DataMuseum.dk

Presents historical artifacts from the history of:

Rational R1000/400

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about Rational R1000/400

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - download

⟦6fa33ed67⟧

    Length: 3072 (0xc00)
    Notes: 01_class, 97_tag, ADA, R1k_Segment, VAR3, seg_004c8e

Derivation

└─⟦8527c1e9b⟧ Bits:30000544 8mm tape, Rational 1000, Arrival backup of disks in PAM's R1000
    └─ ⟦cfc2e13cd⟧ »Space Info Vol 2« 
        └─⟦this⟧ 

Dot plot

Dot(1) source file

Segmented Heap

{HeapHead 0x00000/0x80}:SegHeapHead first_free_bit = 0x00004cff max_bits = 0x03ffffff zero = 0x00000000 alloced_bits = 0x00005fff
{HeadVar3 0x00080/0x2aa}:HeadVar3
    0x000080 [0x00] +0x0000: head_z_000 = 0x80000001 [10000000000000000000000000000001]
    0x0000a0 [0x01] +0x0020: head_segment = 0x00004c8e [0000000000000000100110010001110]
    0x0000bf [0x02] +0x003f: head_c_03f = 0x00000001 [00000000000000000000000000000001]
    0x0000df [0x03] +0x005f: head_chains_p → {Thing1 0x0231a/0x10c} [00000000000000000010001100011010]
    0x0000ff [0x04] +0x007f:
    0x000100 [0x05] +0x0080:
    0x00011f [0x06] +0x009f: [00000000000000000000000000000000]
    0x00013f [0x07] +0x00bf: head_c_bf = 0x000000012 [000000000000000000000000000010010]
    0x000160 [0x08] +0x00e0: head_object = 0x00003277 [000000000000000011001001110111]
    0x00017e [0x09] +0x00fe: head_c_fe = 0x00000001 [00000000000000000000000000000001]
    0x00019e [0x0a] +0x011e:
    0x0001be [0x0b] +0x013e:
    0x0001de [0x0c] +0x015e:
    0x0001fe [0x0d] +0x017e:
    0x00021e [0x0e] +0x019e:
    0x00023e [0x0f] +0x01be:
    0x00025e [0x10] +0x01de:
    0x000265 [0x11] +0x01e5: head_variant = 0x3 [11]
    0x000267 [0x12] +0x01e7: hv3_1e7_n = 0x2 [010]
    0x00026a [0x13] +0x01ea:
    0x00028a [0x14] +0x020a: hv3_20a_p → {D300 0x02970/0xc0} [00000000000000000010100101110000]
    0x0002aa [0x15] +0x022a:
    0x0002ea [0x16] +0x026a: hv3_26a_n = 0x0000000000100000 [0000000000000000000000000000000000000000000100000000000000000000]

{R1kSegChunk 0x0032a/0x1ff0}: ===================
    0x00032a +0x0000:                                    0x0 [0x1f80] 0…
    0x0022aa +0x1f80:                           0x1000000000 [0x70] 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000010000 0000000000000000 0000000000000000
{Thing1 0x0231a/0x10c}:Thing1
    0x00231a [0x00] +0x0000: t1_00_n = 0xffffffff0016000800054000050 [111111111111111111111111111111110000000000010110000000000000100000000000000001010100000000000000000001010000]
    0x002386 [0x01] +0x006c: t1_c1_head_p → {StringIndex 0x02426/0x1e2} [00000000000000000010010000100110]
    0x0023a6 [0x02] +0x008c: t1_c2_last_p → {StringStore 0x02608/0x368} [00000000000000000010011000001000]
    0x0023c6 [0x03] +0x00ac: t1_array1_p → {StringIndex 0x02426/0x1e2} [00000000000000000010010000100110]
    0x0023e6 [0x04] +0x00cc: [00000000000000000000000000000000]
    0x002406 [0x05] +0x00ec: [00000000000000000000000000000000]

{StringIndex 0x02426/0x1e2}:StringIndex x = 0x00000001 y = 0x0000000b
  [$0x0001]  0x00240 000 »EXE_102«
{StringStore 0x02608/0x368}:StringStore x = 0x00000001 y = 0x00000065
    @0x0264e [0x00] =  $0x0001 »EXE_102«
    @0x0269e [0x01] =  $0x0024 »\x7a\x00\x04\x88\x98\x80\x00\x00\x00\x01\x22\x79\x70\x00\x00\x00\x00\x01\x22\x75\xa0\x00\x24\x3f\xca\x00\x00\x00\x00\x09\x14\x1a\x00\x00\x00\x00\x00\x09\x13\xfb\x80\x01\x21\xd6\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x48\xa2\x50\x00\x09\x0d\x75\x80\x00\x00\x13\xb1\x70\x48\x5d\x18\x00\x00\x00\x00«
    @0x0291e [0x02] =  $0x7400 »\x9d\x05\xbf\xe6«
{D300 0x02970/0xc0}:D300
    0x002970 [0x00] +0x0000: d300_0 = 0x00000000 [00000000000000000000000000000000]
    0x002990 [0x01] +0x0020: d300_1 = 0x00002a30 [00000000000000000010101000110000]
    0x0029b0 [0x02] +0x0040: d300_2 = 0x00000000 [00000000000000000000000000000000]
    0x0029d0 [0x03] +0x0060: d300_d305 = 0x000030d0 [00000000000000000011000011010000]
    0x0029f0 [0x04] +0x0080: d300_4 = 0x00000000 [00000000000000000000000000000000]
    0x002a10 [0x05] +0x00a0: d300_d301 = 0x00003db0 [00000000000000000011110110110000]

{BitPointerArray 0x02a30/0x6a0}:BitPointerArray

    0x002a30 +0x0000:                                    0x0 [0x6a0] 0…
{D305 0x030d0/0xce0}:D305
    0x0034f0 [0x21] +0x0420: ptr_0x21_p → {D306 0x04cfb/0x83} [00000000000000000100110011111011]

    0x003510 +0x0440:                                    0x0 [0x8a0] 0…
{D301 0x03db0/0xce0}:D301
    0x0047f0 [0x52] +0x0a40: ptr_0x52_p → {D302 0x04b64/0xa0} [00000000000000000100101101100100]

    0x004810 +0x0a60:                                    0x0 [0x280] 0…
{D303 0x04a90/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04b30/0x34} d303_2 = 0x0001 d303_3 = 0x0000000000000000000
{D304 0x04b30/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x04b64/0xa0}:D302 d302_0 = 0x80000007 d302_d303_p → {D303 0x04a90/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000078
{ArrayString 0x04c04/0x78}:ARRAY_STRING[0x1,0x7] = "EXE_102"
{D307 0x04c7c/0x7f}:D307 d307_0 = 0x00 d307_1 = 0x0000001 d307_2 = 0x0000991a d307_3 = 0x00000002
{D306 0x04cfb/0x83}:D306 d306_d303_p → {D303 0x04a90/0xa0} d306_1 = 0xa0000000 d306_2 = 0x0 d306_d307_p → {D307 0x04c7c/0x7f}