DataMuseum.dk

Presents historical artifacts from the history of:

Rational R1000/400

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about Rational R1000/400

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - download

⟦0d685e87e⟧

    Length: 4096 (0x1000)
    Notes: 01_class, 97_tag, ADA, R1k_Segment, VAR3, seg_0958be

Derivation

└─⟦8527c1e9b⟧ Bits:30000544 8mm tape, Rational 1000, Arrival backup of disks in PAM's R1000
    └─ ⟦cfc2e13cd⟧ »Space Info Vol 2« 
        └─⟦this⟧ 

Dot plot

Dot(1) source file

Segmented Heap

{HeapHead 0x00000/0x80}:SegHeapHead first_free_bit = 0x00006515 max_bits = 0x03ffffff zero = 0x00000000 alloced_bits = 0x00007fff
{HeadVar3 0x00080/0x2aa}:HeadVar3
    0x000080 [0x00] +0x0000: head_z_000 = 0x80000001 [10000000000000000000000000000001]
    0x0000a0 [0x01] +0x0020: head_segment = 0x000958be [0000000000010010101100010111110]
    0x0000bf [0x02] +0x003f: head_c_03f = 0x00000001 [00000000000000000000000000000001]
    0x0000df [0x03] +0x005f: head_chains_p → {Thing1 0x0231a/0x10c} [00000000000000000010001100011010]
    0x0000ff [0x04] +0x007f:
    0x000100 [0x05] +0x0080:
    0x00011f [0x06] +0x009f: [00000000000000000000000000000000]
    0x00013f [0x07] +0x00bf: head_c_bf = 0x000000012 [000000000000000000000000000010010]
    0x000160 [0x08] +0x00e0: head_object = 0x0002b2ad [000000000000101011001010101101]
    0x00017e [0x09] +0x00fe: head_c_fe = 0x00000001 [00000000000000000000000000000001]
    0x00019e [0x0a] +0x011e:
    0x0001be [0x0b] +0x013e:
    0x0001de [0x0c] +0x015e:
    0x0001fe [0x0d] +0x017e:
    0x00021e [0x0e] +0x019e:
    0x00023e [0x0f] +0x01be:
    0x00025e [0x10] +0x01de:
    0x000265 [0x11] +0x01e5: head_variant = 0x3 [11]
    0x000267 [0x12] +0x01e7: hv3_1e7_n = 0x2 [010]
    0x00026a [0x13] +0x01ea:
    0x00028a [0x14] +0x020a: hv3_20a_p → {D300 0x02970/0xc0} [00000000000000000010100101110000]
    0x0002aa [0x15] +0x022a:
    0x0002ea [0x16] +0x026a: hv3_26a_n = 0x0000000000100000 [0000000000000000000000000000000000000000000100000000000000000000]

{R1kSegChunk 0x0032a/0x1ff0}: ===================
    0x00032a +0x0000:                                    0x0 [0x1f80] 0…
    0x0022aa +0x1f80:                           0x1000000000 [0x70] 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000010000 0000000000000000 0000000000000000
{Thing1 0x0231a/0x10c}:Thing1
    0x00231a [0x00] +0x0000: t1_00_n = 0xffffffff00160030003710006dc [111111111111111111111111111111110000000000010110000000000011000000000000001101110001000000000000011011011100]
    0x002386 [0x01] +0x006c: t1_c1_head_p → {StringIndex 0x02426/0x1e2} [00000000000000000010010000100110]
    0x0023a6 [0x02] +0x008c: t1_c2_last_p → {StringStore 0x057d0/0x370} [00000000000000000101011111010000]
    0x0023c6 [0x03] +0x00ac: t1_array1_p → {StringIndex 0x02426/0x1e2} [00000000000000000010010000100110]
    0x0023e6 [0x04] +0x00cc: t1_c2_tail_p → {Thing2 0x05790/0x40} [00000000000000000101011110010000]
    0x002406 [0x05] +0x00ec: [00000000000000000000000000000000]

