-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
864 lines (828 loc) · 62 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
<!-- saved from url=(0048)http://dinosaur.compilertools.net/lex/index.html -->
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
<style type="text/css">
body {
margin: 0 auto;
text-align: justify;
color: #111;
background: #f9f9f9;
font-family: 'Open Sans', Verdana, Helvetica, Arial, sans-serif;
line-height: 1.7;
}
main {
margin: 0 auto;
width: 80%;
font-size: 1.2em;
margin-top: 100px;
}
.nav {
position: fixed;
width: 100%;
background: #f9f9f9;
padding: 10px;
box-sizing: border-box;
top: 0;
border-bottom: 1px solid #cab6a3;
}
a {
color: #111;
}
a.repo {
float: right;
}
.button {
cursor: pointer;
}
.button:hover {
text-decoration: underline;
}
.spacer-20 {
margin: 0 20px 0 0;
display: inline;
}
@media screen and (max-width: 1024px) {
.nav {
font-size: 2em;
}
main {
width: 94%;
font-size: 0.9em;
}
}
@media print {
main {
width: 100%;
font-size: 0.9em;
}
}
</style>
<script>
var initialFontSize = window.innerWidth <= 1024 ? '0.9em' : '1.2em',
bgColors = [
['#f9f9f9', '#111'],
// ['#e3ceb9', '#111'],
['#e8d4c1', '#111'],
['#111', '#f9f9f9'],
],
bgColorIndex = 0;
function changeBgColor() {
var colors,
nav = document.getElementById('nav'),
arras = document.getElementsByTagName('a');
if (++bgColorIndex >= bgColors.length) {
bgColorIndex = 0;
}
colors = bgColors[bgColorIndex];
document.body.style.backgroundColor = colors[0];
nav.style.backgroundColor = colors[0];
document.body.style.color = colors[1];
for (var i = 0; i < arras.length; i++) {
arras[i].style.color = colors[1];
}
}
function fontSize(delta) {
var main = document.getElementById('main');
if (main.style.fontSize.trim() === '') {
main.style.fontSize = initialFontSize;
}
var size = parseFloat(main.style.fontSize);
if (delta > 0) {
size += 0.1;
} else if (delta < 0) {
size -= 0.1;
} else {
return;
}
main.style.fontSize = size + 'em';
// console.log(main.style.fontSize);
}
</script>
</head>
<body bgcolor="white">
<div id="nav" class="nav">
<a href="http://dinosaur.compilertools.net/">The Lex & Yacc Page</a>
<div class="spacer-20"> </div>
<span class="button" onclick="fontSize(+1)"> +A</span>
<span> | </span>
<span class="button" onclick="fontSize(-1)"> -a</span>
<span> | </span>
<span class="button" onclick="changeBgColor()"> change bgColor</span>
<a class="repo" href="https://github.com/thiagoh/lex"> GitHub</a>
</div>
<main id="main">
<div class="title">
<h1>
Lex - A Lexical Analyzer Generator
</h1>
<b><i>M. E. Lesk and E. Schmidt</i></b>
</div>
<br>
<br>
<h2>
ABSTRACT
</h2>
Lex helps write programs whose control flow is directed by instances of regular expressions in the input stream. It is well suited for editor-script type transformations and for segmenting input in preparation for a parsing routine.
<p>
Lex source is a table of regular expressions and corresponding program fragments. The table is translated to a program which reads an input stream, copying it to an output stream and partitioning the input into strings which match the given expressions.
As each such string is recognized the corresponding program fragment is executed. The recognition of the expressions is performed by a deterministic finite automaton generated by Lex. The program fragments written by the user are executed
in the order in which the corresponding regular expressions occur in the input stream.
</p>
<p>
The lexical analysis programs written with Lex accept ambiguous specifications and choose the longest match possible at each input point. If necessary, substantial lookahead is performed on the input, but the input stream will be backed up to the end
of the current partition, so that the user has general freedom to manipulate it.
</p>
<p>
Lex can generate analyzers in either C or Ratfor, a language which can be translated automatically to portable Fortran. It is available on the PDP-11 UNIX, Honeywell GCOS, and IBM OS systems. This manual, however, will only discuss generating analyzers
in C on the UNIX system, which is the only supported form of Lex under UNIX Version 7. Lex is designed to simplify interfacing with Yacc, for those with access to this compiler-compiler system.
</p>
<h2>
1. Introduction.
</h2>
Lex is a program generator designed for lexical processing of character input streams. It accepts a high-level, problem oriented specification for character string matching, and produces a program in a general purpose language which recognizes regular
expressions. The regular expressions are specified by the user in the source specifications given to Lex. The Lex written code recognizes these expressions in an input stream and partitions the input stream into strings matching the expressions.
At the boundaries between strings program sections provided by the user are executed. The Lex source file associates the regular expressions and the program fragments. As each expression appears in the input to the program written by Lex, the
corresponding fragment is executed.
<p>
The user supplies the additional code beyond expression matching needed to complete his tasks, possibly including code written by other generators. The program that recognizes the expressions is generated in the general purpose programming language employed
for the user's program fragments. Thus, a high level expression language is provided to write the string expressions to be matched while the user's freedom to write actions is unimpaired. This avoids forcing the user who wishes to use a string
manipulation language for input analysis to write processing programs in the same and often inappropriate string handling language.
