|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
topIndex: ┃ 5 B C F G L M N P R S T X ┃
Length: 1261568 (0x134000) Description: Bits:30002697 SW1458 Concurrent DOS Distributionsdiskette 4.0 - disk 2/3 Types: 5¼" Floppy Disk, CpmFSAuto Notes: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232} Signature: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1 Confidence score: +93/-0 Sector size: 1024 Block size: 2048 Directory entries: 512 Block number size: 16 Extent-mask: 0x00 Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8 Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user | bc | length | name | artifact |
---|---|---|---|---|
0 | 0 | 23424 | BDOS.CON | ⟦502ba11a7⟧ |
0 | 0 | 41984 | BESKED.CMD | ⟦3963f17aa⟧ |
0 | 0 | 209664 | CCPM.SYS | ⟦be390f6a5⟧ |
0 | 0 | 6016 | CIO.CON | ⟦cc126d9ca⟧ |
0 | 0 | 640 | CLOCK.RSP | ⟦47fd682bf⟧ |
0 | 0 | 21632 | FILEX.A86 | ⟦c864451fd⟧ TextFile |
0 | 0 | 2688 | FILEX.CMD | ⟦ceed655ff⟧ |
0 | 0 | 49536 | GENCCPM.CMD | ⟦222ee6c26⟧ |
0 | 0 | 256 | GENINST.SUB | ⟦4ec9be81f⟧ TextFile |
0 | 0 | 39296 | LANREL.CMD | ⟦bd5157903⟧ |
0 | 0 | 39680 | MATREL.CMD | ⟦e70e8d2d3⟧ |
0 | 0 | 18560 | MATRELHW.CMD | ⟦d994f55f8⟧ |
0 | 0 | 19712 | MATRELSW.CMD | ⟦21b904476⟧ |
0 | 0 | 6144 | MEM.CON | ⟦ee4fd466d⟧ |
0 | 0 | 1792 | MINTERN.CMD | ⟦6f10a2e4e⟧ |
0 | 0 | 9088 | MODEM.CMD | ⟦7f98d6ad4⟧ |
0 | 0 | 1408 | MODEM.KAT | ⟦d4b0a6556⟧ |
0 | 0 | 23680 | NETDRV.RSP | ⟦fada983a3⟧ |
0 | 0 | 256 | NETKONF | ⟦48677865a⟧ TextFile |
0 | 0 | 51968 | NETVEDL.CMD | ⟦0cad93b6e⟧ |
0 | 0 | 3200 | PIN759.RSP | ⟦65a6ea281⟧ |
0 | 0 | 17280 | PINTERN.CMD | ⟦3100e53f9⟧ |
0 | 0 | 9344 | PIP.CMD | ⟦307e4cf3c⟧ |
0 | 0 | 37888 | POSTHUS.CMD | ⟦9e65eb2a4⟧ |
0 | 0 | 32768 | RCADDNET.CMD | ⟦e45eff9f8⟧ |
0 | 0 | 5120 | RCDSP.CMD | ⟦b95b71ff5⟧ |
0 | 0 | 46848 | RCGENNET.CMD | ⟦1abce0bc8⟧ |
0 | 0 | 1920 | RCNIOS.CMD | ⟦1a810ffb0⟧ |
0 | 0 | 16384 | RCSPL.CMD | ⟦60f369d2a⟧ |
0 | 0 | 31744 | RNET.CMD | ⟦7222caa28⟧ |
0 | 0 | 38528 | RSNET.CMD | ⟦f3a2f1b76⟧ |
0 | 0 | 7680 | RTM.CON | ⟦24a9f75b8⟧ |
0 | 0 | 640 | SCROLL.RSP | ⟦f3378549e⟧ |
0 | 0 | 38528 | SIOREL.CMD | ⟦bcf4754e5⟧ |
0 | 0 | 20736 | SNET.CMD | ⟦b68a23120⟧ |
0 | 0 | 42240 | SPOOL.CMD | ⟦159e8616b⟧ |
0 | 0 | 256 | STDKONF | ⟦622ecd79f⟧ TextFile |
0 | 0 | 3584 | SUBMIT.CMD | ⟦3ece11c64⟧ |
0 | 0 | 8960 | SUP.CON | ⟦83023b077⟧ |
0 | 0 | 3456 | SYSDAT.CON | ⟦9090bd8b1⟧ |
0 | 0 | 49024 | SYSVEDL.CMD | ⟦c17db3bac⟧ |
0 | 0 | 33152 | TMP759.RSP | ⟦34d6db8e1⟧ |
0 | 0 | 41088 | XIOS.CON | ⟦4156075d0⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]] First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x8000 26-26-26-23-2-2-2-2 (2, 1) 0xa000 2-2-2-2-2-2-2-2 Total credibility: 109 Block number width: ok16 8 363 1 255 207 False 16 0 8 544 0 False 00:BDOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} 00:BDOS CON rc=0x037 c=0x004 ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x37, al=10001100120013000000000000000000} 00:CIO CON rc=0x02f c=0x003 ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2f, al=14001500160000000000000000000000} 00:MEM CON rc=0x030 c=0x003 ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=17001800190000000000000000000000} 00:RTM CON rc=0x03c c=0x004 ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=1a001b001c001d000000000000000000} 00:SUP CON rc=0x046 c=0x005 ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=1e001f00200021002200000000000000} 00:SYSDAT CON rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=23002400000000000000000000000000} 00:XIOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=250026002700280029002a002b002c00} 00:XIOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2d002e002f0030003100320033003400} 00:XIOS CON rc=0x041 c=0x005 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x41, al=35003600370038003900000000000000} 00:CLOCK RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=3a000000000000000000000000000000} 00:NETDRV RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3b003c003d003e003f00400041004200} 00:NETDRV RSP rc=0x039 c=0x004 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x39, al=43004400450046000000000000000000} 00:PIN759 RSP rc=0x019 c=0x002 ProbeDirEnt {status=0x00, name=»PIN759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=47004800000000000000000000000000} 00:TMP759 RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=49004a004b004c004d004e004f005000} 00:TMP759 RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=51005200530054005500560057005800} 00:TMP759 RSP rc=0x003 c=0x001 ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x03, al=59000000000000000000000000000000} 00:SCROLL RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=5a000000000000000000000000000000} 00:POSTHUS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b005c005d005e005f00600061006200} 00:POSTHUS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63006400650066006700680069006a00} 00:POSTHUS CMD rc=0x028 c=0x003 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=6b006c006d0000000000000000000000} 00:BESKED CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6e006f00700071007200730074007500} 00:BESKED CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=76007700780079007a007b007c007d00} 00:BESKED CMD rc=0x048 c=0x005 ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=7e007f00800081008200000000000000} 