 Publicly-available Electric Fence tool does
something similar
 What are malloc() and free() actually doing?
 Pool of memory segments:
Free
malloc( )
 Rules:
◦ Each segment contiguous in memory (no holes)
◦ Segments do not move once allocated
 malloc()
◦ Find memory area large enough for segment
◦ Mark that memory is allocated
 free()
◦ Mark the segment as unallocated
 Three issues:
 How to maintain information about free memory
 The algorithm for locating a suitable block
 The algorithm for freeing an allocated block
 Three issues:
 How to maintain information about free memory
◦ Linked list
 The algorithm for locating a suitable block
◦ First-fit
 The algorithm for freeing an allocated block
◦ Coalesce adjacent free blocks
Next
Size
Next
SizeSize
Free block Allocated block
malloc( )
First large-enough
free block selected
Free block divided
into two
Previous next
pointer updated
Newly-allocated
region begins with
a size value
free(a)
Appropriate
position in free list
identified
Newly-freed region
added to adjacent
free regions
 Many, many variants
 Other “fit” algorithms
 Segregation of objects by sizes
◦ 8-byte objects in one region, 16 in another, etc.
 More intelligent list structures
 An alternative: Memory pools
 Separate management policy for each pool
 Stack-based pool: can only free whole pool at
once
◦ Very cheap operation
◦ Good for build-once data structures (e.g., compilers)
 Pool for objects of a single size
◦ Useful in object-oriented programs
 Not part of the C standard library
 Array: sequence of identical objects
in memory
 int a[10]; means space for ten
integers
Filippo Brunelleschi,
Ospdale degli Innocenti,
Firenze, Italy, 1421
 By itself, a is the address of the first integer
 *a and a[0] mean the same thing
 The address of a is not stored in memory: the
compiler inserts code to compute it when it appears
 Ritchie calls this interpretation the biggest
conceptual jump from BCPL to C
 Array declarations read right-to-left
 int a[10][3][2];
 “an array of ten arrays of three arrays of two ints”
 In memory
2 2 2
3
2 2 2
3
2 2 2
3
...
10
Seagram Building, Ludwig
Mies van der Rohe,1957
 Passing a multidimensional array as an argument
requires all but the first dimension
int a[10][3][2];
void examine( a[][3][2] ) { … }
 Address for an access such as a[i][j][k] is
a + k + 2*(j + 3*i)
 Use arrays of pointers for variable-sized
multidimensional arrays
 You need to allocate space for and initialize the
arrays of pointers
int ***a;
 a[3][5][4] expands to *(*(*(a+3)+5)+4)
The value
int ** int * int
int ***a
 Traditional mathematical expressions
y = a*x*x + b*x + c;
 Very rich set of expressions
 Able to deal with arithmetic and bit manipulation
 arithmetic: + – * / %
 comparison: == != < <= > >=
 bitwise logical: & | ^ ~
 shifting: << >>
 lazy logical: && || !
 conditional: ? :
 assignment: = += -=
 increment/decrement: ++ --
 sequencing: ,
 pointer: * -> & []
 and: & or: | xor: ^ not: ~ left shift: << right shift: >>
 Useful for bit-field manipulations
#define MASK 0x040
if (a & MASK) { … } /* Check bits */
c |= MASK; /* Set bits */
c &= ~MASK; /* Clear bits */
d = (a & MASK) >> 4; /* Select field */
 “Short circuit” tests save time
if ( a == 3 && b == 4 && c == 5 ) { … }
equivalent to
if (a == 3) { if (b ==4) { if (c == 5) { … } } }
 Evaluation order (left before right) provides safety
if ( i <= SIZE && a[i] == 0 ) { … }
 c = a < b ? a + 1 : b – 1;
 Evaluate first expression. If true, evaluate second,
otherwise evaluate third.
 Puts almost statement-like behavior in expressions.
 BCPL allowed code in an expression:
a := 5 + valof{ int i, s = 0; for (i = 0 ; i < 10 ; i++) s += a[I];
return s; }
 Evaluating an expression often has side-effects
a++ increment a afterwards
a = 5 changes the value of a
a = foo() function foo may have side-effects
 From BCPL’s view of the world
 Pointer arithmetic is natural: everything’s an
integer
int *p, *q;
*(p+5) equivalent to p[5]
 If p and q point into same array, p – q is number
of elements between p and q.
 Accessing fields of a pointed-to structure has a
shorthand:
p->field means (*p).field
 Expression
 Conditional
◦ if (expr) { … } else {…}
◦ switch (expr) { case c1: case c2: … }
 Iteration
◦ while (expr) { … } zero or more iterations
◦ do … while (expr) at least one iteration
◦ for ( init ; valid ; next ) { … }
 Jump
◦ goto label
◦ continue;go to start of loop
◦ break; exit loop or switch
◦ return expr; return from function
 Performs multi-way branches
switch (expr) {
case 1: …
break;
case 5:
case 6: …
break;
default: …
break;
}
tmp = expr;
if (tmp == 1) goto L1
else if (tmp == 5) goto L5
else if (tmp == 6) goto L6
else goto Default;
L1: …
goto Break;
L5:;
L6: …
goto Break;
Default: …
goto Break;
Break:
