DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top
Index: ┃ 5 B C F G L M N P R S T X

⟦f4f24e427⟧ Bits:30002697 SW1458 Concurrent DOS Distributionsdiskette 4.0 - disk 2/3, 5¼" Floppy Disk, CpmFSAuto

    Length: 1261568 (0x134000)
    Description: Bits:30002697 SW1458 Concurrent DOS Distributionsdiskette 4.0 - disk 2/3
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1
Confidence score:  +93/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 23424 BDOS.CON ⟦502ba11a7⟧
0 0 41984 BESKED.CMD ⟦3963f17aa⟧
0 0 209664 CCPM.SYS ⟦be390f6a5⟧
0 0 6016 CIO.CON ⟦cc126d9ca⟧
0 0 640 CLOCK.RSP ⟦47fd682bf⟧
0 0 21632 FILEX.A86 ⟦c864451fd⟧ TextFile
0 0 2688 FILEX.CMD ⟦ceed655ff⟧
0 0 49536 GENCCPM.CMD ⟦222ee6c26⟧
0 0 256 GENINST.SUB ⟦4ec9be81f⟧ TextFile
0 0 39296 LANREL.CMD ⟦bd5157903⟧
0 0 39680 MATREL.CMD ⟦e70e8d2d3⟧
0 0 18560 MATRELHW.CMD ⟦d994f55f8⟧
0 0 19712 MATRELSW.CMD ⟦21b904476⟧
0 0 6144 MEM.CON ⟦ee4fd466d⟧
0 0 1792 MINTERN.CMD ⟦6f10a2e4e⟧
0 0 9088 MODEM.CMD ⟦7f98d6ad4⟧
0 0 1408 MODEM.KAT ⟦d4b0a6556⟧
0 0 23680 NETDRV.RSP ⟦fada983a3⟧
0 0 256 NETKONF ⟦48677865a⟧ TextFile
0 0 51968 NETVEDL.CMD ⟦0cad93b6e⟧
0 0 3200 PIN759.RSP ⟦65a6ea281⟧
0 0 17280 PINTERN.CMD ⟦3100e53f9⟧
0 0 9344 PIP.CMD ⟦307e4cf3c⟧
0 0 37888 POSTHUS.CMD ⟦9e65eb2a4⟧
0 0 32768 RCADDNET.CMD ⟦e45eff9f8⟧
0 0 5120 RCDSP.CMD ⟦b95b71ff5⟧
0 0 46848 RCGENNET.CMD ⟦1abce0bc8⟧
0 0 1920 RCNIOS.CMD ⟦1a810ffb0⟧
0 0 16384 RCSPL.CMD ⟦60f369d2a⟧
0 0 31744 RNET.CMD ⟦7222caa28⟧
0 0 38528 RSNET.CMD ⟦f3a2f1b76⟧
0 0 7680 RTM.CON ⟦24a9f75b8⟧
0 0 640 SCROLL.RSP ⟦f3378549e⟧
0 0 38528 SIOREL.CMD ⟦bcf4754e5⟧
0 0 20736 SNET.CMD ⟦b68a23120⟧
0 0 42240 SPOOL.CMD ⟦159e8616b⟧
0 0 256 STDKONF ⟦622ecd79f⟧ TextFile
0 0 3584 SUBMIT.CMD ⟦3ece11c64⟧
0 0 8960 SUP.CON ⟦83023b077⟧
0 0 3456 SYSDAT.CON ⟦9090bd8b1⟧
0 0 49024 SYSVEDL.CMD ⟦c17db3bac⟧
0 0 33152 TMP759.RSP ⟦34d6db8e1⟧
0 0 41088 XIOS.CON ⟦4156075d0⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 26-26-26-23-2-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 109

