-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathclisp.doc
1421 lines (1073 loc) · 61.4 KB
/
clisp.doc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
Tops-20 Common Lisp
Red Pages
Charles L. Hedrick
1985
Copyright (C) 1983,1984,1985 Charles L. Hedrick
The information in this document is subject to change without notice
and should not be construed as a commitment by Charles Hedrick or
Rutgers University. Charles Hedrick and Rutgers University assume no
responsibility for any errors that may appear in this document.
Note: The following are trademarks of the Digital Equipment
Corporation: DECSYSTEM-20, DECsystem-10, TOPS-20, TOPS-10
i
Table of Contents
1. Introduction 1
1.1. How to read this manual 1
1.2. The genealogy of DECSYSTEM-20 Common Lisp 2
1.3. Design Goals 2
1.4. Overview of the Design 3
2. Current Status of the System 5
2.1. Efficiency Issues 5
3. User Facilities 6
3.1. Interrupt Characters 7
3.2. The Break Facility 7
3.3. Trace 10
3.4. The Stepper 11
3.5. The Editor 12
3.6. Special features for system builders 13
3.7. I/O Implementation 14
3.7.1. Opening files 15
3.7.2. Representation of files and lines 16
3.7.3. Device handling 17
3.7.3.1. Disk files 17
3.7.3.2. Terminals 17
3.7.3.3. Other devices 18
4. Reference Manual - Additional Functions and Features 20
5. Differences between Spice Lisp and Common Lisp 26
1
1. Introduction
This document contains implementation-dependent information describing
the Common Lisp implementation for the DECSYSTEM-20. In the rest of
the manual, I will simply refer to it as "Lisp". Lisp is designed to
be used with the Common Lisp Reference Manual, (Guy Steele,
Carnegie-Mellon University Computer Science Dept.) This manual
documents only the peculiarities of this particular implementation. I
hope that there aren't very many of those. Indeed many people will
probably never need this document at all.
1.1. How to read this manual
This document is organized into the following chapters:
1 General material about the history and goals of DECSYSTEM-20
Common Lisp, and an overview of its internal organization.
2 A description of the current status of the system, including
the facilities that are not yet implemented, and various
issues affecting the speed of your program.
3 A description of the major user facilities of the system.
This chapter contains a number of sections, each giving a
general discussion of some facility. It is intended to
cover the same material as the next chapter, namely all of
the implementation-defined facilities. However this chapter
is organized topically, whereas the next one is organized
alphabetically by function. Also, it is at a conceptual
level, whereas the next chapter is intended as a reference
manual. There is a section at the beginning of this chapter
that provides an overview of its organization.
4 This is intended as a complete reference manual for all
functions that are extensions or whose definition is
implementation-dependent. In those cases where a full
description seems to belong in the previous chapter, there
is a cross-reference to the appropriate section. This
chapter is organized alphabetically by function or variable
name.
5 Hints for people who want to import system-dependent Spice
Lisp code.
2
1.2. The genealogy of DECSYSTEM-20 Common Lisp
This Lisp is in fact an implementation of Carnegie-Mellon's Spice
Lisp. Spice Lisp was originally intended for a micro-coded machine
with bit-mapped screen. However implementations based on it are being
done for the DECSYSTEM-20 and VAX. We are attempting to keep the
Spice implementations as similar as possible. Here are the pieces of
DECSYSTEM-20 Common Lisp, with an indication of which of them came
from Spice Lisp:
- Compiler - This is the Spice compiler, with code generation
rewritten to produce code for the DEC-20.
- System code - This is the portion of the runtime system
written in Lisp. It includes most of the functions that the
user calls. These functions are taken directly from Spice,
with minor modifications where the code is representation-
dependent.
- Kernel - This is the assembly language portion of the
system. It contains low-level functions, mostly things that
manipulate internal data representations, e.g. CONS and the
garbage collector. Most of these functions implement the
basic byte codes of the Spice machine. These are documented
in the Internal Design of Spice Lisp (Scott Fahlman et al,
Carnegie-Mellon Computer Science Dept.) That document
should be regarded as the blue pages for this
implementation. In addition, we have added some
higher-level functions to the kernel, when it seems that
this would help performance noticibly. For example, the
interpreter (EVAL) and much of READ and PRINT are
hand-coded. In general the assembly language code follows
the Spice Lisp code very closely.
