source: trunk/minix/man/man1/flex.1@ 15

Last change on this file since 15 was 9, checked in by Mattia Monga, 14 years ago

Minix 3.1.2a

File size: 20.4 KB
RevLine 
[9]1.TH FLEX 1 "26 May 1990" "Version 2.3"
2.SH NAME
3flex, lex - fast lexical analyzer generator
4.SH SYNOPSIS
5.B flex
6.B [-bcdfinpstvFILT8 -C[efmF] -Sskeleton]
7.I [filename ...]
8.SH DESCRIPTION
9.I flex
10is a tool for generating
11.I scanners:
12programs which recognized lexical patterns in text.
13.I flex
14reads
15the given input files, or its standard input if no file names are given,
16for a description of a scanner to generate. The description is in
17the form of pairs
18of regular expressions and C code, called
19.I rules. flex
20generates as output a C source file,
21.B lex.yy.c,
22which defines a routine
23.B yylex().
24This file is compiled and linked with the
25.B -lfl
26library to produce an executable. When the executable is run,
27it analyzes its input for occurrences
28of the regular expressions. Whenever it finds one, it executes
29the corresponding C code.
30.LP
31For full documentation, see
32.B flexdoc(1).
33This manual entry is intended for use as a quick reference.
34.SH OPTIONS
35.I flex
36has the following options:
37.TP
38.B -b
39Generate backtracking information to
40.I lex.backtrack.
41This is a list of scanner states which require backtracking
42and the input characters on which they do so. By adding rules one
43can remove backtracking states. If all backtracking states
44are eliminated and
45.B -f
46or
47.B -F
48is used, the generated scanner will run faster.
49.TP
50.B -c
51is a do-nothing, deprecated option included for POSIX compliance.
52.IP
53.B NOTE:
54in previous releases of
55.I flex
56.B -c
57specified table-compression options. This functionality is
58now given by the
59.B -C
60flag. To ease the the impact of this change, when
61.I flex
62encounters
63.B -c,
64it currently issues a warning message and assumes that
65.B -C
66was desired instead. In the future this "promotion" of
67.B -c
68to
69.B -C
70will go away in the name of full POSIX compliance (unless
71the POSIX meaning is removed first).
72.TP
73.B -d
74makes the generated scanner run in
75.I debug
76mode. Whenever a pattern is recognized and the global
77.B yy_flex_debug
78is non-zero (which is the default), the scanner will
79write to
80.I stderr
81a line of the form:
82.nf
83
84 --accepting rule at line 53 ("the matched text")
85
86.fi
87The line number refers to the location of the rule in the file
88defining the scanner (i.e., the file that was fed to flex). Messages
89are also generated when the scanner backtracks, accepts the
90default rule, reaches the end of its input buffer (or encounters
91a NUL; the two look the same as far as the scanner's concerned),
92or reaches an end-of-file.
93.TP
94.B -f
95specifies (take your pick)
96.I full table
97or
98.I fast scanner.
99No table compression is done. The result is large but fast.
100This option is equivalent to
101.B -Cf
102(see below).
103.TP
104.B -i
105instructs
106.I flex
107to generate a
108.I case-insensitive
109scanner. The case of letters given in the
110.I flex
111input patterns will
112be ignored, and tokens in the input will be matched regardless of case. The
113matched text given in
114.I yytext
115will have the preserved case (i.e., it will not be folded).
116.TP
117.B -n
118is another do-nothing, deprecated option included only for
119POSIX compliance.
120.TP
121.B -p
122generates a performance report to stderr. The report
123consists of comments regarding features of the
124.I flex
125input file which will cause a loss of performance in the resulting scanner.
126.TP
127.B -s
128causes the
129.I default rule
130(that unmatched scanner input is echoed to
131.I stdout)
132to be suppressed. If the scanner encounters input that does not
133match any of its rules, it aborts with an error.
134.TP
135.B -t
136instructs
137.I flex
138to write the scanner it generates to standard output instead
139of
140.B lex.yy.c.
141.TP
142.B -v
143specifies that
144.I flex
145should write to
146.I stderr
147a summary of statistics regarding the scanner it generates.
148.TP
149.B -F
150specifies that the
151.I fast
152scanner table representation should be used. This representation is
153about as fast as the full table representation
154.RB ( \-f ),
155and for some sets of patterns will be considerably smaller (and for
156others, larger). See
157.B flexdoc(1)
158for details.
159.IP
160This option is equivalent to
161.B -CF
162(see below).
