The following patch updates lang/sbcl from 1.0.15 to 1.0.27. The most
notable change (for OpenBSD anyway) is amd64 support, the full
changelog is installed as /usr/local/share/doc/sbcl/NEWS.

Note that this patch deletes:
  patches/patch-src_runtime_gc-common.c
  patches/patch-tests_subr.sh
and adds:
  patches/patch-src_compiler_x86_parms.lisp
  patches/patch-tests_timer.impure.lisp
  pkg/PFRAG.i386

If you build the port then please do 'make regress' and let me know
about any test failures, aside from anything marked "Expected
failure:" or an invalid exit status for core.test.sh if /proc isn't
mounted.


Index: Makefile
===================================================================
RCS file: /home/cvsync/openbsd/ports/lang/sbcl/Makefile,v
retrieving revision 1.2
diff -u -N Makefile
--- Makefile    15 Apr 2008 12:07:31 -0000      1.2
+++ Makefile    3 Apr 2009 04:20:34 -0000
@@ -1,11 +1,11 @@
 # $OpenBSD: Makefile,v 1.2 2008/04/15 12:07:31 deanna Exp $
 
 # not yet ported to other arches
-ONLY_FOR_ARCHS=                i386
+ONLY_FOR_ARCHS=                amd64 i386
 
 COMMENT=               compiler and runtime system for ANSI Common Lisp
 
-V=                     1.0.15
+V=                     1.0.27
 DISTNAME=              sbcl-${V}-source
 PKGNAME=               sbcl-${V}
 WRKDIST=               ${WRKDIR}/sbcl-${V}
@@ -26,8 +26,10 @@
 MASTER_SITES=          ${MASTER_SITE_SOURCEFORGE:=sbcl/}
 MASTER_SITES0=         http://www.elsasser.org/openbsd/
 DISTFILES=             ${DISTNAME}${EXTRACT_SUFX}
-SUPDISTFILES=          ${SBCL_BOOTSTRAP_I386}.tar.bz2:0
+SUPDISTFILES=          ${SBCL_BOOTSTRAP_AMD64}.tar.bz2:0 \
+                       ${SBCL_BOOTSTRAP_I386}.tar.bz2:0
 
+SBCL_BOOTSTRAP_AMD64=  sbcl-1.0.27-openbsd-amd64-static
 SBCL_BOOTSTRAP_I386=   sbcl-1.0.14-openbsd-i386-static-1
 SBCL_BOOTSTRAP=                ${SBCL_BOOTSTRAP_${MACHINE_ARCH:U}}
 
@@ -35,7 +37,7 @@
 # following files:
 #     ${WRKSRC}/make.sh
 #         comment out "time sh make-target-contrib.sh" near the end
-#     ${WRKSRC}/src/runtime/Config.x86-openbsd
+#     ${WRKSRC}/src/runtime/Config.<ARCH>-openbsd
 #         change the -export-dynamic flags to -static
 # You should also edit the do-build target in this Makefile, comment
 # out the second line to avoid trying to build the manual. Finally, do
@@ -48,7 +50,7 @@
 
 BUILD_DEPENDS=         ::print/texlive/base
 
-# it's not actually interactive, it just needs /proc and higher resource limits
+# it's not actually interactive, it just needs /proc
 REGRESS_IS_INTERACTIVE=Yes
 
 .if ${FLAVOR:L:Mnative_bootstrap}
@@ -62,11 +64,20 @@
                        --disable-debugger --no-sysinit --no-userinit
 .endif
 
+.if ${MACHINE_ARCH} == "i386"
+PKG_ARGS+=             -Di386=1
+.else
+PKG_ARGS+=             -Di386=0
+.endif
+
 USE_GMAKE=             Yes
 PORTHOME=              ${TMPDIR}
 MAKE_ENV=              GNUMAKE=${GMAKE} INSTALL_ROOT=${PREFIX} \
                        MAN_DIR=${PREFIX}/man INFO_DIR=${PREFIX}/info
 