The interior design is sort of a cross between the Spice machine and
Elisp, the Rutgers extended-addressing version of UCI Lisp. The Elisp
manual documents most of the internal data structures in detail. By
the final release, we will provide a real blue pages that integrates
the information in the Elisp manual and the Spice internals manual,
but for the moment, those two documents should allow you to find your
way around in the code. Fortunately, the internal data
representations used by Spice Lisp and Elisp are surprising similar.
1.3. Design Goals
In evaluating this implementation, you might find it useful to know
what goals we had in mind.
- We intend this implementation to stick very close to the
Standard. The extensions are largely tools for the
implementors, which we have made accessible to users. There
3
are also a few features added to increase compatibility with
the VAX implementation. However our experience with Pascal
has lead us to realize how important standards are. I
believe that Pascal's greatest weakness is that no
interesting program written in it is portable. We are
determined that this will not be the case with Common Lisp.
- We are quite concerned about performance. However we are
interested in the performance that a normal researcher will
see, rather than in providing tools to let benchmarks be
tuned to blinding speeds. This means that we worry most
about programs that use no declarations and which are
written without undue concern for speed. (Note however that
the current copy is considerably slower than it should be,
because our register allocation is not yet being done in the
compiler. This leads to slow code, and it also makes the
system larger than it should be. The size is probably at
least as important as the CPU time use.)
1.4. Overview of the Design
Lisp uses extended addressing, which gives it a much larger address
space than conventional programming languages. Lisp runs only on
Model B KL-10 processors running TOPS-20 release 5 or later. That is
because extended addressing is only implemented for those systems. In
particular, Lisp does not run on TOPS-10, on older 2040's and 2050's
(those with Model A CPU's), or on 2020's.
The internal design of Lisp is modelled after the Lisp Machine. All
Lisp objects are type-coded pointers. They consist of 3 fields:
- high order bit is used by the garbage collector for marking.
It is normally off (for extended addressing to work).
- next 5 bits are a type code, used internally by the system.
- last 30 bits are the data for the object. In most cases
this is the address of the object itself. However in some
cases the actual object fits in 30 bits, and no pointer is
needed. E.g. we have 30-bit integer constants.
There are two free spaces. Most Lisp pointers point to objects within
one of these spaces. When a space is full, a copying garbage
collector is invoked to copy all currently used objects to a new
space.
This implementation is a shallow-binding Lisp. It stores atom
bindings in a "value cell" associated with the atom, saving old
bindings on a pushdown stack. List cells take two words, each
containing one object. Atoms consist of small blocks of memory, with
the following structure:
4
value cell
pointer to property list
string pointer to pname
function definition, or NIL if none
other internal information involving function definitions - set
by DEFUN or other function-defining forms, not directly
visible to the user
5
2. Current Status of the System
This is a preliminary release of this system. The basic data
structures are in their final form. So is almost all of the kernel
code. However a few features are not yet implemented. We also plan
to make some additional performance improvements to the system.
The only major omission we know of is complex numbers. However there
may be minor oversights. If so, we would appreciate having them
brought to our attention.
The compiler is currently unable to handle functions that use lexical
closures. When it finds such a function, the compiler will pass
through the source into the .LAP file. Thus the function will work,
but will not be compiled.
Bugs are documented in the file BUGS. Please report any errors, even
minor ones, that are not in this file.
2.1. Efficiency Issues
There are still major inefficiencies in the system. We will fix these
over the next 6 months or so. These inefficiencies can cause
slowdowns ranging from factors of 2 to 5. The most serious slowdowns
are in the string and sequence functions. These use DO loops and
array indexing. We hope to hand-code them to use small ILDB loops.
This will probably not affect most traditional Lisp code, however.
We expect compiled code to be reduced by at least a factor of 1.5 in
code size, and almost this much in CPU time. Currently the compiler
does no register allocation. It keeps all data on the stack. The
compiler is designed to allow for register allocation and other kinds
of optimizations. This will be a high priority over the next few
months.
Additional compiler optimizations will require open-coding of common
functions, and automatic detection of fixnum arithmetic and linear
array references. This should affect the sequence functions
dramatically. If these optimizations prove too difficult, we will
hand-optimize the sequence functions.
The interpreter is nearly as fast as we can make it. There is one
more optimization, which may speed things about by 10% or so.
6
3. User Facilities
This chapter contains the following sections:
3 - how to run the system, and what the top-level is like. A
description of the system-wide help convention.