</p>
<p>
Lex is not a complete language, but rather a generator representing a new language feature which can be added to different programming languages, called ``host languages.'' Just as general purpose languages can produce code to run on different computer
hardware, Lex can write code in different host languages. The host language is used for the output code generated by Lex and also for the program fragments added by the user. Compatible run-time libraries for the different host languages are
also provided. This makes Lex adaptable to different environments and different users. Each application may be directed to the combination of hardware and host language appropriate to the task, the user's background, and the properties of
local implementations. At present, the only supported host language is C, although Fortran (in the form of Ratfor [2] has been available in the past. Lex itself exists on UNIX, GCOS, and OS/370; but the code generated by Lex may be taken anywhere
the appropriate compilers exist.
</p>
<p>
Lex turns the user's expressions and actions (called source in this memo) into the host general-purpose language; the generated program is named yylex. The yylex program will recognize expressions in a stream (called input in this memo) and perform the
specified actions for each expression as it is detected. See Figure 1.
</p><pre> +-------+
Source -> | Lex | -> yylex
+-------+
+-------+
Input -> | yylex | -> Output
+-------+
An overview of Lex
Figure 1
</pre> For a trivial example, consider a program to delete from the input all blanks or tabs at the ends of lines.
<pre> %%
[ \t]+$ ;
</pre> is all that is required. The program contains a %% delimiter to mark the beginning of the rules, and one rule. This rule contains a regular expression which matches one or more instances of the characters blank or tab (written \t for visibility,
in accordance with the C language convention) just prior to the end of a line. The brackets indicate the character class made of blank and tab; the + indicates ``one or more ...''; and the $ indicates ``end of line,'' as in QED. No action is specified,
so the program generated by Lex (yylex) will ignore these characters. Everything else will be copied. To change any remaining string of blanks or tabs to a single blank, add another rule:
<pre> %%
[ \t]+$ ;
[ \t]+ printf(" ");
</pre> The finite automaton generated for this source will scan for both rules at once, observing at the termination of the string of blanks or tabs whether or not there is a newline character, and executing the desired rule action. The first
rule matches all strings of blanks or tabs at the end of lines, and the second rule all remaining strings of blanks or tabs.
<p>
Lex can be used alone for simple transformations, or for analysis and statistics gathering on a lexical level. Lex can also be used with a parser generator to perform the lexical analysis phase; it is particularly easy to interface Lex and Yacc [3]. Lex
programs recognize only regular expressions; Yacc writes parsers that accept a large class of context free grammars, but require a lower level analyzer to recognize input tokens. Thus, a combination of Lex and Yacc is often appropriate. When
used as a preprocessor for a later parser generator, Lex is used to partition the input stream, and the parser generator assigns structure to the resulting pieces. The flow of control in such a case (which might be the first half of a compiler,
for example) is shown in Figure 2. Additional programs, written by other generators or by hand, can be added easily to programs written by Lex.
</p><pre> lexical grammar
rules rules
| |
v v
+---------+ +---------+
| Lex | | Yacc |
+---------+ +---------+
| |
v v
+---------+ +---------+
Input -> | yylex | -> | yyparse | -> Parsed input
+---------+ +---------+
Lex with Yacc
Figure 2
</pre> Yacc users will realize that the name yylex is what Yacc expects its lexical analyzer to be named, so that the use of this name by Lex simplifies interfacing.
<p>
Lex generates a deterministic finite automaton from the regular expressions in the source [4]. The automaton is interpreted, rather than compiled, in order to save space. The result is still a fast analyzer. In particular, the time taken by a Lex program
to recognize and partition an input stream is proportional to the length of the input. The number of Lex rules or the complexity of the rules is not important in determining speed, unless rules which include forward context require a significant
amount of rescanning. What does increase with the number and complexity of rules is the size of the finite automaton, and therefore the size of the program generated by Lex.
</p>
<p>
In the program written by Lex, the user's fragments (representing the actions to be performed as each regular expression is found) are gathered as cases of a switch. The automaton interpreter directs the control flow. Opportunity is provided for the user
to insert either declarations or additional statements in the routine containing the actions, or to add subroutines outside this action routine.
</p>
<p>
Lex is not limited to source which can be interpreted on the basis of one character lookahead. For example, if there are two rules, one looking for ab and another for abcdefg, and the input stream is abcdefh, Lex will recognize ab and leave the input
pointer just before cd. . . Such backup is more costly than the processing of simpler languages.
</p>
<h2>
2. Lex Source.
</h2>
The general format of Lex source is:
<pre> {definitions}
%%
{rules}
%%
{user subroutines}
</pre> where the definitions and the user subroutines are often omitted. The second %% is optional, but the first is required to mark the beginning of the rules. The absolute minimum Lex program is thus
<pre> %%
</pre> (no definitions, no rules) which translates into a program which copies the input to the output unchanged.
<p>
In the outline of Lex programs shown above, the rules represent the user's control decisions; they are a table, in which the left column contains regular expressions (see section 3) and the right column contains actions, program fragments to be executed
when the expressions are recognized. Thus an individual rule might appear
</p><pre> integer printf("found keyword INT");
</pre> to look for the string integer in the input stream and print the message ``found keyword INT'' whenever it appears. In this example the host procedural language is C and the C library function printf is used to print the string. The end of the
expression is indicated by the first blank or tab character. If the action is merely a single C expression, it can just be given on the right side of the line; if it is compound, or takes more than a line, it should be enclosed in braces. As a
slightly more useful example, suppose it is desired to change a number of words from British to American spelling. Lex rules such as
<pre> colour printf("color");
mechanise printf("mechanize");
petrol printf("gas");
</pre> would be a start. These rules are not quite enough, since the word petroleum would become gaseum; a way of dealing with this will be described later.
