|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
topIndex: ┃ 5 A B C D G L M N P R S T V X ┃
Length: 1261568 (0x134000) Description: Bits:30002690 SW1400 Piccoline Distributions system 2.3 - disk 2/3 Types: 5¼" Floppy Disk, CpmFSAuto Notes: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232} Signature: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1 Confidence score: +92/-0 Sector size: 1024 Block size: 2048 Directory entries: 512 Block number size: 16 Extent-mask: 0x00 Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8 Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user | bc | length | name | artifact |
---|---|---|---|---|
0 | 0 | 12544 | ADDNET.CMD | ⟦5b727c266⟧ |
0 | 0 | 15744 | BDOS.CON | ⟦2b7751ba8⟧ |
0 | 0 | 123136 | CCPM.SYS | ⟦5c55c9aa1⟧ |
0 | 0 | 95104 | CCPM1.SYS | ⟦2939f7977⟧ |
0 | 0 | 104704 | CCPM4.SYS | ⟦f2cef0761⟧ |
0 | 0 | 5504 | CIO.CON | ⟦4a35b32e1⟧ |
0 | 0 | 640 | CLOCK.RSP | ⟦9b24ff61d⟧ |
0 | 0 | 24192 | CPADDNET.CMD | ⟦2230ef36d⟧ |
0 | 0 | 41344 | CPGENNET.CMD | ⟦32cb584f7⟧ |
0 | 0 | 29312 | DRNET.CMD | ⟦1b662abb8⟧ |
0 | 0 | 12800 | DSP.CMD | ⟦acf6871d9⟧ |
0 | 0 | 52608 | GENCCPM.CMD | ⟦3df3cf8a3⟧ |
0 | 0 | 12544 | GENNET.CMD | ⟦cb9d43b50⟧ |
0 | 0 | 11392 | LOCAL.CMD | ⟦df81e6a32⟧ |
0 | 0 | 16512 | LOGOFF.CMD | ⟦054f6893e⟧ |
0 | 0 | 18432 | LOGON.CMD | ⟦fc0fca4c5⟧ |
0 | 0 | 6144 | MEM.CON | ⟦f63481f50⟧ |
0 | 0 | 16000 | NAMES.CMD | ⟦003bd88d2⟧ |
0 | 0 | 22912 | NAMESMOD.CMD | ⟦ea69a1aa9⟧ |
0 | 0 | 17536 | NET.CMD | ⟦4f982e6be⟧ |
0 | 0 | 17664 | NETDRV.RSP | ⟦6de4aef19⟧ |
0 | 0 | 22784 | NETDRVB.RSP | ⟦8077c95d5⟧ |
0 | 0 | 16384 | NETOFF.CMD | ⟦8243b6545⟧ |
0 | 0 | 16384 | NETON.CMD | ⟦d72580d16⟧ |
0 | 0 | 17920 | NETSTAT.CMD | ⟦c67d05638⟧ |
0 | 0 | 38272 | NETVEDL.CMD | ⟦099ebc038⟧ |
0 | 0 | 1792 | NIOS.CMD | ⟦ff28041a4⟧ |
0 | 0 | 1792 | NIOS1.CMD | ⟦ea6840b62⟧ |
0 | 0 | 3328 | PIN.RSP | ⟦65c9cbd7d⟧ |
0 | 0 | 1152 | R.CMD | ⟦fda426646⟧ |
0 | 0 | 128 | RDEF1 | ⟦6ffaa521c⟧ TextFile |
0 | 0 | 128 | RDEF4 | ⟦49338253a⟧ TextFile |
0 | 0 | 27264 | RNET.CMD | ⟦e40a6f6dd⟧ |
0 | 0 | 128 | RSDEF1 | ⟦304ce49ff⟧ TextFile |
0 | 0 | 128 | RSDEF4 | ⟦7f3f51e99⟧ TextFile |
0 | 0 | 33408 | RSNET.CMD | ⟦f2811c403⟧ |
0 | 0 | 7552 | RTM.CON | ⟦df9f5b33e⟧ |
0 | 0 | 640 | SCROLL.RSP | ⟦a29593a77⟧ |
0 | 0 | 128 | SDEF | ⟦4eb454ef9⟧ TextFile |
0 | 0 | 19712 | SNET.CMD | ⟦0972410b4⟧ |
0 | 0 | 21120 | SPL.CMD | ⟦ffcd99468⟧ |
0 | 0 | 33664 | SPOOL.CMD | ⟦ca47cc2a7⟧ |
0 | 0 | 256 | STDKONF | ⟦5ddf5f22d⟧ TextFile |
0 | 0 | 5632 | SUP.CON | ⟦c310c51f7⟧ |
0 | 0 | 3328 | SYSDAT.CON | ⟦13f8b41e3⟧ |
0 | 0 | 7168 | TMP759.RSP | ⟦87ee6d2ba⟧ |
0 | 0 | 2944 | VOUT.RSP | ⟦f665ed891⟧ |
0 | 0 | 25728 | XIOS1.CON | ⟦6e52c1cac⟧ |
0 | 0 | 29440 | XIOS4.CON | ⟦7ac3a6b99⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]] First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x8000 26-26-26-23-2-2-2-2 (2, 1) 0xa000 2-2-2-2-2-2-2-2 Total credibility: 109 Block number width: ok16 8 296 1 255 216 False 16 0 8 519 0 False 00:ADDNET CMD rc=0x062 c=0x007 ProbeDirEnt {status=0x00, name=»ADDNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=080009000a000b000c000d000e000000} 00:BDOS CON rc=0x07b c=0x008 ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0f001000110012001300140015001600} 00:CIO CON rc=0x02b c=0x003 ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=17001800190000000000000000000000} 00:CLOCK RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=1a000000000000000000000000000000} 00:CPADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1b001c001d001e001f00200021002200} 00:CPADDNETCMD rc=0x03d c=0x004 ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=23002400250026000000000000000000} 00:CPGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2700280029002a002b002c002d002e00} 00:CPGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2f003000310032003300340035003600} 00:CPGENNETCMD rc=0x043 c=0x005 ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=3700380039003a003b00000000000000} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3c003d003e003f004000410042004300} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4400450046004700480049004a004b00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=4c004d004e004f005000510052005300} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=5400550056005700580059005a005b00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=5c005d005e005f006000610062006300} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=6400650066006700680069006a006b00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=6c006d006e006f007000710072007300} 00:CCPM SYS rc=0x042 c=0x005 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x42, al=74007500760077007800000000000000} 00:XIOS4 CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=79007a007b007c007d007e007f008000} 00:XIOS4 CON rc=0x066 c=0x007 ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x66, al=81008200830084008500860087000000} 00:CCPM1 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00} 00:CCPM1 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=90009100920093009400950096009700} 00:CCPM1 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00} 00:CCPM1 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=a000a100a200a300a400a500a600a700} 00:CCPM1 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=a800a900aa00ab00ac00ad00ae00af00} 00:CCPM1 SYS rc=0x067 c=0x007 