“`<\/p>\n
\u5176\u4e2d` ` \u4e3a\u4e86\u6539\u5584\u751f\u6210\u7684\u53ef\u6267\u884c\u6587\u4ef6\u7684\u6027\u80fd\uff0c\u53ef\u4ee5\u6307\u5b9a\u4f18\u5316\u9009\u9879\uff0c\u4f8b\u5982\uff1a<\/p>\n “`<\/p>\n<\/figure>\n<\/p>\n
{"id":3629,"date":"2023-08-11T12:19:03","date_gmt":"2023-08-11T04:19:03","guid":{"rendered":"https:\/\/www.zhidianwl.net\/zhidianwl\/?p=3629"},"modified":"2023-08-11T12:19:03","modified_gmt":"2023-08-11T04:19:03","slug":"go%e8%af%ad%e8%a8%80%e6%98%af%e5%a6%82%e4%bd%95%e7%94%9f%e6%88%90exe%e7%9a%84","status":"publish","type":"post","link":"https:\/\/www.zhidianwl.net\/zhidianwl\/2023\/08\/11\/go%e8%af%ad%e8%a8%80%e6%98%af%e5%a6%82%e4%bd%95%e7%94%9f%e6%88%90exe%e7%9a%84\/","title":{"rendered":"go\u8bed\u8a00\u662f\u5982\u4f55\u751f\u6210exe\u7684?"},"content":{"rendered":"
Go\u8bed\u8a00\u751f\u6210\u53ef\u6267\u884c\u6587\u4ef6 (.exe) \u7684\u539f\u7406\u548c\u8be6\u7ec6\u4ecb\u7ecd\uff1a<\/p>\n
Go\uff08\u53c8\u79f0Golang\uff09\u662f\u4e00\u95e8\u5f00\u6e90\u7684\u7f16\u7a0b\u8bed\u8a00\uff0c\u7531Google\u5185\u90e8\u7684Robert Griesemer\u3001Rob Pike\u548cKen Thompson\u4e8e2007\u5e74\u8d77\u8fdb\u5c55\u8bbe\u8ba1\u548c\u5b9e\u73b0\uff0c\u7279\u522b\u64c5\u957f\u6784\u5efa\u9ad8\u6027\u80fd\u3001\u53ef\u6269\u5c55\u548c\u9ad8\u53ef\u9760\u6027\u7684\u670d\u52a1\u5668\u8f6f\u4ef6\u3002\u76f8\u8f83\u4e8e\u5176\u4ed6\u7f16\u7a0b\u8bed\u8a00\uff0cGo\u8bed\u8a00\u7684\u7279\u70b9\u4e4b\u4e00\u662f\u5b83\u53ef\u4ee5\u76f4\u63a5\u5c06\u6e90\u7801\u7f16\u8bd1\u6210\u72ec\u7acb\u7684\u53ef\u6267\u884c\u6587\u4ef6\uff08\u5728Windows\u7cfb\u7edf\u4e0b\u4e3a .exe \u6587\u4ef6\uff09\u3002<\/p>\n
Go\u751f\u6210\u53ef\u6267\u884c\u6587\u4ef6\u7684\u8fc7\u7a0b\u4e3b\u8981\u6709\u4ee5\u4e0b\u51e0\u4e2a\u6b65\u9aa4\uff1a<\/p>\n
1. \u8bcd\u6cd5\u5206\u6790\uff08Lexing\uff09\uff1a<\/p>\n
\u7f16\u8bd1\u5668\u9996\u5148\u8bfb\u53d6Go\u6e90\u4ee3\u7801\u6587\u4ef6\uff0c\u5e76\u5c06\u5176\u5185\u5bb9\u5206\u89e3\u6210\u4e00\u4e2a\u4e2a\u7684\u8bcd\u7d20\uff08Token\uff09\u3002\u6bcf\u4e2a\u8bcd\u7d20\u8868\u793a\u6e90\u4ee3\u7801\u7684\u4e00\u4e2a\u8bed\u6cd5\u5355\u5143\uff0c\u4f8b\u5982\u5173\u952e\u5b57\u3001\u6807\u8bc6\u7b26\u3001\u6570\u503c\u5b57\u9762\u91cf\u7b49\u3002<\/p>\n
2. \u8bed\u6cd5\u5206\u6790\uff08Parsing\uff09\uff1a<\/p>\n
\u5728\u5b8c\u6210\u8bcd\u6cd5\u5206\u6790\u540e\uff0c\u7f16\u8bd1\u5668\u5c06\u8bcd\u7d20\u6309\u7167Go\u8bed\u8a00\u7684\u8bed\u6cd5\u89c4\u5219\u91cd\u65b0\u7ec4\u5408\u6210\u4e00\u68f5\u62bd\u8c61\u8bed\u6cd5\u6811\uff08Abstract Syntax Tree\uff0c\u7b80\u79f0AST\uff09\u3002AST\u662fGo\u6e90\u7801\u7684\u7ed3\u6784\u5316\u8868\u8fbe\u5f62\u5f0f\uff0c\u4fbf\u4e8e\u7f16\u8bd1\u5668\u8fdb\u4e00\u6b65\u5206\u6790\u548c\u5904\u7406\u3002<\/p>\n
