1 /* 2 * fset2.c 3 * 4 * Compute FIRST sets for full LL(k) 5 * 6 * SOFTWARE RIGHTS 7 * 8 * We reserve no LEGAL rights to the Purdue Compiler Construction Tool 9 * Set (PCCTS) -- PCCTS is in the public domain. An individual or 10 * company may do whatever they wish with source code distributed with 11 * PCCTS or the code generated by PCCTS, including the incorporation of 12 * PCCTS, or its output, into commerical software. 13 * 14 * We encourage users to develop software with PCCTS. However, we do ask 15 * that credit is given to us for developing PCCTS. By "credit", 16 * we mean that if you incorporate our source code into one of your 17 * programs (commercial product, research project, or otherwise) that you 18 * acknowledge this fact somewhere in the documentation, research report, 19 * etc... If you like PCCTS and have developed a nice tool with the 20 * output, please mention that you developed it using PCCTS. In 21 * addition, we ask that this header remain intact in our source code. 22 * As long as these guidelines are kept, we expect to continue enhancing 23 * this system and expect to make other tools available as they are 24 * completed. 25 * 26 * ANTLR 1.33 27 * Terence Parr 28 * Parr Research Corporation 29 * with Purdue University and AHPCRC, University of Minnesota 30 * 1989-2001 31 */ 32 33 #include <stdio.h> 34 #include "pcctscfg.h" 35 #include <stdlib.h> 36 37 #ifdef PCCTS_USE_STDARG 38 #include <stdarg.h> 39 #else 40 #include <varargs.h> 41 #endif 42 43 #include "set.h" 44 #include "syn.h" 45 #include "hash.h" 46 #include "generic.h" 47 #include "dlgdef.h" 48 49 /* ick! globals. Used by permute() to track which elements of a set have been used */ 50 51 static int *findex; 52 set *fset; /* MR11 make global */ 53 static unsigned **ftbl; 54 static set *constrain; /* pts into fset. constrains tToken() to 'constrain' */ 55 int ConstrainSearch; 56 int maxk; /* set to initial k upon tree construction request */ 57 /* MR11 make global */ 58 static Tree *FreeList = NULL; 59 60 #ifdef __USE_PROTOS 61 static int tmember_of_context(Tree *, Predicate *); 62 #else 63 static int tmember_of_context(); 64 #endif 65 66 #if TREE_DEBUG 67 set set_of_tnodes_in_use; 68 int stop_on_tnode_seq_number=(-1); /* (-1) to disable */ 69 #endif 70 71 /* Do root 72 * Then each sibling 73 */ 74 75 void 76 #ifdef __USE_PROTOS 77 preorder( Tree *tree ) 78 #else 79 preorder( tree ) 80 Tree *tree; 81 #endif 82 { 83 if ( tree == NULL ) return; 84 if ( tree->down != NULL ) fprintf(stderr, " ("); 85 if ( tree->token == ALT ) fprintf(stderr, " ALT"); 86 else fprintf(stderr, " %s", TerminalString(tree->token)); 87 if ( tree->token==EpToken ) fprintf(stderr, "(%d)", tree->v.rk); 88 preorder(tree->down); 89 if ( tree->down != NULL ) fprintf(stderr, " )"); 90 preorder(tree->right); 91 } 92 93 #ifdef __USE_PROTOS 94 int MR_tree_matches_constraints(int k,set * constrain,Tree *t) 95 #else 96 int MR_tree_matches_constraints(k,constrain,t) 97 int k; 98 set * constrain; 99 Tree * t; 100 #endif 101 { 102 int i; 103 Tree *u; 104 105 if (k == 0) return 1; 106 107 /* for testing guard predicates: if the guard tree is shorter 108 than the constraint then it is a match. The reason is that 109 a guard of (A B) should be equivalent to a guard of (A B . . .) 110 where "." matches every token. Thus a match which runs out 111 of tree before constraint is a match. 112 */ 113 114 if (t == NULL) return 1; 115 require (set_deg(constrain[0]) == 1, 116 "MR_tree_matches_constraints: set_deg != 1"); 117 i=set_int(constrain[0]); 118 if (t->token != i) return 0; 119 if (k-1 == 0) return 1; 120 for (u=t->down; u != NULL; u=u->right) { 121 if (MR_tree_matches_constraints(k-1,&constrain[1],u)) { 122 return 1; 123 }; 124 }; 125 return 0; 126 } 127 128 /* check the depth of each primary sibling to see that it is exactly 129 * k deep. e.g.; 130 * 131 * ALT 132 * | 133 * A ------- B 134 * | | 135 * C -- D E 136 * 137 * Remove all branches <= k deep. 138 * 139 * Added by TJP 9-23-92 to make the LL(k) constraint mechanism to work. 140 */ 141 142 static int pruneCount=0; 143 static int prunePeak=200; 144 145 Tree * 146 #ifdef __USE_PROTOS 147 prune( Tree *t, int k ) 148 #else 149 prune( t, k ) 150 Tree *t; 151 int k; 152 #endif 153 { 154 pruneCount++; 155 if (pruneCount > prunePeak+100) { 156 prunePeak=pruneCount; 157 #if 0 158 *** fprintf(stderr,"pruneCount=%d\n",pruneCount); 159 /*** preorder(t); ***/ 160 *** fprintf(stderr,"\n",pruneCount); 161 #endif 162 }; 163 if ( t == NULL ) { 164 pruneCount--; 165 return NULL; 166 }; 167 if ( t->token == ALT ) fatal_internal("prune: ALT node in FIRST tree"); 168 if ( t->right!=NULL ) t->right = prune(t->right, k); 169 if ( k>1 ) 170 { 171 if ( t->down!=NULL ) t->down = prune(t->down, k-1); 172 if ( t->down == NULL ) 173 { 174 Tree *r = t->right; 175 t->right = NULL; 176 Tfree(t); 177 pruneCount--; 178 return r; 179 } 180 } 181 pruneCount--; 182 return t; 183 } 184 185 /* build a tree (root child1 child2 ... NULL) */ 186 #ifdef PCCTS_USE_STDARG 187 Tree *tmake(Tree *root, ...) 188 #else 189 Tree *tmake(va_alist) 190 va_dcl 191 #endif 192 { 193 Tree *w; 194 va_list ap; 195 Tree *child, *sibling=NULL, *tail=NULL; 196 #ifndef PCCTS_USE_STDARG 197 Tree *root; 198 #endif 199 200 #ifdef PCCTS_USE_STDARG 201 va_start(ap, root); 202 #else 203 va_start(ap); 204 root = va_arg(ap, Tree *); 205 #endif 206 child = va_arg(ap, Tree *); 207 while ( child != NULL ) 208 { 209 #ifdef DUM 210 /* added "find end of child" thing TJP March 1994 */ 211 for (w=child; w->right!=NULL; w=w->right) {;} /* find end of child */ 212 #else 213 w = child; 214 #endif 215 216 if ( sibling == NULL ) {sibling = child; tail = w;} 217 else {tail->right = child; tail = w;} 218 child = va_arg(ap, Tree *); 219 } 220 221 /* was "root->down = sibling;" */ 222 if ( root==NULL ) root = sibling; 223 else root->down = sibling; 224 225 va_end(ap); 226 return root; 227 } 228 229 Tree * 230 #ifdef __USE_PROTOS 231 tnode( int tok ) 232 #else 233 tnode( tok ) 234 int tok; 235 #endif 236 { 237 Tree *p, *newblk; 238 static int n=0; 239 240 if ( FreeList == NULL ) 241 { 242 /*fprintf(stderr, "tnode: %d more nodes\n", TreeBlockAllocSize);*/ 243 if ( TreeResourceLimit > 0 ) 244 { 245 if ( (n+TreeBlockAllocSize) >= TreeResourceLimit ) 246 { 247 fprintf(stderr, ErrHdr, FileStr[CurAmbigfile], CurAmbigline); 248 fprintf(stderr, " hit analysis resource limit while analyzing alts %d and %d %s\n", 249 CurAmbigAlt1, 250 CurAmbigAlt2, 251 CurAmbigbtype); 252 exit(PCCTS_EXIT_FAILURE); 253 } 254 } 255 newblk = (Tree *)calloc(TreeBlockAllocSize, sizeof(Tree)); 256 if ( newblk == NULL ) 257 { 258 fprintf(stderr, ErrHdr, FileStr[CurAmbigfile], CurAmbigline); 259 fprintf(stderr, " out of memory while analyzing alts %d and %d %s\n", 260 CurAmbigAlt1, 261 CurAmbigAlt2, 262 CurAmbigbtype); 263 exit(PCCTS_EXIT_FAILURE); 264 } 265 n += TreeBlockAllocSize; 266 for (p=newblk; p<&(newblk[TreeBlockAllocSize]); p++) 267 { 268 p->right = FreeList; /* add all new Tree nodes to Free List */ 269 FreeList = p; 270 } 271 } 272 p = FreeList; 273 FreeList = FreeList->right; /* remove a tree node */ 274 p->right = NULL; /* zero out ptrs */ 275 p->down = NULL; 276 p->token = tok; 277 278 TnodesAllocated++; /* MR10 */ 279 TnodesInUse++; /* MR10 */ 280 if (TnodesInUse > TnodesPeak) TnodesPeak=TnodesInUse; /* MR10 */ 281 282 #ifdef TREE_DEBUG 283 require(!p->in_use, "tnode: node in use!"); 284 p->in_use = 1; 285 p->seq=TnodesAllocated; 286 set_orel( (unsigned) TnodesAllocated,&set_of_tnodes_in_use); 287 if (stop_on_tnode_seq_number == p->seq) { 288 fprintf(stderr,"\n*** just allocated tnode #%d ***\n", 289 stop_on_tnode_seq_number); 290 }; 291 #endif 292 return p; 293 } 294 295 static Tree * 296 #ifdef __USE_PROTOS 297 eofnode( int k ) 298 #else 299 eofnode( k ) 300 int k; 301 #endif 302 { 303 Tree *t=NULL; 304 int i; 305 306 for (i=1; i<=k; i++) 307 { 308 t = tmake(tnode((TokenInd!