+pre-configure:
+       @${SUBST_CMD} ${WRKSRC}/src/runtime/runtime.c
+
 do-build:
        cd ${WRKSRC} && ${SETENV} ${MAKE_ENV} /bin/sh make.sh "${BOOTSTRAP_CMD}"
        cd ${WRKSRC}/doc/manual && ${SETENV} ${MAKE_ENV} ${GMAKE}
@@ -78,10 +89,7 @@
        ${CHOWN} -R 0:0 ${PREFIX}/lib/sbcl
 
 do-regress:
-       @echo "These tests must be run with a data size resource limit of at 
least"
-       @echo "768 MB, for example by a user in the staff or daemon login 
classes."
-       @echo
-       @echo "The /proc filesystem must also be mounted for the core.test.sh 
test:"
+       @echo "The /proc filesystem must be mounted for the core.test.sh test 
to pass:"
        @echo "  mkdir -p /proc && mount -t procfs proc /proc"
        @echo
        @sleep 5
Index: distinfo
===================================================================
RCS file: /home/cvsync/openbsd/ports/lang/sbcl/distinfo,v
retrieving revision 1.1.1.1
diff -u -N distinfo
--- distinfo    14 Apr 2008 12:29:40 -0000      1.1.1.1
+++ distinfo    3 Apr 2009 02:39:08 -0000
@@ -1,10 +1,15 @@
 MD5 (sbcl-1.0.14-openbsd-i386-static-1.tar.bz2) = LLiuQhzlqTgixZV4yZ5j7Q==
-MD5 (sbcl-1.0.15-source.tar.bz2) = 09la4QaEo8/FnkJ+xTPuaA==
+MD5 (sbcl-1.0.27-openbsd-amd64-static.tar.bz2) = +3E/w86E6XLKLjlw272H1Q==
+MD5 (sbcl-1.0.27-source.tar.bz2) = UZNuStA0T+OoRENC1/tT5Q==
 RMD160 (sbcl-1.0.14-openbsd-i386-static-1.tar.bz2) = 
cx9B6lgyN7hg2alpXHXu54diiBM=
-RMD160 (sbcl-1.0.15-source.tar.bz2) = WNputGy3LQ6IzbXtWhvAHVklz6I=
+RMD160 (sbcl-1.0.27-openbsd-amd64-static.tar.bz2) = 
I/Me9pI5Vpt6rR1hdfcvITN7Hdo=
+RMD160 (sbcl-1.0.27-source.tar.bz2) = KgBgDAL0ElQCmDDOTAg/+IIKKEk=
 SHA1 (sbcl-1.0.14-openbsd-i386-static-1.tar.bz2) = 8UjrJjR7PPKBrjz+7qvdvKMF/XA=
-SHA1 (sbcl-1.0.15-source.tar.bz2) = TTNX9W5vYAyuCsP3gRH8zVrrdHM=
+SHA1 (sbcl-1.0.27-openbsd-amd64-static.tar.bz2) = 2Wegh+hGFde5LyYw5FJGWl0/AZA=
+SHA1 (sbcl-1.0.27-source.tar.bz2) = RjfRpRtTIxOQAzUV3BUjdqQ5lB8=
 SHA256 (sbcl-1.0.14-openbsd-i386-static-1.tar.bz2) = 
fn++aMwD+62CKaXAuqPgFi1EztAD2GI5Pxas9iGQwG4=
-SHA256 (sbcl-1.0.15-source.tar.bz2) = 
XeSYVZpr4AAZ/QzgkHV+dch12J6FR1k9ehCvttqXC+k=
+SHA256 (sbcl-1.0.27-openbsd-amd64-static.tar.bz2) = 
zV/mvwUdU9KT7iwVsXIg8muYsNSZVu2T2uY9qpsULOA=
+SHA256 (sbcl-1.0.27-source.tar.bz2) = 
4t2VdGYhE6FZxgSL0rsYmLfcQfMWIrQjjzjL8sDUwis=
 SIZE (sbcl-1.0.14-openbsd-i386-static-1.tar.bz2) = 7636859
-SIZE (sbcl-1.0.15-source.tar.bz2) = 3205556
+SIZE (sbcl-1.0.27-openbsd-amd64-static.tar.bz2) = 7349251
+SIZE (sbcl-1.0.27-source.tar.bz2) = 3316031
Index: patches/patch-contrib_asdf-module.mk
===================================================================
RCS file: 
/home/cvsync/openbsd/ports/lang/sbcl/patches/patch-contrib_asdf-module.mk,v
retrieving revision 1.1.1.1
diff -u -N patches/patch-contrib_asdf-module.mk
--- patches/patch-contrib_asdf-module.mk        14 Apr 2008 12:29:40 -0000      
1.1.1.1
+++ patches/patch-contrib_asdf-module.mk        3 Apr 2009 04:21:16 -0000
@@ -1,6 +1,6 @@
 $OpenBSD: patch-contrib_asdf-module.mk,v 1.1.1.1 2008/04/14 12:29:40 deanna 
Exp $
---- contrib/asdf-module.mk.orig        Wed Sep  6 17:56:59 2006
-+++ contrib/asdf-module.mk     Thu Apr 10 14:37:27 2008
+--- contrib/asdf-module.mk.orig        Thu Mar 27 10:40:31 2008
++++ contrib/asdf-module.mk     Mon Apr 14 08:45:07 2008
 @@ -18,7 +18,8 @@ endif
  