 Sparse case labels tested sequentially
if (e == 1) goto L1;
else if (e == 10) goto L2;
else if (e == 100) goto L3;
 Dense cases use a jump table
table = { L1, L2, Default, L4, L5 };
if (e >= 1 and e <= 5) goto table[e];
 Clever compilers may combine these
 A way to exit from deeply nested functions
 A hack now a formal part of the standard library
#include <setjmp.h>
jmp_buf jmpbuf;
void top(void) {
switch (setjmp(jmpbuf)) {
case 0: child(); break;
case 1: /* longjmp called */ break;
} }
void deeplynested() { longjmp(jmpbuf,
Space for a return
address and registers
(including stack pointer,
frame pointer)
Stores context, returns 0
Returns to context, making it
appear setjmp() returned 1
 Relatively late and awkward addition to the
language
 Symbolic constants
#define PI 3.1415926535
 Macros with arguments for emulating inlining
#define min(x,y) ((x) < (y) ? (x) : (y))
 Conditional compilation
#ifdef __STDC__
 File inclusion for sharing of declarations
#include “myheaders.h”
 Header file dependencies usually form a directed
acyclic graph (DAG)
 How do you avoid defining things twice?
 Convention: surround each header (.h) file with a
conditional:
#ifndef __MYHEADER_H__
#define __MYHEADER_H__
/* Declarations */
#endif
 Macros with arguments do not have function call
semantics
 Function Call:
◦ Each argument evaluated once, in undefined order,
before function is called
 Macro:
◦ Each argument evaluated once every time it appears in
expansion text
 Example: the “min” function
int min(int a, int b)
{ if (a < b) return a; else return b; }
#define min(a,b) ((a) < (b) ? (a) : (b))
 Identical for min(5,x)
 Different when evaluating expression has side-
effect:
min(a++,b)
◦ min function increments a once
◦ min macro may increment a twice if a < b
 Text substitution can expose unexpected groupings
#define mult(a,b) a*b
mult(5+3,2+4)
 Expands to 5 + 3 * 2 + 4
 Operator precedence evaluates this as
5 + (3*2) + 4 = 15 not (5+3) * (2+4) = 48 as intended
 Moral: By convention, enclose each macro argument
in parenthesis:
#define mult(a,b) (a)*(b)
 Library routines
◦ malloc() returns a nondeterministically-chosen address
◦ Address used as a hash key produces nondeterministic results
 Argument evaluation order
◦ myfunc( func1(), func2(), func3() )
◦ func1, func2, and func3 may be called in any order
 Word sizes
int a;
a = 1 << 16; /* Might be zero */
a = 1 << 32; /* Might be zero */
 Uninitialized variables
◦ Automatic variables may take values from stack
◦ Global variables left to the whims of the OS
 Reading the wrong value from a union
◦ union { int a; float b; } u; u.a = 10; printf(“%g”, u.b);
 Pointer dereference
◦ *a undefined unless it points within an allocated array and has
been initialized
◦ Very easy to violate these rules
◦ Legal: int a[10]; a[-1] = 3; a[10] = 2; a[11] = 5;
◦ int *a, *b; a - b only defined if a and b point into the same array
 How to deal with nondeterminism?
◦ Caveat programmer
 Studiously avoid nondeterministic constructs
◦ Compilers, lint, etc. don’t really help
 Philosophy of C: get out of the programmer’s way
 “C treats you like a consenting adult”
◦ Created by a systems programmer (Ritchie)
 “Pascal treats you like a misbehaving child”
◦ Created by an educator (Wirth)
 “Ada treats you like a criminal”
◦ Created by the Department of Defense
 C evolved from the typeless languages BCPL and B
 Array-of-bytes model of memory permeates the
language
 Original weak type system strengthened over time
 C programs built from
◦ Variable and type declarations
◦ Functions
◦ Statements
◦ Expressions
 Built from primitive types that match processor types
 char, int, float, double, pointers
 Struct and union aggregate heterogeneous objects
 Arrays build sequences of identical objects
 Alignment restrictions ensured by compiler
 Multidimensional arrays
 Three storage classes
◦ global, static (address fixed at compile time)
◦ automatic (on stack)
◦ heap (provided by malloc() and free() library calls)
 Wide variety of operators
◦ Arithmetic + - * /
◦ Logical && || (lazy)
◦ Bitwise & |
◦ Comparison < <=
◦ Assignment = += *=
◦ Increment/decrement ++ --
◦ Conditional ? :
 Expressions may have side-effects
 Expression
 Conditional
◦ if-else switch
 Iteration
◦ while do-while for(;;)
 Branching
◦ goto break continue return
 Awkward setjmp, longjmp library routines for non-local
goto
 Preprocessor
◦ symbolic constants
◦ inline-like functions
◦ conditional compilation
◦ file inclusion
 Sources of nondeterminsm
◦ library functions, evaluation order, variable sizes
 Like a high-level assembly language
 Array-of-cells model of memory
 Very efficient code generation follows from close
semantic match
 Language lets you do just about everything
 Very easy to make mistakes