3.2 - the break handler. This is an interactive system which is
entered when an error happens.
3.3 - TRACE, a function that you can use to get a trace of your
program's behavior.
3.4 - STEP, a function that you can use to control your program's
execution on a expression by expression basis, seeing the
results of each evaluation.
3.5 - the editor, which is actually an interface to EMACS
3.6 - some miscellaneous facilities primarily for system
builders: Customizing the top level (including changing the
prompt), creating a saved core image file, loading code into
a specified package, and calling DDT.
3.7 - details about the I/O implementation, including how the
various OPEN options work, the way the Common Lisp and
TOPS-20 file models are matched, end of line handling, and
details about how I/O is done to specific devices
(particularly terminals). This section has a paragraph at
the beginning that describes its organization.
We intend the Lisp system to be installed on your system as
SYS:CLISP.EXE. If it is, you start it by typing
CLISP
Lisp has a simple EVAL top level. You type Lisp forms to it, and it
prints the result. If the form returns multiple values, you will see
all of them (each on a new line).
? should usually give you useful information about the context you are
currently in. In many cases you will have to type a carriage return
after the ?. At the top level, it tells you how to define functions,
and describes some of the most important facilities. In other
situations ? is rebound to messages that are useful in that context.
We urge users to continue this convention for packages that they
write.
7
3.1. Interrupt Characters
Several interrupt characters are defined. When you type one of these
characters once, its effect will happen the next time the program
reads from the terminal. If you type it a second time, the effect
will happen immediately, most of the time. If your program happens to
be in the middle of a garbage collection, the effect will normally be
delayed until the end of the garbage collection.
^B (Break)
This causes Lisp to enter the break package, just as if an
error had happened. This is sometimes useful if you think
your program is in an infinite loop. You can use the
commands in the break package to look around. Currently
there is no way to continue your program after you have done
this. However GO will reevaluate the most recent form, and
so may allow you to continue in many cases.
^C This will return you to the EXEC. If you are in the garbage
collector, it will delay the return until the garbage
collection is finished. If you type more than one ^C, Lisp
will count them. If you 6 of them, it will return you even
if you are in the garbage collector. This is to protect
against bugs in the garbage collector that would otherwise
make it impossible to escape from Lisp.
^G [Note that ^G is the bell.] This will return you to the top
level of Lisp. If you are currently in a break loop, it
will return you to the top-most break loop.
^Y This is a high-priority version of ^C. It always causes
Lisp to exit, even if a garbage collection is going on. It
takes precedence over any other interrupts that may be in
progress. It is intended to make sure that you can always
get out of Lisp, even if bugs exist in the ^C code.
3.2. The Break Facility
The default condition handlers for errors call a built-in break
package. This is a specialized READ-EVAL-PRINT loop. It evaluates
forms in the context of the bad form. When an error occurs, you will
see something like the following:
Error in function FOO.
Undefined function: BAR
1>
The "1>" is the break level number. It indicates that this is the
first level of error. If you make an error while already in a break,
you will get another recursive level of break. It will prompt with
"2>".
8
When you enter a break, the system attempts to put you at the place
where the error occured. When you type forms to the "1>" prompt, the
system will evaluate them in the context of the error. That is, the
variables of that function will be visible, and can be changed. (If
the function is compiled, then of course only special variables are
visible.)
You can tell where you are by typing the "BK" command. This prints a
"backtrace". Here is an example of a standard recursive Factorial
function, which has a bug that shows up only at the bottom level of
recursion:
CL>(fact 2)
Error in function FACT.
Undefined function: FOO
If continued: Please define it before continuing
1> bk
72 (FOO)
70 (COND ((ZEROP N) #) #)
64 ****** FACT
57 (FACT (1- N))
55 (* N (FACT #))
53 (COND ((ZEROP N) #) #)
47 ****** FACT
40 (FACT (1- N))
38 (* N (FACT #))
36 (COND ((ZEROP N) #) #)
30 ****** FACT
23 (FACT 2)
23 compiled call to EVAL
1> n
0
1>
Notice the numbers on the left margin. These are depth indications.
You can use them to access levels other than the default one. For
example, suppose you want to look at the values of variables inside
the top-level incarnation of FACT. Any number between 36 and 40 will
do that. To change to a new level number, you simply type the number.
Here is an example:
1> 40
1> n
2
1>
Note that the debugger will continue at this level until you change it
again. To get back to the initial level, use a negative number.