=NULL?TokenInd[EofToken]:EofToken)), t, NULL); 309 } 310 return t; 311 } 312 313 314 315 void 316 #ifdef __USE_PROTOS 317 _Tfree( Tree *t ) 318 #else 319 _Tfree( t ) 320 Tree *t; 321 #endif 322 { 323 if ( t!=NULL ) 324 { 325 #ifdef TREE_DEBUG 326 if (t->seq == stop_on_tnode_seq_number) { 327 fprintf(stderr,"\n*** just freed tnode #%d ***\n",t->seq); 328 }; 329 require(t->in_use, "_Tfree: node not in use!"); 330 t->in_use = 0; 331 set_rm( (unsigned) t->seq,set_of_tnodes_in_use); 332 #endif 333 t->right = FreeList; 334 FreeList = t; 335 TnodesInUse--; /* MR10 */ 336 } 337 } 338 339 /* tree duplicate */ 340 Tree * 341 #ifdef __USE_PROTOS 342 tdup( Tree *t ) 343 #else 344 tdup( t ) 345 Tree *t; 346 #endif 347 { 348 Tree *u; 349 350 if ( t == NULL ) return NULL; 351 u = tnode(t->token); 352 u->v.rk = t->v.rk; 353 u->right = tdup(t->right); 354 u->down = tdup(t->down); 355 return u; 356 } 357 358 /* tree duplicate (assume tree is a chain downwards) */ 359 Tree * 360 #ifdef __USE_PROTOS 361 tdup_chain( Tree *t ) 362 #else 363 tdup_chain( t ) 364 Tree *t; 365 #endif 366 { 367 Tree *u; 368 369 if ( t == NULL ) return NULL; 370 u = tnode(t->token); 371 u->v.rk = t->v.rk; 372 u->down = tdup(t->down); 373 return u; 374 } 375 376 Tree * 377 #ifdef __USE_PROTOS 378 tappend( Tree *t, Tree *u ) 379 #else 380 tappend( t, u ) 381 Tree *t; 382 Tree *u; 383 #endif 384 { 385 Tree *w; 386 387 /*** fprintf(stderr, "tappend("); 388 *** preorder(t); fprintf(stderr, ","); 389 *** preorder(u); fprintf(stderr, " )\n"); 390 */ 391 if ( t == NULL ) return u; 392 if ( t->token == ALT && t->right == NULL ) return tappend(t->down, u); 393 for (w=t; w->right!=NULL; w=w->right) {;} 394 w->right = u; 395 return t; 396 } 397 398 /* dealloc all nodes in a tree */ 399 void 400 #ifdef __USE_PROTOS 401 Tfree( Tree *t ) 402 #else 403 Tfree( t ) 404 Tree *t; 405 #endif 406 { 407 if ( t == NULL ) return; 408 Tfree( t->down ); 409 Tfree( t->right ); 410 _Tfree( t ); 411 } 412 413 /* find all children (alts) of t that require remaining_k nodes to be LL_k 414 * tokens long. 415 * 416 * t-->o 417 * | 418 * a1--a2--...--an <-- LL(1) tokens 419 * | | | 420 * b1 b2 ... bn <-- LL(2) tokens 421 * | | | 422 * . . . 423 * . . . 424 * z1 z2 ... zn <-- LL(LL_k) tokens 425 * 426 * We look for all [Ep] needing remaining_k nodes and replace with u. 427 * u is not destroyed or actually used by the tree (a copy is made). 428 */ 429 Tree * 430 #ifdef __USE_PROTOS 431 tlink( Tree *t, Tree *u, int remaining_k ) 432 #else 433 tlink( t, u, remaining_k ) 434 Tree *t; 435 Tree *u; 436 int remaining_k; 437 #endif 438 { 439 Tree *p; 440 require(remaining_k!=0, "tlink: bad tree"); 441 442 if ( t==NULL ) return NULL; 443 /*fprintf(stderr, "tlink: u is:"); preorder(u); fprintf(stderr, "\n");*/ 444 if ( t->token == EpToken && t->v.rk == remaining_k ) 445 { 446 require(t->down==NULL, "tlink: invalid tree"); 447 if ( u == NULL ) { 448 /* MR10 */ Tree *tt=t->right; 449 /* MR10 */ _Tfree(t); 450 /* MR10 */ return tt; 451 }; 452 p = tdup( u ); 453 p->right = t->right; 454 _Tfree( t ); 455 return p; 456 } 457 t->down = tlink(t->down, u, remaining_k); 458 t->right = tlink(t->right, u, remaining_k); 459 return t; 460 } 461 462 /* remove as many ALT nodes as possible while still maintaining semantics */ 463 Tree * 464 #ifdef __USE_PROTOS 465 tshrink( Tree *t ) 466 #else 467 tshrink( t ) 468 Tree *t; 469 #endif 470 { 471 if ( t == NULL ) return NULL; 472 t->down = tshrink( t->down ); 473 t->right = tshrink( t->right ); 474 if ( t->down == NULL ) 475 { 476 if ( t->token == ALT ) 477 { 478 Tree *u = t->right; 479 _Tfree(t); 480 return u; /* remove useless alts */ 481 } 482 return t; 483 } 484 485 /* (? (ALT (? ...)) s) ==> (? (? ...) s) where s = sibling, ? = match any */ 486 if ( t->token == ALT && t->down->right == NULL) 487 { 488 Tree *u = t->down; 489 u->right = t->right; 490 _Tfree( t ); 491 return u; 492 } 493 /* (? (A (ALT t)) s) ==> (? (A t) s) where A is a token; s,t siblings */ 494 if ( t->token != ALT && t->down->token == ALT && t->down->right == NULL ) 495 { 496 Tree *u = t->down->down; 497 _Tfree( t->down ); 498 t->down = u; 499 return t; 500 } 501 return t; 502 } 503 504 Tree * 505 #ifdef __USE_PROTOS 506 tflatten( Tree *t ) 507 #else 508 tflatten( t ) 509 Tree *t; 510 #endif 511 { 512 if ( t == NULL ) return NULL; 513 t->down = tflatten( t->down ); 514 t->right = tflatten( t->right ); 515 if ( t->down == NULL ) return t; 516 517 if ( t->token == ALT ) 518 { 519 Tree *u; 520 /* find tail of children */ 521 for (u=t->down; u->right!=NULL; u=u->right) {;} 522 u->right = t->right; 523 u = t->down; 524 _Tfree( t ); 525 return u; 526 } 527 return t; 528 } 529 530 Tree * 531 #ifdef __USE_PROTOS 532 tJunc( Junction *p, int k, set *rk ) 533 #else 534 tJunc( p, k, rk ) 535 Junction *p; 536 int k; 537 set *rk; 538 #endif 539 { 540 Tree *t=NULL, *u=NULL; 541 Junction *alt; 542 Tree *tail=NULL, *r; 543 544 #ifdef DBG_TRAV 545 fprintf(stderr, "tJunc(%d): %s in rule %s\n", k, 546 decodeJType[p->jtype], ((Junction *)p)->rname); 547 #endif 548 549 /* MR14 */ if (AlphaBetaTrace && p->alpha_beta_guess_end) { 550 /* MR14 */ warnFL( 551 /* MR14 */ "not possible to compute follow set for alpha in an \"(alpha)? beta\" block. ", 552 /* MR14 */ FileStr[p->file],p->line); 553 /* MR14 */ MR_alphaBetaTraceReport(); 554 /* MR14 */ }; 555 556 /* MR14 */ if (p->alpha_beta_guess_end) { 557 /* MR14 */ return NULL; 558 /* MR14 */ } 559 560 if ( p->jtype==aLoopBlk || p->jtype==RuleBlk || 561 p->jtype==aPlusBlk || p->jtype==aSubBlk || p->jtype==aOptBlk ) 562 { 563 if ( p->jtype!=aSubBlk && p->jtype!=aOptBlk ) { 564 require(p->lock!=NULL, "rJunc: lock array is NULL"); 565 if ( p->lock[k] ) return NULL; 566 p->lock[k] = TRUE; 567 } 568 569 /* MR10 */ if (MR_MaintainBackTrace) { 570 /* MR10 */ if (p->jtype != Generic) MR_pointerStackPush(&MR_BackTraceStack,p); 571 /* MR10 */ }; 572 573 TRAV(p->p1, k, rk, tail); 574 575 /* MR10 */ if (MR_MaintainBackTrace) { 576 /* MR10 */ if (p->jtype != Generic) MR_pointerStackPop(&MR_BackTraceStack); 577 /* MR10 */ }; 578 579 if ( p->jtype==RuleBlk ) {p->lock[k] = FALSE; return tail;} 580 r = tmake(tnode(ALT), tail, NULL); 581 for (alt=(Junction *)p->p2; alt!=NULL; alt = (Junction *)alt->p2) 582 { 583 /* if this is one of the added optional alts for (...)+ then break */ 584 if ( alt->ignore ) break; 585 586 if ( tail==NULL ) {TRAV(alt->p1, k, rk, tail); r->down = tail;} 587 else 588 { 589 /* MR10 */ if (MR_MaintainBackTrace) { 590 /* MR10 */ if (p->jtype != Generic) MR_pointerStackPush(&MR_BackTraceStack,p); 591 /* MR10 */ }; 592 593 TRAV(alt->p1, k, rk, tail->right); 594 595 /* MR10 */ if (MR_MaintainBackTrace) { 596 /* MR10 */ if (p->jtype != Generic) MR_pointerStackPop(&MR_BackTraceStack); 597 /* MR10 */ }; 598 if ( tail->right != NULL ) tail = tail->right; 599 } 600 } 601 if ( p->jtype!=aSubBlk && p->jtype!