Weitere ähnliche Inhalte

Was ist angesagt?

C programming basics
C  programming basicsC  programming basics
C programming basicsargusacademy
 
Introduction to c
Introduction to cIntroduction to c
Introduction to camol_chavan
 
Hands-on Introduction to the C Programming Language
Hands-on Introduction to the C Programming LanguageHands-on Introduction to the C Programming Language
Hands-on Introduction to the C Programming LanguageVincenzo De Florio
 
Introduction to C Programming - I
Introduction to C Programming - I Introduction to C Programming - I
Introduction to C Programming - I vampugani
 
C Programming Language Tutorial for beginners - JavaTpoint
C Programming Language Tutorial for beginners - JavaTpointC Programming Language Tutorial for beginners - JavaTpoint
C Programming Language Tutorial for beginners - JavaTpointJavaTpoint.Com
 
introduction to C programming (C)
introduction to C programming (C)introduction to C programming (C)
introduction to C programming (C)Abhishek Walia
 
introduction to c programming language
introduction to c programming languageintroduction to c programming language
introduction to c programming languagesanjay joshi
 
Introduction to C programming
Introduction to C programmingIntroduction to C programming
Introduction to C programmingRokonuzzaman Rony
 
COM1407: Introduction to C Programming
COM1407: Introduction to C Programming COM1407: Introduction to C Programming
COM1407: Introduction to C Programming Hemantha Kulathilake
 
Advanced C Language for Engineering
Advanced C Language for EngineeringAdvanced C Language for Engineering
Advanced C Language for EngineeringVincenzo De Florio
 
A brief introduction to C Language
A brief introduction to C LanguageA brief introduction to C Language
A brief introduction to C LanguageMohamed Elsayed
 

Was ist angesagt? (20)

C PROGRAMMING
C PROGRAMMINGC PROGRAMMING
C PROGRAMMING
 
C programming basics
C  programming basicsC  programming basics
C programming basics
 
Introduction to C Programming
Introduction to C ProgrammingIntroduction to C Programming
Introduction to C Programming
 
C program
C programC program
C program
 
Introduction to c
Introduction to cIntroduction to c
Introduction to c
 
Hands-on Introduction to the C Programming Language
Hands-on Introduction to the C Programming LanguageHands-on Introduction to the C Programming Language
Hands-on Introduction to the C Programming Language
 
Introduction to C Programming - I
Introduction to C Programming - I Introduction to C Programming - I
Introduction to C Programming - I
 