<h2>
3. Lex Regular Expressions.
</h2>
The definitions of regular expressions are very similar to those in QED [5]. A regular expression specifies a set of strings to be matched. It contains text characters (which match the corresponding characters in the strings being compared) and operator
characters (which specify repetitions, choices, and other features). The letters of the alphabet and the digits are always text characters; thus the regular expression
<pre> integer
</pre> matches the string integer wherever it appears and the expression
<pre> a57D
</pre> looks for the string a57D.
<p>
Operators. The operator characters are
</p><pre> " \ [ ] ^ - ? . * + | ( ) $ / { } % < >
</pre> and if they are to be used as text characters, an escape should be used. The quotation mark operator (") indicates that whatever is contained between a pair of quotes is to be taken as text characters. Thus
<pre> xyz"++"
</pre> matches the string xyz++ when it appears. Note that a part of a string may be quoted. It is harmless but unnecessary to quote an ordinary text character; the expression
<pre> "xyz++"
</pre> is the same as the one above. Thus by quoting every non-alphanumeric character being used as a text character, the user can avoid remembering the list above of current operator characters, and is safe should further extensions to Lex lengthen
the list.
<p>
An operator character may also be turned into a text character by preceding it with \ as in
</p><pre> xyz\+\+
</pre> which is another, less readable, equivalent of the above expressions. Another use of the quoting mechanism is to get a blank into an expression; normally, as explained above, blanks or tabs end a rule. Any blank character not contained within []
(see below) must be quoted. Several normal C escapes with \ are recognized: \n is newline, \t is tab, and \b is backspace. To enter \ itself, use \\. Since newline is illegal in an expression, \n must be used; it is not required to escape tab
and backspace. Every character but blank, tab, newline and the list above is always a text character.
<p>
Character classes. Classes of characters can be specified using the operator pair []. The construction [abc] matches a single character, which may be a, b, or c. Within square brackets, most operator meanings are ignored. Only three characters are special:
these are \ - and ^. The - character indicates ranges. For example,
</p><pre> [a-z0-9<>_]
</pre> indicates the character class containing all the lower case letters, the digits, the angle brackets, and underline. Ranges may be given in either order. Using - between any pair of characters which are not both upper case letters, both lower case
letters, or both digits is implementation dependent and will get a warning message. (E.g., [0-z] in ASCII is many more characters than it is in EBCDIC). If it is desired to include the character - in a character class, it should be first or last;
thus
<pre> [-+0-9]
</pre> matches all the digits and the two signs.
<p>
In character classes, the ^ operator must appear as the first character after the left bracket; it indicates that the resulting string is to be complemented with respect to the computer character set. Thus
</p><pre> [^abc]
</pre> matches all characters except a, b, or c, including all special or control characters; or
<pre> [^a-zA-Z]
</pre> is any character which is not a letter. The \ character provides the usual escapes within character class brackets.
<p>
Arbitrary character. To match almost any character, the operator character . is the class of all characters except newline. Escaping into octal is possible although non-portable:
</p><pre> [\40-\176]
</pre> matches all printable characters in the ASCII character set, from octal 40 (blank) to octal 176 (tilde).
<p>
Optional expressions. The operator ? indicates an optional element of an expression. Thus
</p><pre> ab?c
</pre> matches either ac or abc.
<p>
Repeated expressions. Repetitions of classes are indicated by the operators * and +.
</p><pre> a*
</pre> is any number of consecutive a characters, including zero; while
<pre> a+
</pre> is one or more instances of a. For example,
<pre> [a-z]+
</pre> is all strings of lower case letters. And
<pre> [A-Za-z][A-Za-z0-9]*
</pre> indicates all alphanumeric strings with a leading alphabetic character. This is a typical expression for recognizing identifiers in computer languages.
<p>
Alternation and Grouping. The operator | indicates alternation:
</p><pre> (ab|cd)
</pre> matches either ab or cd. Note that parentheses are used for grouping, although they are not necessary on the outside level;
<pre> ab|cd
</pre> would have sufficed. Parentheses can be used for more complex expressions:
<pre> (ab|cd+)?(ef)*
</pre> matches such strings as abefef, efefef, cdef, or cddd; but not abc, abcd, or abcdef.
<p>
Context sensitivity. Lex will recognize a small amount of surrounding context. The two simplest operators for this are ^ and $. If the first character of an expression is ^, the expression will only be matched at the beginning of a line (after a newline
character, or at the beginning of the input stream). This can never conflict with the other meaning of ^, complementation of character classes, since that only applies within the [] operators. If the very last character is $, the expression
will only be matched at the end of a line (when immediately followed by newline). The latter operator is a special case of the / operator character, which indicates trailing context. The expression
</p><pre> ab/cd
</pre> matches the string ab, but only if followed by cd. Thus
<pre> ab$
</pre> is the same as
<pre> ab/\n
</pre> Left context is handled in Lex by start conditions as explained in section 10. If a rule is only to be executed when the Lex automaton interpreter is in start condition x, the rule should be prefixed by
<pre> <x>
</pre> using the angle bracket operator characters. If we considered ``being at the beginning of a line'' to be start condition ONE, then the ^ operator would be equivalent to
<pre> <ONE>
</pre> Start conditions are explained more fully later.
<p>
Repetitions and Definitions. The operators {} specify either repetitions (if they enclose numbers) or definition expansion (if they enclose a name). For example
</p><pre> {digit}
</pre> looks for a predefined string named digit and inserts it at that point in the expression. The definitions are given in the first part of the Lex input, before the rules. In contrast,
<pre> a{1,5}
</pre> looks for 1 to 5 occurrences of a.
