DataMuseum.dk

Presents historical artifacts from the history of:

Rational R1000/400

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about Rational R1000/400

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - download

⟦d5ec00a84⟧

    Length: 5120 (0x1400)
    Notes: 01_class, 97_tag, ADA, R1k_Segment, VAR3, seg_00172c

Derivation

└─⟦8527c1e9b⟧ Bits:30000544 8mm tape, Rational 1000, Arrival backup of disks in PAM's R1000
    └─ ⟦5a81ac88f⟧ »Space Info Vol 1« 
        └─⟦this⟧ 

Dot plot

Dot(1) source file

Segmented Heap

{HeapHead 0x00000/0x80}:SegHeapHead first_free_bit = 0x00008833 max_bits = 0x03ffffff zero = 0x00000000 alloced_bits = 0x00009fff
{HeadVar3 0x00080/0x2aa}:HeadVar3
    0x000080 [0x00] +0x0000: head_z_000 = 0x80000001 [10000000000000000000000000000001]
    0x0000a0 [0x01] +0x0020: head_segment = 0x0000172c [0000000000000000001011100101100]
    0x0000bf [0x02] +0x003f: head_c_03f = 0x00000001 [00000000000000000000000000000001]
    0x0000df [0x03] +0x005f: head_chains_p → {Thing1 0x0231a/0x10c} [00000000000000000010001100011010]
    0x0000ff [0x04] +0x007f:
    0x000100 [0x05] +0x0080:
    0x00011f [0x06] +0x009f: [00000000000000000000000000000000]
    0x00013f [0x07] +0x00bf: head_c_bf = 0x000000012 [000000000000000000000000000010010]
    0x000160 [0x08] +0x00e0: head_object = 0x0000010b [000000000000000000000100001011]
    0x00017e [0x09] +0x00fe: head_c_fe = 0x00000001 [00000000000000000000000000000001]
    0x00019e [0x0a] +0x011e:
    0x0001be [0x0b] +0x013e:
    0x0001de [0x0c] +0x015e:
    0x0001fe [0x0d] +0x017e:
    0x00021e [0x0e] +0x019e:
    0x00023e [0x0f] +0x01be:
    0x00025e [0x10] +0x01de:
    0x000265 [0x11] +0x01e5: head_variant = 0x3 [11]
    0x000267 [0x12] +0x01e7: hv3_1e7_n = 0x2 [010]
    0x00026a [0x13] +0x01ea:
    0x00028a [0x14] +0x020a: hv3_20a_p → {D300 0x02970/0xc0} [00000000000000000010100101110000]
    0x0002aa [0x15] +0x022a:
    0x0002ea [0x16] +0x026a: hv3_26a_n = 0x0000000000100000 [0000000000000000000000000000000000000000000100000000000000000000]

{R1kSegChunk 0x0032a/0x1ff0}: ===================
    0x00032a +0x0000:                                    0x0 [0x1f80] 0…
    0x0022aa +0x1f80:                           0x1000000000 [0x70] 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000010000 0000000000000000 0000000000000000
{Thing1 0x0231a/0x10c}:Thing1
    0x00231a [0x00] +0x0000: t1_00_n = 0xffffffff0028005400615800bd8 [111111111111111111111111111111110000000000101000000000000101010000000000011000010101100000000000101111011000]
    0x002386 [0x01] +0x006c: t1_c1_head_p → {StringIndex 0x02426/0x1e2} [00000000000000000010010000100110]
    0x0023a6 [0x02] +0x008c: t1_c2_last_p → {StringStore 0x0820a/0x380} [00000000000000001000001000001010]
    0x0023c6 [0x03] +0x00ac: t1_array1_p → {StringIndex 0x07c86/0x338} [00000000000000000111110010000110]
    0x0023e6 [0x04] +0x00cc: t1_c2_tail_p → {Thing2 0x081ca/0x40} [00000000000000001000000111001010]
    0x002406 [0x05] +0x00ec: t1_c1_tail_p → {Thing2 0x07c46/0x40} [00000000000000000111110001000110]