C Programming Language Tutorial for beginners - JavaTpoint
C Programming Language Tutorial for beginners - JavaTpointC Programming Language Tutorial for beginners - JavaTpoint
C Programming Language Tutorial for beginners - JavaTpoint
 
C_Programming_Notes_ICE
C_Programming_Notes_ICEC_Programming_Notes_ICE
C_Programming_Notes_ICE
 
introduction to C programming (C)
introduction to C programming (C)introduction to C programming (C)
introduction to C programming (C)
 
introduction to c programming language
introduction to c programming languageintroduction to c programming language
introduction to c programming language
 
C programming
C programmingC programming
C programming
 
Introduction to C programming
Introduction to C programmingIntroduction to C programming
Introduction to C programming
 
C Language
C LanguageC Language
C Language
 
The smartpath information systems c pro
The smartpath information systems c proThe smartpath information systems c pro
The smartpath information systems c pro
 
COM1407: Introduction to C Programming
COM1407: Introduction to C Programming COM1407: Introduction to C Programming
COM1407: Introduction to C Programming
 
Advanced C Language for Engineering
Advanced C Language for EngineeringAdvanced C Language for Engineering
Advanced C Language for Engineering
 
C tutorial
C tutorialC tutorial
C tutorial
 
A brief introduction to C Language
A brief introduction to C LanguageA brief introduction to C Language
A brief introduction to C Language
 
C languaGE UNIT-1
C languaGE UNIT-1C languaGE UNIT-1
C languaGE UNIT-1
 

Ähnlich wie C language introduction

Ähnlich wie C language introduction (20)

C language
C languageC language
C language
 
Clanguage
ClanguageClanguage
Clanguage
 
Introduction to c language and its application.ppt
Introduction to c language and its application.pptIntroduction to c language and its application.ppt
Introduction to c language and its application.ppt
 
anjaan007
anjaan007anjaan007
anjaan007
 
C Programming language
C Programming languageC Programming language
C Programming language
 
Clanguage
ClanguageClanguage
Clanguage
 
Clanguage
ClanguageClanguage
Clanguage
 
Clanguage
ClanguageClanguage
Clanguage
 
Programming in C sesion 2
Programming in C sesion 2Programming in C sesion 2
Programming in C sesion 2
 
Theory1&amp;2
Theory1&amp;2Theory1&amp;2
Theory1&amp;2
 
More Pointers and Arrays
More Pointers and ArraysMore Pointers and Arrays
More Pointers and Arrays
 
C++11: Feel the New Language
C++11: Feel the New LanguageC++11: Feel the New Language
C++11: Feel the New Language
 
C
CC
C
 
Report on c and c++
Report on c and c++Report on c and c++
Report on c and c++
 
cp05.pptx
cp05.pptxcp05.pptx
cp05.pptx
 
Oh Crap, I Forgot (Or Never Learned) C! [CodeMash 2010]
Oh Crap, I Forgot (Or Never Learned) C! [CodeMash 2010]Oh Crap, I Forgot (Or Never Learned) C! [CodeMash 2010]
Oh Crap, I Forgot (Or Never Learned) C! [CodeMash 2010]
 
1183 c-interview-questions-and-answers
1183 c-interview-questions-and-answers1183 c-interview-questions-and-answers
1183 c-interview-questions-and-answers
 
Csdfsadf
CsdfsadfCsdfsadf
Csdfsadf
 
C
CC
C
 
C
CC
C
 

Kürzlich hochgeladen

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Kürzlich hochgeladen (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

