Each operation in the binary Fasload language is an eight-bit (one-byte) opcode. Each has a name beginning with “FOP-”. In the following descriptions, the name is followed by operand descriptors. Each descriptor denotes operands that follow the opcode in the input stream. A quantity in parentheses indicates the number of bytes of data from the stream making up the operand. Operands which implicitly come from the stack are noted in the text. The notation “\Rightarrow stack” means that the result is pushed onto the stack; “\Rightarrow table” similarly means that the result is added to the table. A construction like “n(1) value(n)” means that first a single byte n is read from the input stream, and this byte specifies how many bytes to read as the operand named value. All numeric values are unsigned binary integers unless otherwise specified. Values described as “signed” are in two's-complement form unless otherwise specified. When an integer read from the stream occupies more than one byte, the first byte read is the least significant byte, and the last byte read is the most significant (and contains the sign bit as its high-order bit if the entire integer is signed).
Some of the operations are not necessary, but are rather special cases of or combinations of others. These are included to reduce the size of the file or to speed up important cases. As an example, nearly all strings are less than 256 bytes long, and so a special form of string operation might take a one-byte length rather than a four-byte length. As another example, some implementations may choose to store bits in an array in a left-to-right format within each word, rather than right-to-left. The Fasload file format may support both formats, with one being significantly more efficient than the other for a given implementation. The compiler for any implementation may generate the more efficient form for that implementation, and yet compatibility can be maintained by requiring all implementations to support both formats in Fasload files.
Measurements are to be made to determine which operation codes are worthwhile; little-used operations may be discarded and new ones added. After a point the definition will be “frozen”, meaning that existing operations may not be deleted (though new ones may be added; some operations codes will be reserved for that purpose).
table
One item is popped from the stack and added to the table.
\Rightarrow
stack
Item number index of the table is pushed onto the stack. The first element of the table is item number zero.
\Rightarrow
stack
Item number index of the table is pushed onto the stack. The first element of the table is item number zero.
stack
The empty list (()) is pushed onto the stack.
stack
The standard truth value (T) is pushed onto the stack.
(n)
\Rightarrow
stack \& table
The four-byte operand n specifies the length of the print name of a symbol. The name follows, one character per byte, with the first byte of the print name being the first read. The name is interned in the default package, and the resulting symbol is both pushed onto the stack and added to the table.
(n)
\Rightarrow
stack \& table
The one-byte operand n specifies the length of the print name of a symbol. The name follows, one character per byte, with the first byte of the print name being the first read. The name is interned in the default package, and the resulting symbol is both pushed onto the stack and added to the table.
(4)
(n)
\Rightarrow
stack \& table
The four-byte index specifies a package stored in the table. The four-byte operand n specifies the length of the print name of a symbol. The name follows, one character per byte, with the first byte of the print name being the first read. The name is interned in the specified package, and the resulting symbol is both pushed onto the stack and added to the table.
(1)
(n)
\Rightarrow
stack \& table
The four-byte index specifies a package stored in the table. The one-byte operand n specifies the length of the print name of a symbol. The name follows, one character per byte, with the first byte of the print name being the first read. The name is interned in the specified package, and the resulting symbol is both pushed onto the stack and added to the table.
(4)
(n)
\Rightarrow
stack \& table
The one-byte index specifies a package stored in the table. The four-byte operand n specifies the length of the print name of a symbol. The name follows, one character per byte, with the first byte of the print name being the first read. The name is interned in the specified package, and the resulting symbol is both pushed onto the stack and added to the table.
(1)
(n)
\Rightarrow
stack \& table
The one-byte index specifies a package stored in the table. The one-byte operand n specifies the length of the print name of a symbol. The name follows, one character per byte, with the first byte of the print name being the first read. The name is interned in the specified package, and the resulting symbol is both pushed onto the stack and added to the table.
(n)
\Rightarrow
stack \& table
Like FOP-SYMBOL-SAVE, except that it creates an uninterned symbol.
(n)
\Rightarrow
stack \& table
Like FOP-SMALL-SYMBOL-SAVE, except that it creates an uninterned symbol.
table
An item is popped from the stack; it must be a symbol. The package of that name is located and pushed onto the table.
\Rightarrow
stack
The unsigned operand length specifies a number of operands to be popped from the stack. These are made into a list of that length, and the list is pushed onto the stack. The first item popped from the stack becomes the last element of the list, and so on. Hence an iterative loop can start with the empty list and perform “pop an item and cons it onto the list” length times. (Lists of length greater than 255 can be made by using FOP-LIST* repeatedly.)
