|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 B C G I L M N P R S T X
Length: 1261568 (0x134000) Description: Bits:30002704 SW1500 Concurrent DOS 5.2 Disk 2/3 Types: 5¼" Floppy Disk, CpmFSAuto Notes: CpmFSAuto,1024,2048,512,0x0,1<2<3,2:0-76:1
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232} Signature: CpmFSAuto,1024,2048,512,0x0,1<2<3,2:0-76:1 Confidence score: +97/-14 Sector size: 1024 Block size: 2048 Directory entries: 512 Block number size: 16 Extent-mask: 0x00 Sector-interleave: 1, 4, 7, 2, 5, 8, 3, 6 Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user | bc | length | name | artifact |
---|---|---|---|---|
0 | 0 | 24064 | BDOS.CON | ⟦2f9df8b79⟧ |
0 | 0 | 284416 | CCPM.SYS | ⟦504ddf2f1⟧ |
0 | 0 | 7936 | CIO.CON | ⟦59181b0f3⟧ |
0 | 0 | 640 | CLOCK.RSP | ⟦f4390e2dd⟧ |
0 | 0 | 59776 | GENSYS.CMD | ⟦1fb4441c2⟧ |
0 | 0 | 1024 | GENSYS.CNF | ⟦eb712d523⟧ |
0 | 0 | 28544 | IMC.CMD | ⟦519e11555⟧ |
0 | 0 | 9856 | IMCSTART.CMD | ⟦53d2b3783⟧ |
0 | 0 | 9856 | IMCSTOP.CMD | ⟦60bfc5fca⟧ |
0 | 0 | 38784 | LANREL.CMD | ⟦b5c80497e⟧ |
0 | 0 | 24320 | LIST.CMD | ⟦8de436605⟧ |
0 | 0 | 39680 | MATREL.CMD | ⟦3f26317f3⟧ |
0 | 0 | 18560 | MATRELHW.CMD | ⟦f0623d1d0⟧ |
0 | 0 | 19712 | MATRELSW.CMD | ⟦e62be5465⟧ |
0 | 0 | 6912 | MEM.CON | ⟦ace9aa772⟧ |
0 | 0 | 34688 | NETDRV.RSP | ⟦440af8ff8⟧ |
0 | 0 | 1024 | NETSYS.CNF | ⟦69609b559⟧ |
0 | 0 | 3072 | PIN750.RSP | ⟦d688cee65⟧ |
0 | 0 | 4864 | RCDSP.CMD | ⟦da442dada⟧ |
0 | 0 | 58880 | RCGENDOS.CMD | ⟦95517e810⟧ |
0 | 0 | 45824 | RCGENNET.CMD | ⟦da3641123⟧ |
0 | 0 | 1920 | RCNIOS.CMD | ⟦db982ab69⟧ |
0 | 0 | 16896 | RCSPL.CMD | ⟦47129e6f1⟧ |
0 | 0 | 7424 | REDIR.RSP | ⟦159bb0a0e⟧ |
0 | 0 | 3200 | REMOTE.CMD | ⟦ee689b338⟧ |
0 | 0 | 36224 | REMTMP.RSP | ⟦337d39767⟧ |
0 | 0 | 29056 | RNET.CMD | ⟦c011a1311⟧ |
0 | 0 | 35456 | RSNET.CMD | ⟦b159cf852⟧ |
0 | 0 | 7808 | RTM.CON | ⟦3b60f937f⟧ |
0 | 0 | 6272 | SCROLL.RSP | ⟦84e4d7945⟧ |
0 | 0 | 39680 | SIOREL.CMD | ⟦adea9c58e⟧ |
0 | 0 | 18560 | SNET.CMD | ⟦7850ba8b8⟧ |
0 | 0 | 38272 | SPOOL.CMD | ⟦993d2a7f8⟧ |
0 | 0 | 39808 | STRREL.CMD | ⟦15735ece9⟧ |
0 | 0 | 9216 | SUP.CON | ⟦bfdbc1ee2⟧ |
0 | 0 | 3328 | SYSDAT.CON | ⟦7d647b75e⟧ |
0 | 0 | 50560 | SYSVEDL.CMD | ⟦ce8b3e7e9⟧ |
0 | 0 | 36736 | TMP750.RSP | ⟦d53a3adc5⟧ |
0 | 0 | 41600 | XIOS.CON | ⟦73edee140⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]] First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x8000 26-26-26-26-2-2-2-2 (2, 1) 0xa000 2-2-2-2-2-2-2-2 Total credibility: 112 Block number width: ok16 8 421 1 255 215 False 16 0 8 583 0 False 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0e, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0f, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x10, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00} 00:CCPM SYS rc=0x02e c=0x003 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x11, bc=0x00, xh=0x00, rc=0x2e, al=90009100920000000000000000000000} 00:GENSYS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=93009400950096009700980099009a00} 00:GENSYS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=9b009c009d009e009f00a000a100a200} 00:GENSYS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00} 00:GENSYS CMD rc=0x053 c=0x006 ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x53, al=ab00ac00ad00ae00af00b00000000000} 00:GENSYS CNF rc=0x008 c=0x001 ProbeDirEnt {status=0x00, name=»GENSYS CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b1000000000000000000000000000000} 00:NETSYS CNF rc=0x008 c=0x001 ProbeDirEnt {status=0x00, name=»NETSYS CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b2000000000000000000000000000000} 00:RCGENDOSCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00} 00:RCGENDOSCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bb00bc00bd00be00bf00c000c100c200} 00:RCGENDOSCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c300c400c500c600c700c800c900ca00} 00:RCGENDOSCMD rc=0x04c c=0x005 ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x4c, al=cb00cc00cd00ce00cf00000000000000} 00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d000d100d200d300d400d500d600d700} 00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d800d900da00db00dc00dd00de00df00} 00:RCGENNETCMD rc=0x066 c=0x007 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x66, al=e000e100e200e300e400e500e6000000} 00:RCNIOS CMD rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=e7000000000000000000000000000000} 00:SNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e800e900ea00eb00ec00ed00ee00ef00} 00:SNET CMD rc=0x011 c=0x002 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=f000f100000000000000000000000000} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f200f300f400f500f600f700f800f900} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=fa00fb00fc00fd00fe00ff0000010101} 