00:MINTERN CMD rc=0x00e c=0x001 ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=83000000000000000000000000000000} 00:PINTERN CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8400850086008700880089008a008b00} 00:PINTERN CMD rc=0x007 c=0x001 ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=8c000000000000000000000000000000} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8d008e008f0090009100920093009400} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=950096009700980099009a009b009c00} 00:SPOOL CMD rc=0x04a c=0x005 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=9d009e009f00a000a100000000000000} 00:RCDSP CMD rc=0x028 c=0x003 ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=a200a300a40000000000000000000000} 00:RCSPL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a500a600a700a800a900aa00ab00ac00} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ad00ae00af00b000b100b200b300b400} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b500b600b700b800b900ba00bb00bc00} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=bd00be00bf00c000c100c200c300c400} 00:NETVEDL CMD rc=0x016 c=0x002 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x16, al=c500c600000000000000000000000000} 00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c700c800c900ca00cb00cc00cd00ce00} 00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600} 00:RCGENNETCMD rc=0x06e c=0x007 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6e, al=d700d800d900da00db00dc00dd000000} 00:RCADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500} 00:RCADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e600e700e800e900ea00eb00ec00ed00} 00:SIOREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ee00ef00f000f100f200f300f400f500} 00:SIOREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f600f700f800f900fa00fb00fc00fd00} 00:SIOREL CMD rc=0x02d c=0x003 ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=fe00ff00000100000000000000000000} 00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01010201030104010501060107010801} 00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=09010a010b010c010d010e010f011001} 00:SYSVEDL CMD rc=0x07f c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x7f, al=11011201130114011501160117011801} 00:MATREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=19011a011b011c011d011e011f012001} 00:MATREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=21012201230124012501260127012801} 00:MATREL CMD rc=0x036 c=0x004 ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=29012a012b012c010000000000000000} 00:LANREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2d012e012f0130013101320133013401} 00:LANREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=350136013701380139013a013b013c01} 00:LANREL CMD rc=0x033 c=0x004 ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=3d013e013f0140010000000000000000} 00:MATRELHWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801} 00:MATRELHWCMD rc=0x011 c=0x002 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=49014a01000000000000000000000000} 00:MATRELSWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4b014c014d014e014f01500151015201} 00:MATRELSWCMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=53015401000000000000000000000000} 00:MODEM CMD rc=0x047 c=0x005 ProbeDirEnt {status=0x00, name=»MODEM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x47, al=55015601570158015901000000000000} 00:MODEM KAT rc=0x00b c=0x001 ProbeDirEnt {status=0x00, name=»MODEM KAT«, xl=0x00, bc=0x00, xh=0x00, rc=0x0b, al=5a010000000000000000000000000000} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b015c015d015e015f01600161016201} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63016401650166016701680169016a01} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=6b016c016d016e016f01700171017201} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=73017401750176017701780179017a01} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=7b017c017d017e017f01800181018201} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=83018401850186018701880189018a01} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=8b018c018d018e018f01900191019201} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=93019401950196019701980199019a01} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=9b019c019d019e019f01a001a101a201} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=a301a401a501a601a701a801a901aa01} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=ab01ac01ad01ae01af01b001b101b201} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=b301b401b501b601b701b801b901ba01} 00:CCPM SYS rc=0x066 c=0x007 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x66, al=bb01bc01bd01be01bf01c001c1010000} 00:FILEX A86 rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»FILEX A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c201c301c401c501c601c701c801c901} 00:FILEX A86 rc=0x029 c=0x003 ProbeDirEnt {status=0x00, name=»FILEX A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x29, al=ca01cb01cc0100000000000000000000} 00:FILEX CMD rc=0x015 c=0x002 ProbeDirEnt {status=0x00, name=»FILEX CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x15, al=cd01ce01000000000000000000000000} 00:STDKONF rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=cf010000000000000000000000000000} 