{StringIndex 0x02426/0x1e2}:StringIndex x = 0x00000001 y = 0x0000000b
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »REMOTE_MACHINE«
  [$0x0003]  0x00318 004 »REMOTE_TYPE«
  [$0x0004]  0x00388 005 »REMOTE_DIRECTORY«
  [$0x0005]  0x00420 006 »REMOTE_ROOF«
  [$0x0006]  0x00490 007 »AUTO_LOGIN«
  [$0x0007]  0x004f8 008 »USERNAME«
  [$0x0008]  0x035f8 009 »PASSWORD«
  [$0x0009]  0x03650 00a »ACCOUNT«
  [$0x000a]  0x036a0 00b »TRANSFER_TYPE«
  [$0x000b]  0x03720 000 »TRANSFER_MODE«
{StringStore 0x02608/0x368}:StringStore x = 0x00000001 y = 0x00000065
    @0x0264e [0x00] =  $0x0001 »PROFILE«
    @0x0269e [0x01] =  $0x0002 »REMOTE_MACHINE«
    @0x02726 [0x02] =  $0x0003 »REMOTE_TYPE«
    @0x02796 [0x03] =  $0x0004 »REMOTE_DIRECTORY«
    @0x0282e [0x04] =  $0x0005 »REMOTE_ROOF«
    @0x0289e [0x05] =  $0x0006 »AUTO_LOGIN«
    @0x02906 [0x06] =  $0x0007 »USERNAME«
{D300 0x02970/0xc0}:D300
    0x002970 [0x00] +0x0000: d300_0 = 0x00000000 [00000000000000000000000000000000]
    0x002990 [0x01] +0x0020: d300_1 = 0x00002a30 [00000000000000000010101000110000]
    0x0029b0 [0x02] +0x0040: d300_2 = 0x00000000 [00000000000000000000000000000000]
    0x0029d0 [0x03] +0x0060: d300_d305 = 0x000030d0 [00000000000000000011000011010000]
    0x0029f0 [0x04] +0x0080: d300_4 = 0x00000000 [00000000000000000000000000000000]
    0x002a10 [0x05] +0x00a0: d300_d301 = 0x00003db0 [00000000000000000011110110110000]

{BitPointerArray 0x02a30/0x6a0}:BitPointerArray

    0x002a30 +0x0000:                                    0x0 [0x6a0] 0…
{D305 0x030d0/0xce0}:D305

    0x0030d0 +0x0000:                                    0x0 [0xce0] 0…
{D301 0x03db0/0xce0}:D301
    0x003e70 [0x06] +0x00c0: ptr_0x6_p → {D302 0x04b64/0xa0} [00000000000000000100101101100100]
    0x003f70 [0x0e] +0x01c0: ptr_0xe_p → {D302 0x06814/0xa0} [00000000000000000110100000010100]
    0x003f90 [0x0f] +0x01e0: ptr_0xf_p → {D302 0x085be/0xa0} [00000000000000001000010110111110]
    0x004010 [0x13] +0x0260: ptr_0x13_p → {D302 0x06a58/0xa0} [00000000000000000110101001011000]
    0x004190 [0x1f] +0x03e0: ptr_0x1f_p → {D302 0x07a2e/0xa0} [00000000000000000111101000101110]
    0x004470 [0x36] +0x06c0: ptr_0x36_p → {D302 0x0759e/0xa0} [00000000000000000111010110011110]
    0x004510 [0x3b] +0x0760: ptr_0x3b_p → {D302 0x053b4/0xa0} [00000000000000000101001110110100]
    0x004590 [0x3f] +0x07e0: ptr_0x3f_p → {D302 0x05d68/0xa0} [00000000000000000101110101101000]
    0x004610 [0x43] +0x0860: ptr_0x43_p → {D302 0x06364/0xa0} [00000000000000000110001101100100]
    0x004650 [0x45] +0x08a0: ptr_0x45_p → {D302 0x04f74/0xa0} [00000000000000000100111101110100]
    0x004670 [0x46] +0x08c0: ptr_0x46_p → {D302 0x07ff2/0xa0} [00000000000000000111111111110010]
    0x0047f0 [0x52] +0x0a40: ptr_0x52_p → {D302 0x077e2/0xa0} [00000000000000000111011111100010]
    0x004850 [0x55] +0x0aa0: ptr_0x55_p → {D302 0x055c0/0xa0} [00000000000000000101010111000000]
    0x0048b0 [0x58] +0x0b00: ptr_0x58_p → {D302 0x06148/0xa0} [00000000000000000110000101001000]
    0x004910 [0x5b] +0x0b60: ptr_0x5b_p → {D302 0x05f5c/0xa0} [00000000000000000101111101011100]
    0x004970 [0x5e] +0x0bc0: ptr_0x5e_p → {D302 0x08792/0xa0} [00000000000000001000011110010010]
    0x004990 [0x5f] +0x0be0: ptr_0x5f_p → {D302 0x0704c/0xa0} [00000000000000000111000001001100]