<p>
Finally, initial % is special, being the separator for Lex source segments.
</p>
<h2>
4. Lex Actions.
</h2>
When an expression written as above is matched, Lex executes the corresponding action. This section describes some features of Lex which aid in writing actions. Note that there is a default action, which consists of copying the input to the output. This
is performed on all strings not otherwise matched. Thus the Lex user who wishes to absorb the entire input, without producing any output, must provide rules to match everything. When Lex is being used with Yacc, this is the normal situation. One
may consider that actions are what is done instead of copying the input to the output; thus, in general, a rule which merely copies can be omitted. Also, a character combination which is omitted from the rules and which appears as input is likely
to be printed on the output, thus calling attention to the gap in the rules.
<p>
One of the simplest things that can be done is to ignore the input. Specifying a C null statement, ; as an action causes this result. A frequent rule is
</p><pre> [ \t\n] ;
</pre> which causes the three spacing characters (blank, tab, and newline) to be ignored.
<p>
Another easy way to avoid writing actions is the action character |, which indicates that the action for this rule is the action for the next rule. The previous example could also have been written
</p><pre> " "
"\t"
"\n"
</pre> with the same result, although in different style. The quotes around \n and \t are not required.
<p>
In more complex actions, the user will often want to know the actual text that matched some expression like [a-z]+. Lex leaves this text in an external character array named yytext. Thus, to print the name found, a rule like
</p><pre> [a-z]+ printf("%s", yytext);
</pre> will print the string in yytext. The C function printf accepts a format argument and data to be printed; in this case, the format is ``print string'' (% indicating data conversion, and s indicating string type), and the data are the characters
in yytext. So this just places the matched string on the output. This action is so common that it may be written as ECHO:
<pre> [a-z]+ ECHO;
</pre> is the same as the above. Since the default action is just to print the characters found, one might ask why give a rule, like this one, which merely specifies the default action? Such rules are often required to avoid matching some other
rule which is not desired. For example, if there is a rule which matches read it will normally match the instances of read contained in bread or readjust; to avoid this, a rule of the form [a-z]+ is needed. This is explained further below.
<p>
Sometimes it is more convenient to know the end of what has been found; hence Lex also provides a count yyleng of the number of characters matched. To count both the number of words and the number of characters in words in the input, the user might write
[a-zA-Z]+ {words++; chars += yyleng;} which accumulates in chars the number of characters in the words recognized. The last character in the string matched can be accessed by
</p><pre> yytext[yyleng-1]
</pre>
<p>
Occasionally, a Lex action may decide that a rule has not recognized the correct span of characters. Two routines are provided to aid with this situation. First, yymore() can be called to indicate that the next input expression recognized is to be tacked
on to the end of this input. Normally, the next input string would overwrite the current entry in yytext. Second, yyless (n) may be called to indicate that not all the characters matched by the currently successful expression are wanted right
now. The argument n indicates the number of characters in yytext to be retained. Further characters previously matched are returned to the input. This provides the same sort of lookahead offered by the / operator, but in a different form.
</p>
<p>
Example: Consider a language which defines a string as a set of characters between quotation (") marks, and provides that to include a " in a string it must be preceded by a \. The regular expression which matches that is somewhat confusing, so that it
might be preferable to write
</p><pre> \"[^"]* {
if (yytext[yyleng-1] == '\\')
yymore();
else
... normal user processing
}
</pre> which will, when faced with a string such as "abc\"def" first match the five characters "abc\; then the call to yymore() will cause the next part of the string, "def, to be tacked on the end. Note that the final quote terminating the string should
be picked up in the code labeled ``normal processing''.
<p>
The function yyless() might be used to reprocess text in various circumstances. Consider the C problem of distinguishing the ambiguity of ``=-a''. Suppose it is desired to treat this as ``=- a'' but print a message. A rule might be
</p><pre> =-[a-zA-Z] {
printf("Op (=-) ambiguous\n");
yyless(yyleng-1);
... action for =- ...
}
</pre> which prints a message, returns the letter after the operator to the input stream, and treats the operator as ``=-''. Alternatively it might be desired to treat this as ``= -a''. To do this, just return the minus sign as well as the letter to the
input:
<pre> =-[a-zA-Z] {
printf("Op (=-) ambiguous\n");
yyless(yyleng-2);
... action for = ...
}
</pre> will perform the other interpretation. Note that the expressions for the two cases might more easily be written
<pre> =-/[A-Za-z]
</pre> in the first case and
<pre> =/-[A-Za-z]
</pre> in the second; no backup would be required in the rule action. It is not necessary to recognize the whole identifier to observe the ambiguity. The possibility of ``=-3'', however, makes
<pre> =-/[^ \t\n]
</pre> a still better rule.
<p>
In addition to these routines, Lex also permits access to the I/O routines it uses. They are:
</p>
<p>
1) input() which returns the next input character;
</p>
<p>
2) output(c) which writes the character c on the output; and
</p>
<p>
3) unput(c) pushes the character c back onto the input stream to be read later by input().
</p>
<p>
By default these routines are provided as macro definitions, but the user can override them and supply private versions. These routines define the relationship between external files and internal characters, and must all be retained or modified consistently.
They may be redefined, to cause input or output to be transmitted to or from strange places, including other programs or internal memory; but the character set used must be consistent in all routines; a value of zero returned by input must
mean end of file; and the relationship between unput and input must be retained or the Lex lookahead will not work. Lex does not look ahead at all if it does not have to, but every rule ending in + * ? or $ or containing / implies lookahead.