00:NETKONF rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»NETKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=d0010000000000000000000000000000} 00:GENINST SUB rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=d1010000000000000000000000000000} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d201d301d401d501d601d701d801d901} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=da01db01dc01dd01de01df01e001e101} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=e201e301e401e501e601e701e801e901} 00:GENCCPM CMD rc=0x003 c=0x001 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x03, al=ea010000000000000000000000000000} 00:PIP CMD rc=0x049 c=0x005 ProbeDirEnt {status=0x00, name=»PIP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=eb01ec01ed01ee01ef01000000000000} 00:RCNIOS CMD rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=f0010000000000000000000000000000} 00:RNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f101f201f301f401f501f601f701f801} 00:RNET CMD rc=0x078 c=0x008 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x78, al=f901fa01fb01fc01fd01fe01ff010002} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01020202030204020502060207020802} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=09020a020b020c020d020e020f021002} 00:RSNET CMD rc=0x02d c=0x003 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=11021202130200000000000000000000} 00:SNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1402150216021702180219021a021b02} 00:SNET CMD rc=0x022 c=0x003 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x22, al=1c021d021e0200000000000000000000} 00:SUBMIT CMD rc=0x01c c=0x002 ProbeDirEnt {status=0x00, name=»SUBMIT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=1f022002000000000000000000000000} Block Size 2048.00 2048 extent_mask = 0x0 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order 0 normal-1 (1-2-3-4-5-6-7-8) [25, 25, 25, 22, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +93/-0 24 normal-2 (1-3-5-7-2-4-6-8) [25, 25, 1, 1, 25, 22, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +92/-19 48 normal-3 (1-4-7-2-5-8-3-6) [25, 22, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1] +92/-19 From the beastiarium: CpmFSCr16 +0/-0 File & label names found: 0x0008000 (2, 0, 1) ProbeDirEnt {status=0x20, name=»Rel4-0 D2/3«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000000d1507000d1507} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x37, al=10001100120013000000000000000000} ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2f, al=14001500160000000000000000000000} ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=17001800190000000000000000000000} ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=1a001b001c001d000000000000000000} ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=1e001f00200021002200000000000000} ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=23002400000000000000000000000000} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=250026002700280029002a002b002c00} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2d002e002f0030003100320033003400} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x41, al=35003600370038003900000000000000} ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=3a000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3b003c003d003e003f00400041004200} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x39, al=43004400450046000000000000000000} ProbeDirEnt {status=0x00, name=»PIN759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=47004800000000000000000000000000} ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=49004a004b004c004d004e004f005000} ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=51005200530054005500560057005800} ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x03, al=59000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=5a000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b005c005d005e005f00600061006200} ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63006400650066006700680069006a00} ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=6b006c006d0000000000000000000000} ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6e006f00700071007200730074007500} ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=76007700780079007a007b007c007d00} 0x0008400 (2, 0, 2) ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=7e007f00800081008200000000000000} ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=83000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8400850086008700880089008a008b00} ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=8c000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8d008e008f0090009100920093009400} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=950096009700980099009a009b009c00} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=9d009e009f00a000a100000000000000} ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=a200a300a40000000000000000000000} ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a500a600a700a800a900aa00ab00ac00} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ad00ae00af00b000b100b200b300b400} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b500b600b700b800b900ba00bb00bc00} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=bd00be00bf00c000c100c200c300c400} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x16, al=c500c600000000000000000000000000} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c700c800c900ca00cb00cc00cd00ce00} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6e, al=d700d800d900da00db00dc00dd000000} ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500} ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e600e700e800e900ea00eb00ec00ed00} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ee00ef00f000f100f200f300f400f500} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f600f700f800f900fa00fb00fc00fd00} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=fe00ff00000100000000000000000000} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01010201030104010501060107010801} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=09010a010b010c010d010e010f011001} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x7f, al=11011201130114011501160117011801} 0x0008800 (2, 0, 3) ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=19011a011b011c011d011e011f012001} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=21012201230124012501260127012801} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=29012a012b012c010000000000000000} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2d012e012f0130013101320133013401} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=350136013701380139013a013b013c01} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=3d013e013f0140010000000000000000} ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801} ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=49014a01000000000000000000000000} ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4b014c014d014e014f01500151015201} ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=53015401000000000000000000000000} ProbeDirEnt {status=0x00, name=»MODEM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x47, al=55015601570158015901000000000000} ProbeDirEnt {status=0x00, name=»MODEM KAT«, xl=0x00, bc=0x00, xh=0x00, rc=0x0b, al=5a010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b015c015d015e015f01600161016201} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63016401650166016701680169016a01} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=6b016c016d016e016f01700171017201} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=73017401750176017701780179017a01} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=7b017c017d017e017f01800181018201} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=83018401850186018701880189018a01} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=8b018c018d018e018f01900191019201} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=93019401950196019701980199019a01} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=9b019c019d019e019f01a001a101a201} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=a301a401a501a601a701a801a901aa01} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=ab01ac01ad01ae01af01b001b101b201} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=b301b401b501b601b701b801b901ba01} 0x0008c00 (2, 0, 4) ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x66, al=bb01bc01bd01be01bf01c001c1010000} ProbeDirEnt {status=0x00, name=»FILEX A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c201c301c401c501c601c701c801c901} ProbeDirEnt {status=0x00, name=»FILEX A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x29, al=ca01cb01cc0100000000000000000000} ProbeDirEnt {status=0x00, name=»FILEX CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x15, al=cd01ce01000000000000000000000000} ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=cf010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=d0010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=d1010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d201d301d401d501d601d701d801d901} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=da01db01dc01dd01de01df01e001e101} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=e201e301e401e501e601e701e801e901} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x03, al=ea010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»PIP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=eb01ec01ed01ee01ef01000000000000} ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=f0010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f101f201f301f401f501f601f701f801} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x78, al=f901fa01fb01fc01fd01fe01ff010002} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01020202030204020502060207020802} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=09020a020b020c020d020e020f021002} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=11021202130200000000000000000000} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1402150216021702180219021a021b02} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x22, al=1c021d021e0200000000000000000000} ProbeDirEnt {status=0x00, name=»SUBMIT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=1f022002000000000000000000000000} 0x0009000 (2, 0, 5) 0x0009400 (2, 0, 6) 0x0009800 (2, 0, 7) 0x0009c00 (2, 0, 8) 0x000a000 (2, 1, 1) 0x000a400 (2, 1, 2) 0x000a800 (2, 1, 3) 0x000ac00 (2, 1, 4) 0x000b000 (2, 1, 5) 0x000b400 (2, 1, 6) 0x000b800 (2, 1, 7) 0x000bc00 (2, 1, 8) + 93 - 0 <Tree 0x0-0x9a000-0x134000> + 92 - 19 <Tree 0x0-0x9a000-0x134000>