C language introduction

  • 1.
  • 2.  Currently, the most commonly-used language for embedded systems  “High-level assembly”  Very portable: compilers exist for virtually every processor  Easy-to-understand compilation  Produces efficient code  Fairly concise
  • 3.  Developed between 1969 and 1973 along with Unix  Due mostly to Dennis Ritchie  Designed for systems programming ◦ Operating systems ◦ Utility programs ◦ Compilers ◦ Filters  Evolved from B, which evolved from BCPL
  • 4.  Designed by Martin Richards (Cambridge) in 1967  Typeless ◦ Everything an n-bit integer (a machine word) ◦ Pointers (addresses) and integers identical  Memory is an undifferentiated array of words  Natural model for word-addressed machines  Local variables depend on frame-pointer-relative addressing: dynamically-sized automatic objects not permitted  Strings awkward ◦ Routines expand and pack bytes to/from word arrays
  • 5.  Original machine (DEC PDP- 11) was very small ◦ 24K bytes of memory, 12K used for operating system  Written when computers were big, capital equipment ◦ Group would get one, develop new language, OS
  • 6.  Many language features designed to reduce memory ◦ Forward declarations required for everything ◦ Designed to work in one pass: must know everything ◦ No function nesting  PDP-11 was byte-addressed ◦ Now standard ◦ Meant BCPL’s word-based model was insufficient
  • 7. #include <stdio.h> void main() { printf(“Hello, world!n”); } Preprocessor used to share information among source files - Clumsy + Cheaply implemented + Very flexible
  • 8. #include <stdio.h> void main() { printf(“Hello, world!n”); } Program mostly a collection of functions “main” function special: the entry point “void” qualifier indicates function does not return anything I/O performed by a library function: not included in the language
  • 9. int gcd(int m, int n) { int r; while ( (r = m % n) != 0) { m = n; n = r; } return n; } “New Style” function declaration lists number and type of arguments Originally only listed return type. Generated code did not care how many arguments were actually passed. Arguments are call- by-value
  • 10. int gcd(int m, int n) { int r; while ( (r = m % n) != 0) { m = n; n = r; } return n; } Automatic variable Storage allocated on stack when function entered, released when it returns. All parameters, automatic variables accessed w.r.t. frame pointer. Extra storage needed while evaluating large expressions also placed on the stack n m ret. addr. r Frame pointer Stack pointer Excess arguments simply ignored
  • 11. int gcd(int m, int n) { int r; while ( (r = m % n) != 0) { m = n; n = r; } return n; } Expression: C’s basic type of statement. Arithmetic and logical Assignment (=) returns a value, so can be used in expressions % is remainder != is not equal
  • 12. int gcd(int m, int n) { int r; while ( (r = m % n) != 0) { m = n; n = r; } return n; } High-level control-flow statement. Ultimately becomes a conditional branch. Supports “structured programming” Each function returns a single value, usually an integer. Returned through a specific register by convention.
  • 13. .globl _gcd r0-r7 .text PC is r7, SP is r6, FP is r5 _gcd: jsr r5,rsave save sp in frame pointer r5 L2:mov 4(r5),r1 r1 = n sxt r0 sign extend div 6(r5),r0 m / n = r0,r1 mov r1,-10(r5) r = m % n jeq L3 mov 6(r5),4(r5) m = n mov -10(r5),6(r5) n = r jbr L2 L3:mov 6(r5),r0 return n in r0 jbr L1 L1:jmp rretrn restore sp ptr, return int gcd(int m, int n) { int r; while ( (r = m % n) != 0) { m = n; n = r; } return n; }
  • 14. .globl _gcd .text _gcd: jsr r5,rsave L2:mov 4(r5),r1 sxt r0 div 6(r5),r0 mov r1,-10(r5) jeq L3 mov 6(r5),4(r5) mov -10(r5),6(r5) jbr L2 L3:mov 6(r5),r0 jbr L1 L1:jmp rretrn Very natural mapping from C into PDP-11 instructions. Complex addressing modes make frame-pointer-relative accesses easy. Another idiosyncrasy: registers were memory-mapped, so taking address of a variable in a register is straightforward.
  • 15.  Types and Variables ◦ Definitions of data in memory  Expressions ◦ Arithmetic, logical, and assignment operators in an infix notation  Statements ◦ Sequences of conditional, iteration, and branching instructions  Functions ◦ Groups of statements and variables invoked recursively