  export CC SBCL EXTRA_CFLAGS EXTRA_LDFLAGS
@@ -11,9 +11,10 @@
        $(MAKE) -C ../asdf
        $(SBCL) --eval '(defvar *system* "$(SYSTEM)")' --load ../asdf-stub.lisp 
--eval '(quit)'
  
-@@ -29,4 +30,4 @@ test: all
- 
- 
+@@ -30,5 +31,4 @@ test: all
+ # KLUDGE: There seems to be no portable way to tell tar to not to
+ # preserve owner, so chown after installing for the current user.
  install: $(EXTRA_INSTALL_TARGETS)
 -      tar cf - . | ( cd "$(BUILD_ROOT)$(INSTALL_DIR)" && tar xpvf - )
+-      find "$(BUILD_ROOT)$(INSTALL_DIR)" -type f -exec chown `id -u`:`id -g` 
{} \;
 +      cp -p $(SYSTEM).asd *.lisp *.fasl "$(BUILD_ROOT)$(INSTALL_DIR)"
Index: patches/patch-src_compiler_x86_parms.lisp
===================================================================
RCS file: patches/patch-src_compiler_x86_parms.lisp
diff -u -N patches/patch-src_compiler_x86_parms.lisp
--- /dev/null   2 Apr 2009 21:31:52 -0000
+++ patches/patch-src_compiler_x86_parms.lisp   12 Feb 2009 02:43:08 -0000
@@ -0,0 +1,68 @@
+$OpenBSD$
+--- src/compiler/x86/parms.lisp.orig   Sun Jan 25 16:56:08 2009
++++ src/compiler/x86/parms.lisp        Wed Feb 11 16:03:43 2009
+@@ -159,12 +159,31 @@
+ ;;;     And if KVA_PAGES is extended from 1GB to 1.5GB, we can't use
+ ;;;     down to around 0xA0000000.
+ ;;;     So we use 0x58000000--0x98000000 for dynamic space.
+-;;;   * OpenBSD address space changes for W^X as well as malloc
+-;;;     randomization made the old addresses unsafe. The only range
+-;;;     that is really safe is between the end of the text segment (it
+-;;;     starts at #x3C000000) and #x7C000000. However if the -Z linker
+-;;;     option is used then the safe range is (probably) #x00001000 to
+-;;;     #x48048000, with the text and data segments at #x08048000.
++;;;   * OpenBSD address space changes for W^X as well as malloc()
++;;;     randomization made the old addresses unsafe.
++;;;     ** If the -Z linker option is not used (the default):
++;;;        The executable's text segment starts at #x1c000000 and the
++;;;        data segment MAXDSIZ bytes higher, at #x3c000000. Shared
++;;;        library text segments start randomly between #x00002000 and
++;;;        #x10002000, with the data segment MAXDSIZ bytes after that.
++;;;     ** If the -Z linker option is used:
++;;;        The executable's text and data segments simply start at
++;;;        #x08048000, data immediately following text. Shared library
++;;;        text and data is placed as if allocated by malloc().
++;;;     ** In both cases, the randomized range for malloc() starts
++;;;        MAXDSIZ bytes after the end of the data segment (#x48048000
++;;;        with -Z, #x7c000000 without), and extends 256 MB.
++;;;     ** The read only, static, and linkage table spaces should be
++;;;        safe with and without -Z if they are located just before
++;;;        #x1c000000.
++;;;     ** Ideally the dynamic space should be at #x94000000, 64 MB
++;;;        after the end of the highest random malloc()
++;;;        address. Unfortunately it seems that the dynamic space must