Block number width: ok16

   8   363     1   255   207  False
  16     0     8   544     0  False

00:BDOS    CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
00:BDOS    CON rc=0x037 c=0x004 ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x37, al=10001100120013000000000000000000}
00:CIO     CON rc=0x02f c=0x003 ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2f, al=14001500160000000000000000000000}
00:MEM     CON rc=0x030 c=0x003 ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=17001800190000000000000000000000}
00:RTM     CON rc=0x03c c=0x004 ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=1a001b001c001d000000000000000000}
00:SUP     CON rc=0x046 c=0x005 ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=1e001f00200021002200000000000000}
00:SYSDAT  CON rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=23002400000000000000000000000000}
00:XIOS    CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=250026002700280029002a002b002c00}
00:XIOS    CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2d002e002f0030003100320033003400}
00:XIOS    CON rc=0x041 c=0x005 ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x41, al=35003600370038003900000000000000}
00:CLOCK   RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=3a000000000000000000000000000000}
00:NETDRV  RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3b003c003d003e003f00400041004200}
00:NETDRV  RSP rc=0x039 c=0x004 ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x39, al=43004400450046000000000000000000}
00:PIN759  RSP rc=0x019 c=0x002 ProbeDirEnt {status=0x00, name=»PIN759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=47004800000000000000000000000000}
00:TMP759  RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=49004a004b004c004d004e004f005000}
00:TMP759  RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=51005200530054005500560057005800}
00:TMP759  RSP rc=0x003 c=0x001 ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x03, al=59000000000000000000000000000000}
00:SCROLL  RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=5a000000000000000000000000000000}
00:POSTHUS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b005c005d005e005f00600061006200}
00:POSTHUS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63006400650066006700680069006a00}
00:POSTHUS CMD rc=0x028 c=0x003 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=6b006c006d0000000000000000000000}
00:BESKED  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6e006f00700071007200730074007500}
00:BESKED  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=76007700780079007a007b007c007d00}
00:BESKED  CMD rc=0x048 c=0x005 ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=7e007f00800081008200000000000000}
00:MINTERN CMD rc=0x00e c=0x001 ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=83000000000000000000000000000000}
00:PINTERN CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8400850086008700880089008a008b00}
00:PINTERN CMD rc=0x007 c=0x001 ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=8c000000000000000000000000000000}
00:SPOOL   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8d008e008f0090009100920093009400}
00:SPOOL   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=950096009700980099009a009b009c00}
00:SPOOL   CMD rc=0x04a c=0x005 ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=9d009e009f00a000a100000000000000}
00:RCDSP   CMD rc=0x028 c=0x003 ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=a200a300a40000000000000000000000}
00:RCSPL   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a500a600a700a800a900aa00ab00ac00}
00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ad00ae00af00b000b100b200b300b400}
00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b500b600b700b800b900ba00bb00bc00}
00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=bd00be00bf00c000c100c200c300c400}
00:NETVEDL CMD rc=0x016 c=0x002 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x16, al=c500c600000000000000000000000000}
00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c700c800c900ca00cb00cc00cd00ce00}
00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600}
00:RCGENNETCMD rc=0x06e c=0x007 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6e, al=d700d800d900da00db00dc00dd000000}
00:RCADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500}
00:RCADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e600e700e800e900ea00eb00ec00ed00}
00:SIOREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ee00ef00f000f100f200f300f400f500}
00:SIOREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f600f700f800f900fa00fb00fc00fd00}
00:SIOREL  CMD rc=0x02d c=0x003 ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=fe00ff00000100000000000000000000}
00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01010201030104010501060107010801}
00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=09010a010b010c010d010e010f011001}
00:SYSVEDL CMD rc=0x07f c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x7f, al=11011201130114011501160117011801}
00:MATREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=19011a011b011c011d011e011f012001}
00:MATREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=21012201230124012501260127012801}
00:MATREL  CMD rc=0x036 c=0x004 ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=29012a012b012c010000000000000000}
00:LANREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2d012e012f0130013101320133013401}
00:LANREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=350136013701380139013a013b013c01}
00:LANREL  CMD rc=0x033 c=0x004 ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=3d013e013f0140010000000000000000}
00:MATRELHWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801}
00:MATRELHWCMD rc=0x011 c=0x002 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=49014a01000000000000000000000000}
00:MATRELSWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4b014c014d014e014f01500151015201}
00:MATRELSWCMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=53015401000000000000000000000000}
00:MODEM   CMD rc=0x047 c=0x005 ProbeDirEnt {status=0x00, name=»MODEM   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x47, al=55015601570158015901000000000000}
00:MODEM   KAT rc=0x00b c=0x001 ProbeDirEnt {status=0x00, name=»MODEM   KAT«, xl=0x00, bc=0x00, xh=0x00, rc=0x0b, al=5a010000000000000000000000000000}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b015c015d015e015f01600161016201}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63016401650166016701680169016a01}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=6b016c016d016e016f01700171017201}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=73017401750176017701780179017a01}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=7b017c017d017e017f01800181018201}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=83018401850186018701880189018a01}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=8b018c018d018e018f01900191019201}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=93019401950196019701980199019a01}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=9b019c019d019e019f01a001a101a201}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=a301a401a501a601a701a801a901aa01}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=ab01ac01ad01ae01af01b001b101b201}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=b301b401b501b601b701b801b901ba01}
00:CCPM    SYS rc=0x066 c=0x007 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x66, al=bb01bc01bd01be01bf01c001c1010000}
00:FILEX   A86 rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c201c301c401c501c601c701c801c901}
00:FILEX   A86 rc=0x029 c=0x003 ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x29, al=ca01cb01cc0100000000000000000000}
00:FILEX   CMD rc=0x015 c=0x002 ProbeDirEnt {status=0x00, name=»FILEX   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x15, al=cd01ce01000000000000000000000000}
00:STDKONF     rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=cf010000000000000000000000000000}
00:NETKONF     rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»NETKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=d0010000000000000000000000000000}
00:GENINST SUB rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=d1010000000000000000000000000000}
00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d201d301d401d501d601d701d801d901}
00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=da01db01dc01dd01de01df01e001e101}
00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=e201e301e401e501e601e701e801e901}
00:GENCCPM CMD rc=0x003 c=0x001 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x03, al=ea010000000000000000000000000000}
00:PIP     CMD rc=0x049 c=0x005 ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=eb01ec01ed01ee01ef01000000000000}
00:RCNIOS  CMD rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»RCNIOS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=f0010000000000000000000000000000}
00:RNET    CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f101f201f301f401f501f601f701f801}
00:RNET    CMD rc=0x078 c=0x008 ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x78, al=f901fa01fb01fc01fd01fe01ff010002}
00:RSNET   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01020202030204020502060207020802}
00:RSNET   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=09020a020b020c020d020e020f021002}
00:RSNET   CMD rc=0x02d c=0x003 ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=11021202130200000000000000000000}
00:SNET    CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1402150216021702180219021a021b02}
00:SNET    CMD rc=0x022 c=0x003 ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x22, al=1c021d021e0200000000000000000000}
00:SUBMIT  CMD rc=0x01c c=0x002 ProbeDirEnt {status=0x00, name=»SUBMIT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=1f022002000000000000000000000000}
Block Size 2048.00 2048 extent_mask = 0x0

