DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 A B C D F G L M N P R S T V X

⟦bacb18865⟧ Bits:30002783 SW1500 CCP/M 86 v. 3.1 Release 3.3.1 Disk 2/2, 5¼" Floppy Disk, CpmFSAuto

    Length: 1261568 (0x134000)
    Description: Bits:30002783 SW1500 CCP/M 86 v. 3.1 Release 3.3.1 Disk 2/2
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_160)

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         1024_2048_0x0_*1+1_2:0_76:1_160
Confidence score:  +138/-0 
Sector size:       1024
Block size:        2048
Directory entries: 160
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 12544 ADDNET.CMD ⟦5b727c266⟧
0 0 15744 BDOS.CON ⟦af2ba40d6⟧
0 0 150528 CCPM.SYS ⟦1ba40700f⟧
0 0 5504 CIO.CON ⟦883d43f06⟧
0 0 640 CLOCK.RSP ⟦47fd682bf⟧
0 0 24192 CPADDNET.CMD ⟦ae28f2c25⟧
0 0 41344 CPGENNET.CMD ⟦32cb584f7⟧
0 0 35584 DRNET.CMD ⟦361c71fe3⟧
0 0 21760 FILEX.A86 ⟦651a0c044⟧ TextFile
0 0 52608 GENCCPM.CMD ⟦2038840cd⟧
0 0 12544 GENNET.CMD ⟦cb9d43b50⟧
0 0 39296 LANREL.CMD ⟦9a4aab1fb⟧
0 0 11392 LOCAL.CMD ⟦df81e6a32⟧
0 0 16512 LOGOFF.CMD ⟦054f6893e⟧
0 0 18432 LOGON.CMD ⟦9207d8571⟧
0 0 39552 MATREL.CMD ⟦4d9842fc5⟧
0 0 18560 MATRELHW.CMD ⟦d994f55f8⟧
0 0 19712 MATRELSW.CMD ⟦21b904476⟧
0 0 6144 MEM.CON ⟦80dd81b0a⟧
0 0 16000 NAMES.CMD ⟦003bd88d2⟧
0 0 22912 NAMESMOD.CMD ⟦ea69a1aa9⟧
0 0 17536 NET.CMD ⟦4f982e6be⟧
0 0 17792 NETDRV.RSP ⟦001d6c69e⟧
0 0 22784 NETDRVB.RSP ⟦4edf37220⟧
0 0 16384 NETOFF.CMD ⟦8243b6545⟧
0 0 16384 NETON.CMD ⟦08186668e⟧
0 0 17920 NETSTAT.CMD ⟦c67d05638⟧
0 0 39040 NETVEDL.CMD ⟦7c1501dd6⟧
0 0 1920 NIOS.CMD ⟦fbe87a8c1⟧
0 0 1792 NIOS1.CMD ⟦3222839e1⟧
0 0 3328 PIN750.RSP ⟦0538d9e1a⟧
0 0 1152 R.CMD ⟦f9f30d548⟧
0 0 5504 RCDSP.CMD ⟦8e9ea82e0⟧
0 0 17664 RCSPL.CMD ⟦b4f93f8aa⟧
0 0 128 RDEF ⟦1a934559b⟧ TextFile
0 0 3200 REMOTE.CMD ⟦563d79204⟧
0 0 7808 REMTMP.RSP ⟦1551aa60b⟧
0 0 27264 RNET.CMD ⟦6f9f2ac08⟧
0 0 128 RSDEF ⟦0adbbdd18⟧ TextFile
0 0 33408 RSNET.CMD ⟦b24e9e11e⟧
0 0 7552 RTM.CON ⟦4f2ef1bdf⟧
0 0 640 SCROLL.RSP ⟦27844af8c⟧
0 0 128 SDEF ⟦4eb454ef9⟧ TextFile
0 0 39552 SIOREL.CMD ⟦4903257be⟧
0 0 19712 SNET.CMD ⟦346bcfed6⟧
0 0 41088 SPOOL.CMD ⟦32ea98b84⟧
0 0 256 STDKONF ⟦f16162d9a⟧ TextFile
0 0 38656 STRREL.CMD ⟦e5d3ee6d9⟧
0 0 5632 SUP.CON ⟦cd7f3de1f⟧
0 0 3328 SYSDAT.CON ⟦13f8b41e3⟧
0 0 50432 SYSVEDL.CMD ⟦2179a909e⟧
0 0 7424 TMP750.RSP ⟦fc71bfbb8⟧
0 0 2944 VOUT.RSP ⟦f665ed891⟧
0 0 38784 XIOS.CON ⟦38c6cc7e5⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 25-25-25-25-9-1-1-1
   (2, 1)  0xa000 1-1-1-1-1-1-1-1