++;;;        be in the lower half of the address space, where there are
++;;;        no large areas that are unused both with and without
++;;;        -Z. Break -Z (which nobody uses anyway) by starting at
++;;;        #x40000000 and only extending 512 - 64 MB we can run under
++;;;        the default resource limits.
+ 
+ #!+win32
+ (progn
+@@ -225,18 +244,17 @@
+ 
+ #!+openbsd
+ (progn
+-  (def!constant read-only-space-start     #x47000000)
+-  (def!constant read-only-space-end       #x470ff000)
++  (def!constant read-only-space-start     #x1b000000)
++  (def!constant read-only-space-end       #x1b0ff000)
+ 
+-  (def!constant static-space-start        #x47100000)
+-  (def!constant static-space-end          #x471ff000)
++  (def!constant static-space-start        #x1b100000)
++  (def!constant static-space-end          #x1b1ff000)
+ 
+-  (def!constant dynamic-space-start       #x48000000)
+-  (def!constant dynamic-space-end         #x78000000)
++  (def!constant dynamic-space-start       #x40000000)
++  (def!constant dynamic-space-end         #x5bfff000)
+ 
+-  ;; In CMUCL: 0xB0000000->0xB1000000
+-  (def!constant linkage-table-space-start #x47200000)
+-  (def!constant linkage-table-space-end   #x472ff000))
++  (def!constant linkage-table-space-start #x1b200000)
++  (def!constant linkage-table-space-end   #x1b2ff000))
+ 
+ #!+netbsd
+ (progn
Index: patches/patch-src_runtime_Config.x86-openbsd
===================================================================
RCS file: 
/home/cvsync/openbsd/ports/lang/sbcl/patches/patch-src_runtime_Config.x86-openbsd,v
retrieving revision 1.1.1.1
diff -u -N patches/patch-src_runtime_Config.x86-openbsd
--- patches/patch-src_runtime_Config.x86-openbsd        14 Apr 2008 12:29:40 
-0000      1.1.1.1
+++ patches/patch-src_runtime_Config.x86-openbsd        3 Apr 2009 04:22:14 
-0000
@@ -1,9 +1,9 @@
 $OpenBSD: patch-src_runtime_Config.x86-openbsd,v 1.1.1.1 2008/04/14 12:29:40 
deanna Exp $
---- src/runtime/Config.x86-openbsd.orig        Wed Jan  9 11:12:23 2008
-+++ src/runtime/Config.x86-openbsd     Thu Apr 10 14:13:34 2008
-@@ -25,4 +25,4 @@ OS_LIBS += -lutil
+--- src/runtime/Config.x86-openbsd.orig        Sun Feb  3 10:34:58 2008
++++ src/runtime/Config.x86-openbsd     Thu Feb  5 08:41:33 2009
+@@ -24,5 +24,3 @@ OS_LIBS += -lutil
+ 
  LINKFLAGS += -export-dynamic
  LDFLAGS += -export-dynamic
- 
+-
 -CFLAGS =  -g -Wall -O2
-+CFLAGS +=  -g -Wall -O2 -DSBCL_HOME='"${PREFIX}/lib/sbcl/"'
Index: patches/patch-src_runtime_GNUmakefile
===================================================================
RCS file: 
/home/cvsync/openbsd/ports/lang/sbcl/patches/patch-src_runtime_GNUmakefile,v
retrieving revision 1.1.1.1
diff -u -N patches/patch-src_runtime_GNUmakefile
--- patches/patch-src_runtime_GNUmakefile       14 Apr 2008 12:29:40 -0000      
1.1.1.1
+++ patches/patch-src_runtime_GNUmakefile       3 Apr 2009 04:24:52 -0000
@@ -6,7 +6,7 @@
  GREP = grep
  
 -CFLAGS = -g -Wall -Wsign-compare -O3
-+CFLAGS += -Wsign-compare
++CFLAGS += -Wall -Wsign-compare
  ASFLAGS = $(CFLAGS)
  CPPFLAGS = -I.
  