    0x0049b0 +0x0c00:                                    0x0 [0xe0] 0…
{D303 0x04a90/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04b30/0x34} d303_2 = 0x0001 d303_3 = 0x0000000000000000000
{D304 0x04b30/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x04b64/0xa0}:D302 d302_0 = 0x80000007 d302_d303_p → {D303 0x04a90/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000078
{ArrayString 0x04c04/0x78}:ARRAY_STRING[0x1,0x7] = "PROFILE"
{D303 0x04c7c/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04d1c/0x34} d303_2 = 0x0002 d303_3 = 0x0000000000000000000
{D304 0x04d1c/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x04d50/0xa0}:D302 d302_0 = 0x8000000e d302_d303_p → {D303 0x04c7c/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b0
{ArrayString 0x04df0/0xb0}:ARRAY_STRING[0x1,0xe] = "REMOTE_MACHINE"
{D303 0x04ea0/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04f40/0x34} d303_2 = 0x0003 d303_3 = 0x0000000000000000000
{D304 0x04f40/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x04f74/0xa0}:D302 d302_0 = 0x8000000b d302_d302_p → {D302 0x04d50/0xa0} d302_d303_p → {D303 0x04ea0/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000098
{ArrayString 0x05014/0x98}:ARRAY_STRING[0x1,0xb] = "REMOTE_TYPE"
{D303 0x050ac/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0514c/0x34} d303_2 = 0x0004 d303_3 = 0x0000000000000000000
{D304 0x0514c/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x05180/0xa0}:D302 d302_0 = 0x80000010 d302_d303_p → {D303 0x050ac/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000c0
{ArrayString 0x05220/0xc0}:ARRAY_STRING[0x1,0x10] = "REMOTE_DIRECTORY"
{D303 0x052e0/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05380/0x34} d303_2 = 0x0005 d303_3 = 0x0000000000000000000
{D304 0x05380/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x053b4/0xa0}:D302 d302_0 = 0x8000000b d302_d303_p → {D303 0x052e0/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000098
{ArrayString 0x05454/0x98}:ARRAY_STRING[0x1,0xb] = "REMOTE_ROOF"
{D303 0x054ec/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0558c/0x34} d303_2 = 0x0006 d303_3 = 0x0000000000000000000
{D304 0x0558c/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x055c0/0xa0}:D302 d302_0 = 0x8000000a d302_d303_p → {D303 0x054ec/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000090
{ArrayString 0x05660/0x90}:ARRAY_STRING[0x1,0xa] = "AUTO_LOGIN"
{D303 0x056f0/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05790/0x34} d303_2 = 0x0007 d303_3 = 0x0000000000000000000
{D304 0x05790/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x057c4/0xa0}:D302 d302_0 = 0x80000008 d302_d303_p → {D303 0x056f0/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000080
{ArrayString 0x05864/0x80}:ARRAY_STRING[0x1,0x8] = "USERNAME"
{D303 0x058e4/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05d34/0x34} d303_2 = 0x0008 d303_3 = 0x0000000000000000000
