DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 A B C D F G L M N P R S T V X

⟦bacb18865⟧ Bits:30002783 SW1500 CCP/M 86 v. 3.1 Release 3.3.1 Disk 2/2, 5¼" Floppy Disk, CpmFSAuto

    Length: 1261568 (0x134000)
    Description: Bits:30002783 SW1500 CCP/M 86 v. 3.1 Release 3.3.1 Disk 2/2
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1
Confidence score:  +105/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 12544 ADDNET.CMD ⟦5b727c266⟧
0 0 15744 BDOS.CON ⟦af2ba40d6⟧
0 0 150528 CCPM.SYS ⟦1ba40700f⟧
0 0 5504 CIO.CON ⟦883d43f06⟧
0 0 640 CLOCK.RSP ⟦47fd682bf⟧
0 0 24192 CPADDNET.CMD ⟦ae28f2c25⟧
0 0 41344 CPGENNET.CMD ⟦32cb584f7⟧
0 0 35584 DRNET.CMD ⟦361c71fe3⟧
0 0 21760 FILEX.A86 ⟦651a0c044⟧ TextFile
0 0 52608 GENCCPM.CMD ⟦2038840cd⟧
0 0 12544 GENNET.CMD ⟦cb9d43b50⟧
0 0 39296 LANREL.CMD ⟦9a4aab1fb⟧
0 0 11392 LOCAL.CMD ⟦df81e6a32⟧
0 0 16512 LOGOFF.CMD ⟦054f6893e⟧
0 0 18432 LOGON.CMD ⟦9207d8571⟧
0 0 39552 MATREL.CMD ⟦4d9842fc5⟧
0 0 18560 MATRELHW.CMD ⟦d994f55f8⟧
0 0 19712 MATRELSW.CMD ⟦21b904476⟧
0 0 6144 MEM.CON ⟦80dd81b0a⟧
0 0 16000 NAMES.CMD ⟦003bd88d2⟧
0 0 22912 NAMESMOD.CMD ⟦ea69a1aa9⟧
0 0 17536 NET.CMD ⟦4f982e6be⟧
0 0 17792 NETDRV.RSP ⟦001d6c69e⟧
0 0 22784 NETDRVB.RSP ⟦4edf37220⟧
0 0 16384 NETOFF.CMD ⟦8243b6545⟧
0 0 16384 NETON.CMD ⟦08186668e⟧
0 0 17920 NETSTAT.CMD ⟦c67d05638⟧
0 0 39040 NETVEDL.CMD ⟦7c1501dd6⟧
0 0 1920 NIOS.CMD ⟦fbe87a8c1⟧
0 0 1792 NIOS1.CMD ⟦3222839e1⟧
0 0 3328 PIN750.RSP ⟦0538d9e1a⟧
0 0 1152 R.CMD ⟦f9f30d548⟧
0 0 5504 RCDSP.CMD ⟦8e9ea82e0⟧
0 0 17664 RCSPL.CMD ⟦b4f93f8aa⟧
0 0 128 RDEF ⟦1a934559b⟧ TextFile
0 0 3200 REMOTE.CMD ⟦563d79204⟧
0 0 7808 REMTMP.RSP ⟦1551aa60b⟧
0 0 27264 RNET.CMD ⟦6f9f2ac08⟧
0 0 128 RSDEF ⟦0adbbdd18⟧ TextFile
0 0 33408 RSNET.CMD ⟦b24e9e11e⟧
0 0 7552 RTM.CON ⟦4f2ef1bdf⟧
0 0 640 SCROLL.RSP ⟦27844af8c⟧
0 0 128 SDEF ⟦4eb454ef9⟧ TextFile
0 0 39552 SIOREL.CMD ⟦4903257be⟧
0 0 19712 SNET.CMD ⟦346bcfed6⟧
0 0 41088 SPOOL.CMD ⟦32ea98b84⟧
0 0 256 STDKONF ⟦f16162d9a⟧ TextFile
0 0 38656 STRREL.CMD ⟦e5d3ee6d9⟧
0 0 5632 SUP.CON ⟦cd7f3de1f⟧
0 0 3328 SYSDAT.CON ⟦13f8b41e3⟧
0 0 50432 SYSVEDL.CMD ⟦2179a909e⟧
0 0 7424 TMP750.RSP ⟦fc71bfbb8⟧
0 0 2944 VOUT.RSP ⟦f665ed891⟧
0 0 38784 XIOS.CON ⟦38c6cc7e5⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 26-26-26-26-10-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 120