Index: patches/patch-src_runtime_gc-common.c
===================================================================
RCS file: 
/home/cvsync/openbsd/ports/lang/sbcl/patches/patch-src_runtime_gc-common.c,v
retrieving revision 1.1.1.1
diff -u -N patches/patch-src_runtime_gc-common.c
--- patches/patch-src_runtime_gc-common.c       14 Apr 2008 12:29:40 -0000      
1.1.1.1
+++ /dev/null   3 Apr 2009 03:30:16 -0000
@@ -1,20 +0,0 @@
-$OpenBSD: patch-src_runtime_gc-common.c,v 1.1.1.1 2008/04/14 12:29:40 deanna 
Exp $
---- src/runtime/gc-common.c.orig       Wed Feb 20 09:55:27 2008
-+++ src/runtime/gc-common.c    Thu Apr 10 14:13:34 2008
-@@ -25,6 +25,7 @@
-  *   <ftp://ftp.cs.utexas.edu/pub/garbage/bigsurv.ps>.
-  */
- 
-+#include <sys/param.h>
- #include <stdio.h>
- #include <signal.h>
- #include <string.h>
-@@ -53,7 +54,7 @@
- #endif
- #endif
- 
--size_t dynamic_space_size = DEFAULT_DYNAMIC_SPACE_SIZE;
-+size_t dynamic_space_size = MIN(DEFAULT_DYNAMIC_SPACE_SIZE, 400 * 1024 * 
1024);
- 
- inline static boolean
- forwarding_pointer_p(lispobj *pointer) {
Index: patches/patch-src_runtime_runtime.c
===================================================================
RCS file: 
/home/cvsync/openbsd/ports/lang/sbcl/patches/patch-src_runtime_runtime.c,v
retrieving revision 1.1.1.1
diff -u -N patches/patch-src_runtime_runtime.c
--- patches/patch-src_runtime_runtime.c 14 Apr 2008 12:29:40 -0000      1.1.1.1
+++ patches/patch-src_runtime_runtime.c 3 Apr 2009 04:23:51 -0000
@@ -1,12 +1,12 @@
 $OpenBSD: patch-src_runtime_runtime.c,v 1.1.1.1 2008/04/14 12:29:40 deanna Exp 
$
---- src/runtime/runtime.c.orig Thu Oct 25 21:33:34 2007
-+++ src/runtime/runtime.c      Thu Apr 10 14:13:34 2008
-@@ -279,6 +279,8 @@ main(int argc, char *argv[], char *envp[])
-                 dynamic_space_size = strtol(argv[argi++], 0, 0) << 20;
-                 if (errno)
-                     lose("argument to --dynamic-space-size is not a number");
-+                if (dynamic_space_size > DEFAULT_DYNAMIC_SPACE_SIZE)
-+                    lose("argument to --dynamic-space-size is too large");
-             } else if (0 == strcmp(arg, "--debug-environment")) {
-                 int n = 0;
-                 printf("; Commandline arguments:\n");
+--- src/runtime/runtime.c.orig Sun Jan 25 16:56:09 2009
++++ src/runtime/runtime.c      Thu Feb  5 17:44:05 2009
+@@ -67,7 +67,7 @@
+ #endif
+ 
+ #ifndef SBCL_HOME
+-#define SBCL_HOME "/usr/local/lib/sbcl/"
++#define SBCL_HOME "${PREFIX}/lib/sbcl/"
+ #endif
+ 
+ #ifdef LISP_FEATURE_HPUX
Index: patches/patch-tests_subr.sh
===================================================================
RCS file: /home/cvsync/openbsd/ports/lang/sbcl/patches/patch-tests_subr.sh,v