163.TP
164.B -I
165instructs
166.I flex
167to generate an
168.I interactive
169scanner, that is, a scanner which stops immediately rather than
170looking ahead if it knows
171that the currently scanned text cannot be part of a longer rule's match.
172Again, see
173.B flexdoc(1)
174for details.
175.IP
176Note,
177.B -I
178cannot be used in conjunction with
179.I full
180or
181.I fast tables,
182i.e., the
183.B -f, -F, -Cf,
184or
185.B -CF
186flags.
187.TP
188.B -L
189instructs
190.I flex
191not to generate
192.B #line
193directives in
194.B lex.yy.c.
195The default is to generate such directives so error
196messages in the actions will be correctly
197located with respect to the original
198.I flex
199input file, and not to
200the fairly meaningless line numbers of
201.B lex.yy.c.
202.TP
203.B -T
204makes
205.I flex
206run in
207.I trace
208mode. It will generate a lot of messages to
209.I stdout
210concerning
211the form of the input and the resultant non-deterministic and deterministic
212finite automata. This option is mostly for use in maintaining
213.I flex.
214.TP
215.B -8
216instructs
217.I flex
218to generate an 8-bit scanner.
219On some sites, this is the default. On others, the default
220is 7-bit characters. To see which is the case, check the verbose
221.B (-v)
222output for "equivalence classes created". If the denominator of
223the number shown is 128, then by default
224.I flex
225is generating 7-bit characters. If it is 256, then the default is
2268-bit characters.
227.TP
228.B -C[efmF]
229controls the degree of table compression.
230.IP
231.B -Ce
232directs
233.I flex
234to construct
235.I equivalence classes,
236i.e., sets of characters
237which have identical lexical properties.
238Equivalence classes usually give
239dramatic reductions in the final table/object file sizes (typically
240a factor of 2-5) and are pretty cheap performance-wise (one array
241look-up per character scanned).
242.IP
243.B -Cf
244specifies that the
245.I full
246scanner tables should be generated -
247.I flex
248should not compress the
249tables by taking advantages of similar transition functions for
250different states.
251.IP
252.B -CF
253specifies that the alternate fast scanner representation (described in
254.B flexdoc(1))
255should be used.
256.IP
257.B -Cm
258directs
259.I flex
260to construct
261.I meta-equivalence classes,
262which are sets of equivalence classes (or characters, if equivalence
263classes are not being used) that are commonly used together. Meta-equivalence
264classes are often a big win when using compressed tables, but they
265have a moderate performance impact (one or two "if" tests and one
266array look-up per character scanned).
267.IP
268A lone
269.B -C
270specifies that the scanner tables should be compressed but neither
271equivalence classes nor meta-equivalence classes should be used.
272.IP
273The options
274.B -Cf
275or
276.B -CF
277and
278.B -Cm
279do not make sense together - there is no opportunity for meta-equivalence
280classes if the table is not being compressed. Otherwise the options
281may be freely mixed.
282.IP
283The default setting is
284.B -Cem,
285which specifies that
286.I flex
287should generate equivalence classes
288and meta-equivalence classes. This setting provides the highest
289degree of table compression. You can trade off
290faster-executing scanners at the cost of larger tables with
291the following generally being true:
292.nf
293
294 slowest & smallest
295 -Cem
296 -Cm
297 -Ce
298 -C
299 -C{f,F}e
300 -C{f,F}
301 fastest & largest
302
303.fi
304.IP
305.B -C
306options are not cumulative; whenever the flag is encountered, the
307previous -C settings are forgotten.
308.TP
309.B -Sskeleton_file
310overrides the default skeleton file from which
311.I flex
312constructs its scanners. You'll never need this option unless you are doing
313.I flex
314maintenance or development.
315.SH SUMMARY OF FLEX REGULAR EXPRESSIONS
316The patterns in the input are written using an extended set of regular
317expressions. These are:
318.nf
319
320 x match the character 'x'
321 . any character except newline
322 [xyz] a "character class"; in this case, the pattern
323 matches either an 'x', a 'y', or a 'z'
324 [abj-oZ] a "character class" with a range in it; matches
325 an 'a', a 'b', any letter from 'j' through 'o',
326 or a 'Z'
327 [^A-Z] a "negated character class", i.e., any character
328 but those in the class. In this case, any
329 character EXCEPT an uppercase letter.