  • 16.  Basic types: char, int, float, and double  Meant to match the processor’s native types ◦ Natural translation into assembly ◦ Fundamentally nonportable  Declaration syntax: string of specifiers followed by a declarator  Declarator’s notation matches that in an expression  Access a symbol using its declarator and get the basic type back
  • 17. int i; int *j, k; unsigned char *ch; float f[10]; char nextChar(int, char*); int a[3][5][10]; int *func1(float); int (*func2)(void); Integer j: pointer to integer, int k ch: pointer to unsigned char Array of 10 floats 2-arg function Array of three arrays of five … function returning int * pointer to function returning int
  • 18.  Type declarations recursive, complicated.  Name new types with typedef  Instead of int (*func2)(void) use typedef int func2t(void); func2t *func2;
  • 19.  A struct is an object with named fields: struct { char *name; int x, y; int h, w; } box;  Accessed using “dot” notation: box.x = 5; box.y = 2;
  • 20.  Way to aggressively pack data in memory struct { unsigned int baud : 5; unsigned int div2 : 1; unsigned int use_external_clock : 1; } flags;  Compiler will pack these fields into words  Very implementation dependent: no guarantees of ordering, packing, etc.  Usually less efficient ◦ Reading a field requires masking and shifting
  • 21.  Can store objects of different types at different times union { int ival; float fval; char *sval; };  Useful for arrays of dissimilar objects  Potentially very dangerous  Good example of C’s philosophy ◦ Provide powerful mechanisms that can be abused
  • 22.  Most processors require n-byte objects to be in memory at address n*k  Side effect of wide memory busses  E.g., a 32-bit memory bus  Read from address 3 requires two accesses, shifting 4 3 2 1 4 3 2 1
  • 23.  Compilers add “padding” to structs to ensure proper alignment, especially for arrays  Pad to ensure alignment of largest object (with biggest requirement) struct { char a; int b; char c; }  Moral: rearrange to save memory a bbbb c a bbbb c Pad
  • 24. #include <stdlib.h> int global_static; static int file_static; void foo(int auto_param) { static int func_static; int auto_i, auto_a[10]; double *auto_d = malloc(sizeof(double)*5); } Linker-visible. Allocated at fixed location Visible within file. Allocated at fixed location. Visible within func. Allocated at fixed location.
  • 25. #include <stdlib.h> int global_static; static int file_static; void foo(int auto_param) { static int func_static; int auto_i, auto_a[10]; double *auto_d = malloc(sizeof(double)*5); } Space allocated on stack by function. Space allocated on stack by caller. Space allocated on heap by library routine.
  • 26.  Library routines for managing the heap int *a; a = (int *) malloc(sizeof(int) * k); a[5] = 3; free(a);  Allocate and free arbitrary-sized chunks of memory in any order
  • 27.  More flexible than automatic variables (stacked)  More costly in time and space ◦ malloc() and free() use complicated non-constant-time algorithms ◦ Each block generally consumes two additional words of memory  Pointer to next empty block  Size of this block  Common source of errors ◦ Using uninitialized memory ◦ Using freed memory ◦ Not allocating enough
  • 28.  Memory usage errors so pervasive, entire successful company (Pure Software) founded to sell tool to track them down  Purify tool inserts code that verifies each memory access  Reports accesses of uninitialized memory, unallocated memory, etc.  Publicly-available Electric Fence tool does something similar
  • 29.  What are malloc() and free() actually doing?  Pool of memory segments: Free malloc( )
  • 30.  Rules: ◦ Each segment contiguous in memory (no holes) ◦ Segments do not move once allocated  malloc() ◦ Find memory area large enough for segment ◦ Mark that memory is allocated  free() ◦ Mark the segment as unallocated
  • 31.  Three issues:  How to maintain information about free memory  The algorithm for locating a suitable block  The algorithm for freeing an allocated block
  • 32.  Three issues:  How to maintain information about free memory ◦ Linked list  The algorithm for locating a suitable block ◦ First-fit  The algorithm for freeing an allocated block ◦ Coalesce adjacent free blocks
  • 33. Next Size Next SizeSize Free block Allocated block malloc( ) First large-enough free block selected Free block divided into two Previous next pointer updated Newly-allocated region begins with a size value
