-
Notifications
You must be signed in to change notification settings - Fork 27
/
visitor.ml
142 lines (130 loc) · 5.81 KB
/
visitor.ml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
(*
*
* Copyright (c) 2001-2003,
* George C. Necula <[email protected]>
* Scott McPeak <[email protected]>
* Wes Weimer <[email protected]>
* Ben Liblit <[email protected]>
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* 3. The names of the contributors may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
* IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
* PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
* OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
*)
(****************************************************************
* Visitor support code
*
* The code in this file is copied from George Necula's excellent
* CIL project (https://people.eecs.berkeley.edu/~necula/cil/)
* with minor change to allow it to be used with an arbitrary AST.
****************************************************************)
(****************************************************************
* Visit action
*
* Visitor methods can request one of four actions on the AST.
****************************************************************)
(** Different visiting actions. 'a will be instantiated with [expr], [stmt],
etc. *)
type 'a visitAction =
SkipChildren (** Do not visit the children. Return
the node as it is. *)
| DoChildren (** Continue with the children of this
node. Rebuild the node on return
if any of the children changes
(use == test) *)
| ChangeTo of 'a (** Replace the expression with the
given one *)
| ChangeDoChildrenPost of 'a * ('a -> 'a) (** First consider that the entire
exp is replaced by the first
parameter. Then continue with
the children. On return rebuild
the node if any of the children
has changed and then apply the
function on the node *)
(****************************************************************
* Visitor engine
*
* These functions implement the various actions a visitor can
* request and provide helper functions for writing visitors.
*
* Note that the visitor functions implement a space-saving optimisation:
* if the result would be identical to the input value, they return the
* input value to avoid allocating another copy of the object.
* This optimisation is supported by the mapNoCopy, mapNoCopyList
* and doVisitList functions.
*
* This code is changed from the CIL original by replacing the
* "cilVisitor" type by "'v" so that the code is independent of
* the particular AST it is used with.
****************************************************************)
(*** Define the visiting engine ****)
(* visit all the nodes in an ASL tree *)
let doVisit (vis: 'v)
(action: 'a visitAction)
(children: 'v -> 'a -> 'a)
(node: 'a) : 'a =
match action with
SkipChildren -> node
| ChangeTo node' -> node'
| DoChildren -> children vis node
| ChangeDoChildrenPost(node', f) -> f (children vis node')
(* mapNoCopy is like map but avoid copying the list if the function does not
* change the elements. *)
let rec mapNoCopy (f: 'a -> 'a) = function
[] -> []
| (i :: resti) as li ->
let i' = f i in
let resti' = mapNoCopy f resti in
if i' != i || resti' != resti then i' :: resti' else li
let rec mapNoCopyList (f: 'a -> 'a list) = function
[] -> []
| (i :: resti) as li ->
let il' = f i in
let resti' = mapNoCopyList f resti in
match il' with
[i'] when i' == i && resti' == resti -> li
| _ -> il' @ resti'
(* not part of original cil framework *)
let rec mapOptionNoCopy (f: 'a -> 'a): ('a option -> 'a option) = function
| None -> None
| (Some x) as ox ->
let x' = f x in
if x' == x then ox else Some x'
(* A visitor for lists *)
let doVisitList (vis: 'v)
(action: 'a list visitAction)
(children: 'v -> 'a -> 'a)
(node: 'a) : 'a list =
match action with
SkipChildren -> [node]
| ChangeTo nodes' -> nodes'
| DoChildren -> [children vis node]
| ChangeDoChildrenPost(nodes', f) ->
f (mapNoCopy (fun n -> children vis n) nodes')
(****************************************************************
* End
****************************************************************)