The following forms have special actions when typed to the break
system, and thus can be thought of as commands to it.
^^ Returns you to the top-level loop, i.e. exits the break
9
abruptly.
^ Returns you to the next higher level break loop. (There can
be more than one, if you generate an error in a break loop.)
OK Attempts to proceed from the break, returning NIL from
CERROR. This will only work if the error is "correctable".
For this to work, you have to know how to correct the error.
Some cases are obvious. If a function is undefined, you
must define it. If a variable is unbound you must set it to
a value. In fact these are the main cases where OK is
useful. Most other error types require you to return a
value, which will then be used to repair the error. This
requires (OK value), which is documented below. OK is
equivalent to (OK nil). If the error is not correctable,
see "GO" below.
(OK <value>)
Attempt to proceed from the break, returning the specified
value from CERROR. This value is returned to the error
handler. It is used in an attempt to repair the error. E.g.
if the system complains that something is not an symbol, you
should return a symbol. The system will attempt to do
whatever it was trying to do, using the symbol you return
instead of the original non-symbol.
GO Attempt to proceed from a non-continuable error. In this
case, there is no way to exactly continue the computation.
Instead, the form that generated the error is simply
re-executed. The hope is that you have fixed something so
that it will work. If this is not practical, RETURN may
allow you to proceed.
(RETURN <value>)
Proceed from a non-continuable error. In this case, the
form that generated the error is abandoned. The system
pretends that that form returned the value specified.
BK Displays the call stack. See the example above.
? Displays the list of commands.
Note that <value> is evaluated in the context of the error. I have
not done extensive testing of evaluating forms in the context of the
error. The intent is that you are put in the exact binding
environment of it, and any sideeffects are actually made in that
context (i.e. you can do SETQ to change variables). I have little idea
what would happen if you execute a GO, RETURN-FROM, etc., in this
manner. I'm not even sure I know what I want to happen.
10
3.3. Trace
The trace facility allows you to ask for printout whenever a certain
function is called. The printout shows the arguments with which it is
called and the value returned. It is indented to show recursion.
Here is a typical example:
CL>(defun fact (n)
(cond ((zerop n) 1) (t (* n (fact (1- n))))))
FACT
CL>(trace fact)
FACT
CL>(fact 4)
0: (FACT 4)
1: (FACT 3)
2: (FACT 2)
3: (FACT 1)
4: (FACT 0)
4: returned 1
3: returned 1
2: returned 2
1: returned 6
0: returned 24
24
CL>
There are a number of options, to allow for more selective output. In
order to use an option, you must enclose the function name and the
options in parentheses, e.g.
(TRACE (FOO :CONDITION (NEED-TRACE)))
Here are the available options:
:CONDITION
A form that controls whether the trace information is
printed. It will be EVAL'ed at each entry to the function.
:BREAK
A form that controls whether a break will occur before the
function is executed. It will be EVAL'ed at each entry to
the function.
:BREAK-AFTER
like :BREAK, except that the break occurs after the function
is executed.
:WHEREIN
Allows you to specify that tracing should happen only if the
function is called inside another specific function. This
may be either a symbol or a list of symbols.
11
:PRINT
A list of forms to EVAL and PRINT at the start of each call.
:PRINT-AFTER
A list of forms to EVAL and PRINT at the end of each call.
To turn off tracing, use (UNTRACE). Untrace checks to see that its
args are all symbols. If they are, it returns a form which will
untrace each one. Otherwise, it signals an error, and none of the
forms are untraced. With no args, untraces all traced functions.
3.4. The Stepper
The single stepper is another facility to make it easier to debug
functions. It allows you to watch the interpreter EVAL each form
individually. Here is an example of what it looks like:
CL>(step (fact 3))
(FACT 3) : n
3 = 3
(BLOCK FACT (COND # #)) : n
(COND ((ZEROP N) 1) #) : n
(ZEROP N) : n
N = 3
NIL
T = T
(* N (FACT #)) : n
N = 3
(FACT (1- N)) : s
2
6
6
6
6
6
CL>
I typed the lower-case "n"'s and "s". In the stepper, you do not have
to type a return after each command. If you don't like this, then set
*TERMINAL-LINE-MODE* to T. Notice what it is doing: It types out a
form, and then waits for me to type something. If I type N, it
evaluates that form and prints the result. If this involves
evaluating another form, it stops for that, too. Typing S causes it
to evaluate the form without showing what going on inside it.