Lookahead is also necessary to match an expression that is a prefix of another expression. See below for a discussion of the character set used by Lex. The standard Lex library imposes a 100 character limit on backup.
</p>
<p>
Another Lex library routine that the user will sometimes want to redefine is yywrap() which is called whenever Lex reaches an end-of-file. If yywrap returns a 1, Lex continues with the normal wrapup on end of input. Sometimes, however, it is convenient
to arrange for more input to arrive from a new source. In this case, the user should provide a yywrap which arranges for new input and returns 0. This instructs Lex to continue processing. The default yywrap always returns 1.
</p>
<p>
This routine is also a convenient place to print tables, summaries, etc. at the end of a program. Note that it is not possible to write a normal rule which recognizes end-of-file; the only access to this condition is through yywrap. In fact, unless a
private version of input() is supplied a file containing nulls cannot be handled, since a value of 0 returned by input is taken to be end-of-file.
</p>
<h2>
5. Ambiguous Source Rules.
</h2>
Lex can handle ambiguous specifications. When more than one expression can match the current input, Lex chooses as follows:
<p>
1) The longest match is preferred.
</p>
<p>
2) Among rules which matched the same number of characters, the rule given first is preferred.
</p>
<p>
Thus, suppose the rules
</p><pre> integer keyword action ...;
[a-z]+ identifier action ...;
</pre> to be given in that order. If the input is integers, it is taken as an identifier, because [a-z]+ matches 8 characters while integer matches only 7. If the input is integer, both rules match 7 characters, and the keyword rule is selected because
it was given first. Anything shorter (e.g. int) will not match the expression integer and so the identifier interpretation is used.
<p>
The principle of preferring the longest match makes rules containing expressions like .* dangerous. For example, '.*' might seem a good way of recognizing a string in single quotes. But it is an invitation for the program to read far ahead, looking for
a distant single quote. Presented with the input
</p><pre> 'first' quoted string here, 'second' here
</pre> the above expression will match
<pre> 'first' quoted string here, 'second'
</pre> which is probably not what was wanted. A better rule is of the form
<pre> '[^'\n]*'
</pre> which, on the above input, will stop after 'first'. The consequences of errors like this are mitigated by the fact that the . operator will not match newline. Thus expressions like .* stop on the current line. Don't try to defeat this with
expressions like (.|\n)+ or equivalents; the Lex generated program will try to read the entire input file, causing internal buffer overflows.
<p>
Note that Lex is normally partitioning the input stream, not searching for all possible matches of each expression. This means that each character is accounted for once and only once. For example, suppose it is desired to count occurrences of both she
and he in an input text. Some Lex rules to do this might be
</p><pre> she s++;
he h++;
\n |
. ;
</pre> where the last two rules ignore everything besides he and she. Remember that . does not include newline. Since she includes he, Lex will normally not recognize the instances of he included in she, since once it has passed a she those characters
are gone.
<p>
Sometimes the user would like to override this choice. The action REJECT means ``go do the next alternative.'' It causes whatever rule was second choice after the current rule to be executed. The position of the input pointer is adjusted accordingly.
Suppose the user really wants to count the included instances of he:
</p><pre> she {s++; REJECT;}
he {h++; REJECT;}
\n |
. ;
</pre> these rules are one way of changing the previous example to do just that. After counting each expression, it is rejected; whenever appropriate, the other expression will then be counted. In this example, of course, the user could note that she
includes he but not vice versa, and omit the REJECT action on he; in other cases, however, it would not be possible a priori to tell which input characters were in both classes.
<p>
Consider the two rules
</p><pre> a[bc]+ { ... ; REJECT;}
a[cd]+ { ... ; REJECT;}
</pre> If the input is ab, only the first rule matches, and on ad only the second matches. The input string accb matches the first rule for four characters and then the second rule for three characters. In contrast, the input accd agrees with the second
rule for four characters and then the first rule for three.
<p>
In general, REJECT is useful whenever the purpose of Lex is not to partition the input stream but to detect all examples of some items in the input, and the instances of these items may overlap or include each other. Suppose a digram table of the input
is desired; normally the digrams overlap, that is the word the is considered to contain both th and he. Assuming a two-dimensional array named digram to be incremented, the appropriate source is
</p><pre> %%
[a-z][a-z] {
digram[yytext[0]][yytext[1]]++;
REJECT;
}
. ;
\n ;
</pre> where the REJECT is necessary to pick up a letter pair beginning at every character, rather than at every other character.
<h2>
6. Lex Source Definitions.
</h2>
Remember the format of the Lex source:
<pre> {definitions}
%%
{rules}
%%
{user routines}
</pre> So far only the rules have been described. The user needs additional options, though, to define variables for use in his program and for use by Lex. These can go either in the definitions section or in the rules section.
<p>
Remember that Lex is turning the rules into a program. Any source not intercepted by Lex is copied into the generated program. There are three classes of such things.
</p>
<p>
1) Any line which is not part of a Lex rule or action which begins with a blank or tab is copied into the Lex generated program. Such source input prior to the first %% delimiter will be external to any function in the code; if it appears immediately
after the first %%, it appears in an appropriate place for declarations in the function written by Lex which contains the actions. This material must look like program fragments, and should precede the first Lex rule. As a side effect of the
above, lines which begin with a blank or tab, and which contain a comment, are passed through to the generated program. This can be used to include comments in either the Lex source or the generated code. The comments should follow the host
language convention.