  • 34. free(a) Appropriate position in free list identified Newly-freed region added to adjacent free regions
  • 35.  Many, many variants  Other “fit” algorithms  Segregation of objects by sizes ◦ 8-byte objects in one region, 16 in another, etc.  More intelligent list structures
  • 36.  An alternative: Memory pools  Separate management policy for each pool  Stack-based pool: can only free whole pool at once ◦ Very cheap operation ◦ Good for build-once data structures (e.g., compilers)  Pool for objects of a single size ◦ Useful in object-oriented programs  Not part of the C standard library
  • 37.  Array: sequence of identical objects in memory  int a[10]; means space for ten integers Filippo Brunelleschi, Ospdale degli Innocenti, Firenze, Italy, 1421  By itself, a is the address of the first integer  *a and a[0] mean the same thing  The address of a is not stored in memory: the compiler inserts code to compute it when it appears  Ritchie calls this interpretation the biggest conceptual jump from BCPL to C
  • 38.  Array declarations read right-to-left  int a[10][3][2];  “an array of ten arrays of three arrays of two ints”  In memory 2 2 2 3 2 2 2 3 2 2 2 3 ... 10 Seagram Building, Ludwig Mies van der Rohe,1957
  • 39.  Passing a multidimensional array as an argument requires all but the first dimension int a[10][3][2]; void examine( a[][3][2] ) { … }  Address for an access such as a[i][j][k] is a + k + 2*(j + 3*i)
  • 40.  Use arrays of pointers for variable-sized multidimensional arrays  You need to allocate space for and initialize the arrays of pointers int ***a;  a[3][5][4] expands to *(*(*(a+3)+5)+4) The value int ** int * int int ***a
  • 41.  Traditional mathematical expressions y = a*x*x + b*x + c;  Very rich set of expressions  Able to deal with arithmetic and bit manipulation
  • 42.  arithmetic: + – * / %  comparison: == != < <= > >=  bitwise logical: & | ^ ~  shifting: << >>  lazy logical: && || !  conditional: ? :  assignment: = += -=  increment/decrement: ++ --  sequencing: ,  pointer: * -> & []
  • 43.  and: & or: | xor: ^ not: ~ left shift: << right shift: >>  Useful for bit-field manipulations #define MASK 0x040 if (a & MASK) { … } /* Check bits */ c |= MASK; /* Set bits */ c &= ~MASK; /* Clear bits */ d = (a & MASK) >> 4; /* Select field */
  • 44.  “Short circuit” tests save time if ( a == 3 && b == 4 && c == 5 ) { … } equivalent to if (a == 3) { if (b ==4) { if (c == 5) { … } } }  Evaluation order (left before right) provides safety if ( i <= SIZE && a[i] == 0 ) { … }
  • 45.  c = a < b ? a + 1 : b – 1;  Evaluate first expression. If true, evaluate second, otherwise evaluate third.  Puts almost statement-like behavior in expressions.  BCPL allowed code in an expression: a := 5 + valof{ int i, s = 0; for (i = 0 ; i < 10 ; i++) s += a[I]; return s; }
  • 46.  Evaluating an expression often has side-effects a++ increment a afterwards a = 5 changes the value of a a = foo() function foo may have side-effects
  • 47.  From BCPL’s view of the world  Pointer arithmetic is natural: everything’s an integer int *p, *q; *(p+5) equivalent to p[5]  If p and q point into same array, p – q is number of elements between p and q.  Accessing fields of a pointed-to structure has a shorthand: p->field means (*p).field
  • 48.  Expression  Conditional ◦ if (expr) { … } else {…} ◦ switch (expr) { case c1: case c2: … }  Iteration ◦ while (expr) { … } zero or more iterations ◦ do … while (expr) at least one iteration ◦ for ( init ; valid ; next ) { … }  Jump ◦ goto label ◦ continue;go to start of loop ◦ break; exit loop or switch ◦ return expr; return from function
  • 49.  Performs multi-way branches switch (expr) { case 1: … break; case 5: case 6: … break; default: … break; } tmp = expr; if (tmp == 1) goto L1 else if (tmp == 5) goto L5 else if (tmp == 6) goto L6 else goto Default; L1: … goto Break; L5:; L6: … goto Break; Default: … goto Break; Break:
  • 50.  Sparse case labels tested sequentially if (e == 1) goto L1; else if (e == 10) goto L2; else if (e == 100) goto L3;  Dense cases use a jump table table = { L1, L2, Default, L4, L5 }; if (e >= 1 and e <= 5) goto table[e];  Clever compilers may combine these
  • 51.  A way to exit from deeply nested functions  A hack now a formal part of the standard library #include <setjmp.h> jmp_buf jmpbuf; void top(void) { switch (setjmp(jmpbuf)) { case 0: child(); break; case 1: /* longjmp called */ break; } } void deeplynested() { longjmp(jmpbuf, Space for a return address and registers (including stack pointer, frame pointer) Stores context, returns 0 Returns to context, making it appear setjmp() returned 1