retrieving revision 1.1.1.1
diff -u -N patches/patch-tests_subr.sh
--- patches/patch-tests_subr.sh 14 Apr 2008 12:29:40 -0000      1.1.1.1
+++ /dev/null   3 Apr 2009 03:30:16 -0000
@@ -1,12 +0,0 @@
-$OpenBSD: patch-tests_subr.sh,v 1.1.1.1 2008/04/14 12:29:40 deanna Exp $
---- tests/subr.sh.orig Fri Dec 28 11:46:57 2007
-+++ tests/subr.sh      Thu Apr 10 14:13:34 2008
-@@ -29,7 +29,7 @@ set -a # export all variables at assignment-time.
- SBCL_HOME="$SBCL_PWD/../contrib"
- SBCL_CORE="$SBCL_PWD/../output/sbcl.core"
- SBCL_RUNTIME="$SBCL_PWD/../src/runtime/sbcl"
--SBCL_ARGS="--noinform --no-sysinit --no-userinit --noprint --disable-debugger"
-+SBCL_ARGS="--noinform --dynamic-space-size 600 --no-sysinit --no-userinit 
--noprint --disable-debugger"
- 
- # Scripts that use these variables should quote them.
- TEST_BASENAME="$(basename $0)"
Index: patches/patch-tests_timer.impure.lisp
===================================================================
RCS file: patches/patch-tests_timer.impure.lisp
diff -u -N patches/patch-tests_timer.impure.lisp
--- /dev/null   2 Apr 2009 21:31:52 -0000
+++ patches/patch-tests_timer.impure.lisp       3 Apr 2009 01:32:02 -0000
@@ -0,0 +1,12 @@
+$OpenBSD$
+--- tests/timer.impure.lisp.orig       Wed Apr  1 10:36:39 2009
++++ tests/timer.impure.lisp    Thu Apr  2 18:31:56 2009
+@@ -147,7 +147,7 @@
+   (let ((time (1+ (get-universal-time))))
+     (loop repeat 200 do
+           (schedule-timer (make-timer (lambda ())) time :absolute-p t))
+-    (sleep 2)
++    (sleep 6)
+     (assert (zerop (length (sb-impl::%pqueue-contents 
sb-impl::*schedule*))))))
+ 
+ (with-test (:name (:with-timeout :timeout))
Index: pkg/PFRAG.i386
===================================================================
RCS file: pkg/PFRAG.i386
diff -u -N pkg/PFRAG.i386
--- /dev/null   2 Apr 2009 21:31:52 -0000
+++ pkg/PFRAG.i386      12 Feb 2009 02:43:08 -0000
@@ -0,0 +1,2 @@
+...@comment $OpenBSD$
+lib/sbcl/sb-rotate-byte/x86-vm.fasl
Index: pkg/PLIST
===================================================================
RCS file: /home/cvsync/openbsd/ports/lang/sbcl/pkg/PLIST,v
retrieving revision 1.1.1.1
diff -u -N pkg/PLIST
--- pkg/PLIST   14 Apr 2008 12:29:40 -0000      1.1.1.1
+++ pkg/PLIST   3 Apr 2009 04:24:15 -0000
@@ -1,5 +1,6 @@
 @comment $OpenBSD: PLIST,v 1.1.1.1 2008/04/14 12:29:40 deanna Exp $
-bin/sbcl
+%%i386%%
+...@bin bin/sbcl
 @info info/asdf.info
 @info info/sbcl.info
 lib/sbcl/
@@ -115,7 +116,6 @@
 lib/sbcl/sb-rotate-byte/rotate-byte.lisp
 lib/sbcl/sb-rotate-byte/sb-rotate-byte.asd
 lib/sbcl/sb-rotate-byte/sb-rotate-byte.fasl
-lib/sbcl/sb-rotate-byte/x86-vm.fasl
 lib/sbcl/sb-rotate-byte/x86-vm.lisp
 lib/sbcl/sb-rt/
 lib/sbcl/sb-rt/rt.fasl
@@ -214,6 +214,7 @@
 