{Thing2 0x05984/0x40}:Thing2 Chain2 payload_p → {StringStore 0x02608/0x368}
{StringStore 0x059c4/0x370}:StringStore x = 0x00000001 y = 0x00000066
    @0x05a06 [0x00] =  $0x0008 »PASSWORD«
    @0x05a5e [0x01] =  $0x0009 »ACCOUNT«
    @0x05aae [0x02] =  $0x000a »TRANSFER_TYPE«
    @0x05b2e [0x03] =  $0x000b »TRANSFER_MODE«
    @0x05bae [0x04] =  $0x000c »TRANSFER_STRUCTURE«
    @0x05c56 [0x05] =  $0x000d »SEND_PORT_ENABLED«
{D304 0x05d34/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x05d68/0xa0}:D302 d302_0 = 0x80000008 d302_d303_p → {D303 0x058e4/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000080
{ArrayString 0x05e08/0x80}:ARRAY_STRING[0x1,0x8] = "PASSWORD"
{D303 0x05e88/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05f28/0x34} d303_2 = 0x0009 d303_3 = 0x0000000000000000000
{D304 0x05f28/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x05f5c/0xa0}:D302 d302_0 = 0x80000007 d302_d303_p → {D303 0x05e88/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000078
{ArrayString 0x05ffc/0x78}:ARRAY_STRING[0x1,0x7] = "ACCOUNT"
{D303 0x06074/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x06114/0x34} d303_2 = 0x000a d303_3 = 0x0000000000000000000
{D304 0x06114/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x06148/0xa0}:D302 d302_0 = 0x8000000d d302_d303_p → {D303 0x06074/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000a8
{ArrayString 0x061e8/0xa8}:ARRAY_STRING[0x1,0xd] = "TRANSFER_TYPE"
{D303 0x06290/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x06330/0x34} d303_2 = 0x000b d303_3 = 0x0000000000000000000
{D304 0x06330/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x06364/0xa0}:D302 d302_0 = 0x8000000d d302_d303_p → {D303 0x06290/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000a8
{ArrayString 0x06404/0xa8}:ARRAY_STRING[0x1,0xd] = "TRANSFER_MODE"
{D303 0x064ac/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x067e0/0x34} d303_2 = 0x000c d303_3 = 0x0000000000000000000
{Thing2 0x0654c/0x40}:Thing2 Chain1 payload_p → {StringIndex 0x02426/0x1e2}
{StringIndex 0x0658c/0x254}:StringIndex x = 0x00000001 y = 0x0000000e
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »REMOTE_MACHINE«
  [$0x0003]  0x00318 004 »REMOTE_TYPE«
  [$0x0004]  0x00388 005 »REMOTE_DIRECTORY«
  [$0x0005]  0x00420 006 »REMOTE_ROOF«
  [$0x0006]  0x00490 007 »AUTO_LOGIN«
  [$0x0007]  0x004f8 008 »USERNAME«
  [$0x0008]  0x035f8 009 »PASSWORD«
  [$0x0009]  0x03650 00a »ACCOUNT«
  [$0x000a]  0x036a0 00b »TRANSFER_TYPE«
  [$0x000b]  0x03720 00c »TRANSFER_MODE«
  [$0x000c]  0x037a0 00d »TRANSFER_STRUCTURE«
  [$0x000d]  0x03848 00e »SEND_PORT_ENABLED«
  [$0x000e]  0x048d8 000 »PROMPT_FOR_PASSWORD«
{D304 0x067e0/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x06814/0xa0}:D302 d302_0 = 0x80000012 d302_d303_p → {D303 0x064ac/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000d0