330 [^A-Z\\n] any character EXCEPT an uppercase letter or
331 a newline
332 r* zero or more r's, where r is any regular expression
333 r+ one or more r's
334 r? zero or one r's (that is, "an optional r")
335 r{2,5} anywhere from two to five r's
336 r{2,} two or more r's
337 r{4} exactly 4 r's
338 {name} the expansion of the "name" definition
339 (see above)
340 "[xyz]\\"foo"
341 the literal string: [xyz]"foo
342 \\X if X is an 'a', 'b', 'f', 'n', 'r', 't', or 'v',
343 then the ANSI-C interpretation of \\x.
344 Otherwise, a literal 'X' (used to escape
345 operators such as '*')
346 \\123 the character with octal value 123
347 \\x2a the character with hexadecimal value 2a
348 (r) match an r; parentheses are used to override
349 precedence (see below)
350
351
352 rs the regular expression r followed by the
353 regular expression s; called "concatenation"
354
355
356 r|s either an r or an s
357
358
359 r/s an r but only if it is followed by an s. The
360 s is not part of the matched text. This type
361 of pattern is called as "trailing context".
362 ^r an r, but only at the beginning of a line
363 r$ an r, but only at the end of a line. Equivalent
364 to "r/\\n".
365
366
367 <s>r an r, but only in start condition s (see
368 below for discussion of start conditions)
369 <s1,s2,s3>r
370 same, but in any of start conditions s1,
371 s2, or s3
372
373
374 <<EOF>> an end-of-file
375 <s1,s2><<EOF>>
376 an end-of-file when in start condition s1 or s2
377
378.fi
379The regular expressions listed above are grouped according to
380precedence, from highest precedence at the top to lowest at the bottom.
381Those grouped together have equal precedence.
382.LP
383Some notes on patterns:
384.IP -
385Negated character classes
386.I match newlines
387unless "\\n" (or an equivalent escape sequence) is one of the
388characters explicitly present in the negated character class
389(e.g., "[^A-Z\\n]").
390.IP -
391A rule can have at most one instance of trailing context (the '/' operator
392or the '$' operator). The start condition, '^', and "<<EOF>>" patterns
393can only occur at the beginning of a pattern, and, as well as with '/' and '$',
394cannot be grouped inside parentheses. The following are all illegal:
395.nf
396
397 foo/bar$
398 foo|(bar$)
399 foo|^bar
400 <sc1>foo<sc2>bar
401
402.fi
403.SH SUMMARY OF SPECIAL ACTIONS
404In addition to arbitrary C code, the following can appear in actions:
405.IP -
406.B ECHO
407copies yytext to the scanner's output.
408.IP -
409.B BEGIN
410followed by the name of a start condition places the scanner in the
411corresponding start condition.
412.IP -
413.B REJECT
414directs the scanner to proceed on to the "second best" rule which matched the
415input (or a prefix of the input).
416.B yytext
417and
418.B yyleng
419are set up appropriately. Note that
420.B REJECT
421is a particularly expensive feature in terms scanner performance;
422if it is used in
423.I any
424of the scanner's actions it will slow down
425.I all
426of the scanner's matching. Furthermore,
427.B REJECT
428cannot be used with the
429.I -f
430or
431.I -F
432options.
433.IP
434Note also that unlike the other special actions,
435.B REJECT
436is a
437.I branch;
438code immediately following it in the action will
439.I not
440be executed.
441.IP -
442.B yymore()
443tells the scanner that the next time it matches a rule, the corresponding
444token should be
445.I appended
446onto the current value of
447.B yytext
448rather than replacing it.
449.IP -
450.B yyless(n)
451returns all but the first
452.I n
453characters of the current token back to the input stream, where they
454will be rescanned when the scanner looks for the next match.
455.B yytext
456and
457.B yyleng
458are adjusted appropriately (e.g.,
459.B yyleng
460will now be equal to
461.I n
462).
463.IP -
464.B unput(c)
465puts the character
466.I c
467back onto the input stream. It will be the next character scanned.
468.IP -
469.B input()
470reads the next character from the input stream (this routine is called
471.B yyinput()
472if the scanner is compiled using
473.B C++).
474.IP -
475.B yyterminate()
476can be used in lieu of a return statement in an action. It terminates
477the scanner and returns a 0 to the scanner's caller, indicating "all done".
478.IP
479By default,
480.B yyterminate()
481is also called when an end-of-file is encountered. It is a macro and
482may be redefined.
483.IP -
484.B YY_NEW_FILE
485is an action available only in <<EOF>> rules. It means "Okay, I've
486set up a new input file, continue scanning".