Block number width: ok16

   8   392     1   255   211  False
  16     0     8   565     0  False

00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
00:CCPM    SYS rc=0x018 c=0x002 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x18, al=50005100000000000000000000000000}
00:ADDNET  CMD rc=0x062 c=0x007 ProbeDirEnt {status=0x00, name=»ADDNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=52005300540055005600570058000000}
00:BDOS    CON rc=0x07b c=0x008 ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=59005a005b005c005d005e005f006000}
00:CIO     CON rc=0x02b c=0x003 ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=61006200630000000000000000000000}
00:CLOCK   RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=64000000000000000000000000000000}
00:CPADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=650066006700680069006a006b006c00}
00:CPADDNETCMD rc=0x03d c=0x004 ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=6d006e006f0070000000000000000000}
00:CPGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=71007200730074007500760077007800}
00:CPGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=79007a007b007c007d007e007f008000}
00:CPGENNETCMD rc=0x043 c=0x005 ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=81008200830084008500000000000000}
00:DRNET   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86008700880089008a008b008c008d00}
00:DRNET   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500}
00:DRNET   CMD rc=0x016 c=0x002 ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x16, al=96009700000000000000000000000000}
00:FILEX   A86 rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00}
00:FILEX   A86 rc=0x02a c=0x003 ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=a000a100a20000000000000000000000}
00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00}
00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ab00ac00ad00ae00af00b000b100b200}
00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00}
00:GENCCPM CMD rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=bb00bc00000000000000000000000000}
00:GENNET  CMD rc=0x062 c=0x007 ProbeDirEnt {status=0x00, name=»GENNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=bd00be00bf00c000c100c200c3000000}
00:LANREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c400c500c600c700c800c900ca00cb00}
00:LANREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300}
00:LANREL  CMD rc=0x033 c=0x004 ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=d400d500d600d7000000000000000000}
00:LOCAL   CMD rc=0x059 c=0x006 ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=d800d900da00db00dc00dd0000000000}
00:LOGOFF  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500}
00:LOGOFF  CMD rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=e6000000000000000000000000000000}
00:LOGON   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00}
00:LOGON   CMD rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=ef000000000000000000000000000000}
00:MATREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f000f100f200f300f400f500f600f700}
00:MATREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f800f900fa00fb00fc00fd00fe00ff00}
00:MATREL  CMD rc=0x035 c=0x004 ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=00010101020103010000000000000000}
00:MATRELHWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
00:MATRELHWCMD rc=0x011 c=0x002 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=0c010d01000000000000000000000000}
00:MATRELSWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0e010f01100111011201130114011501}
00:MATRELSWCMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=16011701000000000000000000000000}
00:MEM     CON rc=0x030 c=0x003 ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=180119011a0100000000000000000000}
00:NAMES   CMD rc=0x07d c=0x008 ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=1b011c011d011e011f01200121012201}
00:NAMESMODCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01}
00:NAMESMODCMD rc=0x033 c=0x004 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=2b012c012d012e010000000000000000}
00:NET     CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2f013001310132013301340135013601}
00:NET     CMD rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=37010000000000000000000000000000}
00:NETDRV  RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01}
00:NETDRV  RSP rc=0x00b c=0x001 ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0b, al=40010000000000000000000000000000}
00:NETDRVB RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801}
00:NETDRVB RSP rc=0x032 c=0x004 ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=49014a014b014c010000000000000000}
00:NETOFF  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d014e014f0150015101520153015401}
00:NETON   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=550156015701580159015a015b015c01}
00:NETSTAT CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5d015e015f0160016101620163016401}
00:NETSTAT CMD rc=0x00c c=0x001 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=65010000000000000000000000000000}
00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=66016701680169016a016b016c016d01}
00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=6e016f01700171017201730174017501}
00:NETVEDL CMD rc=0x031 c=0x004 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x31, al=76017701780179010000000000000000}
00:NIOS    CMD rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»NIOS    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=7a010000000000000000000000000000}
00:NIOS1   CMD rc=0x00e c=0x001 ProbeDirEnt {status=0x00, name=»NIOS1   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=7b010000000000000000000000000000}
00:PIN750  RSP rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»PIN750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=7c017d01000000000000000000000000}
00:R       CMD rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»R       CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=7e010000000000000000000000000000}
00:RCDSP   CMD rc=0x02b c=0x003 ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=7f018001810100000000000000000000}
00:RCSPL   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=82018301840185018601870188018901}
00:RCSPL   CMD rc=0x00a c=0x001 ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=8a010000000000000000000000000000}
00:RDEF        rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»RDEF       «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=8b010000000000000000000000000000}
00:REMOTE  CMD rc=0x019 c=0x002 ProbeDirEnt {status=0x00, name=»REMOTE  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=8c018d01000000000000000000000000}
00:REMTMP  RSP rc=0x03d c=0x004 ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=8e018f01900191010000000000000000}
00:RNET    CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901}
00:RNET    CMD rc=0x055 c=0x006 ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=9a019b019c019d019e019f0100000000}
00:RSDEF       rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»RSDEF      «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=a0010000000000000000000000000000}
00:RSNET   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a101a201a301a401a501a601a701a801}
00:RSNET   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a901aa01ab01ac01ad01ae01af01b001}
00:RSNET   CMD rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=b1010000000000000000000000000000}
00:RTM     CON rc=0x03b c=0x004 ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=b201b301b401b5010000000000000000}
00:SCROLL  RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=b6010000000000000000000000000000}
00:SDEF        rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»SDEF       «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=b7010000000000000000000000000000}
00:SIOREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b801b901ba01bb01bc01bd01be01bf01}
00:SIOREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c001c101c201c301c401c501c601c701}
00:SIOREL  CMD rc=0x035 c=0x004 ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=c801c901ca01cb010000000000000000}
00:SNET    CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc01cd01ce01cf01d001d101d201d301}
00:SNET    CMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=d401d501000000000000000000000000}
00:SPOOL   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01}
00:SPOOL   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=de01df01e001e101e201e301e401e501}
00:SPOOL   CMD rc=0x041 c=0x005 ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x41, al=e601e701e801e901ea01000000000000}
00:STDKONF     rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=eb010000000000000000000000000000}
00:STRREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ec01ed01ee01ef01f001f101f201f301}
00:STRREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01}
00:STRREL  CMD rc=0x02e c=0x003 ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2e, al=fc01fd01fe0100000000000000000000}
00:SUP     CON rc=0x02c c=0x003 ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=ff010002010200000000000000000000}
00:SYSDAT  CON rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=02020302000000000000000000000000}
00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0402050206020702080209020a020b02}
00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0c020d020e020f021002110212021302}
00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=1402150216021702180219021a021b02}
00:SYSVEDL CMD rc=0x00a c=0x001 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0a, al=1c020000000000000000000000000000}
00:TMP750  RSP rc=0x03a c=0x004 ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=1d021e021f0220020000000000000000}
00:VOUT    RSP rc=0x017 c=0x002 ProbeDirEnt {status=0x00, name=»VOUT    RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=21022202000000000000000000000000}
00:XIOS    CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23022402250226022702280229022a02}
00:XIOS    CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b022c022d022e022f02300231023202}
00:XIOS    CON rc=0x02f c=0x003 ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=33023402350200000000000000000000}
Block Size 2048.00 2048 extent_mask = 0x0

