1 .TH FLEX 1 "26 May 1990" "Version 2.3"
3 flex, lex - fast lexical analyzer generator
6 .B [-bcdfinpstvFILT8 -C[efmF] -Sskeleton]
10 is a tool for generating
12 programs which recognized lexical patterns in text.
15 the given input files, or its standard input if no file names are given,
16 for a description of a scanner to generate. The description is in
18 of regular expressions and C code, called
20 generates as output a C source file,
22 which defines a routine
24 This file is compiled and linked with the
26 library to produce an executable. When the executable is run,
27 it analyzes its input for occurrences
28 of the regular expressions. Whenever it finds one, it executes
29 the corresponding C code.
31 For full documentation, see
33 This manual entry is intended for use as a quick reference.
36 has the following options:
39 Generate backtracking information to
41 This is a list of scanner states which require backtracking
42 and the input characters on which they do so. By adding rules one
43 can remove backtracking states. If all backtracking states
48 is used, the generated scanner will run faster.
51 is a do-nothing, deprecated option included for POSIX compliance.
54 in previous releases of
57 specified table-compression options. This functionality is
60 flag. To ease the the impact of this change, when
64 it currently issues a warning message and assumes that
66 was desired instead. In the future this "promotion" of
70 will go away in the name of full POSIX compliance (unless
71 the POSIX meaning is removed first).
74 makes the generated scanner run in
76 mode. Whenever a pattern is recognized and the global
78 is non-zero (which is the default), the scanner will
84 --accepting rule at line 53 ("the matched text")
87 The line number refers to the location of the rule in the file
88 defining the scanner (i.e., the file that was fed to flex). Messages
89 are also generated when the scanner backtracks, accepts the
90 default rule, reaches the end of its input buffer (or encounters
91 a NUL; the two look the same as far as the scanner's concerned),
92 or reaches an end-of-file.
95 specifies (take your pick)
99 No table compression is done. The result is large but fast.
100 This option is equivalent to
109 scanner. The case of letters given in the
112 be ignored, and tokens in the input will be matched regardless of case. The
113 matched text given in
115 will have the preserved case (i.e., it will not be folded).
118 is another do-nothing, deprecated option included only for
122 generates a performance report to stderr. The report
123 consists of comments regarding features of the
125 input file which will cause a loss of performance in the resulting scanner.
130 (that unmatched scanner input is echoed to
132 to be suppressed. If the scanner encounters input that does not
133 match any of its rules, it aborts with an error.
138 to write the scanner it generates to standard output instead
147 a summary of statistics regarding the scanner it generates.
152 scanner table representation should be used. This representation is
153 about as fast as the full table representation
155 and for some sets of patterns will be considerably smaller (and for
160 This option is equivalent to
169 scanner, that is, a scanner which stops immediately rather than
170 looking ahead if it knows
171 that the currently scanned text cannot be part of a longer rule's match.
178 cannot be used in conjunction with
195 The default is to generate such directives so error
196 messages in the actions will be correctly
197 located with respect to the original
199 input file, and not to
200 the fairly meaningless line numbers of
208 mode. It will generate a lot of messages to
211 the form of the input and the resultant non-deterministic and deterministic
212 finite automata. This option is mostly for use in maintaining
218 to generate an 8-bit scanner.
219 On some sites, this is the default. On others, the default
220 is 7-bit characters. To see which is the case, check the verbose
222 output for "equivalence classes created". If the denominator of
223 the number shown is 128, then by default
225 is generating 7-bit characters. If it is 256, then the default is
229 controls the degree of table compression.
235 .I equivalence classes,
236 i.e., sets of characters
237 which have identical lexical properties.
238 Equivalence classes usually give
239 dramatic reductions in the final table/object file sizes (typically
240 a factor of 2-5) and are pretty cheap performance-wise (one array
241 look-up per character scanned).
246 scanner tables should be generated -
248 should not compress the
249 tables by taking advantages of similar transition functions for
253 specifies that the alternate fast scanner representation (described in
261 .I meta-equivalence classes,
262 which are sets of equivalence classes (or characters, if equivalence
263 classes are not being used) that are commonly used together. Meta-equivalence
264 classes are often a big win when using compressed tables, but they
265 have a moderate performance impact (one or two "if" tests and one
266 array look-up per character scanned).
270 specifies that the scanner tables should be compressed but neither
271 equivalence classes nor meta-equivalence classes should be used.
279 do not make sense together - there is no opportunity for meta-equivalence
280 classes if the table is not being compressed. Otherwise the options
283 The default setting is
287 should generate equivalence classes
288 and meta-equivalence classes. This setting provides the highest
289 degree of table compression. You can trade off
290 faster-executing scanners at the cost of larger tables with
291 the following generally being true:
306 options are not cumulative; whenever the flag is encountered, the
307 previous -C settings are forgotten.
310 overrides the default skeleton file from which
312 constructs its scanners. You'll never need this option unless you are doing
314 maintenance or development.
