AMD64 callback fix, and facts file update

slava 2006-02-21 23:37:17 +00:00
parent 0bb9e1df30
commit 44b2323175
3 changed files with 1 additions and 19 deletions

View File

@ -1,4 +1,3 @@
- input values which get spilled on amd64
- if two tasks write to a unix stream, the buffer can overflow
- x86 SIB addressing modes
- exceptions inside callbacks are broken:

View File

@ -24,7 +24,7 @@ M: stack-params stack>freg
drop >r R11 swap stack@ MOV r> stack@ R11 MOV ;
M: stack-params freg>stack
>r stack-increment + swap r> stack>freg ;
>r stack-increment + cell + swap r> stack>freg ;
M: %unbox-struct generate-node ( vop -- )
drop

View File

@ -115,23 +115,6 @@ HELP: scan-word "( -- obj )"
{ $errors "Throws an error if the token does not name a word, and does not parse as a number." }
$parsing-note ;
HELP: ch-search "( ch -- index )"
{ $values { "ch" "a character" } { "index" "an index in the current line" } }
{ $description "Searches the current line, starting from the parser column, for an occurrence of " { $snippet "ch" } ". If the character does not occur in the line, outputs -1." }
$parsing-note
{ $see-also POSTPONE: ( } ;
HELP: until "( index -- )"
{ $values { "index" "an index in the current line" } }
{ $description "Advances the parser column to immediately after the index." }
$parsing-note
{ $see-also POSTPONE: ( } ;
HELP: until-eol "( -- )"
{ $description "Discards all input until the end of the line." }
$parsing-note
{ $see-also POSTPONE: ! POSTPONE: #! } ;
HELP: escape "( escape -- ch )"
{ $values { "escape" "a single-character escape" } { "ch" "a character" } }
{ $description "Converts from a single-character escape code and the corresponding character." }