Total credibility: 104

Block number width: ok16

   8   392     1   255   211  False
  16     0     8   565     0  False

Block Sizes:
    2048 0x00 +103 -0
    4096 0x01 +9 -94
    8192 0x03 +9 -94
   16384 0x07 +9 -94
   32768 0x0f +9 -94
   65536 0x1f +9 -94
    1024 0x00 +8 -95
     256 0x00 +5 -98
     512 0x00 +5 -98
     128 0x00 +4 -99

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [24, 24, 24, 24, 8]   +138/-0
     25  normal-2     (1-3-5-7-2-4-6-8)                                                         [24, 24, 8, 0, 24, 24]   +112/-15
     50  normal-3     (1-4-7-2-5-8-3-6)                                                         [24, 24, 0, 24, 8, 0, 24]   +123/-21
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»Udgave 3.3 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=00000000000000003a0b14503a0b1450}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x18, al=50005100000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ADDNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=52005300540055005600570058000000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=59005a005b005c005d005e005f006000}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=61006200630000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=64000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=650066006700680069006a006b006c00}
    ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=6d006e006f0070000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=71007200730074007500760077007800}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=79007a007b007c007d007e007f008000}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=81008200830084008500000000000000}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86008700880089008a008b008c008d00}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x16, al=96009700000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=a000a100a20000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ab00ac00ad00ae00af00b000b100b200}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=bb00bc00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=bd00be00bf00c000c100c200c3000000}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c400c500c600c700c800c900ca00cb00}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=d400d500d600d7000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=d800d900da00db00dc00dd0000000000}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=e6000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=ef000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f000f100f200f300f400f500f600f700}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f800f900fa00fb00fc00fd00fe00ff00}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=00010101020103010000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=0c010d01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0e010f01100111011201130114011501}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=16011701000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=180119011a0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=1b011c011d011e011f01200121012201}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=2b012c012d012e010000000000000000}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2f013001310132013301340135013601}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=37010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0b, al=40010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801}
    ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=49014a014b014c010000000000000000}
    ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d014e014f0150015101520153015401}
    ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=550156015701580159015a015b015c01}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5d015e015f0160016101620163016401}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=65010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=66016701680169016a016b016c016d01}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=6e016f01700171017201730174017501}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x31, al=76017701780179010000000000000000}
    ProbeDirEnt {status=0x00, name=»NIOS    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=7a010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NIOS1   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=7b010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIN750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=7c017d01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»R       CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=7e010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=7f018001810100000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=82018301840185018601870188018901}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=8a010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RDEF       «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=8b010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REMOTE  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=8c018d01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=8e018f01900191010000000000000000}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=9a019b019c019d019e019f0100000000}
    ProbeDirEnt {status=0x00, name=»RSDEF      «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=a0010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a101a201a301a401a501a601a701a801}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a901aa01ab01ac01ad01ae01af01b001}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=b1010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=b201b301b401b5010000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=b6010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SDEF       «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=b7010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b801b901ba01bb01bc01bd01be01bf01}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c001c101c201c301c401c501c601c701}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=c801c901ca01cb010000000000000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc01cd01ce01cf01d001d101d201d301}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=d401d501000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=de01df01e001e101e201e301e401e501}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x41, al=e601e701e801e901ea01000000000000}
    ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=eb010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ec01ed01ee01ef01f001f101f201f301}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2e, al=fc01fd01fe0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=ff010002010200000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=02020302000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0402050206020702080209020a020b02}
  0x0009000 (2, 0, 5)
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0c020d020e020f021002110212021302}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=1402150216021702180219021a021b02}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0a, al=1c020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=1d021e021f0220020000000000000000}
    ProbeDirEnt {status=0x00, name=»VOUT    RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=21022202000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23022402250226022702280229022a02}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b022c022d022e022f02300231023202}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=33023402350200000000000000000000}
* 138 -   0 [1, 2, 3, 4, 5, 6, 7, 8]
+ 123 -  21 [1, 4, 7, 2, 5, 8, 3, 6]
+ 112 -  15 [1, 3, 5, 7, 2, 4, 6, 8]

Full view