|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 A B C D F G L M N P R S T V X
Length: 1261568 (0x134000) Description: Bits:30002783 SW1500 CCP/M 86 v. 3.1 Release 3.3.1 Disk 2/2 Types: 5¼" Floppy Disk, CpmFSAuto Notes: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232} Signature: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1 Confidence score: +105/-0 Sector size: 1024 Block size: 2048 Directory entries: 512 Block number size: 16 Extent-mask: 0x00 Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8 Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user | bc | length | name | artifact |
---|---|---|---|---|
0 | 0 | 12544 | ADDNET.CMD | ⟦5b727c266⟧ |
0 | 0 | 15744 | BDOS.CON | ⟦af2ba40d6⟧ |
0 | 0 | 150528 | CCPM.SYS | ⟦1ba40700f⟧ |
0 | 0 | 5504 | CIO.CON | ⟦883d43f06⟧ |
0 | 0 | 640 | CLOCK.RSP | ⟦47fd682bf⟧ |
0 | 0 | 24192 | CPADDNET.CMD | ⟦ae28f2c25⟧ |
0 | 0 | 41344 | CPGENNET.CMD | ⟦32cb584f7⟧ |
0 | 0 | 35584 | DRNET.CMD | ⟦361c71fe3⟧ |
0 | 0 | 21760 | FILEX.A86 | ⟦651a0c044⟧ TextFile |
0 | 0 | 52608 | GENCCPM.CMD | ⟦2038840cd⟧ |
0 | 0 | 12544 | GENNET.CMD | ⟦cb9d43b50⟧ |
0 | 0 | 39296 | LANREL.CMD | ⟦9a4aab1fb⟧ |
0 | 0 | 11392 | LOCAL.CMD | ⟦df81e6a32⟧ |
0 | 0 | 16512 | LOGOFF.CMD | ⟦054f6893e⟧ |
0 | 0 | 18432 | LOGON.CMD | ⟦9207d8571⟧ |
0 | 0 | 39552 | MATREL.CMD | ⟦4d9842fc5⟧ |
0 | 0 | 18560 | MATRELHW.CMD | ⟦d994f55f8⟧ |
0 | 0 | 19712 | MATRELSW.CMD | ⟦21b904476⟧ |
0 | 0 | 6144 | MEM.CON | ⟦80dd81b0a⟧ |
0 | 0 | 16000 | NAMES.CMD | ⟦003bd88d2⟧ |
0 | 0 | 22912 | NAMESMOD.CMD | ⟦ea69a1aa9⟧ |
0 | 0 | 17536 | NET.CMD | ⟦4f982e6be⟧ |
0 | 0 | 17792 | NETDRV.RSP | ⟦001d6c69e⟧ |
0 | 0 | 22784 | NETDRVB.RSP | ⟦4edf37220⟧ |
0 | 0 | 16384 | NETOFF.CMD | ⟦8243b6545⟧ |
0 | 0 | 16384 | NETON.CMD | ⟦08186668e⟧ |
0 | 0 | 17920 | NETSTAT.CMD | ⟦c67d05638⟧ |
0 | 0 | 39040 | NETVEDL.CMD | ⟦7c1501dd6⟧ |
0 | 0 | 1920 | NIOS.CMD | ⟦fbe87a8c1⟧ |
0 | 0 | 1792 | NIOS1.CMD | ⟦3222839e1⟧ |
0 | 0 | 3328 | PIN750.RSP | ⟦0538d9e1a⟧ |
0 | 0 | 1152 | R.CMD | ⟦f9f30d548⟧ |
0 | 0 | 5504 | RCDSP.CMD | ⟦8e9ea82e0⟧ |
0 | 0 | 17664 | RCSPL.CMD | ⟦b4f93f8aa⟧ |
0 | 0 | 128 | RDEF | ⟦1a934559b⟧ TextFile |
0 | 0 | 3200 | REMOTE.CMD | ⟦563d79204⟧ |
0 | 0 | 7808 | REMTMP.RSP | ⟦1551aa60b⟧ |
0 | 0 | 27264 | RNET.CMD | ⟦6f9f2ac08⟧ |
0 | 0 | 128 | RSDEF | ⟦0adbbdd18⟧ TextFile |
0 | 0 | 33408 | RSNET.CMD | ⟦b24e9e11e⟧ |
0 | 0 | 7552 | RTM.CON | ⟦4f2ef1bdf⟧ |
0 | 0 | 640 | SCROLL.RSP | ⟦27844af8c⟧ |
0 | 0 | 128 | SDEF | ⟦4eb454ef9⟧ TextFile |
0 | 0 | 39552 | SIOREL.CMD | ⟦4903257be⟧ |
0 | 0 | 19712 | SNET.CMD | ⟦346bcfed6⟧ |
0 | 0 | 41088 | SPOOL.CMD | ⟦32ea98b84⟧ |
0 | 0 | 256 | STDKONF | ⟦f16162d9a⟧ TextFile |
0 | 0 | 38656 | STRREL.CMD | ⟦e5d3ee6d9⟧ |
0 | 0 | 5632 | SUP.CON | ⟦cd7f3de1f⟧ |
0 | 0 | 3328 | SYSDAT.CON | ⟦13f8b41e3⟧ |
0 | 0 | 50432 | SYSVEDL.CMD | ⟦2179a909e⟧ |
0 | 0 | 7424 | TMP750.RSP | ⟦fc71bfbb8⟧ |
0 | 0 | 2944 | VOUT.RSP | ⟦f665ed891⟧ |
0 | 0 | 38784 | XIOS.CON | ⟦38c6cc7e5⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]] First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x8000 26-26-26-26-10-2-2-2 (2, 1) 0xa000 2-2-2-2-2-2-2-2 Total credibility: 120 Block number width: ok16 8 392 1 255 211 False 16 0 8 565 0 False 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00} 00:CCPM SYS rc=0x018 c=0x002 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x18, al=50005100000000000000000000000000} 00:ADDNET CMD rc=0x062 c=0x007 ProbeDirEnt {status=0x00, name=»ADDNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=52005300540055005600570058000000} 00:BDOS CON rc=0x07b c=0x008 ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=59005a005b005c005d005e005f006000} 00:CIO CON rc=0x02b c=0x003 ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=61006200630000000000000000000000} 00:CLOCK RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=64000000000000000000000000000000} 00:CPADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=650066006700680069006a006b006c00} 00:CPADDNETCMD rc=0x03d c=0x004 ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=6d006e006f0070000000000000000000} 00:CPGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=71007200730074007500760077007800} 00:CPGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=79007a007b007c007d007e007f008000} 00:CPGENNETCMD rc=0x043 c=0x005 ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=81008200830084008500000000000000} 00:DRNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86008700880089008a008b008c008d00} 00:DRNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500} 00:DRNET CMD rc=0x016 c=0x002 ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x16, al=96009700000000000000000000000000} 00:FILEX A86 rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»FILEX A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00} 00:FILEX A86 rc=0x02a c=0x003 ProbeDirEnt {status=0x00, name=»FILEX A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=a000a100a20000000000000000000000} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ab00ac00ad00ae00af00b000b100b200} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00} 00:GENCCPM CMD rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=bb00bc00000000000000000000000000} 00:GENNET CMD rc=0x062 c=0x007 ProbeDirEnt {status=0x00, name=»GENNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=bd00be00bf00c000c100c200c3000000} 00:LANREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c400c500c600c700c800c900ca00cb00} 00:LANREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300} 00:LANREL CMD rc=0x033 c=0x004 ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=d400d500d600d7000000000000000000} 00:LOCAL CMD rc=0x059 c=0x006 ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=d800d900da00db00dc00dd0000000000} 00:LOGOFF CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500} 00:LOGOFF CMD rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=e6000000000000000000000000000000} 00:LOGON CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00} 00:LOGON CMD rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=ef000000000000000000000000000000} 00:MATREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f000f100f200f300f400f500f600f700} 00:MATREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f800f900fa00fb00fc00fd00fe00ff00} 00:MATREL CMD rc=0x035 c=0x004 ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=00010101020103010000000000000000} 00:MATRELHWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01} 00:MATRELHWCMD rc=0x011 c=0x002 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=0c010d01000000000000000000000000} 00:MATRELSWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0e010f01100111011201130114011501} 00:MATRELSWCMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=16011701000000000000000000000000} 00:MEM CON rc=0x030 c=0x003 ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=180119011a0100000000000000000000} 00:NAMES CMD rc=0x07d c=0x008 ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=1b011c011d011e011f01200121012201} 00:NAMESMODCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01} 00:NAMESMODCMD rc=0x033 c=0x004 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=2b012c012d012e010000000000000000} 00:NET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2f013001310132013301340135013601} 00:NET CMD rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=37010000000000000000000000000000} 00:NETDRV RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01} 00:NETDRV RSP rc=0x00b c=0x001 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0b, al=40010000000000000000000000000000} 00:NETDRVB RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801} 00:NETDRVB RSP rc=0x032 c=0x004 ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=49014a014b014c010000000000000000} 00:NETOFF CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d014e014f0150015101520153015401} 00:NETON CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=550156015701580159015a015b015c01} 00:NETSTAT CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5d015e015f0160016101620163016401} 00:NETSTAT CMD rc=0x00c c=0x001 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=65010000000000000000000000000000} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=66016701680169016a016b016c016d01} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=6e016f01700171017201730174017501} 00:NETVEDL CMD rc=0x031 c=0x004 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x31, al=76017701780179010000000000000000} 00:NIOS CMD rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»NIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=7a010000000000000000000000000000} 00:NIOS1 CMD rc=0x00e c=0x001 ProbeDirEnt {status=0x00, name=»NIOS1 CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=7b010000000000000000000000000000} 00:PIN750 RSP rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»PIN750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=7c017d01000000000000000000000000} 00:R CMD rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»R CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=7e010000000000000000000000000000} 00:RCDSP CMD rc=0x02b c=0x003 ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=7f018001810100000000000000000000} 00:RCSPL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=82018301840185018601870188018901} 00:RCSPL CMD rc=0x00a c=0x001 ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=8a010000000000000000000000000000} 00:RDEF rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»RDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=8b010000000000000000000000000000} 00:REMOTE CMD rc=0x019 c=0x002 ProbeDirEnt {status=0x00, name=»REMOTE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=8c018d01000000000000000000000000} 00:REMTMP RSP rc=0x03d c=0x004 ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=8e018f01900191010000000000000000} 00:RNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901} 00:RNET CMD rc=0x055 c=0x006 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=9a019b019c019d019e019f0100000000} 00:RSDEF rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»RSDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=a0010000000000000000000000000000} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a101a201a301a401a501a601a701a801} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a901aa01ab01ac01ad01ae01af01b001} 00:RSNET CMD rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=b1010000000000000000000000000000} 00:RTM CON rc=0x03b c=0x004 ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=b201b301b401b5010000000000000000} 00:SCROLL RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=b6010000000000000000000000000000} 