pre-recording backup
This commit is contained in:
56
notes/papers/report/parts/macros/order.md
Normal file
56
notes/papers/report/parts/macros/order.md
Normal file
@@ -0,0 +1,56 @@
|
||||
## Execution order
|
||||
|
||||
The macros describe several independent sequential programs that are expected to be able to interact with each other. To make debugging easier, the order of execution of internal steps within independent macros has to be relatively static.
|
||||
|
||||
The macro executor follows a manually specified priority cascade, with priorities ranging from 0 to 0xep255, exclusive. Priorities are accepted in any valid floating point format, but usually written in binary or hexadecimal natural form, as this format represents floating point precision on the syntax level, thus making precision errors extremely unlikely.
|
||||
|
||||
The range of valid priorities is divided up into bands, much like radio bands. In this case, the bands serve to establish a high level ordering between instructions.
|
||||
|
||||
The bands are each an even 32 orders of magnitude, with space in between for future expansion
|
||||
|
||||
| | | | |
|
||||
| :-----------: | :------: | :---------: | :----------: |
|
||||
| 0-7 | 8-15 | 16-23 | 24-31 |
|
||||
| optimizations | x | | |
|
||||
| 32-39 | 40-47 | 48-55 | 56-63 |
|
||||
| operators | | | x |
|
||||
| 64-71 | 72-79 | 80-87 | 88-95 |
|
||||
| | | expressions | |
|
||||
| 96-103 | 104-111 | 112-119 | 120-127 |
|
||||
| | x | | |
|
||||
| 128-135 | 136-143 | 144-151 | 152-159 |
|
||||
| bindings | | | x |
|
||||
| 160-167 | 168-175 | 176-183 | 184-191 |
|
||||
| | | x | |
|
||||
| 192-199 | 200-207 | 208-215 | 216-223 |
|
||||
| | aliases* | | |
|
||||
| 224-231 | 232-239 | 240-247 | 248- |
|
||||
| integrations | | | transitional |
|
||||
|
||||
### Transitional states
|
||||
|
||||
Transitional states produced and consumed by the same macro program occupy the unbounded top region of the f64 field. Nothing in this range should be written by the user or triggered by an interaction of distinct macro programs, the purpose of this high range is to prevent devices such as carriages from interacting. Any transformation sequence in this range can assume that the tree is inert other than its own operation.
|
||||
|
||||
### Integrations
|
||||
|
||||
Integrations expect an inert syntax tree but at least one token in the pattern is external to the macro program that resolves the rule, so it's critical that all macro programs be in a documented state at the time of resolution.
|
||||
|
||||
### Aliases
|
||||
|
||||
Fragments of code extracted for readability are all at exactly 0x1p800. These may be written by programmers who are not comfortable with macros or metaprogramming. They must have unique single token patterns. Because their priority is higher than any entry point, they can safely contain parts of other macro invocations. They have a single priority number because they can't conceivably require internal ordering adjustments and their usage is meant to be be as straightforward as possible.
|
||||
|
||||
### Binding builders
|
||||
|
||||
Syntax elements that manipulate bindings should be executed earlier. `do` blocks and (future) `match` statements are good examples of this category. Anything with a lower priority trigger can assume that all names are correctly bound.
|
||||
|
||||
### Expressions
|
||||
|
||||
Things that essentially work like function calls just with added structure, such as `if`/`then`/`else` or `loop`. These are usually just more intuitive custom forms that are otherwise identical to a macro
|
||||
|
||||
### Operators
|
||||
|
||||
Binary and unary operators that process the chunks of text on either side. Within the band, these macros are prioritized in inverse precedence order and apply to the entire range of clauses before and after themselves, to ensure that function calls have the highest perceived priority.
|
||||
|
||||
### Optimizations
|
||||
|
||||
Macros that operate on a fully resolved lambda code and look for known patterns that can be simplified. I did not manage to create a working example of this but for instance repeated string concatenation is a good example.
|
||||
Reference in New Issue
Block a user