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x67, al=b000b100b200b300b400b500b6000000} 00:CCPM4 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b700b800b900ba00bb00bc00bd00be00} 00:CCPM4 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bf00c000c100c200c300c400c500c600} 00:CCPM4 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c700c800c900ca00cb00cc00cd00ce00} 00:CCPM4 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600} 00:CCPM4 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=d700d800d900da00db00dc00dd00de00} 00:CCPM4 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=df00e000e100e200e300e400e500e600} 00:CCPM4 SYS rc=0x032 c=0x004 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x32, al=e700e800e900ea000000000000000000} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=eb00ec00ed00ee00ef00f000f100f200} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f300f400f500f600f700f800f900fa00} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=fb00fc00fd00fe00ff00000101010201} 00:GENCCPM CMD rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=03010401000000000000000000000000} 00:GENNET CMD rc=0x062 c=0x007 ProbeDirEnt {status=0x00, name=»GENNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=050106010701080109010a010b010000} 00:MEM CON rc=0x030 c=0x003 ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=0c010d010e0100000000000000000000} 00:NETDRV RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0f011001110112011301140115011601} 00:NETDRV RSP rc=0x00a c=0x001 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=17010000000000000000000000000000} 00:DRNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=180119011a011b011c011d011e011f01} 00:DRNET CMD rc=0x065 c=0x007 ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x65, al=20012101220123012401250126010000} 00:PIN RSP rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»PIN RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=27012801000000000000000000000000} 00:R CMD rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»R CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=29010000000000000000000000000000} 00:RNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2a012b012c012d012e012f0130013101} 00:RNET CMD rc=0x055 c=0x006 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=32013301340135013601370100000000} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=40014101420143014401450146014701} 00:RSNET CMD rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=48010000000000000000000000000000} 00:TMP759 RSP rc=0x038 c=0x004 ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=49014a014b014c010000000000000000} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d014e014f0150015101520153015401} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=550156015701580159015a015b015c01} 00:NETVEDL CMD rc=0x02b c=0x003 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=5d015e015f0100000000000000000000} 00:SNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60016101620163016401650166016701} 00:SNET CMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=68016901000000000000000000000000} 00:SUP CON rc=0x02c c=0x003 ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=6a016b016c0100000000000000000000} 00:SYSDAT CON rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=6d016e01000000000000000000000000} 00:VOUT RSP rc=0x017 c=0x002 ProbeDirEnt {status=0x00, name=»VOUT RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=6f017001000000000000000000000000} 00:RTM CON rc=0x03b c=0x004 ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=71017201730174010000000000000000} 00:LOGOFF CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=750176017701780179017a017b017c01} 00:LOGOFF CMD rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=7d010000000000000000000000000000} 00:NAMES CMD rc=0x07d c=0x008 ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=7e017f01800181018201830184018501} 00:NET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86018701880189018a018b018c018d01} 00:NET CMD rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=8e010000000000000000000000000000} 00:NETON CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8f019001910192019301940195019601} 00:SPL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9701980199019a019b019c019d019e01} 00:SPL CMD rc=0x025 c=0x003 ProbeDirEnt {status=0x00, name=»SPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x25, al=9f01a001a10100000000000000000000} 00:LOCAL CMD rc=0x059 c=0x006 ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a201a301a401a501a601a70100000000} 00:LOGON CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a801a901aa01ab01ac01ad01ae01af01} 00:LOGON CMD rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=b0010000000000000000000000000000} 00:NAMESMODCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b101b201b301b401b501b601b701b801} 00:NAMESMODCMD rc=0x033 c=0x004 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=b901ba01bb01bc010000000000000000} 00:NETOFF CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bd01be01bf01c001c101c201c301c401} 00:NETSTAT CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c501c601c701c801c901ca01cb01cc01} 00:NETSTAT CMD rc=0x00c c=0x001 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=cd010000000000000000000000000000} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ce01cf01d001d101d201d301d401d501} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01} 