Here is a complete list of commands to the stepper. If you type "?"
while in step mode, you will get this list:
N (next)
evaluate current expression in step mode.
S (skip)
12
evaluate current expression without stepping.
M (macro)
steps a macroexpansion, signaled by a :: prompt.
Q (quit)
finish evaluation, but turn stepper off.
p (print)
print current exp. (ignore *step-print-level* & *step-print-
length*)
P (pprint)
pretty-print current exp.
B (break)
enter break loop.
E (eval)
evaluate an arbitrary expression.
? (help)
print this text.
R (return)
prompt for an arbitrary value to return as result of current
exp.
G throw to top level.
The stepper automatically refuses to step through system code, even
when it is interpreted. If you need to debug system code with the
stepper, you should look at the macro STEP-STEP-FORM in STEP.CLISP.
This is where system functions are made un-steppable.
3.5. The Editor
Lisp uses EMACS as its editor. Lisp will check your definition of
EDITOR: when looking for EMACS. If EDITOR: seems to point to some
version of EMACS it will be used. Otherwise SYS:EMACS will be used.
You can call it with the function ED, described in the manual, or
EDIT. EDIT is just like ED, except it does not evaluate its argument.
In most cases, EDIT is probably more convenient. Otherwise these
functions are identical.
As described in the Common Lisp manual, there are three different
things you can do with EMACS:
(ED symbol)
Edit a function definition. Lisp will pretty-print the
current definition into the EMACS buffer and call EMACS.
When you are finished editing, type ^X^Z (the normal EMACS
13
command to return to the superior). Lisp will read the
first S-expression back in from the EMACS buffer and EVAL
it. Should you decide that you don't want to redefine the
function, put something innocuous at the beginning of the
buffer (e.g. a NIL).
(ED pathname)
Edit a file. Lisp will simply call EMACS and pass it a
request to edit the specified file. When you are finished
editing, type ^X^Z to return to Lisp. Lisp will not do
anything additional. If you want to write out the modified
file, do ^X^S (or your favorite file-saving command) before
exiting. If you want to read in the file after modifying
it, you can use the LOAD command.
(ED)
With no arguments, ED simply reenters EMACS. Whatever you
edited last is still there. ^X^Z will return to Lisp. Lisp
will not do anything additional, such as reading in from the
buffer.
This is a fairly simple interface, as Lisp-EMACS interfaces go. The
primitives are present in Lisp to do as hairy an interface to EMACS as
you like (see section 4). We are planning an interface modelled after
the Maclisp LEDIT.
There is also a function (KILL-EDITOR). It kills the EMACS fork.
3.6. Special features for system builders
This section documents some internals of Lisp that you may find useful
if you are building a system of your own.
(%TOP-LEVEL) - never returns
When a copy of Lisp is started, it first prints out the
greeting message (set by SAVE - see below) and then calls
LISP::%TOP-LEVEL. LISP::%TOP-LEVEL should be a function of
no arguments that never returns. If you redefined
LISP::%TOP-LEVEL, the redefinition should not take effect
until a saved core image is run. The current incarnation
will not be affected, since Lisp has already started the
existing top level function, and it will never return.
If you intend to use the error handlers that we supply, your
top level function should include (CATCH 'LISP::TOP-LEVEL-
CATCHER ...) around any EVAL's. That is because the ^^
function within the error handler THROWS to LISP::TOP-LEVEL-
CATCHER.
Should %TOP-LEVEL return, you will be in a READ-EVAL-PRINT
loop in the kernel. It prompts with a "*". It is a minimal
top-level, intended for testing the kernel.
14
*PROMPT* - variable
If you prefer to use the existing top level, you can change
its prompt to anything you like. The variable *PROMPT* is
PRINC'ed to produce the prompt. It will normally be a
string, without any newlines. (FRESH-LINE is called right
before printing the prompt.)
(SAVE filename &OPTIONAL greeting-message)
The SAVE function can be used to produce an executable file
containing the current Lisp system. The first argument is a
file name, which is passed to OPEN. The second argument
(which is optional) is a normally a string. It is PRINC'ed
when the saved core image is started. It is intended as a
greeting message. If this argument is not supplied, or is
NIL, the PRINC is not done.
