|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 A B C D F G L M N P R S T V X
Length: 1261568 (0x134000) Description: Bits:30002783 SW1500 CCP/M 86 v. 3.1 Release 3.3.1 Disk 2/2 Types: 5¼" Floppy Disk, CpmFSAuto Notes: CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232} Signature: CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1 Confidence score: +105/-0 Sector size: 1024 Block size: 2048 Directory entries: 512 Block number size: 16 Extent-mask: 0x00 Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8 Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user | bc | length | name | artifact |
---|---|---|---|---|
0 | 0 | 12544 | ADDNET.CMD | ⟦5b727c266⟧ |
0 | 0 | 15744 | BDOS.CON | ⟦af2ba40d6⟧ |
0 | 0 | 150528 | CCPM.SYS | ⟦1ba40700f⟧ |
0 | 0 | 5504 | CIO.CON | ⟦883d43f06⟧ |
0 | 0 | 640 | CLOCK.RSP | ⟦47fd682bf⟧ |
0 | 0 | 24192 | CPADDNET.CMD | ⟦ae28f2c25⟧ |
0 | 0 | 41344 | CPGENNET.CMD | ⟦32cb584f7⟧ |
0 | 0 | 35584 | DRNET.CMD | ⟦361c71fe3⟧ |
0 | 0 | 21760 | FILEX.A86 | ⟦651a0c044⟧ TextFile |
0 | 0 | 52608 | GENCCPM.CMD | ⟦2038840cd⟧ |
0 | 0 | 12544 | GENNET.CMD | ⟦cb9d43b50⟧ |
0 | 0 | 39296 | LANREL.CMD | ⟦9a4aab1fb⟧ |
0 | 0 | 11392 | LOCAL.CMD | ⟦df81e6a32⟧ |
0 | 0 | 16512 | LOGOFF.CMD | ⟦054f6893e⟧ |
0 | 0 | 18432 | LOGON.CMD | ⟦9207d8571⟧ |
0 | 0 | 39552 | MATREL.CMD | ⟦4d9842fc5⟧ |
0 | 0 | 18560 | MATRELHW.CMD | ⟦d994f55f8⟧ |
0 | 0 | 19712 | MATRELSW.CMD | ⟦21b904476⟧ |
0 | 0 | 6144 | MEM.CON | ⟦80dd81b0a⟧ |
0 | 0 | 16000 | NAMES.CMD | ⟦003bd88d2⟧ |
0 | 0 | 22912 | NAMESMOD.CMD | ⟦ea69a1aa9⟧ |
0 | 0 | 17536 | NET.CMD | ⟦4f982e6be⟧ |
0 | 0 | 17792 | NETDRV.RSP | ⟦001d6c69e⟧ |
0 | 0 | 22784 | NETDRVB.RSP | ⟦4edf37220⟧ |
0 | 0 | 16384 | NETOFF.CMD | ⟦8243b6545⟧ |
0 | 0 | 16384 | NETON.CMD | ⟦08186668e⟧ |
0 | 0 | 17920 | NETSTAT.CMD | ⟦c67d05638⟧ |
0 | 0 | 39040 | NETVEDL.CMD | ⟦7c1501dd6⟧ |
0 | 0 | 1920 | NIOS.CMD | ⟦fbe87a8c1⟧ |
0 | 0 | 1792 | NIOS1.CMD | ⟦3222839e1⟧ |
0 | 0 | 3328 | PIN750.RSP | ⟦0538d9e1a⟧ |
0 | 0 | 1152 | R.CMD | ⟦f9f30d548⟧ |
0 | 0 | 5504 | RCDSP.CMD | ⟦8e9ea82e0⟧ |
0 | 0 | 17664 | RCSPL.CMD | ⟦b4f93f8aa⟧ |
0 | 0 | 128 | RDEF | ⟦1a934559b⟧ TextFile |
0 | 0 | 3200 | REMOTE.CMD | ⟦563d79204⟧ |
0 | 0 | 7808 | REMTMP.RSP | ⟦1551aa60b⟧ |
0 | 0 | 27264 | RNET.CMD | ⟦6f9f2ac08⟧ |
0 | 0 | 128 | RSDEF | ⟦0adbbdd18⟧ TextFile |
0 | 0 | 33408 | RSNET.CMD | ⟦b24e9e11e⟧ |
0 | 0 | 7552 | RTM.CON | ⟦4f2ef1bdf⟧ |
0 | 0 | 640 | SCROLL.RSP | ⟦27844af8c⟧ |
0 | 0 | 128 | SDEF | ⟦4eb454ef9⟧ TextFile |
0 | 0 | 39552 | SIOREL.CMD | ⟦4903257be⟧ |
0 | 0 | 19712 | SNET.CMD | ⟦346bcfed6⟧ |
0 | 0 | 41088 | SPOOL.CMD | ⟦32ea98b84⟧ |
0 | 0 | 256 | STDKONF | ⟦f16162d9a⟧ TextFile |
0 | 0 | 38656 | STRREL.CMD | ⟦e5d3ee6d9⟧ |
0 | 0 | 5632 | SUP.CON | ⟦cd7f3de1f⟧ |
0 | 0 | 3328 | SYSDAT.CON | ⟦13f8b41e3⟧ |
0 | 0 | 50432 | SYSVEDL.CMD | ⟦2179a909e⟧ |
0 | 0 | 7424 | TMP750.RSP | ⟦fc71bfbb8⟧ |
0 | 0 | 2944 | VOUT.RSP | ⟦f665ed891⟧ |
0 | 0 | 38784 | XIOS.CON | ⟦38c6cc7e5⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]] First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x8000 26-26-26-26-10-2-2-2 (2, 1) 0xa000 2-2-2-2-2-2-2-2 Total credibility: 120 Block number width: ok16 8 392 1 255 211 False 16 0 8 565 0 False Block Sizes: 2048 0x00 +103 -0 4096 0x01 +9 -94 8192 0x03 +9 -94 16384 0x07 +9 -94 32768 0x0f +9 -94 65536 0x1f +9 -94 1024 0x00 +8 -95 256 0x00 +5 -98 512 0x00 +5 -98 128 0x00 +4 -99 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order 0 normal-1 (1-2-3-4-5-6-7-8) [25, 25, 25, 25, 9, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +105/-0 24 normal-2 (1-3-5-7-2-4-6-8) [25, 25, 9, 1, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +103/-15 48 normal-3 (1-4-7-2-5-8-3-6) [25, 25, 1, 25, 9, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1] +103/-21 From the beastiarium: CpmFSCr16 +0/-0 File & label names found: 0x0008000 (2, 0, 1) ProbeDirEnt {status=0x20, name=»Udgave 3.3 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=00000000000000003a0b14503a0b1450} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x18, al=50005100000000000000000000000000} ProbeDirEnt {status=0x00, name=»ADDNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=52005300540055005600570058000000} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=59005a005b005c005d005e005f006000} ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=61006200630000000000000000000000} ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=64000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=650066006700680069006a006b006c00} ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=6d006e006f0070000000000000000000} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=71007200730074007500760077007800} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=79007a007b007c007d007e007f008000} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=81008200830084008500000000000000} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86008700880089008a008b008c008d00} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x16, al=96009700000000000000000000000000} ProbeDirEnt {status=0x00, name=»FILEX A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00} 0x0008400 (2, 0, 2) ProbeDirEnt {status=0x00, name=»FILEX A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=a000a100a20000000000000000000000} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ab00ac00ad00ae00af00b000b100b200} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=bb00bc00000000000000000000000000} ProbeDirEnt {status=0x00, name=»GENNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=bd00be00bf00c000c100c200c3000000} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c400c500c600c700c800c900ca00cb00} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=d400d500d600d7000000000000000000} ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=d800d900da00db00dc00dd0000000000} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=e6000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=ef000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f000f100f200f300f400f500f600f700} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f800f900fa00fb00fc00fd00fe00ff00} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=00010101020103010000000000000000} ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01} ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=0c010d01000000000000000000000000} ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0e010f01100111011201130114011501} ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=16011701000000000000000000000000} ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=180119011a0100000000000000000000} ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=1b011c011d011e011f01200121012201} ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01} 0x0008800 (2, 0, 3) ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=2b012c012d012e010000000000000000} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2f013001310132013301340135013601} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=37010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0b, al=40010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801} ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=49014a014b014c010000000000000000} ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d014e014f0150015101520153015401} ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=550156015701580159015a015b015c01} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5d015e015f0160016101620163016401} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=65010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=66016701680169016a016b016c016d01} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=6e016f01700171017201730174017501} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x31, al=76017701780179010000000000000000} ProbeDirEnt {status=0x00, name=»NIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=7a010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NIOS1 CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=7b010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»PIN750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=7c017d01000000000000000000000000} ProbeDirEnt {status=0x00, name=»R CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=7e010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=7f018001810100000000000000000000} ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=82018301840185018601870188018901} ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=8a010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=8b010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»REMOTE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=8c018d01000000000000000000000000} ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=8e018f01900191010000000000000000} 0x0008c00 (2, 0, 4) ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=9a019b019c019d019e019f0100000000} ProbeDirEnt {status=0x00, name=»RSDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=a0010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a101a201a301a401a501a601a701a801} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a901aa01ab01ac01ad01ae01af01b001} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=b1010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=b201b301b401b5010000000000000000} ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=b6010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=b7010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b801b901ba01bb01bc01bd01be01bf01} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c001c101c201c301c401c501c601c701} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=c801c901ca01cb010000000000000000} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc01cd01ce01cf01d001d101d201d301} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=d401d501000000000000000000000000} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=de01df01e001e101e201e301e401e501} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x41, al=e601e701e801e901ea01000000000000} ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=eb010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ec01ed01ee01ef01f001f101f201f301} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2e, al=fc01fd01fe0100000000000000000000} ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=ff010002010200000000000000000000} ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=02020302000000000000000000000000} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0402050206020702080209020a020b02} 0x0009000 (2, 0, 5) ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0c020d020e020f021002110212021302} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=1402150216021702180219021a021b02} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0a, al=1c020000000000000000000000000000} ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=1d021e021f0220020000000000000000} ProbeDirEnt {status=0x00, name=»VOUT RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=21022202000000000000000000000000} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23022402250226022702280229022a02} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b022c022d022e022f02300231023202} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=33023402350200000000000000000000} 0x0009400 (2, 0, 6) 0x0009800 (2, 0, 7) 0x0009c00 (2, 0, 8) 0x000a000 (2, 1, 1) 0x000a400 (2, 1, 2) 0x000a800 (2, 1, 3) 0x000ac00 (2, 1, 4) 0x000b000 (2, 1, 5) 0x000b400 (2, 1, 6) 0x000b800 (2, 1, 7) 0x000bc00 (2, 1, 8) + 105 - 0 <Tree 0x0-0x9a000-0x134000> + 103 - 15 <Tree 0x0-0x9a000-0x134000>