=aOptBlk ) p->lock[k] = FALSE; 602 #ifdef DBG_TREES 603 fprintf(stderr, "blk(%s) returns:",((Junction *)p)->rname); preorder(r); fprintf(stderr, "\n"); 604 #endif 605 if ( r->down == NULL ) {_Tfree(r); return NULL;} 606 return r; 607 } 608 609 if ( p->jtype==EndRule ) 610 { 611 if ( p->halt ) /* don't want FOLLOW here? */ 612 { 613 /**** if ( ContextGuardTRAV ) return NULL; ****/ 614 set_orel( (unsigned) k, rk); /* indicate this k value needed */ /* MR10 cast */ 615 t = tnode(EpToken); 616 t->v.rk = k; 617 return t; 618 } 619 require(p->lock!=NULL, "rJunc: lock array is NULL"); 620 if ( p->lock[k] ) return NULL; 621 /* if no FOLLOW assume k EOF's */ 622 if ( p->p1 == NULL ) return eofnode(k); 623 p->lock[k] = TRUE; 624 } 625 626 /* MR14 */ if (p->p1 != NULL && p->guess && p->guess_analysis_point == NULL) { 627 /* MR14 */ Node * guess_point; 628 /* MR14 */ guess_point=(Node *)analysis_point(p); 629 /* MR14 */ if (guess_point == (Node *)p) { 630 /* MR14 */ guess_point=p->p1; 631 /* MR14 */ } 632 /* MR14 */ p->guess_analysis_point=guess_point; 633 /* MR14 */ } 634 635 if ( p->p2 == NULL ) 636 { 637 638 /* MR10 */ if (MR_MaintainBackTrace) { 639 /* MR10 */ if (p->jtype != Generic) MR_pointerStackPush(&MR_BackTraceStack,p); 640 /* MR10 */ }; 641 642 /* M14 */ if (p->guess_analysis_point != NULL) { 643 /* M14 */ TRAV(p->guess_analysis_point, k, rk,t); 644 /* M14 */ } else { 645 TRAV(p->p1, k, rk,t); 646 /* M14 */ } 647 648 /* MR10 */ if (MR_MaintainBackTrace) { 649 /* MR10 */ if (p->jtype != Generic) MR_pointerStackPop(&MR_BackTraceStack); 650 /* MR10 */ }; 651 652 if ( p->jtype==EndRule ) p->lock[k]=FALSE; 653 return t; 654 } 655 656 /* MR10 */ if (MR_MaintainBackTrace) { 657 /* MR10 */ if (p->jtype != Generic) MR_pointerStackPush(&MR_BackTraceStack,p); 658 /* MR10 */ }; 659 660 /* M14 */ if (p->guess_analysis_point != NULL) { 661 /* M14 */ TRAV(p->guess_analysis_point, k, rk,t); 662 /* M14 */ } else { 663 TRAV(p->p1, k, rk,t); 664 /* M14 */ } 665 666 /* MR10 */ if (MR_MaintainBackTrace) { 667 /* MR10 */ if (p->jtype != Generic) MR_pointerStackPop(&MR_BackTraceStack); 668 /* MR10 */ }; 669 670 if ( p->jtype!=RuleBlk && /* MR14 */ !p->guess) TRAV(p->p2, k, rk, u); 671 672 if ( p->jtype==EndRule ) p->lock[k] = FALSE;/* unlock node */ 673 674 if ( t==NULL ) return tmake(tnode(ALT), u, NULL); 675 return tmake(tnode(ALT), t, u, NULL); 676 } 677 678 Tree * 679 #ifdef __USE_PROTOS 680 tRuleRef( RuleRefNode *p, int k, set *rk_out ) 681 #else 682 tRuleRef( p, k, rk_out ) 683 RuleRefNode *p; 684 int k; 685 set *rk_out; 686 #endif 687 { 688 int k2; 689 Tree *t=NULL, *u=NULL; 690 Junction *r; 691 set rk, rk2; 692 int save_halt; 693 RuleEntry *q = (RuleEntry *) hash_get(Rname, p->text); 694 695 #ifdef DBG_TRAV 696 fprintf(stderr, "tRuleRef: %s\n", p->text); 697 #endif 698 if ( q == NULL ) 699 { 700 TRAV(p->next, k, rk_out, t);/* ignore undefined rules */ 701 return t; 702 } 703 rk = rk2 = empty; 704 if (RulePtr == NULL) fatal("RulePtr==NULL"); 705 r = RulePtr[q->rulenum]; 706 if ( r->lock[k] ) return NULL; 707 save_halt = r->end->halt; 708 r->end->halt = TRUE; /* don't let reach fall off end of rule here */ 709 710 /* MR10 */ if (MR_MaintainBackTrace) { 711 /* MR10 */ MR_pointerStackPush(&MR_BackTraceStack,p); 712 /* MR10 */ }; 713 714 TRAV(r, k, &rk, t); 715 716 /* MR10 */ if (MR_MaintainBackTrace) { 717 /* MR10 */ MR_pointerStackPop(&MR_BackTraceStack); 718 /* MR10 */ }; 719 720 r->end->halt = save_halt; 721 #ifdef DBG_TREES 722 fprintf(stderr, "after ruleref, t is:"); preorder(t); fprintf(stderr, "\n"); 723 #endif 724 t = tshrink( t ); 725 while ( !set_nil(rk) ) { /* any k left to do? if so, link onto tree */ 726 k2 = set_int(rk); 727 set_rm(k2, rk); 728 729 /* MR10 */ if (MR_MaintainBackTrace) { 730 /* MR10 */ MR_pointerStackPush(&MR_BackTraceStack,p); 731 /* MR10 */ }; 732 733 TRAV(p->next, k2, &rk2, u); 734 735 /* MR10 */ if (MR_MaintainBackTrace) { 736 /* MR10 */ MR_pointerStackPop(&MR_BackTraceStack); 737 /* MR10 */ }; 738 739 t = tlink(t, u, k2); /* any alts missing k2 toks, add u onto end */ 740 Tfree(u); /* MR10 */ 741 } 742 set_free(rk); /* rk is empty, but free it's memory */ 743 set_orin(rk_out, rk2); /* remember what we couldn't do */ 744 set_free(rk2); 745 return t; 746 } 747 748 Tree * 749 #ifdef __USE_PROTOS 750 tToken( TokNode *p, int k, set *rk ) 751 #else 752 tToken( p, k, rk ) 753 TokNode *p; 754 int k; 755 set *rk; 756 #endif 757 { 758 Tree *t=NULL, *tset=NULL, *u; 759 760 if (ConstrainSearch) { 761 if (MR_AmbSourceSearch) { 762 require(constrain>=fset&&constrain<=&(fset[CLL_k]),"tToken: constrain is not a valid set"); 763 } else { 764 require(constrain>=fset&&constrain<=&(fset[LL_k]),"tToken: constrain is not a valid set"); 765 }; 766 constrain = &fset[maxk-k+1]; 767 } 768 769 #ifdef DBG_TRAV 770 fprintf(stderr, "tToken(%d): %s\n", k, TerminalString(p->token)); 771 if ( ConstrainSearch ) { 772 fprintf(stderr, "constrain is:"); s_fprT(stderr, *constrain); fprintf(stderr, "\n"); 773 } 774 #endif 775 776 /* is it a meta token (set of tokens)? */ 777 778 if ( !set_nil(p->tset) ) 779 { 780 unsigned e=0; 781 set a; 782 Tree *n, *tail = NULL; 783 784 if ( ConstrainSearch ) { 785 a = set_and(p->tset, *constrain); 786 if (set_nil(a)) { /* MR10 */ 787 set_free(a); /* MR11 */ 788 return NULL; /* MR10 */ 789 }; /* MR10 */ 790 } else { 791 a = set_dup(p->tset); 792 }; 793 794 for (; !set_nil(a); set_rm(e, a)) 795 { 796 e = set_int(a); 797 n = tnode(e); 798 if ( tset==NULL ) { tset = n; tail = n; } 799 else { tail->right = n; tail = n; } 800 } 801 set_free( a ); 802 } 803 else if ( ConstrainSearch && !set_el(p->token, *constrain) ) 804 { 805 /* fprintf(stderr, "ignoring token %s(%d)\n", TerminalString(p->token), 806 k);*/ 807 return NULL; 808 } 809 else { 810 tset = tnode( p->token ); 811 }; 812 813 /* MR10 */ if (MR_MaintainBackTrace) { 814 /* MR10 */ if (k == 1) { 815 /* MR10 */ MR_pointerStackPush(&MR_BackTraceStack,p); 816 /* MR13 */ if (MR_SuppressSearch) { 817 /* MR13 */ MR_suppressSearchReport(); 818 /* MR13 */ } else { 819 /* MR10 */ MR_backTraceReport(); 820 /* MR13 */ }; 821 /* MR10 */ MR_pointerStackPop(&MR_BackTraceStack); 822 /* MR11 */ Tfree(tset); 823 /* MR11 */ return NULL; 824 /* MR10 */ }; 825 /* MR10 */ }; 826 827 if ( k == 1 ) return tset; 828 829 if (MR_MaintainBackTrace) { 830 MR_pointerStackPush(&MR_BackTraceStack,p); 831 }; 832 833 TRAV(p->next, k-1, rk, t); 834 835 if (MR_MaintainBackTrace) { 836 Tfree(t); 837 Tfree(tset); 838 MR_pointerStackPop(&MR_BackTraceStack); 839 return NULL; 840 }; 841 842 /* here, we are positive that, at least, this tree will not contribute 843 * to the LL(2) tree since it will be too shallow, IF t==NULL. 844 * If doing a context guard walk, then don't prune. 845 */ 846 if ( t == NULL && !ContextGuardTRAV ) /* tree will be too shallow */ 847 { 848 if ( tset!=NULL ) Tfree( tset ); 849 return NULL; 850 } 851 #ifdef DBG_TREES 852 fprintf(stderr, "tToken(%d)->next:",k); preorder(t); fprintf(stderr, "\n"); 853 #endif 854 855 /* if single token root, then just make new tree and return */ 856 /* MR10 - set_nil(p->tset) isn't a good test because of ConstraintSearch */ 857 858 if (tset->right == NULL) return tmake(tset, t, NULL); /* MR10 */ 859 860 /* here we must make a copy of t as a child of each element of the tset; 861 * e.g., "T1..T3 A" would yield ( nil ( T1 A ) ( T2 A ) ( T3 A ) ) 862 */ 863 for (u=tset; u!