315 .SH SUMMARY OF FLEX REGULAR EXPRESSIONS
316 The patterns in the input are written using an extended set of regular
317 expressions. These are:
320 x match the character 'x'
321 . any character except newline
322 [xyz] a "character class"; in this case, the pattern
323 matches either an 'x', a 'y', or a 'z'
324 [abj-oZ] a "character class" with a range in it; matches
325 an 'a', a 'b', any letter from 'j' through 'o',
327 [^A-Z] a "negated character class", i.e., any character
328 but those in the class. In this case, any
329 character EXCEPT an uppercase letter.
330 [^A-Z\\n] any character EXCEPT an uppercase letter or
332 r* zero or more r's, where r is any regular expression
334 r? zero or one r's (that is, "an optional r")
335 r{2,5} anywhere from two to five r's
336 r{2,} two or more r's
338 {name} the expansion of the "name" definition
341 the literal string: [xyz]"foo
342 \\X if X is an 'a', 'b', 'f', 'n', 'r', 't', or 'v',
343 then the ANSI-C interpretation of \\x.
344 Otherwise, a literal 'X' (used to escape
345 operators such as '*')
346 \\123 the character with octal value 123
347 \\x2a the character with hexadecimal value 2a
348 (r) match an r; parentheses are used to override
349 precedence (see below)
352 rs the regular expression r followed by the
353 regular expression s; called "concatenation"
356 r|s either an r or an s
359 r/s an r but only if it is followed by an s. The
360 s is not part of the matched text. This type
361 of pattern is called as "trailing context".
362 ^r an r, but only at the beginning of a line
363 r$ an r, but only at the end of a line. Equivalent
367 <s>r an r, but only in start condition s (see
368 below for discussion of start conditions)
370 same, but in any of start conditions s1,
374 <<EOF>> an end-of-file
376 an end-of-file when in start condition s1 or s2
379 The regular expressions listed above are grouped according to
380 precedence, from highest precedence at the top to lowest at the bottom.
381 Those grouped together have equal precedence.
383 Some notes on patterns:
385 Negated character classes
387 unless "\\n" (or an equivalent escape sequence) is one of the
388 characters explicitly present in the negated character class
391 A rule can have at most one instance of trailing context (the '/' operator
392 or the '$' operator). The start condition, '^', and "<<EOF>>" patterns
393 can only occur at the beginning of a pattern, and, as well as with '/' and '$',
394 cannot be grouped inside parentheses. The following are all illegal:
403 .SH SUMMARY OF SPECIAL ACTIONS
404 In addition to arbitrary C code, the following can appear in actions:
407 copies yytext to the scanner's output.
410 followed by the name of a start condition places the scanner in the
411 corresponding start condition.
414 directs the scanner to proceed on to the "second best" rule which matched the
415 input (or a prefix of the input).
419 are set up appropriately. Note that
421 is a particularly expensive feature in terms scanner performance;
424 of the scanner's actions it will slow down
426 of the scanner's matching. Furthermore,
428 cannot be used with the
434 Note also that unlike the other special actions,
438 code immediately following it in the action will
443 tells the scanner that the next time it matches a rule, the corresponding
446 onto the current value of
448 rather than replacing it.
451 returns all but the first
453 characters of the current token back to the input stream, where they
454 will be rescanned when the scanner looks for the next match.
458 are adjusted appropriately (e.g.,
467 back onto the input stream. It will be the next character scanned.
470 reads the next character from the input stream (this routine is called
472 if the scanner is compiled using
476 can be used in lieu of a return statement in an action. It terminates
477 the scanner and returns a 0 to the scanner's caller, indicating "all done".
481 is also called when an end-of-file is encountered. It is a macro and
485 is an action available only in <<EOF>> rules. It means "Okay, I've
486 set up a new input file, continue scanning".
488 .B yy_create_buffer( file, size )
491 pointer and an integer
493 It returns a YY_BUFFER_STATE
494 handle to a new input buffer large enough to accomodate
496 characters and associated with the given file. When in doubt, use
500 .B yy_switch_to_buffer( new_buffer )
501 switches the scanner's processing to scan for tokens from
502 the given buffer, which must be a YY_BUFFER_STATE.
504 .B yy_delete_buffer( buffer )
505 deletes the given buffer.
506 .SH VALUES AVAILABLE TO THE USER
509 holds the text of the current token. It may not be modified.
512 holds the length of the current token. It may not be modified.
515 is the file which by default
517 reads from. It may be redefined but doing so only makes sense before
518 scanning begins. Changing it in the middle of scanning will have
519 unexpected results since
521 buffers its input. Once scanning terminates because an end-of-file
524 void yyrestart( FILE *new_file )
525 may be called to point
527 at the new input file.
532 actions are done. It can be reassigned by the user.
537 handle to the current buffer.
538 .SH MACROS THE USER CAN REDEFINE
541 controls how the scanning routine is declared.
542 By default, it is "int yylex()", or, if prototypes are being
543 used, "int yylex(void)". This definition may be changed by redefining
544 the "YY_DECL" macro. Note that
545 if you give arguments to the scanning routine using a
546 K&R-style/non-prototyped function declaration, you must terminate
547 the definition with a semi-colon (;).
