- Source: Lexer hack
In computer programming, the lexer hack is a solution to parsing context-sensitive grammars such as C, where classifying a sequence of characters as a variable name or a type name requires contextual information, by feeding contextual information backwards from the parser to the lexer.
Lexer hack is frowned upon in modern compilers as it creates tight coupling between otherwise largely independent steps in the compilation process. Instead, identifier-like tokens are tokenized as identifiers and later disambiguated by the parser, allowing cleaner separation of concerns.
Problem
The fundamental problem is differentiating types from other identifiers. In the following example, the lexical class of A cannot be determined without further contextual information:
This code could either be multiplication or a declaration, depending on context.
In more detail, in a compiler, the lexer performs one of the earliest stages of converting the source code to a program. It scans the text to extract meaningful tokens, such as words, numbers, and strings. The parser analyzes sequences of tokens attempting to match them to syntax rules representing language structures, such as loops and variable declarations. A problem occurs here if a single sequence of tokens can ambiguously match more than one syntax rule.
This ambiguity can happen in C if the lexer does not distinguish between variable and typedef identifiers. For example, in the C expression:
the lexer may find these tokens:
?? 'A'
operator '*'
identifier 'B'
punctuation ';'
Depending on whether A is a typedef name or not it may be desirable to tokenize A as either an identifier or a type so the parser does not have to handle an ambiguous parse. This gramatical ambiguity is known as the "typedef-name: identifier" problem, due to the name of the problematic production rule.
The hack solution
The solution generally consists of feeding information from the semantic symbol table back into the lexer. That is, rather than functioning as a pure one-way pipeline from the lexer to the parser, there is a backchannel from semantic analysis back to the lexer. This mixing of parsing and semantic analysis is generally regarded as inelegant, which is why it is called a "hack".
Without added context, the lexer cannot distinguish type identifiers from other identifiers because all identifiers have the same format. With the hack in the above example, when the lexer finds the identifier A it should be able to classify the token as a type identifier. The rules of the language would be clarified by specifying that typecasts require a type identifier and the ambiguity disappears.
The problem also exists in C++ and parsers can use the same hack.
Alternative solutions
This problem does not arise (and hence needs no "hack" in order to solve) when using lexerless parsing techniques, as these are intrinsically contextual. These are generally seen as less elegant designs, however, because they lack the modularity of having a concurrent lexer and parser in a pipeline.
Some parser generators, such as the byacc-derived BtYacc ("Backtracking Yacc"), give the generated parser the ability to try multiple attempts to parse the tokens. In the problem described here, if an attempt fails because of semantic information about the identifier, it can backtrack and attempt other rules.
The Clang parser handles the situation in a completely different way, namely by using a non-reference lexical grammar. Clang's lexer does not attempt to differentiate between type names and variable names: it simply reports the current token as an identifier. The parser then uses Clang's semantic analysis library to determine the nature of the identifier. This allows a simpler and more maintainable architecture than The Lexer Hack. This is also the approach used in most other modern languages, which do not distinguish different classes of identifiers in the lexical grammar, but instead defer them to the parsing or semantic analysis phase, when sufficient information is available.
See also
Dangling else
Most vexing parse
References
Citations
http://www.cs.berkeley.edu/~smcpeak/elkhound/sources/elkhound/index.html
http://cs.nyu.edu/rgrimm/papers/pldi06.pdf
http://cens.ioc.ee/local/man/CompaqCompilers/ladebug/ladebug-manual-details.html
DOI.org
[1]
http://groups.google.com/group/comp.compilers/browse_frm/thread/db7f68e9d8b49002/fa20bf5de9c73472?lnk=st&q=%2B%22the+lexer+hack%22&rnum=1&hl=en#fa20bf5de9c73472
Kata Kunci Pencarian:
- Lexer hack
- Lexical analysis
- Pipeline (software)
- Syntax (programming languages)
- Scannerless parsing
- Dangling else
- Perl
- Category 6: Day of Destruction
- Scratchbox 2
- Boa (JavaScript engine)