{StringIndex 0x02426/0x1e2}:StringIndex x = 0x00000001 y = 0x0000000b
  [$0x0001]  0x00240 002 »FILE_MUTEX_INIT«
  [$0x0002]  0x002d0 003 »FILE«
  [$0x0003]  0x00308 004 »FILE_MUTEX_DESTROY«
  [$0x0004]  0x003b0 005 »FILE_LOCK«
  [$0x0005]  0x00410 006 »FILE_UNLOCK«
  [$0x0006]  0x00480 007 »TEXT_IO_LOCK«
  [$0x0007]  0x03408 008 »TEXT_IO_UNLOCK«
  [$0x0008]  0x03490 009 »FILE_SUPPORT_LOCK«
  [$0x0009]  0x03530 00a »FILE_SUPPORT_UNLOCK«
  [$0x000a]  0x035e0 00b »OS_FILES_LOCK«
  [$0x000b]  0x03660 000 »OS_FILES_UNLOCK«
{StringStore 0x02608/0x368}:StringStore x = 0x00000001 y = 0x00000065
    @0x0264e [0x00] =  $0x0001 »FILE_MUTEX_INIT«
    @0x026de [0x01] =  $0x0002 »FILE«
    @0x02716 [0x02] =  $0x0003 »FILE_MUTEX_DESTROY«
    @0x027be [0x03] =  $0x0004 »FILE_LOCK«
    @0x0281e [0x04] =  $0x0005 »FILE_UNLOCK«
    @0x0288e [0x05] =  $0x0006 »TEXT_IO_LOCK«
{D300 0x02970/0xc0}:D300
    0x002970 [0x00] +0x0000: d300_0 = 0x00000000 [00000000000000000000000000000000]
    0x002990 [0x01] +0x0020: d300_1 = 0x00002a30 [00000000000000000010101000110000]
    0x0029b0 [0x02] +0x0040: d300_2 = 0x00000000 [00000000000000000000000000000000]
    0x0029d0 [0x03] +0x0060: d300_d305 = 0x000030d0 [00000000000000000011000011010000]
    0x0029f0 [0x04] +0x0080: d300_4 = 0x00000000 [00000000000000000000000000000000]
    0x002a10 [0x05] +0x00a0: d300_d301 = 0x00003db0 [00000000000000000011110110110000]

{BitPointerArray 0x02a30/0x6a0}:BitPointerArray

    0x002a30 +0x0000:                                    0x0 [0x6a0] 0…
{D305 0x030d0/0xce0}:D305

    0x0030d0 +0x0000:                                    0x0 [0xce0] 0…
{D301 0x03db0/0xce0}:D301
    0x003e70 [0x06] +0x00c0: ptr_0x6_p → {D302 0x04f64/0xa0} [00000000000000000100111101100100]
    0x003f30 [0x0c] +0x0180: ptr_0xc_p → {D302 0x05d98/0xa0} [00000000000000000101110110011000]
    0x003f50 [0x0d] +0x01a0: ptr_0xd_p → {D302 0x051a8/0xa0} [00000000000000000101000110101000]
    0x004010 [0x13] +0x0260: ptr_0x13_p → {D302 0x05b74/0xa0} [00000000000000000101101101110100]
    0x004090 [0x17] +0x02e0: ptr_0x17_p → {D302 0x06220/0xa0} [00000000000000000110001000100000]
    0x0040f0 [0x1a] +0x0340: ptr_0x1a_p → {D302 0x04b64/0xa0} [00000000000000000100101101100100]
    0x0041d0 [0x21] +0x0420: ptr_0x21_p → {D302 0x0643c/0xa0} [00000000000000000110010000111100]
    0x004270 [0x26] +0x04c0: ptr_0x26_p → {D302 0x055b0/0xa0} [00000000000000000101010110110000]
    0x0045d0 [0x41] +0x0820: ptr_0x41_p → {D302 0x05fd4/0xa0} [00000000000000000101111111010100]
    0x0047d0 [0x51] +0x0a20: ptr_0x51_p → {D302 0x04d90/0xa0} [00000000000000000100110110010000]
    0x004990 [0x5f] +0x0be0: ptr_0x5f_p → {D302 0x053a4/0xa0} [00000000000000000101001110100100]