\Rightarrow
stack
This is like FOP-LIST except that the constructed list is terminated not by () (the empty list), but by an item popped from the stack before any others are. Therefore length+1 items are popped in all. Hence an iterative loop can start with a popped item and perform “pop an item and cons it onto the list” length+1 times.
(n)
\Rightarrow
stack
A four-byte unsigned operand specifies the number of following bytes. These bytes define the value of a signed integer in two's-complement form. The first byte of the value is the least significant byte.
(n)
\Rightarrow
stack
A one-byte unsigned operand specifies the number of following bytes. These bytes define the value of a signed integer in two's-complement form. The first byte of the value is the least significant byte.
\Rightarrow
stack
A four-byte signed integer (in the range -2^31 to 2^31-1) follows the operation code. A LISP integer (fixnum or bignum) with that value is constructed and pushed onto the stack.
\Rightarrow
stack
A one-byte signed integer (in the range -128 to 127) follows the operation code. A LISP integer (fixnum or bignum) with that value is constructed and pushed onto the stack.
(n)
\Rightarrow
stack
The four-byte operand n specifies the length of a string to construct. The characters of the string follow, one per byte. The constructed string is pushed onto the stack.
(n)
\Rightarrow
stack
The one-byte operand n specifies the length of a string to construct. The characters of the string follow, one per byte. The constructed string is pushed onto the stack.
\Rightarrow
stack
The four-byte operand n specifies the length of a vector of LISP objects to construct. The elements of the vector are popped off the stack; the first one popped becomes the last element of the vector. The constructed vector is pushed onto the stack.
\Rightarrow
stack
The one-byte operand n specifies the length of a vector of LISP objects to construct. The elements of the vector are popped off the stack; the first one popped becomes the last element of the vector. The constructed vector is pushed onto the stack.
\Rightarrow
stack
The four-byte operand n specifies the length of a vector of LISP objects to construct. A single item is popped from the stack and used to initialize all elements of the vector. The constructed vector is pushed onto the stack.
\Rightarrow
stack
The one-byte operand n specifies the length of a vector of LISP objects to construct. A single item is popped from the stack and used to initialize all elements of the vector. The constructed vector is pushed onto the stack.
(1)
(\left\lceil len*count/8\right\rceil)
\Rightarrow
stack
The four-byte operand n specifies the length of a vector of unsigned integers to be constructed. Each integer is size bits long, and is packed according to the machine's native byte ordering. size must be a directly supported i-vector element size. Currently supported values are 1,2,4,8,16 and 32.
(1)
(@ceiling<size/8>)
\Rightarrow
stack
The four-byte operand n specifies the length of a vector of unsigned integers to construct. Each integer is size bits big, and is initialized to the value of the operand value. The constructed vector is pushed onto the stack.
\Rightarrow
stack
The data bytes are read as an integer, then turned into an IEEE single float (as though by make-single-float).
\Rightarrow
stack
The data bytes are read as an integer, then turned into an IEEE double float (as though by make-double-float).
\Rightarrow
stack
The four-byte operand n specifies the length structure to construct. The elements of the vector are popped off the stack; the first one popped becomes the last element of the structure. The constructed vector is pushed onto the stack.
\Rightarrow
stack
The one-byte operand n specifies the length structure to construct. The elements of the vector are popped off the stack; the first one popped becomes the last element of the structure. The constructed vector is pushed onto the stack.
stack
Pop an item from the stack and evaluate it (give it to EVAL). Push the result back onto the stack.
\Rightarrow
stack
Pop nargs+1 items from the stack and apply the last one popped as a function to all the rest as arguments (the first one popped being the last argument). Push the result back onto the stack.
(1)
This FOP specifiers the code format for following code objects. The operations FOP-CODE and its relatives may not occur in a group until after FOP-CODE-FORMAT has appeared; there is no default format. The implementation is an integer indicating the target hardware and environment. See compiler/generic/vm-macs.lisp for the currently defined implementations. version for an implementation is increased whenever there is a change that renders old fasl files unusable.
(4)
(size)
\Rightarrow
stack
A compiled function is constructed and pushed onto the stack. This object is in the format specified by the most recent occurrence of FOP-CODE-FORMAT. The operand nitems specifies a number of items to pop off the stack to use in the “boxed storage” section. The operand code is a string of bytes constituting the compiled executable code.
(2)
(size)
\Rightarrow
stack
A compiled function is constructed and pushed onto the stack. This object is in the format specified by the most recent occurrence of FOP-CODE-FORMAT. The operand nitems specifies a number of items to pop off the stack to use in the “boxed storage” section. The operand code is a string of bytes constituting the compiled executable code.