=NULL; u=u->right) 864 { 865 /* make a copy of t and hook it onto bottom of u */ 866 u->down = tdup(t); 867 } 868 Tfree( t ); 869 #ifdef DBG_TREES 870 fprintf(stderr, "range is:"); preorder(tset); fprintf(stderr, "\n"); 871 #endif 872 return tset; 873 } 874 875 Tree * 876 #ifdef __USE_PROTOS 877 tAction( ActionNode *p, int k, set *rk ) 878 #else 879 tAction( p, k, rk ) 880 ActionNode *p; 881 int k; 882 set *rk; 883 #endif 884 { 885 Tree *t=NULL; 886 set *save_fset=NULL; 887 int i; 888 889 /* fprintf(stderr, "tAction\n"); */ 890 891 /* An MR_SuppressSearch is looking for things that can be 892 reached even when the predicate is false. 893 894 There are three kinds of predicates: 895 plain: r1: <<p>>? r2 896 guarded: r1: (A)? => <<p>>? r2 897 ampersand style: r1: (A)? && <<p>>? r2 898 899 Of the three kinds of predicates, only a guard predicate 900 has things which are reachable even when the predicate 901 is false. To be reachable the constraint must *not* 902 match the guard. 903 904 */ 905 906 if (p->is_predicate && MR_SuppressSearch) { 907 908 Predicate *pred=p->guardpred; 909 910 if (pred == NULL) { 911 t=NULL; 912 goto EXIT; 913 }; 914 constrain = &fset[maxk-k+1]; 915 if (pred->k == 1) { 916 set dif; 917 dif=set_dif(*constrain,pred->scontext[1]); 918 if (set_nil(dif)) { 919 set_free(dif); 920 t=NULL; 921 goto EXIT; 922 }; 923 set_free(dif); 924 } else { 925 if (MR_tree_matches_constraints(k,constrain,pred->tcontext)) { 926 t=NULL; 927 goto EXIT; 928 }; 929 } 930 }; 931 932 /* The ampersand predicate differs from the 933 other predicates because its first set 934 is a subset of the first set behind the predicate 935 936 r1: (A)? && <<p>>? r2 ; 937 r2: A | B; 938 939 In this case first[1] of r1 is A, even 940 though first[1] of r2 is {A B}. 941 */ 942 943 if (p->is_predicate && p->ampersandPred != NULL) { 944 945 Predicate *pred=p->ampersandPred; 946 Tree *tAND; 947 Tree *tset; 948 949 if (k <= pred->k) { 950 if (MR_MaintainBackTrace) MR_pointerStackPush(&MR_BackTraceStack,p); 951 TRAV(p->guardNodes,k,rk,t); 952 if (MR_MaintainBackTrace) MR_pointerStackPop(&MR_BackTraceStack); 953 return t; 954 } else { 955 require (k>1,"tAction for ampersandpred: k <= 1"); 956 if (ConstrainSearch) { 957 if (MR_AmbSourceSearch) { 958 require(constrain>=fset&&constrain<=&(fset[CLL_k]), 959 "tToken: constrain is not a valid set"); 960 } else { 961 require(constrain>=fset&&constrain<=&(fset[LL_k]), 962 "tToken: constrain is not a valid set"); 963 }; 964 save_fset=(set *) calloc (CLL_k+1,sizeof(set)); 965 require (save_fset != NULL,"tAction save_fset alloc"); 966 for (i=1; i <= CLL_k ; i++) { 967 save_fset[i]=set_dup(fset[i]); 968 }; 969 if (pred->k == 1) { 970 constrain = &fset[maxk-k+1]; 971 set_andin(constrain,pred->scontext[1]); 972 if (set_nil(*constrain)) { 973 t=NULL; 974 goto EXIT; 975 }; 976 } else { 977 constrain = &fset[maxk-k+1]; 978 if (! MR_tree_matches_constraints(pred->k,constrain,pred->tcontext)) { 979 t=NULL; 980 goto EXIT; 981 }; /* end loop on i */ 982 }; /* end loop on pred scontext/tcontext */ 983 }; /* end if on k > pred->k */ 984 }; /* end if on constrain search */ 985 986 TRAV(p->next,k,rk,t); 987 988 if (t != NULL) { 989 t=tshrink(t); 990 t=tflatten(t); 991 t=tleft_factor(t); 992 if (pred->tcontext != NULL) { 993 tAND=MR_computeTreeAND(t,pred->tcontext); 994 } else { 995 tset=MR_make_tree_from_set(pred->scontext[1]); 996 tAND=MR_computeTreeAND(t,tset); 997 Tfree(tset); 998 }; 999 Tfree(t); 1000 t=tAND; 1001 }; 1002 goto EXIT; 1003 1004 }; /* end if on ampersand predicate */ 1005 1006 TRAV(p->next,k,rk,t); 1007 1008 EXIT: 1009 if (save_fset != NULL) { 1010 for (i=1 ; i <= CLL_k ; i++) { 1011 set_free(fset[i]); 1012 fset[i]=save_fset[i]; 1013 }; 1014 free ( (char *) save_fset); 1015 }; 1016 return t; 1017 } 1018 1019 /* see if e exists in s as a possible input permutation (e is always a chain) */ 1020 1021 int 1022 #ifdef __USE_PROTOS 1023 tmember( Tree *e, Tree *s ) 1024 #else 1025 tmember( e, s ) 1026 Tree *e; 1027 Tree *s; 1028 #endif 1029 { 1030 if ( e==NULL||s==NULL ) return 0; 1031 /** fprintf(stderr, "tmember("); 1032 *** preorder(e); fprintf(stderr, ","); 1033 *** preorder(s); fprintf(stderr, " )\n"); 1034 */ 1035 if ( s->token == ALT && s->right == NULL ) return tmember(e, s->down); 1036 if ( e->token!=s->token ) 1037 { 1038 if ( s->right==NULL ) return 0; 1039 return tmember(e, s->right); 1040 } 1041 if ( e->down==NULL && s->down == NULL ) return 1; 1042 if ( tmember(e->down, s->down) ) return 1; 1043 if ( s->right==NULL ) return 0; 1044 return tmember(e, s->right); 1045 } 1046 1047 /* see if e exists in s as a possible input permutation (e is always a chain); 1048 * Only check s to the depth of e. In other words, 'e' can be a shorter 1049 * sequence than s. 1050 */ 1051 int 1052 #ifdef __USE_PROTOS 1053 tmember_constrained( Tree *e, Tree *s) 1054 #else 1055 tmember_constrained( e, s ) 1056 Tree *e; 1057 Tree *s; 1058 #endif 1059 { 1060 if ( e==NULL||s==NULL ) return 0; 1061 /** fprintf(stderr, "tmember_constrained("); 1062 *** preorder(e); fprintf(stderr, ","); 1063 *** preorder(s); fprintf(stderr, " )\n"); 1064 **/ 1065 if ( s->token == ALT && s->right == NULL ) 1066 return tmember_constrained(e, s->down); 1067 if ( e->token!=s->token ) 1068 { 1069 if ( s->right==NULL ) return 0; 1070 return tmember_constrained(e, s->right); 1071 } 1072 if ( e->down == NULL ) return 1; /* if s is matched to depth of e return */ 1073 if ( tmember_constrained(e->down, s->down) ) return 1; 1074 if ( s->right==NULL ) return 0; 1075 return tmember_constrained(e, s->right); 1076 } 1077 1078 /* combine (? (A t) ... (A u) ...) into (? (A t u)) */ 1079 Tree * 1080 #ifdef __USE_PROTOS 1081 tleft_factor( Tree *t ) 1082 #else 1083 tleft_factor( t ) 1084 Tree *t; 1085 #endif 1086 { 1087 Tree *u, *v, *trail, *w; 1088 1089 /* left-factor what is at this level */ 1090 if ( t == NULL ) return NULL; 1091 for (u=t; u!=NULL; u=u->right) 1092 { 1093 trail = u; 1094 v=u->right; 1095 while ( v!=NULL ) 1096 { 1097 if ( u->token == v->token ) 1098 { 1099 if ( u->down!=NULL ) 1100 { 1101 for (w=u->down; w->right!=NULL; w=w->right) {;} 1102 w->right = v->down; /* link children together */ 1103 } 1104 else u->down = v->down; 1105 trail->right = v->right; /* unlink factored node */ 1106 _Tfree( v ); 1107 v = trail->right; 1108 } 1109 else {trail = v; v=v->right;} 1110 } 1111 } 1112 /* left-factor what is below */ 1113 for (u=t; u!=NULL; u=u->right) u->down = tleft_factor( u->down ); 1114 return t; 1115 } 1116 1117 /* remove the permutation p from t if present */ 1118 Tree * 1119 #ifdef __USE_PROTOS 1120 trm_perm( Tree *t, Tree *p ) 1121 #else 1122 trm_perm( t, p ) 1123 Tree *t; 1124 Tree *p; 1125 #endif 1126 { 1127 /* 1128 fprintf(stderr, "trm_perm("); 1129 preorder(t); fprintf(stderr, ","); 1130 preorder(p); fprintf(stderr, " )\n"); 1131 */ 1132 if ( t == NULL || p == NULL ) return NULL; 1133 if ( t->token == ALT ) 1134 { 1135 t->down = trm_perm(t->down, p); 1136 if ( t->down == NULL ) /* nothing left below, rm cur node */ 1137 { 1138 Tree *u = t->right; 1139 _Tfree( t ); 1140 return trm_perm(u, p); 1141 } 1142 t->right = trm_perm(t->right, p); /* look for more instances of p */ 1143 return t; 1144 } 1145 if ( p->token != t->token ) /* not found, try a sibling */ 1146 { 1147 t->right = trm_perm(t->right, p); 1148 return t; 1149 } 1150 t->down = trm_perm(t->down, p->down); 1151 if ( t->down == NULL ) /* nothing left below, rm cur node */ 1152 { 1153 Tree *u = t->right; 1154 _Tfree( t ); 1155 return trm_perm(u, p); 1156 } 1157 t->right = trm_perm(t->right, p); /* look for more instances of p */ 1158 return t; 1159 } 1160 1161 /* add the permutation 'perm' to the LL_k sets in 'fset' */ 1162 void 1163 #ifdef __USE_PROTOS 1164 tcvt( set *fset, Tree *perm ) 1165 #else 1166 tcvt( fset, perm ) 1167 set *fset; 1168 Tree *perm; 1169 #endif 1170 { 1171 if ( perm==NULL ) return; 1172 set_orel(perm->token, fset); 1173 tcvt(fset+1, perm->down); 1174 } 1175 1176 /* for each element of ftbl[k], make it the root of a tree with permute(ftbl[k+1]) 1177 * as a child. 