|
DataMuseum.dkPresents historical artifacts from the history of: Rational R1000/400 |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about Rational R1000/400 Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - download
Length: 4096 (0x1000) Notes: 01_class, 97_tag, ADA, R1k_Segment, VAR3, seg_0a0b0f
└─⟦8527c1e9b⟧ Bits:30000544 8mm tape, Rational 1000, Arrival backup of disks in PAM's R1000 └─ ⟦cfc2e13cd⟧ »Space Info Vol 2« └─⟦this⟧
{HeapHead 0x00000/0x80}:SegHeapHead first_free_bit = 0x000068b5 max_bits = 0x03ffffff zero = 0x00000000 alloced_bits = 0x00007fff {HeadVar3 0x00080/0x2aa}:HeadVar3 0x000080 [0x00] +0x0000: head_z_000 = 0x80000001 [10000000000000000000000000000001] 0x0000a0 [0x01] +0x0020: head_segment = 0x000a0b0f [0000000000010100000101100001111] 0x0000bf [0x02] +0x003f: head_c_03f = 0x00000001 [00000000000000000000000000000001] 0x0000df [0x03] +0x005f: head_chains_p → {Thing1 0x0231a/0x10c} [00000000000000000010001100011010] 0x0000ff [0x04] +0x007f: 0x000100 [0x05] +0x0080: 0x00011f [0x06] +0x009f: [00000000000000000000000000000000] 0x00013f [0x07] +0x00bf: head_c_bf = 0x000000012 [000000000000000000000000000010010] 0x000160 [0x08] +0x00e0: head_object = 0x0002dcd3 [000000000000101101110011010011] 0x00017e [0x09] +0x00fe: head_c_fe = 0x00000001 [00000000000000000000000000000001] 0x00019e [0x0a] +0x011e: 0x0001be [0x0b] +0x013e: 0x0001de [0x0c] +0x015e: 0x0001fe [0x0d] +0x017e: 0x00021e [0x0e] +0x019e: 0x00023e [0x0f] +0x01be: 0x00025e [0x10] +0x01de: 0x000265 [0x11] +0x01e5: head_variant = 0x3 [11] 0x000267 [0x12] +0x01e7: hv3_1e7_n = 0x2 [010] 0x00026a [0x13] +0x01ea: 0x00028a [0x14] +0x020a: hv3_20a_p → {D300 0x02970/0xc0} [00000000000000000010100101110000] 0x0002aa [0x15] +0x022a: 0x0002ea [0x16] +0x026a: hv3_26a_n = 0x0000000000100000 [0000000000000000000000000000000000000000000100000000000000000000] {R1kSegChunk 0x0032a/0x1ff0}: =================== 0x00032a +0x0000: 0x0 [0x1f80] 0… 0x0022aa +0x1f80: 0x1000000000 [0x70] 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000010000 0000000000000000 0000000000000000 {Thing1 0x0231a/0x10c}:Thing1 0x00231a [0x00] +0x0000: t1_00_n = 0xffffffff001c00340036f8006ca [111111111111111111111111111111110000000000011100000000000011010000000000001101101111100000000000011011001010] 0x002386 [0x01] +0x006c: t1_c1_head_p → {StringIndex 0x02426/0x1e2} [00000000000000000010010000100110] 0x0023a6 [0x02] +0x008c: t1_c2_last_p → {StringStore 0x057b8/0x370} [00000000000000000101011110111000] 0x0023c6 [0x03] +0x00ac: t1_array1_p → {StringIndex 0x065ac/0x254} [00000000000000000110010110101100] 0x0023e6 [0x04] +0x00cc: t1_c2_tail_p → {Thing2 0x05778/0x40} [00000000000000000101011101111000] 0x002406 [0x05] +0x00ec: t1_c1_tail_p → {Thing2 0x0656c/0x40} [00000000000000000110010101101100] {StringIndex 0x02426/0x1e2}:StringIndex x = 0x00000001 y = 0x0000000b [$0x0001] 0x00240 002 »BOUNDED_STRING« [$0x0002] 0x002c8 003 »IS_REGISTRATION« [$0x0003] 0x00358 004 »MESS« [$0x0004] 0x00390 005 »IS_UNREGISTRATION« [$0x0005] 0x00430 006 »ALLOC_IDENT« [$0x0006] 0x004a0 007 »IDENT« [$0x0007] 0x033f0 008 »DESALLOC_IDENT« [$0x0008] 0x03478 009 »EXTRACT_HOST_AND_NAME_AND_SOCK« [$0x0009] 0x03580 00a »FROM« [$0x000a] 0x035b8 00b »HOST« [$0x000b] 0x035f0 000 »NAME« {StringStore 0x02608/0x368}:StringStore x = 0x00000001 y = 0x00000065 @0x0264e [0x00] = $0x0001 »BOUNDED_STRING« @0x026d6 [0x01] = $0x0002 »IS_REGISTRATION« @0x02766 [0x02] = $0x0003 »MESS« @0x0279e [0x03] = $0x0004 »IS_UNREGISTRATION« @0x0283e [0x04] = $0x0005 »ALLOC_IDENT« @0x028ae [0x05] = $0x0006 »IDENT« {D300 0x02970/0xc0}:D300 0x002970 [0x00] +0x0000: d300_0 = 0x00000000 [00000000000000000000000000000000] 0x002990 [0x01] +0x0020: d300_1 = 0x00002a30 [00000000000000000010101000110000] 0x0029b0 [0x02] +0x0040: d300_2 = 0x00000000 [00000000000000000000000000000000] 0x0029d0 [0x03] +0x0060: d300_d305 = 0x000030d0 [00000000000000000011000011010000] 0x0029f0 [0x04] +0x0080: d300_4 = 0x00000000 [00000000000000000000000000000000] 0x002a10 [0x05] +0x00a0: d300_d301 = 0x00003db0 [00000000000000000011110110110000] {BitPointerArray 0x02a30/0x6a0}:BitPointerArray 0x002a30 +0x0000: 0x0 [0x6a0] 0… {D305 0x030d0/0xce0}:D305 0x0030d0 +0x0000: 0x0 [0xce0] 0… {D301 0x03db0/0xce0}:D301 0x003e50 [0x05] +0x00a0: ptr_0x5_p → {D302 0x05188/0xa0} [00000000000000000101000110001000] 0x003ed0 [0x09] +0x0120: ptr_0x9_p → {D302 0x055d0/0xa0} [00000000000000000101010111010000] 0x003f30 [0x0c] +0x0180: ptr_0xc_p → {D302 0x05b5c/0xa0} [00000000000000000101101101011100] 0x003f90 [0x0f] +0x01e0: ptr_0xf_p → {D302 0x04d88/0xa0} [00000000000000000100110110001000] 0x004070 [0x16] +0x02c0: ptr_0x16_p → {D302 0x04b64/0xa0} [00000000000000000100101101100100] 0x0040b0 [0x18] +0x0300: ptr_0x18_p → {D302 0x053c4/0xa0} [00000000000000000101001111000100] 0x004270 [0x26] +0x04c0: ptr_0x26_p → {D302 0x04fb4/0xa0} [00000000000000000100111110110100] 0x0042b0 [0x28] +0x0500: ptr_0x28_p → {D302 0x06834/0xa0} [00000000000000000110100000110100] 0x004390 [0x2f] +0x05e0: ptr_0x2f_p → {D302 0x063cc/0xa0} [00000000000000000110001111001100] 0x004510 [0x3b] +0x0760: ptr_0x3b_p → {D302 0x061f8/0xa0} [00000000000000000110000111111000] 0x004750 [0x4d] +0x09a0: ptr_0x4d_p → {D302 0x06024/0xa0} [00000000000000000110000000100100] 0x0048b0 [0x58] +0x0b00: ptr_0x58_p → {D302 0x05d80/0xa0} [00000000000000000101110110000000] 0x0048d0 +0x0b20: 0x0 [0x1c0] 0… {D303 0x04a90/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04b30/0x34} d303_2 = 0x0001 d303_3 = 0x0000000000000000000 {D304 0x04b30/0x34}:D304 d304_0 = 0x8228338000001 {D302 0x04b64/0xa0}:D302 d302_0 = 0x8000000e d302_d303_p → {D303 0x04a90/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b0 {ArrayString 0x04c04/0xb0}:ARRAY_STRING[0x1,0xe] = "BOUNDED_STRING" {D303 0x04cb4/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04d54/0x34} d303_2 = 0x0002 d303_3 = 0x0000000000000000000 {D304 0x04d54/0x34}:D304 d304_0 = 0x8228338000001 {D302 0x04d88/0xa0}:D302 d302_0 = 0x8000000f d302_d303_p → {D303 0x04cb4/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b8 {ArrayString 0x04e28/0xb8}:ARRAY_STRING[0x1,0xf] = "IS_REGISTRATION" {D303 0x04ee0/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04f80/0x34} d303_2 = 0x0003 d303_3 = 0x0000000000000000000 {D304 0x04f80/0x34}:D304 d304_0 = 0x8228338000001 {D302 0x04fb4/0xa0}:D302 d302_0 = 0x80000004 d302_d303_p → {D303 0x04ee0/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000060 {ArrayString 0x05054/0x60}:ARRAY_STRING[0x1,0x4] = "MESS" {D303 0x050b4/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05154/0x34} d303_2 = 0x0004 d303_3 = 0x0000000000000000000 {D304 0x05154/0x34}:D304 d304_0 = 0x8228338000001 {D302 0x05188/0xa0}:D302 d302_0 = 0x80000011 d302_d303_p → {D303 0x050b4/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000c8 {ArrayString 0x05228/0xc8}:ARRAY_STRING[0x1,0x11] = "IS_UNREGISTRATION" {D303 0x052f0/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05390/0x34} d303_2 = 0x0005 d303_3 = 0x0000000000000000000 {D304 0x05390/0x34}:D304 d304_0 = 0x8228338000001 {D302 0x053c4/0xa0}:D302 d302_0 = 0x8000000b d302_d303_p → {D303 0x052f0/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000098 {ArrayString 