  • 52.  Relatively late and awkward addition to the language  Symbolic constants #define PI 3.1415926535  Macros with arguments for emulating inlining #define min(x,y) ((x) < (y) ? (x) : (y))  Conditional compilation #ifdef __STDC__  File inclusion for sharing of declarations #include “myheaders.h”
  • 53.  Header file dependencies usually form a directed acyclic graph (DAG)  How do you avoid defining things twice?  Convention: surround each header (.h) file with a conditional: #ifndef __MYHEADER_H__ #define __MYHEADER_H__ /* Declarations */ #endif
  • 54.  Macros with arguments do not have function call semantics  Function Call: ◦ Each argument evaluated once, in undefined order, before function is called  Macro: ◦ Each argument evaluated once every time it appears in expansion text
  • 55.  Example: the “min” function int min(int a, int b) { if (a < b) return a; else return b; } #define min(a,b) ((a) < (b) ? (a) : (b))  Identical for min(5,x)  Different when evaluating expression has side- effect: min(a++,b) ◦ min function increments a once ◦ min macro may increment a twice if a < b
  • 56.  Text substitution can expose unexpected groupings #define mult(a,b) a*b mult(5+3,2+4)  Expands to 5 + 3 * 2 + 4  Operator precedence evaluates this as 5 + (3*2) + 4 = 15 not (5+3) * (2+4) = 48 as intended  Moral: By convention, enclose each macro argument in parenthesis: #define mult(a,b) (a)*(b)
  • 57.  Library routines ◦ malloc() returns a nondeterministically-chosen address ◦ Address used as a hash key produces nondeterministic results  Argument evaluation order ◦ myfunc( func1(), func2(), func3() ) ◦ func1, func2, and func3 may be called in any order  Word sizes int a; a = 1 << 16; /* Might be zero */ a = 1 << 32; /* Might be zero */
  • 58.  Uninitialized variables ◦ Automatic variables may take values from stack ◦ Global variables left to the whims of the OS  Reading the wrong value from a union ◦ union { int a; float b; } u; u.a = 10; printf(“%g”, u.b);  Pointer dereference ◦ *a undefined unless it points within an allocated array and has been initialized ◦ Very easy to violate these rules ◦ Legal: int a[10]; a[-1] = 3; a[10] = 2; a[11] = 5; ◦ int *a, *b; a - b only defined if a and b point into the same array
  • 59.  How to deal with nondeterminism? ◦ Caveat programmer  Studiously avoid nondeterministic constructs ◦ Compilers, lint, etc. don’t really help  Philosophy of C: get out of the programmer’s way  “C treats you like a consenting adult” ◦ Created by a systems programmer (Ritchie)  “Pascal treats you like a misbehaving child” ◦ Created by an educator (Wirth)  “Ada treats you like a criminal” ◦ Created by the Department of Defense
  • 60.  C evolved from the typeless languages BCPL and B  Array-of-bytes model of memory permeates the language  Original weak type system strengthened over time  C programs built from ◦ Variable and type declarations ◦ Functions ◦ Statements ◦ Expressions
  • 61.  Built from primitive types that match processor types  char, int, float, double, pointers  Struct and union aggregate heterogeneous objects  Arrays build sequences of identical objects  Alignment restrictions ensured by compiler  Multidimensional arrays  Three storage classes ◦ global, static (address fixed at compile time) ◦ automatic (on stack) ◦ heap (provided by malloc() and free() library calls)
  • 62.  Wide variety of operators ◦ Arithmetic + - * / ◦ Logical && || (lazy) ◦ Bitwise & | ◦ Comparison < <= ◦ Assignment = += *= ◦ Increment/decrement ++ -- ◦ Conditional ? :  Expressions may have side-effects
  • 63.  Expression  Conditional ◦ if-else switch  Iteration ◦ while do-while for(;;)  Branching ◦ goto break continue return  Awkward setjmp, longjmp library routines for non-local goto
  • 64.  Preprocessor ◦ symbolic constants ◦ inline-like functions ◦ conditional compilation ◦ file inclusion  Sources of nondeterminsm ◦ library functions, evaluation order, variable sizes
  • 65.  Like a high-level assembly language  Array-of-cells model of memory  Very efficient code generation follows from close semantic match  Language lets you do just about everything  Very easy to make mistakes