{ArrayString 0x068b4/0xd0}:ARRAY_STRING[0x1,0x12] = "TRANSFER_STRUCTURE"
{D303 0x06984/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x06a24/0x34} d303_2 = 0x000d d303_3 = 0x0000000000000000000
{D304 0x06a24/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x06a58/0xa0}:D302 d302_0 = 0x80000011 d302_d303_p → {D303 0x06984/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000c8
{ArrayString 0x06af8/0xc8}:ARRAY_STRING[0x1,0x11] = "SEND_PORT_ENABLED"
{D303 0x06bc0/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x07018/0x34} d303_2 = 0x000e d303_3 = 0x0000000000000000000
{Thing2 0x06c60/0x40}:Thing2 Chain2 payload_p → {StringStore 0x059c4/0x370} next_p → {Thing2 0x05984/0x40}
{StringStore 0x06ca0/0x378}:StringStore x = 0x00000001 y = 0x00000067
    @0x06ce6 [0x00] =  $0x000e »PROMPT_FOR_PASSWORD«
    @0x06d96 [0x01] =  $0x000f »PROMPT_FOR_ACCOUNT«
    @0x06e3e [0x02] =  $0x0010 »CURRENT_REMOTE_TYPE«
    @0x06eee [0x03] =  $0x0011 »CURRENT_REMOTE_ROOF«
    @0x06f9e [0x04] =  $0x0012 »PROFILE_GET«
{D304 0x07018/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0704c/0xa0}:D302 d302_0 = 0x80000013 d302_d303_p → {D303 0x06bc0/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000d8
{ArrayString 0x070ec/0xd8}:ARRAY_STRING[0x1,0x13] = "PROMPT_FOR_PASSWORD"
{D303 0x071c4/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0756a/0x34} d303_2 = 0x000f d303_3 = 0x0000000000000000000
{Thing2 0x07264/0x40}:Thing2 Chain1 payload_p → {StringIndex 0x0658c/0x254} next_p → {Thing2 0x0654c/0x40}
{StringIndex 0x072a4/0x2c6}:StringIndex x = 0x00000001 y = 0x00000011
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »REMOTE_MACHINE«
  [$0x0003]  0x00318 004 »REMOTE_TYPE«
  [$0x0004]  0x00388 005 »REMOTE_DIRECTORY«
  [$0x0005]  0x00420 006 »REMOTE_ROOF«
  [$0x0006]  0x00490 007 »AUTO_LOGIN«
  [$0x0007]  0x004f8 008 »USERNAME«
  [$0x0008]  0x035f8 009 »PASSWORD«
  [$0x0009]  0x03650 00a »ACCOUNT«
  [$0x000a]  0x036a0 00b »TRANSFER_TYPE«
  [$0x000b]  0x03720 00c »TRANSFER_MODE«
  [$0x000c]  0x037a0 00d »TRANSFER_STRUCTURE«
  [$0x000d]  0x03848 00e »SEND_PORT_ENABLED«
  [$0x000e]  0x048d8 00f »PROMPT_FOR_PASSWORD«
  [$0x000f]  0x04988 010 »PROMPT_FOR_ACCOUNT«
  [$0x0010]  0x04a30 011 »CURRENT_REMOTE_TYPE«
  [$0x0011]  0x04ae0 000 »CURRENT_REMOTE_ROOF«
{D304 0x0756a/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0759e/0xa0}:D302 d302_0 = 0x80000012 d302_d303_p → {D303 0x071c4/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000d0
{ArrayString 0x0763e/0xd0}:ARRAY_STRING[0x1,0x12] = "PROMPT_FOR_ACCOUNT"
{D303 0x0770e/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x077ae/0x34} d303_2 = 0x0010 d303_3 = 0x0000000000000000000
{D304 0x077ae/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x077e2/0xa0}:D302 d302_0 = 0x80000013 d302_d302_p → {D302 0x05180/0xa0} d302_d303_p → {D303 0x0770e/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000d8