(LOAD filename :PACKAGE package)
LOAD has an extra option, :PACKAGE. This allows you to
specify the package into which the code is to be loaded.
The system code must be in the internal Lisp package, not
the user's package. So if you wanted to load a new version
of PPRINT.CLISP (the pretty-printer), you would type
(LOAD "PPRINT.CLISP" :PACKAGE *LISP-PACKAGE*)
(LISP::PPRINT-INIT)
(DDT)
(DDT) calls DDT in section 1 (the section in which the
kernel code is loaded). It gives DDT access to the kernel's
symbol table. To return to Lisp, type
IRET$X
where $ is an escape. Be careful about using $X in DDT to
single-step. There are bugs in some versions of DDT that
cause extended-addressing byte instructions to be
incorrectly simulated in $X and $$X.
3.7. I/O Implementation
The Common Lisp specificiations leave some aspects of I/O up to the
implementor. This section will describe what has been done with some
of them. It has the following subsections:
3.7.1 - opening files, including details of filename handling,
and how the various OPEN options are implemented.
3.7.2 - how the Common Lisp file model is mapped onto TOPS-20,
including file structure, random access, and end of line
handling.
3.7.3 - details on how Lisp handles various devices. The most
15
interesting is the terminal. This section describes a
number of options you have to control how Lisp interfaces
with the terminal.
3.7.1. Opening files
A NAMESTRING is simply a TOPS-20 file specification. Host names go at
the beginning of the string, followed by "::". For example
"RUTGERS::PS:<HEDRICK>CLISP.EXE". Note however that host names don't
have any effect at the moment. The filename parser understands all of
the options that TOPS-20 normally understands, including wildcards and
the special version numbers 0, -1, -2, and -3.
There may be a slight problem with namestrings because of ambiguity
about null file types. In most cases, a field in the file
specification can be omitted if it is not specified. Unfortunately,
there is no way to omit the file type if the version is specified.
"SOURCE..3" is interpreted by TOPS-20 as having a null file type.
That is, the file type is specified, and is the null string. If you
need to specify the version and leave the file type unspecified, you
will simply have to leave the result in pathname format.
All of the keywords described in the manual as "suggested" are
implemented except for INSTALLED. If someone can suggest a reasonable
meaning for it in TOPS-20, I will be happy to implement it.
Currently Lisp cannot do network I/O. Thus host names are ignored
when opening files. The functions that manipulate namestrings and
pathnames do handle host names properly. We intend to implement
Internet I/O eventually.
All of the OPEN options are implemented. Here are some details:
- NEW-VERSION operates according to TOPS-20 conventions. That
is, if you specify an explicit version number, that version
will be used, and NEW-VERSION will be ignored. This gives
an effect similar to SUPERSEDE.
- If you specify UNSIGNED-BYTE or SIGNED-BYTE without a
number, you will get 8-bit bytes. UNSIGNED-BYTE allows any
byte size up to 35, and SIGNED-BYTE allows any byte size up
to 36. Note that you may specify UNSIGNED-BYTE or
SIGNED-BYTE even if you intend to use a file for text I/O.
This allows you to handle text files with non-standard byte
size. For example, if you open a file for (SIGNED-BYTE 8),
READ-BYTE will return a signed integer, but READ-CHAR will
still return a character. Note that the byte size may
affect the way certain devices work. For example, opening a
terminal with a byte size of 8 will cause I/O to occur in
binary mode.
- DEFAULT gives you STRING-CHAR. STRING-CHAR represents 7-bit
16
ASCII characters. This is the normal Tops-20 representation
for text.
- RENAME and RENAME-AND-DELETE rename the file to have a file
type of "LISP-BACKUP". If there is more than one version of
the file, they are all renamed.
3.7.2. Representation of files and lines
The file model that Common Lisp uses is very close to the DEC-20's
actual file model. Thus most I/O is quite straightforward. TOPS-20
files have user-determined byte size. All I/O is done in terms of
these bytes. The file length as shown in a VDIRECTORY command gives
the number of bytes. This all corresponds nicely to Common Lisp. The
Common Lisp OPEN function allows you to specify the byte size to be
used for the file. FILE-LENGTH returns the file size in these bytes.
NB: FILE-LENGTH will use the byte size that you specified when you
OPENed the file. If you are reading an existing file, this might not
be the same as the byte size used to write the file. Thus FILE-LENGTH
might not return the same result as the length shown in VDIRECTORY.