00:SDEF rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»SDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=b7010000000000000000000000000000} 00:SIOREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b801b901ba01bb01bc01bd01be01bf01} 00:SIOREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c001c101c201c301c401c501c601c701} 00:SIOREL CMD rc=0x035 c=0x004 ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=c801c901ca01cb010000000000000000} 00:SNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc01cd01ce01cf01d001d101d201d301} 00:SNET CMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=d401d501000000000000000000000000} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=de01df01e001e101e201e301e401e501} 00:SPOOL CMD rc=0x041 c=0x005 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x41, al=e601e701e801e901ea01000000000000} 00:STDKONF rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=eb010000000000000000000000000000} 00:STRREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ec01ed01ee01ef01f001f101f201f301} 00:STRREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01} 00:STRREL CMD rc=0x02e c=0x003 ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2e, al=fc01fd01fe0100000000000000000000} 00:SUP CON rc=0x02c c=0x003 ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=ff010002010200000000000000000000} 00:SYSDAT CON rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=02020302000000000000000000000000} 00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0402050206020702080209020a020b02} 00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0c020d020e020f021002110212021302} 00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=1402150216021702180219021a021b02} 00:SYSVEDL CMD rc=0x00a c=0x001 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0a, al=1c020000000000000000000000000000} 00:TMP750 RSP rc=0x03a c=0x004 ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=1d021e021f0220020000000000000000} 00:VOUT RSP rc=0x017 c=0x002 ProbeDirEnt {status=0x00, name=»VOUT RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=21022202000000000000000000000000} 00:XIOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23022402250226022702280229022a02} 00:XIOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b022c022d022e022f02300231023202} 00:XIOS CON rc=0x02f c=0x003 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=33023402350200000000000000000000} Block Size 2048.00 2048 extent_mask = 0x0 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order 0 normal-1 (1-2-3-4-5-6-7-8) [25, 25, 25, 25, 9, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +105/-0 24 normal-2 (1-3-5-7-2-4-6-8) [25, 25, 9, 1, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +103/-15 48 normal-3 (1-4-7-2-5-8-3-6) [25, 25, 1, 25, 9, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1] +103/-21 From the beastiarium: CpmFSCr16 +0/-0 File & label names found: 0x0008000 (2, 0, 1) ProbeDirEnt {status=0x20, name=»Udgave 3.3 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=00000000000000003a0b14503a0b1450} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x18, al=50005100000000000000000000000000} ProbeDirEnt {status=0x00, name=»ADDNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=52005300540055005600570058000000} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=59005a005b005c005d005e005f006000} ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=61006200630000000000000000000000} ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=64000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=650066006700680069006a006b006c00} ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=6d006e006f0070000000000000000000} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=71007200730074007500760077007800} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=79007a007b007c007d007e007f008000} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=81008200830084008500000000000000} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86008700880089008a008b008c008d00} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x16, al=96009700000000000000000000000000} ProbeDirEnt {status=0x00, name=»FILEX A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00} 0x0008400 (2, 0, 2) ProbeDirEnt {status=0x00, name=»FILEX A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=a000a100a20000000000000000000000} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ab00ac00ad00ae00af00b000b100b200} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=bb00bc00000000000000000000000000} ProbeDirEnt {status=0x00, name=»GENNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=bd00be00bf00c000c100c200c3000000} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c400c500c600c700c800c900ca00cb00} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=d400d500d600d7000000000000000000} ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=d800d900da00db00dc00dd0000000000} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=e6000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=ef000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f000f100f200f300f400f500f600f700} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f800f900fa00fb00fc00fd00fe00ff00} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=00010101020103010000000000000000} ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01} ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=0c010d01000000000000000000000000} ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0e010f01100111011201130114011501} ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=16011701000000000000000000000000} ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=180119011a0100000000000000000000} ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=1b011c011d011e011f01200121012201} ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01} 0x0008800 (2, 0, 3) ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=2b012c012d012e010000000000000000} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2f013001310132013301340135013601} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=37010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0b, al=40010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801} ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=49014a014b014c010000000000000000} ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d014e014f0150015101520153015401} ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=550156015701580159015a015b015c01} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5d015e015f0160016101620163016401} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=65010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=66016701680169016a016b016c016d01} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=6e016f01700171017201730174017501} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x31, al=76017701780179010000000000000000} ProbeDirEnt {status=0x00, name=»NIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=7a010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NIOS1 CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=7b010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»PIN750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=7c017d01000000000000000000000000} ProbeDirEnt {status=0x00, name=»R CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=7e010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=7f018001810100000000000000000000} ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=82018301840185018601870188018901} ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=8a010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=8b010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»REMOTE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=8c018d01000000000000000000000000} ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=8e018f01900191010000000000000000} 0x0008c00 (2, 0, 4) ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=9a019b019c019d019e019f0100000000} ProbeDirEnt {status=0x00, name=»RSDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=a0010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a101a201a301a401a501a601a701a801} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a901aa01ab01ac01ad01ae01af01b001} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=b1010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=b201b301b401b5010000000000000000} ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=b6010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=b7010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b801b901ba01bb01bc01bd01be01bf01} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c001c101c201c301c401c501c601c701} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=c801c901ca01cb010000000000000000} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc01cd01ce01cf01d001d101d201d301} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=d401d501000000000000000000000000} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=de01df01e001e101e201e301e401e501} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x41, al=e601e701e801e901ea01000000000000} ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=eb010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ec01ed01ee01ef01f001f101f201f301} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2e, al=fc01fd01fe0100000000000000000000} ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=ff010002010200000000000000000000} ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=02020302000000000000000000000000} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0402050206020702080209020a020b02} 0x0009000 (2, 0, 5) ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0c020d020e020f021002110212021302} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=1402150216021702180219021a021b02} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0a, al=1c020000000000000000000000000000} ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=1d021e021f0220020000000000000000} ProbeDirEnt {status=0x00, name=»VOUT RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=21022202000000000000000000000000} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23022402250226022702280229022a02} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b022c022d022e022f02300231023202} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=33023402350200000000000000000000} 0x0009400 (2, 0, 6) 0x0009800 (2, 0, 7) 0x0009c00 (2, 0, 8) 0x000a000 (2, 1, 1) 0x000a400 (2, 1, 2) 0x000a800 (2, 1, 3) 0x000ac00 (2, 1, 4) 0x000b000 (2, 1, 5) 0x000b400 (2, 1, 6) 0x000b800 (2, 1, 7) 0x000bc00 (2, 1, 8) + 105 - 0 <Tree 0x0-0x9a000-0x134000> + 103 - 15 <Tree 0x0-0x9a000-0x134000>