1178 */ 1179 Tree * 1180 #ifdef __USE_PROTOS 1181 permute( int k, int max_k ) 1182 #else 1183 permute( k, max_k ) 1184 int k, max_k; 1185 #endif 1186 { 1187 Tree *t, *u; 1188 1189 if ( k>max_k ) return NULL; 1190 if ( ftbl[k][findex[k]] == nil ) return NULL; 1191 t = permute(k+1, max_k); 1192 if ( t==NULL&&k<max_k ) /* no permutation left below for k+1 tokens? */ 1193 { 1194 findex[k+1] = 0; 1195 (findex[k])++; /* try next token at this k */ 1196 return permute(k, max_k); 1197 } 1198 1199 u = tmake(tnode(ftbl[k][findex[k]]), t, NULL); 1200 if ( k == max_k ) (findex[k])++; 1201 return u; 1202 } 1203 1204 /* Compute LL(k) trees for alts alt1 and alt2 of p. 1205 * function result is tree of ambiguous input permutations 1206 * 1207 * ALGORITHM may change to look for something other than LL_k size 1208 * trees ==> maxk will have to change. 1209 */ 1210 Tree * 1211 #ifdef __USE_PROTOS 1212 VerifyAmbig( Junction *alt1, Junction *alt2, unsigned **ft, set *fs, Tree **t, Tree **u, int *numAmbig ) 1213 #else 1214 VerifyAmbig( alt1, alt2, ft, fs, t, u, numAmbig ) 1215 Junction *alt1; 1216 Junction *alt2; 1217 unsigned **ft; 1218 set *fs; 1219 Tree **t; 1220 Tree **u; 1221 int *numAmbig; 1222 #endif 1223 { 1224 set rk; 1225 Tree *perm, *ambig=NULL; 1226 Junction *p; 1227 int k; 1228 int tnodes_at_start=TnodesAllocated; 1229 int tnodes_at_end; 1230 int tnodes_used; 1231 set *save_fs; 1232 int j; 1233 1234 save_fs=(set *) calloc(CLL_k+1,sizeof(set)); 1235 require(save_fs != NULL,"save_fs calloc"); 1236 1237 for (j=0; j <= CLL_k ; j++) save_fs[j]=set_dup(fs[j]); 1238 1239 maxk = LL_k; /* NOTE: for now, we look for LL_k */ 1240 ftbl = ft; 1241 fset = fs; 1242 constrain = &(fset[1]); 1243 findex = (int *) calloc(LL_k+1, sizeof(int)); 1244 if ( findex == NULL ) 1245 { 1246 fprintf(stderr, ErrHdr, FileStr[CurAmbigfile], CurAmbigline); 1247 fprintf(stderr, " out of memory while analyzing alts %d and %d of %s\n", 1248 CurAmbigAlt1, 1249 CurAmbigAlt2, 1250 CurAmbigbtype); 1251 exit(PCCTS_EXIT_FAILURE); 1252 } 1253 for (k=1; k<=LL_k; k++) findex[k] = 0; 1254 1255 rk = empty; 1256 ConstrainSearch = 1; /* consider only tokens in ambig sets */ 1257 1258 p = analysis_point((Junction *)alt1->p1); 1259 TRAV(p, LL_k, &rk, *t); 1260 *t = tshrink( *t ); 1261 *t = tflatten( *t ); 1262 *t = tleft_factor( *t ); /* MR10 */ 1263 *t = prune(*t, LL_k); 1264 *t = tleft_factor( *t ); 1265 1266 /*** fprintf(stderr, "after shrink&flatten&prune&left_factor:"); preorder(*t); fprintf(stderr, "\n");*/ 1267 if ( *t == NULL ) 1268 { 1269 /*** fprintf(stderr, "TreeIncomplete --> no LL(%d) ambiguity\n", LL_k);*/ 1270 Tfree( *t ); /* kill if impossible to have ambig */ 1271 *t = NULL; 1272 } 1273 1274 p = analysis_point((Junction *)alt2->p1); 1275 1276 TRAV(p, LL_k, &rk, *u); 1277 *u = tshrink( *u ); 1278 *u = tflatten( *u ); 1279 *t = tleft_factor( *t ); /* MR10 */ 1280 *u = prune(*u, LL_k); 1281 *u = tleft_factor( *u ); 1282 /* fprintf(stderr, "after shrink&flatten&prune&lfactor:"); preorder(*u); fprintf(stderr, "\n");*/ 1283 if ( *u == NULL ) 1284 { 1285 /* fprintf(stderr, "TreeIncomplete --> no LL(%d) ambiguity\n", LL_k);*/ 1286 Tfree( *u ); 1287 *u = NULL; 1288 } 1289 1290 for (k=1; k<=LL_k; k++) set_clr( fs[k] ); 1291 1292 ambig = tnode(ALT); 1293 k = 0; 1294 if ( *t!=NULL && *u!=NULL ) 1295 { 1296 while ( (perm=permute(1,LL_k))!=NULL ) 1297 { 1298 /* fprintf(stderr, "chk perm:"); preorder(perm); fprintf(stderr, "\n");*/ 1299 if ( tmember(perm, *t) && tmember(perm, *u) ) 1300 { 1301 /* fprintf(stderr, "ambig upon"); preorder(perm); fprintf(stderr, "\n");*/ 1302 1303 k++; 1304 perm->right = ambig->down; 1305 ambig->down = perm; 1306 tcvt(&(fs[1]), perm); 1307 } 1308 else Tfree( perm ); 1309 } 1310 } 1311 1312 for (j=0; j <= CLL_k ; j++) fs[j]=save_fs[j]; 1313 free( (char *) save_fs); 1314 1315 tnodes_at_end=TnodesAllocated; 1316 tnodes_used=tnodes_at_end - tnodes_at_start; 1317 1318 if (TnodesReportThreshold > 0 && tnodes_used > TnodesReportThreshold) { 1319 fprintf(stdout,"There were %d tuples whose ambiguity could not be resolved by full lookahead\n",k); 1320 fprintf(stdout,"There were %d tnodes created to resolve ambiguity between:\n\n",tnodes_used); 1321 fprintf(stdout," Choice 1: %s line %d file %s\n", 1322 MR_ruleNamePlusOffset( (Node *) alt1),alt1->line,FileStr[alt1->file]); 1323 fprintf(stdout," Choice 2: %s line %d file %s\n", 1324 MR_ruleNamePlusOffset( (Node *) alt2),alt2->line,FileStr[alt2->file]); 1325 for (j=1; j <= CLL_k ; j++) { 1326 fprintf(stdout,"\n Intersection of lookahead[%d] sets:\n",j); 1327 MR_dumpTokenSet(stdout,2,fs[j]); 1328 }; 1329 fprintf(stdout,"\n"); 1330 }; 1331 1332 *numAmbig = k; 1333 if ( ambig->down == NULL ) {_Tfree(ambig); ambig = NULL;} 1334 free( (char *)findex ); 1335 /* fprintf(stderr, "final ambig:"); preorder(ambig); fprintf(stderr, "\n");*/ 1336 return ambig; 1337 } 1338 1339 static Tree * 1340 #ifdef __USE_PROTOS 1341 bottom_of_chain( Tree *t ) 1342 #else 1343 bottom_of_chain( t ) 1344 Tree *t; 1345 #endif 1346 { 1347 if ( t==NULL ) return NULL; 1348 for (; t->down != NULL; t=t->down) {;} 1349 return t; 1350 } 1351 1352 /* 1353 * Make a tree from k sets where the degree of the first k-1 sets is 1. 1354 */ 1355 Tree * 1356 #ifdef __USE_PROTOS 1357 make_tree_from_sets( set *fset1, set *fset2 ) 1358 #else 1359 make_tree_from_sets( fset1, fset2 ) 1360 set *fset1; 1361 set *fset2; 1362 #endif 1363 { 1364 set inter; 1365 int i; 1366 Tree *t=NULL, *n, *u; 1367 unsigned *p,*q; 1368 require(LL_k>1, "make_tree_from_sets: LL_k must be > 1"); 1369 1370 /* do the degree 1 sets first */ 1371 for (i=1; i<=LL_k-1; i++) 1372 { 1373 inter = set_and(fset1[i], fset2[i]); 1374 require(set_deg(inter)==1, "invalid set to tree conversion"); 1375 n = tnode(set_int(inter)); 1376 if (t==NULL) t=n; else tmake(t, n, NULL); 1377 set_free(inter); 1378 } 1379 1380 /* now add the chain of tokens at depth k */ 1381 u = bottom_of_chain(t); 1382 inter = set_and(fset1[LL_k], fset2[LL_k]); 1383 if ( (q=p=set_pdq(inter)) == NULL ) fatal_internal("Can't alloc space for set_pdq"); 1384 /* first one is linked to bottom, then others are sibling linked */ 1385 n = tnode(*p++); 1386 u->down = n; 1387 u = u->down; 1388 while ( *p != nil ) 1389 { 1390 n = tnode(*p); 1391 u->right = n; 1392 u = u->right; 1393 p++; 1394 } 1395 free((char *)q); 1396 1397 return t; 1398 } 1399 1400 /* create and return the tree of lookahead k-sequences that are in t, but not 1401 * in the context of predicates in predicate list p. 1402 */ 1403 Tree * 1404 #ifdef __USE_PROTOS 1405 tdif( Tree *ambig_tuples, Predicate *p, set *fset1, set *fset2 ) 1406 #else 1407 tdif( ambig_tuples, p, fset1, fset2 ) 1408 Tree *ambig_tuples; 1409 Predicate *p; 1410 set *fset1; 1411 set *fset2; 1412 #endif 1413 { 1414 unsigned **ft; 1415 Tree *dif=NULL; 1416 Tree *perm; 1417 set b; 1418 int i,k; 1419 1420 if ( p == NULL ) return tdup(ambig_tuples); 1421 1422 ft = (unsigned **) calloc(CLL_k+1, sizeof(unsigned *)); 1423 require(ft!