{ArrayString 0x07882/0xd8}:ARRAY_STRING[0x1,0x13] = "CURRENT_REMOTE_TYPE"
{D303 0x0795a/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x079fa/0x34} d303_2 = 0x0011 d303_3 = 0x0000000000000000000
{D304 0x079fa/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x07a2e/0xa0}:D302 d302_0 = 0x80000013 d302_d303_p → {D303 0x0795a/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000d8
{ArrayString 0x07ace/0xd8}:ARRAY_STRING[0x1,0x13] = "CURRENT_REMOTE_ROOF"
{D303 0x07ba6/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x07fbe/0x34} d303_2 = 0x0012 d303_3 = 0x0000000000000000000
{Thing2 0x07c46/0x40}:Thing2 Chain1 payload_p → {StringIndex 0x072a4/0x2c6} next_p → {Thing2 0x07264/0x40}
{StringIndex 0x07c86/0x338}:StringIndex x = 0x00000001 y = 0x00000014
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »REMOTE_MACHINE«
  [$0x0003]  0x00318 004 »REMOTE_TYPE«
  [$0x0004]  0x00388 005 »REMOTE_DIRECTORY«
  [$0x0005]  0x00420 006 »REMOTE_ROOF«
  [$0x0006]  0x00490 007 »AUTO_LOGIN«
  [$0x0007]  0x004f8 008 »USERNAME«
  [$0x0008]  0x035f8 009 »PASSWORD«
  [$0x0009]  0x03650 00a »ACCOUNT«
  [$0x000a]  0x036a0 00b »TRANSFER_TYPE«
  [$0x000b]  0x03720 00c »TRANSFER_MODE«
  [$0x000c]  0x037a0 00d »TRANSFER_STRUCTURE«
  [$0x000d]  0x03848 00e »SEND_PORT_ENABLED«
  [$0x000e]  0x048d8 00f »PROMPT_FOR_PASSWORD«
  [$0x000f]  0x04988 010 »PROMPT_FOR_ACCOUNT«
  [$0x0010]  0x04a30 011 »CURRENT_REMOTE_TYPE«
  [$0x0011]  0x04ae0 012 »CURRENT_REMOTE_ROOF«
  [$0x0012]  0x04b90 013 »PROFILE_GET«
  [$0x0013]  0x05e40 014 »SHOW«
  [$0x0014]  0x05e78 000 »RESPONSE«
{D304 0x07fbe/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x07ff2/0xa0}:D302 d302_0 = 0x8000000b d302_d303_p → {D303 0x07ba6/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000098
{ArrayString 0x08092/0x98}:ARRAY_STRING[0x1,0xb] = "PROFILE_GET"
{D303 0x0812a/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0858a/0x34} d303_2 = 0x0013 d303_3 = 0x0000000000000000000
{Thing2 0x081ca/0x40}:Thing2 Chain2 payload_p → {StringStore 0x06ca0/0x378} next_p → {Thing2 0x06c60/0x40}
{StringStore 0x0820a/0x380}:StringStore x = 0x00000001 y = 0x00000068
    @0x0824e [0x00] =  $0x0013 »SHOW«
    @0x08286 [0x01] =  $0x0014 »RESPONSE«
{D304 0x0858a/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x085be/0xa0}:D302 d302_0 = 0x80000004 d302_d303_p → {D303 0x0812a/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000060
{ArrayString 0x0865e/0x60}:ARRAY_STRING[0x1,0x4] = "SHOW"
{D303 0x086be/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0875e/0x34} d303_2 = 0x0014 d303_3 = 0x0000000000000000000
{D304 0x0875e/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x08792/0xa0}:D302 d302_0 = 0x80000008 d302_d302_p → {D302 0x057c4/0xa0} d302_d303_p → {D303 0x086be/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000080
{ArrayString 0x08832/0x80}:ARRAY_STRING[0x1,0x8] = "RESPONSE"