549 The nature of how the scanner
550 gets its input can be controlled by redefining the
553 YY_INPUT's calling sequence is "YY_INPUT(buf,result,max_size)". Its
554 action is to place up to
556 characters in the character array
558 and return in the integer variable
561 number of characters read or the constant YY_NULL (0 on Unix systems)
562 to indicate EOF. The default YY_INPUT reads from the
563 global file-pointer "yyin".
564 A sample redefinition of YY_INPUT (in the definitions
565 section of the input file):
570 #define YY_INPUT(buf,result,max_size) \\
572 int c = getchar(); \\
573 result = (c == EOF) ? YY_NULL : (buf[0] = c, 1); \\
579 When the scanner receives an end-of-file indication from YY_INPUT,
584 returns false (zero), then it is assumed that the
585 function has gone ahead and set up
587 to point to another input file, and scanning continues. If it returns
588 true (non-zero), then the scanner terminates, returning 0 to its
593 always returns 1. Presently, to redefine it you must first
594 "#undef yywrap", as it is currently implemented as a macro. It is
597 will soon be defined to be a function rather than a macro.
600 can be redefined to provide an action
601 which is always executed prior to the matched rule's action.
605 may be redefined to provide an action which is always executed before
608 In the generated scanner, the actions are all gathered in one large
609 switch statement and separated using
611 which may be redefined. By default, it is simply a "break", to separate
612 each rule's action from the following rule's.
619 generated scanner (called
624 backtracking information for
631 library with which to link the scanners.
634 flexdoc(1), lex(1), yacc(1), sed(1), awk(1x).
636 M. E. Lesk and E. Schmidt,
637 .I LEX - Lexical Analyzer Generator
639 .I reject_used_but_not_detected undefined
642 .I yymore_used_but_not_detected undefined -
643 These errors can occur at compile time. They indicate that the
650 failed to notice the fact, meaning that
652 scanned the first two sections looking for occurrences of these actions
653 and failed to find any, but somehow you snuck some in (via a #include
654 file, for example). Make an explicit reference to the action in your
656 input file. (Note that previously
660 mechanism for dealing with this problem; this feature is still supported
661 but now deprecated, and will go away soon unless the author hears from
662 people who can argue compellingly that they need it.)
664 .I flex scanner jammed -
665 a scanner compiled with
667 has encountered an input string which wasn't matched by
670 .I flex input buffer overflowed -
671 a scanner rule matched a string long enough to overflow the
672 scanner's internal input buffer (16K bytes - controlled by
676 .I scanner requires -8 flag -
677 Your scanner specification includes recognizing 8-bit characters and
678 you did not specify the -8 flag (and your site has not installed flex
679 with -8 as the default).
682 fatal flex scanner internal error--end of buffer missed -
683 This can occur in an scanner which is reentered after a long-jump
684 has jumped out (or over) the scanner's activation frame. Before
685 reentering the scanner, use:
692 .I too many %t classes! -
693 You managed to put every single character into its own %t class.
695 requires that at least one of the classes share characters.
697 Vern Paxson, with the help of many ideas and much inspiration from
698 Van Jacobson. Original version by Jef Poskanzer.
700 See flexdoc(1) for additional credits and the address to send comments to.
701 .SH DEFICIENCIES / BUGS
703 Some trailing context
704 patterns cannot be properly matched and generate
705 warning messages ("Dangerous trailing context"). These are
706 patterns where the ending of the
707 first part of the rule matches the beginning of the second
708 part, such as "zx*/xy*", where the 'x*' matches the 'x' at
709 the beginning of the trailing context. (Note that the POSIX draft
710 states that the text matched by such patterns is undefined.)
712 For some trailing context rules, parts which are actually fixed-length are
713 not recognized as such, leading to the abovementioned performance loss.
714 In particular, parts using '|' or {n} (such as "foo{3}") are always
715 considered variable-length.
717 Combining trailing context with the special '|' action can result in
719 trailing context being turned into the more expensive
721 trailing context. For example, this happens in the following example:
730 Use of unput() invalidates yytext and yyleng.
732 Use of unput() to push back more text than was matched can
733 result in the pushed-back text matching a beginning-of-line ('^')
734 rule even though it didn't come at the beginning of the line
735 (though this is rare!).
737 Pattern-matching of NUL's is substantially slower than matching other
741 does not generate correct #line directives for code internal
742 to the scanner; thus, bugs in
744 yield bogus line numbers.
746 Due to both buffering of input and read-ahead, you cannot intermix
747 calls to <stdio.h> routines, such as, for example,
751 rules and expect it to work. Call
755 The total table entries listed by the
757 flag excludes the number of table entries needed to determine
758 what rule has been matched. The number of entries is equal
759 to the number of DFA states if the scanner does not use
761 and somewhat greater than the number of states if it does.
764 cannot be used with the
770 Some of the macros, such as
772 may in the future become functions which live in the
774 library. This will doubtless break a lot of code, but may be
775 required for POSIX-compliance.
779 internal algorithms need documentation.
780 .\" ref. to awk(9) man page corrected -- ASW 2005-01-15