=NULL, "cannot allocate ft"); 1424 for (i=1; i<=CLL_k; i++) 1425 { 1426 b = set_and(fset1[i], fset2[i]); 1427 ft[i] = set_pdq(b); 1428 set_free(b); 1429 } 1430 findex = (int *) calloc(LL_k+1, sizeof(int)); 1431 if ( findex == NULL ) 1432 { 1433 fatal_internal("out of memory in tdif while checking predicates"); 1434 } 1435 for (k=1; k<=LL_k; k++) findex[k] = 0; 1436 1437 #ifdef DBG_TRAV 1438 fprintf(stderr, "tdif_%d[", p->k); 1439 preorder(ambig_tuples); 1440 fprintf(stderr, ","); 1441 preorder(p->tcontext); 1442 fprintf(stderr, "] ="); 1443 #endif 1444 1445 ftbl = ft; 1446 while ( (perm=permute(1,p->k))!=NULL ) 1447 { 1448 #ifdef DBG_TRAV 1449 fprintf(stderr, "test perm:"); preorder(perm); fprintf(stderr, "\n"); 1450 #endif 1451 if ( tmember_constrained(perm, ambig_tuples) && 1452 !tmember_of_context(perm, p) ) 1453 { 1454 #ifdef DBG_TRAV 1455 fprintf(stderr, "satisfied upon"); preorder(perm); fprintf(stderr, "\n"); 1456 #endif 1457 k++; 1458 if ( dif==NULL ) dif = perm; 1459 else 1460 { 1461 perm->right = dif; 1462 dif = perm; 1463 } 1464 } 1465 else Tfree( perm ); 1466 } 1467 1468 #ifdef DBG_TRAV 1469 preorder(dif); 1470 fprintf(stderr, "\n"); 1471 #endif 1472 1473 for (i=1; i<=CLL_k; i++) free( (char *)ft[i] ); 1474 free((char *)ft); 1475 free((char *)findex); 1476 1477 return dif; 1478 } 1479 1480 /* is lookahead sequence t a member of any context tree for any 1481 * predicate in p? 1482 */ 1483 static int 1484 #ifdef __USE_PROTOS 1485 tmember_of_context( Tree *t, Predicate *p ) 1486 #else 1487 tmember_of_context( t, p ) 1488 Tree *t; 1489 Predicate *p; 1490 #endif 1491 { 1492 for (; p!=NULL; p=p->right) 1493 { 1494 if ( p->expr==PRED_AND_LIST || p->expr==PRED_OR_LIST ) 1495 return tmember_of_context(t, p->down); 1496 if ( tmember_constrained(t, p->tcontext) ) return 1; 1497 if ( tmember_of_context(t, p->down) ) return 1; 1498 } 1499 return 0; 1500 } 1501 1502 int 1503 #ifdef __USE_PROTOS 1504 is_single_tuple( Tree *t ) 1505 #else 1506 is_single_tuple( t ) 1507 Tree *t; 1508 #endif 1509 { 1510 if ( t == NULL ) return 0; 1511 if ( t->right != NULL ) return 0; 1512 if ( t->down == NULL ) return 1; 1513 return is_single_tuple(t->down); 1514 } 1515 1516 1517 /* MR10 Check that a context guard contains only allowed things */ 1518 /* MR10 (mainly token references). */ 1519 1520 #ifdef __USE_PROTOS 1521 int contextGuardOK(Node *p,int h,int *hmax) 1522 #else 1523 int contextGuardOK(p,h,hmax) 1524 Node *p; 1525 int h; 1526 int *hmax; 1527 #endif 1528 { 1529 Junction *j; 1530 TokNode *tn; 1531 1532 if (p == NULL) return 1; 1533 if (p->ntype == nToken) { 1534 h++; 1535 if (h > *hmax) *hmax=h; 1536 tn=(TokNode *)p; 1537 if (tn->el_label != NULL) { 1538 warnFL(eMsg1("a label (\"%s\") for a context guard element is meaningless",tn->el_label), 1539 FileStr[p->file],p->line); 1540 }; 1541 return contextGuardOK( ( (TokNode *) p)->next,h,hmax); 1542 } else if (p->ntype == nAction) { 1543 goto Fail; 1544 } else if (p->ntype == nRuleRef) { 1545 goto Fail; 1546 } else { 1547 require (p->ntype == nJunction,"Unexpected ntype"); 1548 j=(Junction *) p; 1549 if (j->jtype != Generic && 1550 j->jtype != aSubBlk && /* pretty sure this one is allowed */ 1551 /**** j->jtype != aOptBlk && ****/ /* pretty sure this one is allowed */ /* MR11 not any more ! */ 1552 j->jtype != EndBlk) { 1553 errFL("A context guard may not contain an option block: {...} or looping block: (...)* or (...)+", 1554 FileStr[p->file],p->line); 1555 contextGuardOK(j->p1,h,hmax); 1556 return 0; 1557 }; 1558 /* do both p1 and p2 so use | rather than || */ 1559 return contextGuardOK(j->p2,h,hmax) | contextGuardOK(j->p1,h,hmax); 1560 }; 1561 Fail: 1562 errFL("A context guard may contain only Token references - guard will be ignored", 1563 FileStr[p->file],p->line); 1564 contextGuardOK( ( (ActionNode *) p)->next,h,hmax); 1565 return 0; 1566 } 1567 1568 /* 1569 * Look at a (...)? generalized-predicate context-guard and compute 1570 * either a lookahead set (k==1) or a lookahead tree for k>1. The 1571 * k level is determined by the guard itself rather than the LL_k 1572 * variable. For example, ( A B )? is an LL(2) guard and ( ID )? 1573 * is an LL(1) guard. For the moment, you can only have a single 1574 * tuple in the guard. Physically, the block must look like this 1575 * --o-->TOKEN-->o-->o-->TOKEN-->o-- ... -->o-->TOKEN-->o-- 1576 * An error is printed for any other type. 1577 */ 1578 Predicate * 1579 #ifdef __USE_PROTOS 1580 computePredFromContextGuard(Graph blk,int *msgDone) /* MR10 */ 1581 #else 1582 computePredFromContextGuard(blk,msgDone) /* MR10 */ 1583 Graph blk; 1584 int *msgDone; /* MR10 */ 1585 #endif 1586 { 1587 Junction *junc = (Junction *)blk.left, *p; 1588 Tree *t=NULL; 1589 Predicate *pred = NULL; 1590 set scontext, rk; 1591 int ok; 1592 int hmax=0; 1593 1594 require(junc!=NULL && junc->ntype == nJunction, "bad context guard"); 1595 1596 /* MR10 Check for anything other than Tokens and generic junctions */ 1597 1598 *msgDone=0; /* MR10 */ 1599 ok=contextGuardOK( (Node *)junc,0,&hmax); /* MR10 */ 1600 if (! ok) { /* MR10 */ 1601 *msgDone=1; /* MR10 */ 1602 return NULL; /* MR10 */ 1603 }; /* MR10 */ 1604 if (hmax == 0) { 1605 errFL("guard is 0 tokens long",FileStr[junc->file],junc->line); /* MR11 */ 1606 *msgDone=1; 1607 return NULL; 1608 }; 1609 if (hmax > CLL_k) { /* MR10 */ 1610 errFL(eMsgd2("guard is %d tokens long - lookahead is limited to max(k,ck)==%d", /* MR10 */ 1611 hmax,CLL_k), /* MR10 */ 1612 FileStr[junc->file],junc->line); /* MR10 */ 1613 *msgDone=1; /* MR10 */ 1614 return NULL; /* MR10 */ 1615 }; /* MR10 */ 1616 1617 rk = empty; 1618 p = junc; 1619 pred = new_pred(); 1620 pred->k = hmax; /* MR10 should be CLL_k, not LLK ? */ 1621 if (hmax > 1 ) /* MR10 was LL_k */ 1622 { 1623 ConstrainSearch = 0; 1624 ContextGuardTRAV = 1; 1625 TRAV(p, hmax, &rk, t); /* MR10 was LL_k */ 1626 ContextGuardTRAV = 0; 1627 set_free(rk); 1628 t = tshrink( t ); 1629 t = tflatten( t ); 1630 t = tleft_factor( t ); 1631 /* 1632 fprintf(stderr, "ctx guard:"); 1633 preorder(t); 1634 fprintf(stderr, "\n"); 1635 */ 1636 pred->tcontext = t; 1637 } 1638 else 1639 { 1640 REACH(p, 1, &rk, scontext); 1641 require(set_nil(rk), "rk != nil"); 1642 set_free(rk); 1643 /* 1644 fprintf(stderr, "LL(1) ctx guard is:"); 1645 s_fprT(stderr, scontext); 1646 fprintf(stderr, "\n"); 1647 */ 1648 pred->scontext[1] = scontext; 1649 } 1650 1651 list_add(&ContextGuardPredicateList,pred); /* MR13 */ 1652 1653 return pred; 1654 } 1655 1656 /* MR13 1657 When the context guard is originally computed the 1658 meta-tokens are not known. 