00:SPOOL CMD rc=0x007 c=0x001 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x07, al=de010000000000000000000000000000} 00:NIOS CMD rc=0x00e c=0x001 ProbeDirEnt {status=0x00, name=»NIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=df010000000000000000000000000000} 00:DSP CMD rc=0x064 c=0x007 ProbeDirEnt {status=0x00, name=»DSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x64, al=e001e101e201e301e401e501e6010000} 00:SDEF rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»SDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e7010000000000000000000000000000} 00:RDEF4 rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»RDEF4 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e8010000000000000000000000000000} 00:RDEF1 rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»RDEF1 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e9010000000000000000000000000000} 00:RSDEF4 rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»RSDEF4 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ea010000000000000000000000000000} 00:RSDEF1 rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»RSDEF1 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=eb010000000000000000000000000000} 00:STDKONF rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=ec010000000000000000000000000000} 00:SCROLL RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=ed010000000000000000000000000000} 00:NETDRVB RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ee01ef01f001f101f201f301f401f501} 00:NETDRVB RSP rc=0x032 c=0x004 ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=f601f701f801f9010000000000000000} 00:NIOS1 CMD rc=0x00e c=0x001 ProbeDirEnt {status=0x00, name=»NIOS1 CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=fa010000000000000000000000000000} 00:XIOS1 CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fb01fc01fd01fe01ff01000201020202} 00:XIOS1 CON rc=0x049 c=0x005 ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x49, al=03020402050206020702000000000000} Block Size 2048.00 2048 extent_mask = 0x0 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order 0 normal-1 (1-2-3-4-5-6-7-8) [25, 25, 25, 22, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +92/-0 24 normal-2 (1-3-5-7-2-4-6-8) [25, 25, 1, 1, 25, 22, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +92/-21 48 normal-3 (1-4-7-2-5-8-3-6) [25, 22, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1] +92/-18 From the beastiarium: CpmFSCr16 +0/-0 File & label names found: 0x0008000 (2, 0, 1) ProbeDirEnt {status=0x20, name=»PIC 2-3.2-3«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000520a1106520a1106} ProbeDirEnt {status=0x00, name=»ADDNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=080009000a000b000c000d000e000000} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0f001000110012001300140015001600} ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=17001800190000000000000000000000} ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=1a000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1b001c001d001e001f00200021002200} ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=23002400250026000000000000000000} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2700280029002a002b002c002d002e00} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2f003000310032003300340035003600} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=3700380039003a003b00000000000000} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3c003d003e003f004000410042004300} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4400450046004700480049004a004b00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=4c004d004e004f005000510052005300} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=5400550056005700580059005a005b00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=5c005d005e005f006000610062006300} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=6400650066006700680069006a006b00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=6c006d006e006f007000710072007300} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x42, al=74007500760077007800000000000000} ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=79007a007b007c007d007e007f008000} ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x66, al=81008200830084008500860087000000} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=90009100920093009400950096009700} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=a000a100a200a300a400a500a600a700} 0x0008400 (2, 0, 2) ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=a800a900aa00ab00ac00ad00ae00af00} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x67, al=b000b100b200b300b400b500b6000000} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b700b800b900ba00bb00bc00bd00be00} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bf00c000c100c200c300c400c500c600} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c700c800c900ca00cb00cc00cd00ce00} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=d700d800d900da00db00dc00dd00de00} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=df00e000e100e200e300e400e500e600} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x32, al=e700e800e900ea000000000000000000} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=eb00ec00ed00ee00ef00f000f100f200} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f300f400f500f600f700f800f900fa00} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=fb00fc00fd00fe00ff00000101010201} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=03010401000000000000000000000000} ProbeDirEnt {status=0x00, name=»GENNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=050106010701080109010a010b010000} ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=0c010d010e0100000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0f011001110112011301140115011601} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=17010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=180119011a011b011c011d011e011f01} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x65, al=20012101220123012401250126010000} ProbeDirEnt {status=0x00, name=»PIN RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=27012801000000000000000000000000} ProbeDirEnt {status=0x00, name=»R CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=29010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2a012b012c012d012e012f0130013101} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=32013301340135013601370100000000} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01} 0x0008800 (2, 0, 3) ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=40014101420143014401450146014701} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=48010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=49014a014b014c010000000000000000} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d014e014f0150015101520153015401} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=550156015701580159015a015b015c01} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=5d015e015f0100000000000000000000} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60016101620163016401650166016701} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=68016901000000000000000000000000} ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=6a016b016c0100000000000000000000} ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=6d016e01000000000000000000000000} ProbeDirEnt {status=0x00, name=»VOUT RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=6f017001000000000000000000000000} ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=71017201730174010000000000000000} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=750176017701780179017a017b017c01} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=7d010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=7e017f01800181018201830184018501} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86018701880189018a018b018c018d01} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=8e010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8f019001910192019301940195019601} ProbeDirEnt {status=0x00, name=»SPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9701980199019a019b019c019d019e01} ProbeDirEnt {status=0x00, name=»SPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x25, al=9f01a001a10100000000000000000000} ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a201a301a401a501a601a70100000000} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a801a901aa01ab01ac01ad01ae01af01} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=b0010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b101b201b301b401b501b601b701b801} 0x0008c00 (2, 0, 4) ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=b901ba01bb01bc010000000000000000} ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bd01be01bf01c001c101c201c301c401} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c501c601c701c801c901ca01cb01cc01} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=cd010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ce01cf01d001d101d201d301d401d501} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x07, al=de010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=df010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»DSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x64, al=e001e101e201e301e401e501e6010000} ProbeDirEnt {status=0x00, name=»SDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e7010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RDEF4 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e8010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RDEF1 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e9010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RSDEF4 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ea010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RSDEF1 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=eb010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=ec010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=ed010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ee01ef01f001f101f201f301f401f501} ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=f601f701f801f9010000000000000000} ProbeDirEnt {status=0x00, name=»NIOS1 CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=fa010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fb01fc01fd01fe01ff01000201020202} ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x49, al=03020402050206020702000000000000} 0x0009000 (2, 0, 5) 0x0009400 (2, 0, 6) 0x0009800 (2, 0, 7) 0x0009c00 (2, 0, 8) 0x000a000 (2, 1, 1) 0x000a400 (2, 1, 2) 0x000a800 (2, 1, 3) 0x000ac00 (2, 1, 4) 0x000b000 (2, 1, 5) 0x000b400 (2, 1, 6) 0x000b800 (2, 1, 7) 0x000bc00 (2, 1, 8) + 92 - 0 <Tree 0x0-0x9a000-0x134000> + 92 - 18 <Tree 0x0-0x9a000-0x134000>