</p>
<p>
2) Anything included between lines containing only %{ and %} is copied out as above. The delimiters are discarded. This format permits entering text like preprocessor statements that must begin in column 1, or copying lines that do not look like programs.
</p>
<p>
3) Anything after the third %% delimiter, regardless of formats, etc., is copied out after the Lex output.
</p>
<p>
Definitions intended for Lex are given before the first %% delimiter. Any line in this section not contained between %{ and %}, and begining in column 1, is assumed to define Lex substitution strings. The format of such lines is name translation and it
causes the string given as a translation to be associated with the name. The name and translation must be separated by at least one blank or tab, and the name must begin with a letter. The translation can then be called out by the {name} syntax
in a rule. Using {D} for the digits and {E} for an exponent field, for example, might abbreviate rules to recognize numbers:
</p><pre> D [0-9]
E [DEde][-+]?{D}+
%%
{D}+ printf("integer");
{D}+"."{D}*({E})? |
{D}*"."{D}+({E})? |
{D}+{E}
</pre> Note the first two rules for real numbers; both require a decimal point and contain an optional exponent field, but the first requires at least one digit before the decimal point and the second requires at least one digit after the decimal point.
To correctly handle the problem posed by a Fortran expression such as 35.EQ.I, which does not contain a real number, a context-sensitive rule such as
<pre> [0-9]+/"."EQ printf("integer");
</pre> could be used in addition to the normal rule for integers.
<p>
The definitions section may also contain other commands, including the selection of a host language, a character set table, a list of start conditions, or adjustments to the default size of arrays within Lex itself for larger source programs. These possibilities
are discussed below under ``Summary of Source Format,'' section 12.
</p>
<h2>
7. Usage.
</h2>
There are two steps in compiling a Lex source program. First, the Lex source must be turned into a generated program in the host general purpose language. Then this program must be compiled and loaded, usually with a library of Lex subroutines. The generated
program is on a file named lex.yy.c. The I/O library is defined in terms of the C standard library [6].
<p>
The C programs generated by Lex are slightly different on OS/370, because the OS compiler is less powerful than the UNIX or GCOS compilers, and does less at compile time. C programs generated on GCOS and UNIX are the same.
</p>
<p>
UNIX. The library is accessed by the loader flag -ll. So an appropriate set of commands is lex source cc lex.yy.c -ll The resulting program is placed on the usual file a.out for later execution. To use Lex with Yacc see below. Although the default Lex
I/O routines use the C standard library, the Lex automata themselves do not do so; if private versions of input, output and unput are given, the library can be avoided.
</p>
<h2>
8. Lex and Yacc.
</h2>
If you want to use Lex with Yacc, note that what Lex writes is a program named yylex(), the name required by Yacc for its analyzer. Normally, the default main program on the Lex library calls this routine, but if Yacc is loaded, and its main program is
used, Yacc will call yylex(). In this case each Lex rule should end with
<pre> return(token);
</pre> where the appropriate token value is returned. An easy way to get access to Yacc's names for tokens is to compile the Lex output file as part of the Yacc output file by placing the line # include "lex.yy.c" in the last section of Yacc input.
Supposing the grammar to be named ``good'' and the lexical rules to be named ``better'' the UNIX command sequence can just be:
<pre> yacc good
lex better
cc y.tab.c -ly -ll
</pre> The Yacc library (-ly) should be loaded before the Lex library, to obtain a main program which invokes the Yacc parser. The generations of Lex and Yacc programs can be done in either order.
<h2>
9. Examples.
</h2>
As a trivial problem, consider copying an input file while adding 3 to every positive number divisible by 7. Here is a suitable Lex source program
<pre> %%
int k;
[0-9]+ {
k = atoi(yytext);
if (k%7 == 0)
printf("%d", k+3);
else
printf("%d",k);
}
</pre> to do just that. The rule [0-9]+ recognizes strings of digits; atoi converts the digits to binary and stores the result in k. The operator % (remainder) is used to check whether k is divisible by 7; if it is, it is incremented by 3 as it
is written out. It may be objected that this program will alter such input items as 49.63 or X7. Furthermore, it increments the absolute value of all negative numbers divisible by 7. To avoid this, just add a few more rules after the active one,
as here:
<pre> %%
int k;
-?[0-9]+ {
k = atoi(yytext);
printf("%d",
k%7 == 0 ? k+3 : k);
}
-?[0-9.]+ ECHO;
[A-Za-z][A-Za-z0-9]+ ECHO;
</pre> Numerical strings containing a ``.'' or preceded by a letter will be picked up by one of the last two rules, and not changed. The if-else has been replaced by a C conditional expression to save space; the form a?b:c means ``if a then b
else c''.
<p>
For an example of statistics gathering, here is a program which histograms the lengths of words, where a word is defined as a string of letters.
</p><pre> int lengs[100];
%%
[a-z]+ lengs[yyleng]++;
. |
\n ;
%%
yywrap()
{
int i;
printf("Length No. words\n");
for(i=0; i<100; i++)
if (lengs[i] > 0)
printf("%5d%10d\n",i,lengs[i]);
return(1);
}
</pre> This program accumulates the histogram, while producing no output. At the end of the input it prints the table. The final statement return(1); indicates that Lex is to perform wrapup. If yywrap returns zero (false) it implies that further input
is available and the program is to continue reading and processing. To provide a yywrap that never returns true causes an infinite loop.