1659 */ 1660 1661 #ifdef __USE_PROTOS 1662 void recomputeContextGuard(Predicate *pred) 1663 #else 1664 void recomputeContextGuard(pred) 1665 Predicate *pred; 1666 #endif 1667 { 1668 Tree * t=NULL; 1669 set scontext; 1670 set rk; 1671 ActionNode * actionNode; 1672 Junction * p; 1673 1674 actionNode=pred->source; 1675 require (actionNode != NULL,"context predicate's source == NULL"); 1676 1677 p=actionNode->guardNodes; 1678 require (p != NULL,"context predicate's guardNodes == NULL"); 1679 1680 rk = empty; 1681 if (pred->k > 1 ) 1682 { 1683 ConstrainSearch = 0; 1684 ContextGuardTRAV = 1; 1685 TRAV(p, pred->k, &rk, t); 1686 ContextGuardTRAV = 0; 1687 set_free(rk); 1688 t = tshrink( t ); 1689 t = tflatten( t ); 1690 t = tleft_factor( t ); 1691 Tfree(pred->tcontext); 1692 pred->tcontext = t; 1693 } 1694 else 1695 { 1696 REACH(p, 1, &rk, scontext); 1697 require(set_nil(rk), "rk != nil"); 1698 set_free(rk); 1699 set_free(pred->scontext[1]); 1700 pred->scontext[1] = scontext; 1701 } 1702 } 1703 1704 /* MR11 - had enough of flags yet ? */ 1705 1706 int MR_AmbSourceSearch=0; 1707 int MR_AmbSourceSearchGroup=0; 1708 int MR_AmbSourceSearchChoice=0; 1709 int MR_AmbSourceSearchLimit=0; 1710 int MR_matched_AmbAidRule=0; 1711 1712 static set *matchSets[2]={NULL,NULL}; 1713 static int *tokensInChain=NULL; 1714 static Junction *MR_AmbSourceSearchJ[2]; 1715 1716 void MR_traceAmbSourceKclient() 1717 { 1718 int i; 1719 set *save_fset; 1720 int save_ConstrainSearch; 1721 set incomplete; 1722 Tree *t; 1723 1724 if (matchSets[0] == NULL) { 1725 matchSets[0]=(set *) calloc (CLL_k+1,sizeof(set)); 1726 require (matchSets[0] != NULL,"matchSets[0] alloc"); 1727 matchSets[1]=(set *) calloc (CLL_k+1,sizeof(set)); 1728 require (matchSets[1] != NULL,"matchSets[1] alloc"); 1729 }; 1730 1731 for (i=1 ; i <= MR_AmbSourceSearchLimit ; i++) { 1732 set_clr(matchSets[0][i]); 1733 set_orel( (unsigned) tokensInChain[i], 1734 &matchSets[0][i]); 1735 set_clr(matchSets[1][i]); 1736 set_orel( (unsigned) tokensInChain[i], 1737 &matchSets[1][i]); 1738 }; 1739 1740 save_fset=fset; 1741 save_ConstrainSearch=ConstrainSearch; 1742 1743 1744 1745 for (i=0 ; i < 2 ; i++) { 1746 1747 #if 0 1748 ** fprintf(stdout," Choice:%d Depth:%d ",i+1,MR_AmbSourceSearchLimit); 1749 ** fprintf(stdout,"("); 1750 ** for (j=1 ; j <= MR_AmbSourceSearchLimit ; j++) { 1751 ** if (j != 1) fprintf(stdout," "); 1752 ** fprintf(stdout,"%s",TerminalString(tokensInChain[j])); 1753 ** }; 1754 ** fprintf(stdout,")\n\n"); 1755 #endif 1756 1757 fset=matchSets[i]; 1758 1759 MR_AmbSourceSearch=1; 1760 MR_MaintainBackTrace=1; 1761 MR_AmbSourceSearchChoice=i; 1762 ConstrainSearch=1; 1763 1764 maxk = MR_AmbSourceSearchLimit; 1765 1766 incomplete=empty; 1767 t=NULL; 1768 1769 constrain = &(fset[1]); 1770 MR_pointerStackReset(&MR_BackTraceStack); 1771 1772 TRAV(MR_AmbSourceSearchJ[i],maxk,&incomplete,t); 1773 1774 Tfree(t); 1775 1776 require (set_nil(incomplete),"MR_traceAmbSourceK TRAV incomplete"); 1777 require (MR_BackTraceStack.count == 0,"K: MR_BackTraceStack.count != 0"); 1778 1779 set_free(incomplete); 1780 }; 1781 1782 ConstrainSearch=save_ConstrainSearch; 1783 fset=save_fset; 1784 MR_AmbSourceSearch=0; 1785 MR_MaintainBackTrace=0; 1786 MR_AmbSourceSearchChoice=0; 1787 } 1788 1789 #ifdef __USE_PROTOS 1790 Tree *tTrunc(Tree *t,int depth) 1791 #else 1792 Tree *tTrunc(t,depth) 1793 Tree *t; 1794 #endif 1795 { 1796 Tree *u; 1797 1798 require ( ! (t == NULL && depth > 0),"tree too short"); 1799 1800 if (depth == 0) return NULL; 1801 1802 if (t->token == ALT) { 1803 u=tTrunc(t->down,depth); 1804 } else { 1805 u=tnode(t->token); 1806 u->down=tTrunc(t->down,depth-1); 1807 }; 1808 if (t->right != NULL) u->right=tTrunc(t->right,depth); 1809 return u; 1810 } 1811 1812 #ifdef __USE_PROTOS 1813 void MR_iterateOverTree(Tree *t,int chain[]) 1814 #else 1815 void MR_iterateOverTree(t,chain) 1816 Tree *t; 1817 int chain[]; 1818 #endif 1819 { 1820 if (t == NULL) return; 1821 chain[0]=t->token; 1822 if (t->down != NULL) { 1823 MR_iterateOverTree(t->down,&chain[1]); 1824 } else { 1825 MR_traceAmbSourceKclient(); 1826 }; 1827 MR_iterateOverTree(t->right,&chain[0]); 1828 chain[0]=0; 1829 } 1830 1831 #ifdef __USE_PROTOS 1832 void MR_traceAmbSourceK(Tree *t,Junction *alt1,Junction *alt2) 1833 #else 1834 void MR_traceAmbSourceK(t,alt1,alt2) 1835 Tree *t; 1836 Junction *alt1; 1837 Junction *alt2; 1838 #endif 1839 { 1840 int i; 1841 int depth; 1842 int maxDepth; 1843 Tree *truncatedTree; 1844 1845 if (MR_AmbAidRule == NULL) return; 1846 1847 if ( ! ( 1848 strcmp(MR_AmbAidRule,alt1->rname) == 0 || 1849 strcmp(MR_AmbAidRule,alt2->rname) == 0 || 1850 MR_AmbAidLine==alt1->line || 1851 MR_AmbAidLine==alt2->line 1852 ) 1853 ) return; 1854 1855 MR_matched_AmbAidRule++; 1856 1857 /* there are no token sets in trees, only in TokNodes */ 1858 1859 MR_AmbSourceSearchJ[0]=analysis_point( (Junction *) alt1->p1); 1860 MR_AmbSourceSearchJ[1]=analysis_point( (Junction *) alt2->p1); 1861 1862 if (tokensInChain == NULL) { 1863 tokensInChain=(int *) calloc (CLL_k+1,sizeof(int)); 1864 require (tokensInChain != NULL,"tokensInChain alloc"); 1865 }; 1866 1867 MR_AmbSourceSearchGroup=0; 1868 1869 fprintf(stdout,"\n"); 1870 fprintf(stdout," Ambiguity Aid "); 1871 fprintf(stdout, 1872 (MR_AmbAidDepth <= LL_k ? 1873 "(-k %d -aa %s %s -aad %d)\n\n" : 1874 "(-k %d -aa %s %s [-k value limits -aad %d])\n\n"), 1875 LL_k, 1876 MR_AmbAidRule, 1877 (MR_AmbAidMultiple ? "-aam" : ""), 1878 MR_AmbAidDepth); 1879 1880 for (i=0 ; i < 2 ; i++) { 1881 fprintf(stdout," Choice %d: %-25s line %d file %s\n", 1882 (i+1), 1883 MR_ruleNamePlusOffset( (Node *) MR_AmbSourceSearchJ[i]), 1884 MR_AmbSourceSearchJ[i]->line, 1885 FileStr[MR_AmbSourceSearchJ[i]->file]); 1886 }; 1887 1888 fprintf(stdout,"\n"); 1889 1890 if (MR_AmbAidDepth < LL_k) { 1891 maxDepth=MR_AmbAidDepth; 1892 } else { 1893 maxDepth=LL_k; 1894 }; 1895 1896 for (depth=1 ; depth <= maxDepth; depth++) { 1897 MR_AmbSourceSearchLimit=depth; 1898 if (depth < LL_k) { 1899 truncatedTree=tTrunc(t,depth); 1900 truncatedTree=tleft_factor(truncatedTree); 1901 MR_iterateOverTree(truncatedTree,&tokensInChain[1]); /* <===== */ 1902 Tfree(truncatedTree); 1903 } else { 1904 MR_iterateOverTree(t,tokensInChain); /* <===== */ 1905 }; 1906 fflush(stdout); 1907 fflush(stderr); 1908 }; 1909 1910 fprintf(stdout,"\n"); 1911 MR_AmbSourceSearch=0; 1912 MR_MaintainBackTrace=0; 1913 MR_AmbSourceSearchGroup=0; 1914 MR_AmbSourceSearchChoice=0; 1915 MR_AmbSourceSearchLimit=0; 1916 1917 } 1918 1919 1920 /* this if for k=1 grammars only 1921 1922 this is approximate only because of the limitations of linear 1923 approximation lookahead. Don't want to do a k=3 search when 1924 the user only specified a ck=3 grammar 1925 */ 1926 1927 #ifdef __USE_PROTOS 1928 void MR_traceAmbSource(set *matchSets,Junction *alt1, Junction *alt2) 1929 #else 1930 void MR_traceAmbSource(matchSets,alt1,alt2) 1931 set *matchSets; 1932 Junction *alt1; 1933 Junction *alt2; 1934 #endif 1935 { 1936 set *save_fset; 1937 Junction *p[2]; 1938 int i; 1939 int j; 1940 set *dup_matchSets; 1941 set intersection; 1942 set incomplete; 1943 set tokensUsed; 1944 int depth; 1945 1946 if (MR_AmbAidRule == NULL) return; 1947 if ( ! ( 1948 strcmp(MR_AmbAidRule,alt1->rname) == 0 || 1949 strcmp(MR_AmbAidRule,alt2->rname) == 0 || 1950 MR_AmbAidLine==alt1->line || 1951 MR_AmbAidLine==alt2->line 1952 ) 1953 ) return; 1954 1955 MR_matched_AmbAidRule++; 1956 1957 save_fset=fset; 1958 1959 dup_matchSets=(set *) calloc(CLL_k+1,sizeof(set)); 1960 require (dup_matchSets != NULL,"Can't allocate dup_matchSets"); 1961 1962 p[0]=analysis_point( (Junction *) alt1->p1); 1963 p[1]=analysis_point( (Junction *) alt2->p1); 1964 1965 fprintf(stdout,"\n"); 1966 1967 fprintf(stdout," Ambiguity Aid "); 1968 fprintf(stdout, 1969 (MR_AmbAidDepth <= CLL_k ? 