487.IP -
488.B yy_create_buffer( file, size )
489takes a
490.I FILE
491pointer and an integer
492.I size.
493It returns a YY_BUFFER_STATE
494handle to a new input buffer large enough to accomodate
495.I size
496characters and associated with the given file. When in doubt, use
497.B YY_BUF_SIZE
498for the size.
499.IP -
500.B yy_switch_to_buffer( new_buffer )
501switches the scanner's processing to scan for tokens from
502the given buffer, which must be a YY_BUFFER_STATE.
503.IP -
504.B yy_delete_buffer( buffer )
505deletes the given buffer.
506.SH VALUES AVAILABLE TO THE USER
507.IP -
508.B char *yytext
509holds the text of the current token. It may not be modified.
510.IP -
511.B int yyleng
512holds the length of the current token. It may not be modified.
513.IP -
514.B FILE *yyin
515is the file which by default
516.I flex
517reads from. It may be redefined but doing so only makes sense before
518scanning begins. Changing it in the middle of scanning will have
519unexpected results since
520.I flex
521buffers its input. Once scanning terminates because an end-of-file
522has been seen,
523.B
524void yyrestart( FILE *new_file )
525may be called to point
526.I yyin
527at the new input file.
528.IP -
529.B FILE *yyout
530is the file to which
531.B ECHO
532actions are done. It can be reassigned by the user.
533.IP -
534.B YY_CURRENT_BUFFER
535returns a
536.B YY_BUFFER_STATE
537handle to the current buffer.
538.SH MACROS THE USER CAN REDEFINE
539.IP -
540.B YY_DECL
541controls how the scanning routine is declared.
542By default, it is "int yylex()", or, if prototypes are being
543used, "int yylex(void)". This definition may be changed by redefining
544the "YY_DECL" macro. Note that
545if you give arguments to the scanning routine using a
546K&R-style/non-prototyped function declaration, you must terminate
547the definition with a semi-colon (;).
548.IP -
549The nature of how the scanner
550gets its input can be controlled by redefining the
551.B YY_INPUT
552macro.
553YY_INPUT's calling sequence is "YY_INPUT(buf,result,max_size)". Its
554action is to place up to
555.I max_size
556characters in the character array
557.I buf
558and return in the integer variable
559.I result
560either the
561number of characters read or the constant YY_NULL (0 on Unix systems)
562to indicate EOF. The default YY_INPUT reads from the
563global file-pointer "yyin".
564A sample redefinition of YY_INPUT (in the definitions
565section of the input file):
566.nf
567
568 %{
569 #undef YY_INPUT
570 #define YY_INPUT(buf,result,max_size) \\
571 { \\
572 int c = getchar(); \\
573 result = (c == EOF) ? YY_NULL : (buf[0] = c, 1); \\
574 }
575 %}
576
577.fi
578.IP -
579When the scanner receives an end-of-file indication from YY_INPUT,
580it then checks the
581.B yywrap()
582function. If
583.B yywrap()
584returns false (zero), then it is assumed that the
585function has gone ahead and set up
586.I yyin
587to point to another input file, and scanning continues. If it returns
588true (non-zero), then the scanner terminates, returning 0 to its
589caller.
590.IP
591The default
592.B yywrap()
593always returns 1. Presently, to redefine it you must first
594"#undef yywrap", as it is currently implemented as a macro. It is
595likely that
596.B yywrap()
597will soon be defined to be a function rather than a macro.
598.IP -
599YY_USER_ACTION
600can be redefined to provide an action
601which is always executed prior to the matched rule's action.
602.IP -
603The macro
604.B YY_USER_INIT
605may be redefined to provide an action which is always executed before
606the first scan.
607.IP -
608In the generated scanner, the actions are all gathered in one large
609switch statement and separated using
610.B YY_BREAK,
611which may be redefined. By default, it is simply a "break", to separate
612each rule's action from the following rule's.
613.SH FILES
614.TP
615.I flex.skel
616skeleton scanner.
617.TP
618.I lex.yy.c
619generated scanner (called
620.I lexyy.c
621on some systems).
622.TP
623.I lex.backtrack
624backtracking information for
625.B -b
626flag (called
627.I lex.bck
628on some systems).
629.TP
630.B -lfl
631library with which to link the scanners.
632.SH "SEE ALSO"
633.LP
634flexdoc(1), lex(1), yacc(1), sed(1), awk(9).