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [25, 25, 25, 22, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +93/-0
     24  normal-2     (1-3-5-7-2-4-6-8)                                                         [25, 25, 1, 1, 25, 22, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +92/-19
     48  normal-3     (1-4-7-2-5-8-3-6)                                                         [25, 22, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +92/-19
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»Rel4-0 D2/3«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000000d1507000d1507}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x37, al=10001100120013000000000000000000}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2f, al=14001500160000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=17001800190000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=1a001b001c001d000000000000000000}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=1e001f00200021002200000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=23002400000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=250026002700280029002a002b002c00}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2d002e002f0030003100320033003400}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x41, al=35003600370038003900000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=3a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3b003c003d003e003f00400041004200}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x39, al=43004400450046000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIN759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=47004800000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=49004a004b004c004d004e004f005000}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=51005200530054005500560057005800}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x03, al=59000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=5a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b005c005d005e005f00600061006200}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63006400650066006700680069006a00}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=6b006c006d0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6e006f00700071007200730074007500}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=76007700780079007a007b007c007d00}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=7e007f00800081008200000000000000}
    ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=83000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8400850086008700880089008a008b00}
    ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=8c000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8d008e008f0090009100920093009400}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=950096009700980099009a009b009c00}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=9d009e009f00a000a100000000000000}
    ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=a200a300a40000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a500a600a700a800a900aa00ab00ac00}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ad00ae00af00b000b100b200b300b400}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b500b600b700b800b900ba00bb00bc00}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=bd00be00bf00c000c100c200c300c400}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x16, al=c500c600000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c700c800c900ca00cb00cc00cd00ce00}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6e, al=d700d800d900da00db00dc00dd000000}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e600e700e800e900ea00eb00ec00ed00}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ee00ef00f000f100f200f300f400f500}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f600f700f800f900fa00fb00fc00fd00}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=fe00ff00000100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01010201030104010501060107010801}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=09010a010b010c010d010e010f011001}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x7f, al=11011201130114011501160117011801}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=19011a011b011c011d011e011f012001}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=21012201230124012501260127012801}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=29012a012b012c010000000000000000}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2d012e012f0130013101320133013401}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=350136013701380139013a013b013c01}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=3d013e013f0140010000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=49014a01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4b014c014d014e014f01500151015201}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=53015401000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MODEM   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x47, al=55015601570158015901000000000000}
    ProbeDirEnt {status=0x00, name=»MODEM   KAT«, xl=0x00, bc=0x00, xh=0x00, rc=0x0b, al=5a010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b015c015d015e015f01600161016201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63016401650166016701680169016a01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=6b016c016d016e016f01700171017201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=73017401750176017701780179017a01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=7b017c017d017e017f01800181018201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=83018401850186018701880189018a01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=8b018c018d018e018f01900191019201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=93019401950196019701980199019a01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=9b019c019d019e019f01a001a101a201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=a301a401a501a601a701a801a901aa01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=ab01ac01ad01ae01af01b001b101b201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=b301b401b501b601b701b801b901ba01}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x66, al=bb01bc01bd01be01bf01c001c1010000}
    ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c201c301c401c501c601c701c801c901}
    ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x29, al=ca01cb01cc0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»FILEX   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x15, al=cd01ce01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=cf010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=d0010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=d1010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d201d301d401d501d601d701d801d901}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=da01db01dc01dd01de01df01e001e101}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=e201e301e401e501e601e701e801e901}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x03, al=ea010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=eb01ec01ed01ee01ef01000000000000}
    ProbeDirEnt {status=0x00, name=»RCNIOS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=f0010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f101f201f301f401f501f601f701f801}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x78, al=f901fa01fb01fc01fd01fe01ff010002}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01020202030204020502060207020802}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=09020a020b020c020d020e020f021002}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=11021202130200000000000000000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1402150216021702180219021a021b02}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x22, al=1c021d021e0200000000000000000000}
    ProbeDirEnt {status=0x00, name=»SUBMIT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=1f022002000000000000000000000000}
  0x0009000 (2, 0, 5)
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+  93 -   0 <Tree 0x0-0x9a000-0x134000>
+  92 -  19 <Tree 0x0-0x9a000-0x134000>

Full View