1970 "(-ck %d -aa %s %s -aad %d)\n\n" : 1971 "(-ck %d -aa %s %s [-ck value limits -aad %d])\n\n"), 1972 CLL_k, 1973 MR_AmbAidRule, 1974 (MR_AmbAidMultiple ? "-aam" : ""), 1975 MR_AmbAidDepth); 1976 1977 for (i=0 ; i < 2 ; i++) { 1978 fprintf(stdout," Choice %d: %-25s line %d file %s\n", 1979 (i+1), 1980 MR_ruleNamePlusOffset( (Node *) p[i]), 1981 p[i]->line,FileStr[p[i]->file]); 1982 }; 1983 1984 for (j=1; j <= CLL_k ; j++) { 1985 fprintf(stdout,"\n Intersection of lookahead[%d] sets:\n",j); 1986 intersection=set_and(alt1->fset[j],alt2->fset[j]); 1987 MR_dumpTokenSet(stdout,2,intersection); 1988 set_free(intersection); 1989 }; 1990 1991 fprintf(stdout,"\n"); 1992 1993 require (1 <= MR_AmbAidDepth && MR_AmbAidDepth <= CLL_k, 1994 "illegal MR_AmbAidDepth"); 1995 1996 MR_AmbSourceSearchGroup=0; 1997 for (depth=1; depth <= MR_AmbAidDepth; depth++) { 1998 MR_AmbSourceSearchLimit=depth; 1999 for (i=0 ; i < 2 ; i++) { 2000 2001 /*** fprintf(stdout," Choice:%d Depth:%d\n\n",i+1,depth); ***/ 2002 2003 for (j=0 ; j <= CLL_k ; j++) { dup_matchSets[j]=set_dup(matchSets[j]); }; 2004 fset=dup_matchSets; 2005 2006 fflush(output); 2007 fflush(stdout); 2008 2009 MR_AmbSourceSearch=1; 2010 MR_MaintainBackTrace=1; 2011 MR_AmbSourceSearchChoice=i; 2012 2013 maxk = depth; 2014 tokensUsed=empty; 2015 incomplete=empty; 2016 2017 constrain = &(fset[1]); 2018 MR_pointerStackReset(&MR_BackTraceStack); 2019 2020 REACH(p[i],depth,&incomplete,tokensUsed); 2021 2022 fflush(output); 2023 fflush(stdout); 2024 2025 require (set_nil(incomplete),"MR_traceAmbSource REACH incomplete"); 2026 require (MR_BackTraceStack.count == 0,"1: MR_BackTraceStack.count != 0"); 2027 2028 set_free(incomplete); 2029 set_free(tokensUsed); 2030 2031 for (j=0 ; j <= CLL_k ; j++) { set_free(dup_matchSets[j]); }; 2032 }; 2033 }; 2034 2035 fprintf(stdout,"\n"); 2036 2037 MR_AmbSourceSearch=0; 2038 MR_MaintainBackTrace=0; 2039 MR_AmbSourceSearchGroup=0; 2040 MR_AmbSourceSearchChoice=0; 2041 MR_AmbSourceSearchLimit=0; 2042 2043 fset=save_fset; 2044 free ( (char *) dup_matchSets); 2045 } 2046 2047 static int itemCount; 2048 2049 void MR_backTraceDumpItemReset() { 2050 itemCount=0; 2051 } 2052 2053 #ifdef __USE_PROTOS 2054 void MR_backTraceDumpItem(FILE *f,int skip,Node *n) 2055 #else 2056 void MR_backTraceDumpItem(f,skip,n) 2057 FILE *f; 2058 int skip; 2059 Node *n; 2060 #endif 2061 { 2062 TokNode *tn; 2063 RuleRefNode *rrn; 2064 Junction *j; 2065 ActionNode *a; 2066 2067 switch (n->ntype) { 2068 case nToken: 2069 itemCount++; if (skip) goto EXIT; 2070 tn=(TokNode *)n; 2071 if (set_nil(tn->tset)) { 2072 fprintf(f," %2d #token %-23s",itemCount,TerminalString(tn->token)); 2073 } else { 2074 fprintf(f," %2d #tokclass %-20s",itemCount,TerminalString(tn->token)); 2075 }; 2076 break; 2077 case nRuleRef: 2078 itemCount++; if (skip) goto EXIT; 2079 rrn=(RuleRefNode *)n; 2080 fprintf(f," %2d to %-27s",itemCount,rrn->text); 2081 break; 2082 case nAction: 2083 a=(ActionNode *)n; 2084 goto EXIT; 2085 case nJunction: 2086 2087 j=(Junction *)n; 2088 2089 switch (j->jtype) { 2090 case aSubBlk: 2091 if (j->guess) { 2092 itemCount++; if (skip) goto EXIT; 2093 fprintf(f," %2d %-30s",itemCount,"in (...)? block at"); 2094 break; 2095 }; 2096 /****** fprintf(f," %2d %-32s",itemCount,"in (...) block at"); *******/ 2097 /****** break; *******/ 2098 goto EXIT; 2099 case aOptBlk: 2100 itemCount++; if (skip) goto EXIT; 2101 fprintf(f," %2d %-30s",itemCount,"in {...} block"); 2102 break; 2103 case aLoopBlk: 2104 itemCount++; if (skip) goto EXIT; 2105 fprintf(f," %2d %-30s",itemCount,"in (...)* block"); 2106 break; 2107 case EndBlk: 2108 if (j->alpha_beta_guess_end) { 2109 itemCount++; if (skip) goto EXIT; 2110 fprintf(f," %2d %-30s",itemCount,"end (...)? block at"); 2111 break; 2112 }; 2113 goto EXIT; 2114 /****** fprintf(f," %2d %-32s",itemCount,"end of a block at"); *****/ 2115 /****** break; *****/ 2116 case RuleBlk: 2117 itemCount++; if (skip) goto EXIT; 2118 fprintf(f," %2d %-30s",itemCount,j->rname); 2119 break; 2120 case Generic: 2121 goto EXIT; 2122 case EndRule: 2123 itemCount++; if (skip) goto EXIT; 2124 fprintf (f," %2d end %-26s",itemCount,j->rname); 2125 break; 2126 case aPlusBlk: 2127 itemCount++; if (skip) goto EXIT; 2128 fprintf(f," %2d %-30s",itemCount,"in (...)+ block"); 2129 break; 2130 case aLoopBegin: 2131 goto EXIT; 2132 }; 2133 break; 2134 }; 2135 fprintf(f," %-23s line %-4d %s\n",MR_ruleNamePlusOffset(n),n->line,FileStr[n->file]); 2136 EXIT: 2137 return; 2138 } 2139 2140 2141 static PointerStack previousBackTrace={0,0,NULL}; 2142 2143 #ifdef __USE_PROTOS 2144 void MR_backTraceReport(void) 2145 #else 2146 void MR_backTraceReport() 2147 #endif 2148 { 2149 int i; 2150 int match = 0; 2151 int limitMatch; 2152 2153 Node *p; 2154 TokNode *tn; 2155 set remainder; 2156 int depth; 2157 2158 /* Even when doing a k=2 search this routine can get 2159 called when there is only 1 token on the stack. 2160 This is because something like rRuleRef can change 2161 the search value of k from 2 to 1 temporarily. 2162 It does this because the it wants to know the k=1 2163 first set before it does a k=2 search 2164 */ 2165 2166 depth=0; 2167 for (i=0; i < MR_BackTraceStack.count ; i++) { 2168 p=(Node *) MR_BackTraceStack.data[i]; 2169 if (p->ntype == nToken) depth++; 2170 }; 2171 2172 /* MR14 */ if (MR_AmbSourceSearch) { 2173 /* MR14 */ require (depth <= MR_AmbSourceSearchLimit,"depth > MR_AmbSourceSearchLimit"); 2174 /* MR14 */ } 2175 2176 /* MR23 THM - Traceback report was being called at the wrong time for -alpha reports */ 2177 /* Reported by Arpad Beszedes (beszedes (at) inf.u-szeged.hu) */ 2178 2179 if (MR_AmbSourceSearchLimit == 0 || depth < MR_AmbSourceSearchLimit) { 2180 return; 2181 }; 2182 2183 MR_backTraceDumpItemReset(); 2184 2185 limitMatch=MR_BackTraceStack.count; 2186 if (limitMatch > previousBackTrace.count) { 2187 limitMatch=previousBackTrace.count; 2188 }; 2189 2190 for (match=0; match < limitMatch; match++) { 2191 if (MR_BackTraceStack.data[match] != 2192 previousBackTrace.data[match]) { 2193 break; 2194 }; 2195 }; 2196 2197 /* not sure at the moment why there would be duplicates */ 2198 2199 if (match != MR_BackTraceStack.count) { 2200 2201 fprintf(stdout," Choice:%d Depth:%d Group:%d", 2202 (MR_AmbSourceSearchChoice+1), 2203 MR_AmbSourceSearchLimit, 2204 ++MR_AmbSourceSearchGroup); 2205 2206 depth=0; 2207 fprintf(stdout," ("); 2208 for (i=0; i < MR_BackTraceStack.count ; i++) { 2209 p=(Node *) MR_BackTraceStack.data[i]; 2210 if (p->ntype != nToken) continue; 2211 tn=(TokNode *)p; 2212 if (depth != 0) fprintf(stdout," "); 2213 fprintf(stdout,TerminalString(tn->token)); 2214 depth++; 2215 if (! MR_AmbAidMultiple) { 2216 if (set_nil(tn->tset)) { 2217 set_rm( (unsigned) tn->token,fset[depth]); 2218 } else { 2219 remainder=set_dif(fset[depth],tn->tset); 2220 set_free(fset[depth]); 2221 fset[depth]=remainder; 2222 }; 2223 }; 2224 }; 2225 fprintf(stdout,")\n"); 2226 2227 for (i=0; i < MR_BackTraceStack.count ; i++) { 2228 MR_backTraceDumpItem(stdout, (i<match) ,(Node *) MR_BackTraceStack.data[i]); 2229 }; 2230 fprintf(stdout,"\n"); 2231 fflush(stdout); 2232 2233 MR_pointerStackReset(&previousBackTrace); 2234 2235 for (i=0; i < MR_BackTraceStack.count ; i++) { 2236 MR_pointerStackPush(&previousBackTrace,MR_BackTraceStack.data[i]); 2237 }; 2238 2239 }; 2240 } 2241 2242 #ifdef __USE_PROTOS 2243 void MR_setConstrainPointer(set * newConstrainValue) 2244 #else 2245 void MR_setConstrainPointer(newConstrainValue) 2246 set * newConstrainValue; 2247 #endif 2248 { 2249 constrain=newConstrainValue; 2250 } 2251