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [25, 25, 25, 25, 9, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +105/-0
     24  normal-2     (1-3-5-7-2-4-6-8)                                                         [25, 25, 9, 1, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +103/-15
     48  normal-3     (1-4-7-2-5-8-3-6)                                                         [25, 25, 1, 25, 9, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +103/-21
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»Udgave 3.3 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=00000000000000003a0b14503a0b1450}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x18, al=50005100000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ADDNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=52005300540055005600570058000000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=59005a005b005c005d005e005f006000}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=61006200630000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=64000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=650066006700680069006a006b006c00}
    ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=6d006e006f0070000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=71007200730074007500760077007800}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=79007a007b007c007d007e007f008000}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=81008200830084008500000000000000}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86008700880089008a008b008c008d00}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x16, al=96009700000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=a000a100a20000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ab00ac00ad00ae00af00b000b100b200}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=bb00bc00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=bd00be00bf00c000c100c200c3000000}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c400c500c600c700c800c900ca00cb00}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=d400d500d600d7000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=d800d900da00db00dc00dd0000000000}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=e6000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=ef000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f000f100f200f300f400f500f600f700}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f800f900fa00fb00fc00fd00fe00ff00}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=00010101020103010000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=0c010d01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0e010f01100111011201130114011501}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=16011701000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=180119011a0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=1b011c011d011e011f01200121012201}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=2b012c012d012e010000000000000000}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2f013001310132013301340135013601}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=37010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0b, al=40010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801}
    ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=49014a014b014c010000000000000000}
    ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d014e014f0150015101520153015401}
    ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=550156015701580159015a015b015c01}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5d015e015f0160016101620163016401}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=65010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=66016701680169016a016b016c016d01}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=6e016f01700171017201730174017501}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x31, al=76017701780179010000000000000000}
    ProbeDirEnt {status=0x00, name=»NIOS    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=7a010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NIOS1   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=7b010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIN750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=7c017d01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»R       CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=7e010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=7f018001810100000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=82018301840185018601870188018901}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=8a010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RDEF       «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=8b010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REMOTE  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=8c018d01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=8e018f01900191010000000000000000}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=9a019b019c019d019e019f0100000000}
    ProbeDirEnt {status=0x00, name=»RSDEF      «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=a0010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a101a201a301a401a501a601a701a801}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a901aa01ab01ac01ad01ae01af01b001}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=b1010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=b201b301b401b5010000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=b6010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SDEF       «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=b7010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b801b901ba01bb01bc01bd01be01bf01}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c001c101c201c301c401c501c601c701}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=c801c901ca01cb010000000000000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc01cd01ce01cf01d001d101d201d301}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=d401d501000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=de01df01e001e101e201e301e401e501}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x41, al=e601e701e801e901ea01000000000000}
    ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=eb010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ec01ed01ee01ef01f001f101f201f301}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2e, al=fc01fd01fe0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=ff010002010200000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=02020302000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0402050206020702080209020a020b02}
  0x0009000 (2, 0, 5)
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0c020d020e020f021002110212021302}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=1402150216021702180219021a021b02}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0a, al=1c020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=1d021e021f0220020000000000000000}
    ProbeDirEnt {status=0x00, name=»VOUT    RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=21022202000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23022402250226022702280229022a02}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b022c022d022e022f02300231023202}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=33023402350200000000000000000000}
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+ 105 -   0 <Tree 0x0-0x9a000-0x134000>
+ 103 -  15 <Tree 0x0-0x9a000-0x134000>

Full view