If you don't specify the byte size in OPEN, it will be 7 bits, which
is the normal byte size for text files.
Random-access is also quite simple. Tops-20 stores files as simple
character streams. So if you do (FILE-POSITION file 23), Lisp will
position the file after the 23'rd byte. As with FILE-LENGTH, Lisp
will use the byte size you specified when you OPENed the file. As in
Common Lisp, end of line is indicated in a TOPS-20 file by characters
in the text. So if your lines are different lengths there is no easy
way to position to the Nth line. It is common for programs to
maintain an index into the file. You can build such an index by
calling FILE-POSITION when you are writing the file, to tell you where
the object you are about to write will go. You can also arrange to
pad short lines with extra characters, so that all lines are the same
length. WARNING: Lines will be longer in the file than they are in
Lisp, because end of line is one character in Lisp, but two in the
file. See the next paragraph for details.
Unfortunately there is a slight discrepancy between Common Lisp and
TOPS-20 conventions regarding end of line. The Common Lisp manual
specifies that lines are terminated by a single end of line
characters, referred to as NEWLINE. TOPS-20 normally uses a
two-character sequence: carriage return (CR) followed by linefeed
(LF). Thus Lisp has to turn CR/LF into NEWLINE when reading files,
and NEWLINE into CR/LF when writing them. The manual allows the
implementor to choose the character code for NEWLINE, but it
recommends octal 12, which is LF. We have followed that
recommendation. Any possible choice has its consequences. The
consequences of this one is that a Lisp program will not be able to
tell the difference between CRLF and a bare LF in a file. Both will
show up as a single NEWLINE character. If you really have to be able
to tell what your end of line is, you should read the file with
17
READ-BYTE. This treats CR and LF just like any other character.
3.7.3. Device handling
Lisp has three different sets of I/O routines for handling external
files. (There are also routines for reading from and writing to
strings and the EMACS buffer.) When you OPEN a file, Lisp will choose
the set of routines to use based on the the of device involved.
3.7.3.1. Disk files
If the file is on disk, Lisp will normally use a set of I/O routines
that use the PMAP JSYS. These routines are capable of random access,
using FILE-POSITION. They will do I/O using any byte size that you
specify in the OPEN. In a few cases PMAP is not possible. If you to
append to a file for which you have append-only access, of if you
write to a file for which you have write-only access, the PMAP JSYS is
not allowed. In this case, another set of routines is used. They use
BIN and BOUT for each character individually.
3.7.3.2. Terminals
If OPEN is done to a terminal, there are several possibilities.
Normally, input is done with the TEXTI JSYS and output with BOUT.
TEXTI implements the normal TOPS-20 terminal handling conventions,
including special actions for rubout, ^R, ^U, and ^W. In order to
allow this editing, it keeps characters in a buffer until you type and
end of line character (normally carriage return, but line feed, ^Z,
^L, and escape also activiate it). The Lisp program starts reading
from the buffer once you have typed the end of line. At that point
you can no longer make changes on that line. If you print a prompt,
Lisp will automatically put it into the ^R buffer for the next read.
That is, you can do something like
(PRINC "LISP>") (READ)
What you will see on the terminal is a prompt
LISP>
with the cursor waiting for input on the same line. If you type ^R or
^U, the LISP> will remain at the beginning of the line. Lisp will
keep putting input and output into the ^R buffer as long as you remain
on the same line. This is done on a stream by stream basis. If you
open a second stream on the same terminal, you should not print a
prompt from one stream and read the results from the other stream.
18
(Such a sequence would work, however ^R would not show the prompt in
the right way.)
Because output is done using BOUT for each character. Thus output
will show up on your terminal as soon as you generate it. You do not
need to do anything special to force buffers to be written.
If you OPEN a terminal with a byte size of 8 (by specifying an
ELEMENT-TYPE of SIGNED-BYTE or UNSIGNED-BYTE), this has a special
meaning to both the operating system and Lisp. A byte size of 8
implies "binary mode". In this mode there is no echoing, and normal
character processing (e.g. rubout and ^U) is not done. In some
circumstances it is even possible to read ^C in binary mode. Lisp
handles terminals opened this way by using simple BIN and BOUT jsyses
for each character.
The choice between normal and binary mode is made when you open the
file, on the basis of whether or not you specify a byte size of 8.
You cannot change between these modes once the file is opened.
However if you open a terminal normally, you can use the function