\Rightarrow
One item is popped from the stack.
stack
A trap object is pushed onto the stack.
\Rightarrow
stack
The next 8 bytes are read, and a double-double-float number is constructed.
\Rightarrow
stack
The three bytes are read as an integer then converted to a character. This FOP is currently rather useless, as extended characters are not supported.
\Rightarrow
stack
The one byte specifies the code of a Common Lisp character object. A character is constructed and pushed onto the stack.
stack
Creates a ratio from two integers popped from the stack. The denominator is popped first, the numerator second.
stack
Creates a complex number from two numbers popped from the stack. The imaginary part is popped first, the real part second.
stack
Creates a complex single-float number from the following 8 bytes.
stack
Creates a complex double-float number from the following 16 bytes.
(n)
\Rightarrow
stack \& table
Like FOP-SYMBOL-SAVE, except that it creates a symbol in the LISP package.
(n)
\Rightarrow
stack \& table
Like FOP-SMALL-SYMBOL-SAVE, except that it creates a symbol in the LISP package.
(n)
\Rightarrow
stack \& table
Like FOP-SYMBOL-SAVE, except that it creates a symbol in the KEYWORD package.
(n)
\Rightarrow
stack \& table
Like FOP-SMALL-SYMBOL-SAVE, except that it creates a symbol in the KEYWORD package.
\Rightarrow
stack
This operation creates a simple array header (used for simple-arrays with rank /= 1). The data vector is popped off of the stack, and then rank dimensions are popped off of the stack (the highest dimensions is on top.)
\Rightarrow
stack
Creates a (simple-array single-float (*)) object. The number of single-floats is length.
\Rightarrow
stack
Creates a (simple-array double-float (*)) object. The number of double-floats is length.
\Rightarrow
stack
Creates a (simple-array (complex single-float) (*)) object. The number of complex single-floats is length.
\Rightarrow
stack
Creates a (simple-array (complex double-float) (*)) object. The number of complex double-floats is length.
\Rightarrow
stack
Creates a (simple-array double-double-float (*)) object. The number of double-double-floats is length.
\Rightarrow
stack
Creates a (complex double-double-float) object from the following 32 bytes of data.
\Rightarrow
stack
Creates a (simple-arra (complex double-double-float) (*)) object. The number of complex double-double-floats is length.
\Rightarrow
stack
Initializes a function-entry header inside of a pre-existing code object, and returns the corresponding function descriptor. index is the byte offset inside of the code object where the header should be plunked down. The stack arguments to this operation are the code object, function name, function debug arglist and function type.
\Rightarrow
stack
Create a byte-compiled function. FIXME: describe what's on the stack.
\Rightarrow
stack
This operation creates a code object holding assembly routines. length bytes of code are read and placed in the code object, and the code object descriptor is pushed on the stack. This FOP is only recognized by the cold loader (Genesis.)
\Rightarrow
stack
This operation records an entry point into an assembler code object (for use with FOP-ASSEMBLER-FIXUP). The routine name (a symbol) is on stack top. The code object is underneath. The entry point is defined at offset bytes inside the code area of the code object, and the code object is left on stack top (allowing multiple uses of this FOP to be chained.) This FOP is only recognized by the cold loader (Genesis.)
(len)
(4)
\Rightarrow
stack
This operation resolves a reference to a foreign (C) symbol. len bytes are read and interpreted as the symbol name. First the kind and the code-object to patch are popped from the stack. The kind is a target-dependent symbol indicating the instruction format of the patch target (at offset bytes from the start of the code area.) The code object is left on stack top (allowing multiple uses of this FOP to be chained.)
\Rightarrow
stack
This operation resolves a reference to an assembler routine. The stack args are (routine-name, kind and code-object). The kind is a target-dependent symbol indicating the instruction format of the patch target (at offset bytes from the start of the code area.) The code object is left on stack top (allowing multiple uses of this FOP to be chained.)
stack
FIXME: Describe what this does!
stack
FIXME: Describe what this does!
(4)
Like FOP-CODE-FORMAT, except that the version is 32 bits long.
(4)
(4)
These operations destructively modify a list entered in the table. table-idx is the table entry holding the list, and cdr-offset designates the cons in the list to modify (like the argument to nthcdr.) The new value is popped off of the stack, and stored in the car or cdr, respectively.
(4)
Destructively modifies a simple-vector entered in the table. Pops the new value off of the stack, and stores it in the vector-idx element of the contents of the table entry table-idx.
\Rightarrow
stack
Does nthcdr on the top-of stack, leaving the result there.
(4)
Like FOP-SVSET, except it alters structure slots.