0x05464/0x98}:ARRAY_STRING[0x1,0xb] = "ALLOC_IDENT" {D303 0x054fc/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0559c/0x34} d303_2 = 0x0006 d303_3 = 0x0000000000000000000 {D304 0x0559c/0x34}:D304 d304_0 = 0x8228338000001 {D302 0x055d0/0xa0}:D302 d302_0 = 0x80000005 d302_d303_p → {D303 0x054fc/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000068 {ArrayString 0x05670/0x68}:ARRAY_STRING[0x1,0x5] = "IDENT" {D303 0x056d8/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05b28/0x34} d303_2 = 0x0007 d303_3 = 0x0000000000000000000 {Thing2 0x05778/0x40}:Thing2 Chain2 payload_p → {StringStore 0x02608/0x368} {StringStore 0x057b8/0x370}:StringStore x = 0x00000001 y = 0x00000066 @0x057fe [0x00] = $0x0007 »DESALLOC_IDENT« @0x05886 [0x01] = $0x0008 »EXTRACT_HOST_AND_NAME_AND_SOCK« @0x0598e [0x02] = $0x0009 »FROM« @0x059c6 [0x03] = $0x000a »HOST« @0x059fe [0x04] = $0x000b »NAME« @0x05a36 [0x05] = $0x000c »SOCK« {D304 0x05b28/0x34}:D304 d304_0 = 0x8228338000001 {D302 0x05b5c/0xa0}:D302 d302_0 = 0x8000000e d302_d303_p → {D303 0x056d8/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b0 {ArrayString 0x05bfc/0xb0}:ARRAY_STRING[0x1,0xe] = "DESALLOC_IDENT" {D303 0x05cac/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05d4c/0x34} d303_2 = 0x0008 d303_3 = 0x0000000000000000000 {D304 0x05d4c/0x34}:D304 d304_0 = 0x8228338000001 {D302 0x05d80/0xa0}:D302 d302_0 = 0x8000001e d302_d303_p → {D303 0x05cac/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000130 {ArrayString 0x05e20/0x130}:ARRAY_STRING[0x1,0x1e] = "EXTRACT_HOST_AND_NAME_AND_SOCK" {D303 0x05f50/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05ff0/0x34} d303_2 = 0x0009 d303_3 = 0x0000000000000000000 {D304 0x05ff0/0x34}:D304 d304_0 = 0x8228338000001 {D302 0x06024/0xa0}:D302 d302_0 = 0x80000004 d302_d303_p → {D303 0x05f50/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000060 {ArrayString 0x060c4/0x60}:ARRAY_STRING[0x1,0x4] = "FROM" {D303 0x06124/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x061c4/0x34} d303_2 = 0x000a d303_3 = 0x0000000000000000000 {D304 0x061c4/0x34}:D304 d304_0 = 0x8228338000001 {D302 0x061f8/0xa0}:D302 d302_0 = 0x80000004 d302_d303_p → {D303 0x06124/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000060 {ArrayString 0x06298/0x60}:ARRAY_STRING[0x1,0x4] = "HOST" {D303 0x062f8/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x06398/0x34} d303_2 = 0x000b d303_3 = 0x0000000000000000000 {D304 0x06398/0x34}:D304 d304_0 = 0x8228338000001 {D302 0x063cc/0xa0}:D302 d302_0 = 0x80000004 d302_d303_p → {D303 0x062f8/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000060 {ArrayString 0x0646c/0x60}:ARRAY_STRING[0x1,0x4] = "NAME" {D303 0x064cc/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x06800/0x34} d303_2 = 0x000c d303_3 = 0x0000000000000000000 {Thing2 0x0656c/0x40}:Thing2 Chain1 payload_p → {StringIndex 0x02426/0x1e2} {StringIndex 0x065ac/0x254}:StringIndex x = 0x00000001 y = 0x0000000e [$0x0001] 0x00240 002 »BOUNDED_STRING« [$0x0002] 0x002c8 003 »IS_REGISTRATION« [$0x0003] 0x00358 004 »MESS« [$0x0004] 0x00390 005 »IS_UNREGISTRATION« [$0x0005] 0x00430 006 »ALLOC_IDENT« [$0x0006] 0x004a0 007 »IDENT« [$0x0007] 0x033f0 008 »DESALLOC_IDENT« [$0x0008] 0x03478 009 »EXTRACT_HOST_AND_NAME_AND_SOCK« [$0x0009] 0x03580 00a »FROM« [$0x000a] 0x035b8 00b »HOST« [$0x000b] 0x035f0 00c »NAME« [$0x000c] 0x03628 000 »SOCK« {D304 0x06800/0x34}:D304 d304_0 = 0x8228338000001 {D302 0x06834/0xa0}:D302 d302_0 = 0x80000004 d302_d303_p → {D303 0x064cc/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000060 {ArrayString 0x068d4/0x60}:ARRAY_STRING[0x1,0x4] = "SOCK"