3. \u8bed\u4e49\u5206\u6790\uff08Semantic analysis\uff09\uff1a<\/p>\n
\u7f16\u8bd1\u5668\u5bf9AST\u8fdb\u884c\u904d\u5386\uff0c\u8fdb\u884c\u7c7b\u578b\u63a8\u65ad\u3001\u5e38\u91cf\u6c42\u503c\u3001\u53d8\u91cf\u58f0\u660e\u7684\u68c0\u67e5\u7b49\u5de5\u4f5c\uff0c\u4ee5\u786e\u4fdd\u6e90\u4ee3\u7801\u9075\u5faaGo\u8bed\u8a00\u7684\u8bed\u4e49\u89c4\u5219\u3002<\/p>\n
4. \u751f\u6210\u4e2d\u95f4\u4ee3\u7801\uff08Intermediate code generation\uff09\uff1a<\/p>\n
\u7f16\u8bd1\u5668\u5c06\u7ecf\u8fc7\u8bed\u4e49\u5206\u6790\u7684AST\u8f6c\u6362\u6210\u4f4e\u7ea7\u7684\u4e2d\u95f4\u8868\u793a\uff08\u901a\u5e38\u4e3aSSA\u8868\u793a\uff0c\u5373\u9759\u6001\u5355\u503c\u5206\u914d\u8868\u793a\uff09\u3002\u8fd9\u79cd\u4e2d\u95f4\u8868\u793a\u6709\u52a9\u4e8e\u540e\u7eed\u7684\u4ee3\u7801\u4f18\u5316\u548c\u76ee\u6807\u4ee3\u7801\u751f\u6210\u3002<\/p>\n
5. \u4ee3\u7801\u4f18\u5316\uff08Code optimization\uff09\uff1a<\/p>\n
\u5728\u751f\u6210\u4e2d\u95f4\u4ee3\u7801\u7684\u57fa\u7840\u4e0a\uff0c\u7f16\u8bd1\u5668\u5bf9\u5176\u8fdb\u884c\u4f18\u5316\uff0c\u4ee5\u4f7f\u5f97\u751f\u6210\u7684\u53ef\u6267\u884c\u6587\u4ef6\u8fd0\u884c\u66f4\u52a0\u9ad8\u6548\u3002\u4e3b\u8981\u5305\u62ec\u6d88\u9664\u5197\u4f59\u4ee3\u7801\u3001\u5e38\u91cf\u6298\u53e0\u3001\u5faa\u73af\u5c55\u5f00\u3001\u51fd\u6570\u5185\u8054\u7b49\u624b\u6bb5\u3002<\/p>\n
6. \u751f\u6210\u76ee\u6807\u4ee3\u7801\uff08Target code generation\uff09\uff1a<\/p>\n
\u7f16\u8bd1\u5668\u6839\u636e\u76ee\u6807\u5e73\u53f0\uff08\u5982x86\u3001ARM\u7b49\uff09\u5c06\u4f18\u5316\u540e\u7684\u4e2d\u95f4\u8868\u793a\u8f6c\u6362\u6210\u673a\u5668\u4ee3\u7801\uff0c\u5e76\u751f\u6210\u5bf9\u5e94\u7684\u76ee\u6807\u6587\u4ef6\uff08\u5982Windows\u4e0b\u7684 .exe \u6587\u4ef6\uff09\u3002\u8fd9\u4e2a\u8fc7\u7a0b\u4e2d\u7f16\u8bd1\u5668\u9700\u8981\u5904\u7406\u5e73\u53f0\u76f8\u5173\u7684\u4e8c\u8fdb\u5236\u683c\u5f0f\u3001\u8c03\u7528\u7ea6\u5b9a\u3001\u5bfb\u5740\u6a21\u5f0f\u7b49\u95ee\u9898\u3002<\/p>\n
7. \u94fe\u63a5\uff08Linking\uff09\uff1a<\/p>\n
Go\u7f16\u8bd1\u5668\u652f\u6301\u9759\u6001\u94fe\u63a5\uff0c\u8fd9\u610f\u5473\u7740\u6240\u6709\u4f9d\u8d56\u7684\u5e93\uff08\u5305\u62ecGo\u6807\u51c6\u5e93\uff09\u90fd\u4f1a\u5185\u5d4c\u5230\u751f\u6210\u7684\u53ef\u6267\u884c\u6587\u4ef6\u4e2d\u3002\u8fd9\u6837\u4e00\u6765\uff0c\u53ef\u6267\u884c\u6587\u4ef6\u5728\u8fd0\u884c\u65f6\u4e0d\u518d\u9700\u8981\u5916\u90e8\u7684\u52a8\u6001\u94fe\u63a5\u5e93\uff08\u5982 .dll \u6216 .so\uff09\uff0c\u6613\u4e8e\u5206\u53d1\u548c\u90e8\u7f72\u3002<\/p>\n