<p>
As a larger example, here are some parts of a program written by N. L. Schryer to convert double precision Fortran to single precision Fortran. Because Fortran does not distinguish upper and lower case letters, this routine begins by defining a set of
classes including both cases of each letter:
</p><pre> a [aA]
b [bB]
c [cC]
...
z [zZ]
</pre> An additional class recognizes white space:
<pre> W [ \t]*
</pre> The first rule changes ``double precision'' to ``real'', or ``DOUBLE PRECISION'' to ``REAL''.
<pre> {d}{o}{u}{b}{l}{e}{W}{p}{r}{e}{c}{i}{s}{i}{o}{n} {
printf(yytext[0]=='d'? "real" : "REAL");
}
</pre> Care is taken throughout this program to preserve the case (upper or lower) of the original program. The conditional operator is used to select the proper form of the keyword. The next rule copies continuation card indications to avoid
confusing them with constants:
<pre> ^" "[^ 0] ECHO;
</pre> In the regular expression, the quotes surround the blanks. It is interpreted as ``beginning of line, then five blanks, then anything but blank or zero.'' Note the two different meanings of ^. There follow some rules to change double precision
constants to ordinary floating constants.
<pre> [0-9]+{W}{d}{W}[+-]?{W}[0-9]+ |
[0-9]+{W}"."{W}{d}{W}[+-]?{W}[0-9]+ |
"."{W}[0-9]+{W}{d}{W}[+-]?{W}[0-9]+ {
/* convert constants */
for(p=yytext; *p != 0; p++)
{
if (*p == 'd' || *p == 'D')
*p=+ 'e'- 'd';
ECHO;
}
</pre> After the floating point constant is recognized, it is scanned by the for loop to find the letter d or D. The program than adds 'e'-'d', which converts it to the next letter of the alphabet. The modified constant, now single-precision,
is written out again. There follow a series of names which must be respelled to remove their initial d. By using the array yytext the same action suffices for all the names (only a sample of a rather long list is given here).
<pre> {d}{s}{i}{n} |
{d}{c}{o}{s} |
{d}{s}{q}{r}{t} |
{d}{a}{t}{a}{n} |
...
{d}{f}{l}{o}{a}{t} printf("%s",yytext+1);
</pre> Another list of names must have initial d changed to initial a:
<pre> {d}{l}{o}{g} |
{d}{l}{o}{g}10 |
{d}{m}{i}{n}1 |
{d}{m}{a}{x}1 {
yytext[0] =+ 'a' - 'd';
ECHO;
}
</pre> And one routine must have initial d changed to initial r:
<pre> {d}1{m}{a}{c}{h} {yytext[0] =+ 'r' - 'd';
</pre> To avoid such names as dsinx being detected as instances of dsin, some final rules pick up longer words as identifiers and copy some surviving characters:
<pre> [A-Za-z][A-Za-z0-9]* |
[0-9]+ |
\n |
. ECHO;
</pre> Note that this program is not complete; it does not deal with the spacing problems in Fortran or with the use of keywords as identifiers.
<h2>
10. Left Context Sensitivity.
</h2>
Sometimes it is desirable to have several sets of lexical rules to be applied at different times in the input. For example, a compiler preprocessor might distinguish preprocessor statements and analyze them differently from ordinary statements. This requires
sensitivity to prior context, and there are several ways of handling such problems. The ^ operator, for example, is a prior context operator, recognizing immediately preceding left context just as $ recognizes immediately following right context.
Adjacent left context could be extended, to produce a facility similar to that for adjacent right context, but it is unlikely to be as useful, since often the relevant left context appeared some time earlier, such as at the beginning of a line.
<p>
This section describes three means of dealing with different environments: a simple use of flags, when only a few rules change from one environment to another, the use of start conditions on rules, and the possibility of making multiple lexical analyzers
all run together. In each case, there are rules which recognize the need to change the environment in which the following input text is analyzed, and set some parameter to reflect the change. This may be a flag explicitly tested by the user's
action code; such a flag is the simplest way of dealing with the problem, since Lex is not involved at all. It may be more convenient, however, to have Lex remember the flags as initial conditions on the rules. Any rule may be associated with
a start condition. It will only be recognized when Lex is in that start condition. The current start condition may be changed at any time. Finally, if the sets of rules for the different environments are very dissimilar, clarity may be best
achieved by writing several distinct lexical analyzers, and switching from one to another as desired.
</p>
<p>
Consider the following problem: copy the input to the output, changing the word magic to first on every line which began with the letter a, changing magic to second on every line which began with the letter b, and changing magic to third on every line
which began with the letter c. All other words and all other lines are left unchanged.
</p>
<p>
These rules are so simple that the easiest way to do this job is with a flag:
</p><pre> int flag;
%%
^a {flag = 'a'; ECHO;}
^b {flag = 'b'; ECHO;}
^c {flag = 'c'; ECHO;}
\n {flag = 0 ; ECHO;}
magic {
switch (flag)
{
case 'a': printf("first"); break;
case 'b': printf("second"); break;
case 'c': printf("third"); break;
default: ECHO; break;
}
}
</pre> should be adequate.
<p>
To handle the same problem with start conditions, each start condition must be introduced to Lex in the definitions section with a line reading
</p><pre> %Start name1 name2 ...
</pre> where the conditions may be named in any order. The word Start may be abbreviated to s or S. The conditions may be referenced at the head of a rule with the <> brackets:
<pre> <name1>expression
</pre> is a rule which is only recognized when Lex is in the start condition name1. To enter a start condition, execute the action statement
<pre> BEGIN name1;
</pre> which changes the start condition to name1. To resume the normal state,
<pre> BEGIN 0;
</pre> resets the initial condition of the Lex automaton interpreter. A rule may be active in several start conditions: <name1,name2,name3> is a legal prefix. Any rule not beginning with the <> prefix operator is always active.