share/doc/sbcl/html/sbcl/Class-sb_002dgray_003afundamental_002dinput_002dstream.html
 
share/doc/sbcl/html/sbcl/Class-sb_002dgray_003afundamental_002doutput_002dstream.html
 share/doc/sbcl/html/sbcl/Class-sb_002dgray_003afundamental_002dstream.html
+share/doc/sbcl/html/sbcl/Class-sb_002dposix_003aflock.html
 share/doc/sbcl/html/sbcl/Class-sb_002dposix_003apasswd.html
 share/doc/sbcl/html/sbcl/Class-sb_002dposix_003astat.html
 share/doc/sbcl/html/sbcl/Class-sb_002dposix_003atermios.html
@@ -305,6 +306,7 @@
 share/doc/sbcl/html/sbcl/Function-sb_002dcover_003asave_002dcoverage.html
 
share/doc/sbcl/html/sbcl/Function-sb_002dcover_003asave_002dcoverage_002din_002dfile.html
 
share/doc/sbcl/html/sbcl/Function-sb_002dext_003aadd_002dimplementation_002dpackage.html
+share/doc/sbcl/html/sbcl/Function-sb_002dext_003aarray_002dstorage_002dvector.html
 share/doc/sbcl/html/sbcl/Function-sb_002dext_003acancel_002dfinalization.html
 share/doc/sbcl/html/sbcl/Function-sb_002dext_003afinalize.html
 share/doc/sbcl/html/sbcl/Function-sb_002dext_003alist_002dall_002dtimers.html
@@ -465,7 +467,10 @@
 share/doc/sbcl/html/sbcl/Macro-sb_002dthread_003awith_002dmutex.html
 
share/doc/sbcl/html/sbcl/Macro-sb_002dthread_003awith_002drecursive_002dlock.html
 share/doc/sbcl/html/sbcl/Metaobject-Protocol.html
+share/doc/sbcl/html/sbcl/Method-sb_002dbsd_002dsockets_003asocket_002dmake_002dstream-_0028_0028socket-socket_0029-_0026key-input-output-_0028element_002dtype-_0027character_0029-_0028buffering-full_0029-_0028external_002dformat-default_0029-timeout_0029.html
 share/doc/sbcl/html/sbcl/Methods-common-to-all-streams.html
+share/doc/sbcl/html/sbcl/Miscellaneous-Efficiency-Issues.html
+share/doc/sbcl/html/sbcl/Miscellaneous-Extensions.html
 share/doc/sbcl/html/sbcl/Modular-arithmetic.html
 share/doc/sbcl/html/sbcl/More-Common-Lisp-Information.html
 share/doc/sbcl/html/sbcl/More-SBCL-Information.html
@@ -504,6 +509,7 @@
 share/doc/sbcl/html/sbcl/Shebang-Scripts.html
 share/doc/sbcl/html/sbcl/Simple-Streams.html
 share/doc/sbcl/html/sbcl/Single-Stepping.html
+share/doc/sbcl/html/sbcl/Slot-access.html
 share/doc/sbcl/html/sbcl/Socket-Options.html
 share/doc/sbcl/html/sbcl/Sockets-Overview.html
 share/doc/sbcl/html/sbcl/Source-Location-Availability.html
@@ -542,7 +548,6 @@
 share/doc/sbcl/html/sbcl/Type-conversion-functions.html
 share/doc/sbcl/html/sbcl/Types.html
 share/doc/sbcl/html/sbcl/Understanding-Compiler-Diagnostics.html
-share/doc/sbcl/html/sbcl/Unix_002dstyle-Command-Line-Protocol.html
 share/doc/sbcl/html/sbcl/Unknown-Locations-and-Interrupts.html
 share/doc/sbcl/html/sbcl/User-Initialization-File.html
 share/doc/sbcl/html/sbcl/Variable-Access.html
@@ -561,7 +566,9 @@
 share/doc/sbcl/html/sbcl/Variable-sb_002dext_003a_002ainit_002dhooks_002a.html
 
share/doc/sbcl/html/sbcl/Variable-sb_002dext_003a_002ainvoke_002ddebugger_002dhook_002a.html
 
share/doc/sbcl/html/sbcl/Variable-sb_002dext_003a_002amodule_002dprovider_002dfunctions_002a.html
+share/doc/sbcl/html/sbcl/Variable-sb_002dext_003a_002amuffled_002dwarnings_002a.html
 share/doc/sbcl/html/sbcl/Variable-sb_002dext_003a_002asave_002dhooks_002a.html
+share/doc/sbcl/html/sbcl/Variable-sb_002dext_003a_002astack_002dallocate_002ddynamic_002dextent_002a.html
 
share/doc/sbcl/html/sbcl/Variable-sb_002dsprof_003a_002amax_002dsamples_002a.html
 
share/doc/sbcl/html/sbcl/Variable-sb_002dsprof_003a_002asample_002dinterval_002a.html
 
share/doc/sbcl/html/sbcl/Variable-sb_002dthread_003a_002acurrent_002dthread_002a.html

Reply via email to