635.LP
636M. E. Lesk and E. Schmidt,
637.I LEX - Lexical Analyzer Generator
638.SH DIAGNOSTICS
639.I reject_used_but_not_detected undefined
640or
641.LP
642.I yymore_used_but_not_detected undefined -
643These errors can occur at compile time. They indicate that the
644scanner uses
645.B REJECT
646or
647.B yymore()
648but that
649.I flex
650failed to notice the fact, meaning that
651.I flex
652scanned the first two sections looking for occurrences of these actions
653and failed to find any, but somehow you snuck some in (via a #include
654file, for example). Make an explicit reference to the action in your
655.I flex
656input file. (Note that previously
657.I flex
658supported a
659.B %used/%unused
660mechanism for dealing with this problem; this feature is still supported
661but now deprecated, and will go away soon unless the author hears from
662people who can argue compellingly that they need it.)
663.LP
664.I flex scanner jammed -
665a scanner compiled with
666.B -s
667has encountered an input string which wasn't matched by
668any of its rules.
669.LP
670.I flex input buffer overflowed -
671a scanner rule matched a string long enough to overflow the
672scanner's internal input buffer (16K bytes - controlled by
673.B YY_BUF_MAX
674in "flex.skel").
675.LP
676.I scanner requires -8 flag -
677Your scanner specification includes recognizing 8-bit characters and
678you did not specify the -8 flag (and your site has not installed flex
679with -8 as the default).
680.LP
681.I
682fatal flex scanner internal error--end of buffer missed -
683This can occur in an scanner which is reentered after a long-jump
684has jumped out (or over) the scanner's activation frame. Before
685reentering the scanner, use:
686.nf
687
688 yyrestart( yyin );
689
690.fi
691.LP
692.I too many %t classes! -
693You managed to put every single character into its own %t class.
694.I flex
695requires that at least one of the classes share characters.
696.SH AUTHOR
697Vern Paxson, with the help of many ideas and much inspiration from
698Van Jacobson. Original version by Jef Poskanzer.
699.LP
700See flexdoc(1) for additional credits and the address to send comments to.
701.SH DEFICIENCIES / BUGS
702.LP
703Some trailing context
704patterns cannot be properly matched and generate
705warning messages ("Dangerous trailing context"). These are
706patterns where the ending of the
707first part of the rule matches the beginning of the second
708part, such as "zx*/xy*", where the 'x*' matches the 'x' at
709the beginning of the trailing context. (Note that the POSIX draft
710states that the text matched by such patterns is undefined.)
711.LP
712For some trailing context rules, parts which are actually fixed-length are
713not recognized as such, leading to the abovementioned performance loss.
714In particular, parts using '|' or {n} (such as "foo{3}") are always
715considered variable-length.
716.LP
717Combining trailing context with the special '|' action can result in
718.I fixed
719trailing context being turned into the more expensive
720.I variable
721trailing context. For example, this happens in the following example:
722.nf
723
724 %%
725 abc |
726 xyz/def
727
728.fi
729.LP
730Use of unput() invalidates yytext and yyleng.
731.LP
732Use of unput() to push back more text than was matched can
733result in the pushed-back text matching a beginning-of-line ('^')
734rule even though it didn't come at the beginning of the line
735(though this is rare!).
736.LP
737Pattern-matching of NUL's is substantially slower than matching other
738characters.
739.LP
740.I flex
741does not generate correct #line directives for code internal
742to the scanner; thus, bugs in
743.I flex.skel
744yield bogus line numbers.
745.LP
746Due to both buffering of input and read-ahead, you cannot intermix
747calls to <stdio.h> routines, such as, for example,
748.B getchar(),
749with
750.I flex
751rules and expect it to work. Call
752.B input()
753instead.
754.LP
755The total table entries listed by the
756.B -v
757flag excludes the number of table entries needed to determine
758what rule has been matched. The number of entries is equal
759to the number of DFA states if the scanner does not use
760.B REJECT,
761and somewhat greater than the number of states if it does.
762.LP
763.B REJECT
764cannot be used with the
765.I -f
766or
767.I -F
768options.
769.LP
770Some of the macros, such as
771.B yywrap(),
772may in the future become functions which live in the
773.B -lfl
774library. This will doubtless break a lot of code, but may be
775required for POSIX-compliance.
776.LP
777The
778.I flex
779internal algorithms need documentation.
780.\" ref. to awk(9) man page corrected -- ASW 2005-01-15
Note: See TracBrowser for help on using the repository browser.