    0x0049b0 +0x0c00:                                    0x0 [0xe0] 0…
{D303 0x04a90/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04b30/0x34} d303_2 = 0x0001 d303_3 = 0x0000000000000000000
{D304 0x04b30/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x04b64/0xa0}:D302 d302_0 = 0x8000000f d302_d303_p → {D303 0x04a90/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b8
{ArrayString 0x04c04/0xb8}:ARRAY_STRING[0x1,0xf] = "FILE_MUTEX_INIT"
{D303 0x04cbc/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04d5c/0x34} d303_2 = 0x0002 d303_3 = 0x0000000000000000000
{D304 0x04d5c/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x04d90/0xa0}:D302 d302_0 = 0x80000004 d302_d303_p → {D303 0x04cbc/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000060
{ArrayString 0x04e30/0x60}:ARRAY_STRING[0x1,0x4] = "FILE"
{D303 0x04e90/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04f30/0x34} d303_2 = 0x0003 d303_3 = 0x0000000000000000000
{D304 0x04f30/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x04f64/0xa0}:D302 d302_0 = 0x80000012 d302_d303_p → {D303 0x04e90/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000d0
{ArrayString 0x05004/0xd0}:ARRAY_STRING[0x1,0x12] = "FILE_MUTEX_DESTROY"
{D303 0x050d4/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05174/0x34} d303_2 = 0x0004 d303_3 = 0x0000000000000000000
{D304 0x05174/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x051a8/0xa0}:D302 d302_0 = 0x80000009 d302_d303_p → {D303 0x050d4/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000088
{ArrayString 0x05248/0x88}:ARRAY_STRING[0x1,0x9] = "FILE_LOCK"
{D303 0x052d0/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05370/0x34} d303_2 = 0x0005 d303_3 = 0x0000000000000000000
{D304 0x05370/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x053a4/0xa0}:D302 d302_0 = 0x8000000b d302_d303_p → {D303 0x052d0/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000098
{ArrayString 0x05444/0x98}:ARRAY_STRING[0x1,0xb] = "FILE_UNLOCK"
{D303 0x054dc/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0557c/0x34} d303_2 = 0x0006 d303_3 = 0x0000000000000000000
{D304 0x0557c/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x055b0/0xa0}:D302 d302_0 = 0x8000000c d302_d303_p → {D303 0x054dc/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000a0
{ArrayString 0x05650/0xa0}:ARRAY_STRING[0x1,0xc] = "TEXT_IO_LOCK"
{D303 0x056f0/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05b40/0x34} d303_2 = 0x0007 d303_3 = 0x0000000000000000000
{Thing2 0x05790/0x40}:Thing2 Chain2 payload_p → {StringStore 0x02608/0x368}
{StringStore 0x057d0/0x370}:StringStore x = 0x00000001 y = 0x00000066
    @0x05816 [0x00] =  $0x0007 »TEXT_IO_UNLOCK«
    @0x0589e [0x01] =  $0x0008 »FILE_SUPPORT_LOCK«
    @0x0593e [0x02] =  $0x0009 »FILE_SUPPORT_UNLOCK«
    @0x059ee [0x03] =  $0x000a »OS_FILES_LOCK«
    @0x05a6e [0x04] =  $0x000b »OS_FILES_UNLOCK«
{D304 0x05b40/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x05b74/0xa0}:D302 d302_0 = 0x8000000e d302_d303_p → {D303 0x056f0/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b0
{ArrayString 0x05c14/0xb0}:ARRAY_STRING[0x1,0xe] = "TEXT_IO_UNLOCK"
{D303 0x05cc4/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05d64/0x34} d303_2 = 0x0008 d303_3 = 0x0000000000000000000
{D304 0x05d64/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x05d98/0xa0}:D302 d302_0 = 0x80000011 d302_d303_p → {D303 0x05cc4/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000c8
{ArrayString 0x05e38/0xc8}:ARRAY_STRING[0x1,0x11] = "FILE_SUPPORT_LOCK"
{D303 0x05f00/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05fa0/0x34} d303_2 = 0x0009 d303_3 = 0x0000000000000000000
{D304 0x05fa0/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x05fd4/0xa0}:D302 d302_0 = 0x80000013 d302_d303_p → {D303 0x05f00/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000d8
{ArrayString 0x06074/0xd8}:ARRAY_STRING[0x1,0x13] = "FILE_SUPPORT_UNLOCK"
{D303 0x0614c/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x061ec/0x34} d303_2 = 0x000a d303_3 = 0x0000000000000000000
{D304 0x061ec/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x06220/0xa0}:D302 d302_0 = 0x8000000d d302_d303_p → {D303 0x0614c/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000a8
{ArrayString 0x062c0/0xa8}:ARRAY_STRING[0x1,0xd] = "OS_FILES_LOCK"
{D303 0x06368/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x06408/0x34} d303_2 = 0x000b d303_3 = 0x0000000000000000000
{D304 0x06408/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0643c/0xa0}:D302 d302_0 = 0x8000000f d302_d303_p → {D303 0x06368/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b8
{ArrayString 0x064dc/0xb8}:ARRAY_STRING[0x1,0xf] = "OS_FILES_UNLOCK"