<p>
The same example as before can be written:
</p><pre> %START AA BB CC
%%
^a {ECHO; BEGIN AA;}
^b {ECHO; BEGIN BB;}
^c {ECHO; BEGIN CC;}
\n {ECHO; BEGIN 0;}
<AA>magic printf("first");
<BB>magic printf("second");
<CC>magic printf("third");
</pre> where the logic is exactly the same as in the previous method of handling the problem, but Lex does the work rather than the user's code.
<h2>
11. Character Set.
</h2>
The programs generated by Lex handle character I/O only through the routines input, output, and unput. Thus the character representation provided in these routines is accepted by Lex and employed to return values in yytext. For internal use a character
is represented as a small integer which, if the standard library is used, has a value equal to the integer value of the bit pattern representing the character on the host computer. Normally, the letter a is represented as the same form as the
character constant 'a'. If this interpretation is changed, by providing I/O routines which translate the characters, Lex must be told about it, by giving a translation table. This table must be in the definitions section, and must be bracketed
by lines containing only ``%T''. The table contains lines of the form
<pre> {integer} {character string}
</pre> which indicate the value associated with each character. Thus the next example
<pre> %T
1 Aa
2 Bb
...
26 Zz
27 \n
28 +
29 -
30 0
31 1
...
39 9
%T
Sample character table.
</pre> maps the lower and upper case letters together into the integers 1 through 26, newline into 27, + and - into 28 and 29, and the digits into 30 through 39. Note the escape for newline. If a table is supplied, every character that is to appear
either in the rules or in any valid input must be included in the table. No character may be assigned the number 0, and no character may be assigned a bigger number than the size of the hardware character set.
<h2>
12. Summary of Source Format.
</h2>
The general form of a Lex source file is:
<pre> {definitions}
%%
{rules}
%%
{user subroutines}
</pre> The definitions section contains a combination of
<p>
1) Definitions, in the form ``name space translation''.
</p>
<p>
2) Included code, in the form ``space code''.
</p>
<p>
3) Included code, in the form
</p><pre> %{
code
%}
</pre> 4) Start conditions, given in the form
<pre> %S name1 name2 ...
</pre> 5) Character set tables, in the form
<pre> %T
number space character-string
...
%T
</pre> 6) Changes to internal array sizes, in the form
<pre> %x nnn
</pre> where nnn is a decimal integer representing an array size and x selects the parameter as follows:
<pre> Letter Parameter
p positions
n states
e tree nodes
a transitions
k packed character classes
o output array size
</pre> Lines in the rules section have the form ``expression action'' where the action may be continued on succeeding lines by using braces to delimit it.
<p>
Regular expressions in Lex use the following operators:
</p><pre> x the character "x"
"x" an "x", even if x is an operator.
\x an "x", even if x is an operator.
[xy] the character x or y.
[x-z] the characters x, y or z.
[^x] any character but x.
. any character but newline.
^x an x at the beginning of a line.
<y>x an x when Lex is in start condition y.
x$ an x at the end of a line.
x? an optional x.
x* 0,1,2, ... instances of x.
x+ 1,2,3, ... instances of x.
x|y an x or a y.
(x) an x.
x/y an x but only if followed by y.
{xx} the translation of xx from the
definitions section.
x{m,n} m through n occurrences of x
</pre>
<h2>
13. Caveats and Bugs.
</h2>
There are pathological expressions which produce exponential growth of the tables when converted to deterministic machines; fortunately, they are rare.
<p>
REJECT does not rescan the input; instead it remembers the results of the previous scan. This means that if a rule with trailing context is found, and REJECT executed, the user must not have used unput to change the characters forthcoming from the input
stream. This is the only restriction on the user's ability to manipulate the not-yet-processed input.
</p>
<h2>
14. Acknowledgments.
</h2>
As should be obvious from the above, the outside of Lex is patterned on Yacc and the inside on Aho's string matching routines. Therefore, both S. C. Johnson and A. V. Aho are really originators of much of Lex, as well as debuggers of it. Many thanks are
due to both.
<p>
The code of the current version of Lex was designed, written, and debugged by Eric Schmidt.
</p>
<h2>
15. References.
</h2>
<p>
1. B. W. Kernighan and D. M. Ritchie, The C Programming Language, Prentice-Hall, N. J. (1978).
</p>
<p>
2. B. W. Kernighan, Ratfor: A Preprocessor for a Rational Fortran, Software Practice and Experience, 5, pp. 395-496 (1975).
</p>
<p>
3. S. C. Johnson, Yacc: Yet Another Compiler Compiler, Computing Science Technical Report No. 32, 1975, Bell Laboratories, Murray Hill, NJ 07974.
</p>
<p>
4. A. V. Aho and M. J. Corasick, Efficient String Matching: An Aid to Bibliographic Search, Comm. ACM 18, 333-340 (1975).
</p>
<p>
5. B. W. Kernighan, D. M. Ritchie and K. L. Thompson, QED Text Editor, Computing Science Technical Report No. 5, 1972, Bell Laboratories, Murray Hill, NJ 07974.
</p>
<p>
6. D. M. Ritchie, private communication. See also M. E. Lesk, The Portable C Library, Computing Science Technical Report No. 31, Bell Laboratories, Murray Hill, NJ 07974.
</p>
</main>
</body>
</html>