00:RSNET CMD rc=0x015 c=0x002 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x15, al=02010301000000000000000000000000} 00:RNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01} 00:RNET CMD rc=0x063 c=0x007 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x63, al=0c010d010e010f011001110112010000} 00:BDOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=13011401150116011701180119011a01} 00:BDOS CON rc=0x03c c=0x004 ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x3c, al=1b011c011d011e010000000000000000} 00:CIO CON rc=0x03e c=0x004 ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=1f012001210122010000000000000000} 00:MEM CON rc=0x036 c=0x004 ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x36, al=23012401250126010000000000000000} 00:RTM CON rc=0x03d c=0x004 ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=2701280129012a010000000000000000} 00:SUP CON rc=0x048 c=0x005 ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x48, al=2b012c012d012e012f01000000000000} 00:SYSDAT CON rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=30013101000000000000000000000000} 00:XIOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=32013301340135013601370138013901} 00:XIOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=3a013b013c013d013e013f0140014101} 00:XIOS CON rc=0x045 c=0x005 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x45, al=42014301440145014601000000000000} 00:CLOCK RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=47010000000000000000000000000000} 00:NETDRV RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=480149014a014b014c014d014e014f01} 00:NETDRV RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=50015101520153015401550156015701} 00:NETDRV RSP rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x0f, al=58010000000000000000000000000000} 00:PIN750 RSP rc=0x018 c=0x002 ProbeDirEnt {status=0x00, name=»PIN750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=59015a01000000000000000000000000} 00:TMP750 RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b015c015d015e015f01600161016201} 00:TMP750 RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63016401650166016701680169016a01} 00:TMP750 RSP rc=0x01f c=0x002 ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1f, al=6b016c01000000000000000000000000} 00:REDIR RSP rc=0x03a c=0x004 ProbeDirEnt {status=0x00, name=»REDIR RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=6d016e016f0170010000000000000000} 00:SCROLL RSP rc=0x031 c=0x004 ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x31, al=71017201730174010000000000000000} 00:REMTMP RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=750176017701780179017a017b017c01} 00:REMTMP RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7d017e017f0180018101820183018401} 00:REMTMP RSP rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1b, al=85018601000000000000000000000000} 00:REMOTE CMD rc=0x019 c=0x002 ProbeDirEnt {status=0x00, name=»REMOTE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=87018801000000000000000000000000} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=89018a018b018c018d018e018f019001} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=91019201930194019501960197019801} 00:SPOOL CMD rc=0x02b c=0x003 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=99019a019b0100000000000000000000} 00:RCSPL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9c019d019e019f01a001a101a201a301} 00:RCSPL CMD rc=0x004 c=0x001 ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x04, al=a4010000000000000000000000000000} 00:RCDSP CMD rc=0x026 c=0x003 ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x26, al=a501a601a70100000000000000000000} 00:LIST CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LIST CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a801a901aa01ab01ac01ad01ae01af01} 00:LIST CMD rc=0x03e c=0x004 ProbeDirEnt {status=0x00, name=»LIST CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3e, al=b001b101b201b3010000000000000000} 00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b401b501b601b701b801b901ba01bb01} 00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bc01bd01be01bf01c001c101c201c301} 00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c401c501c601c701c801c901ca01cb01} 00:SYSVEDL CMD rc=0x00b c=0x001 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0b, al=cc010000000000000000000000000000} 00:LANREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cd01ce01cf01d001d101d201d301d401} 00:LANREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d501d601d701d801d901da01db01dc01} 00:LANREL CMD rc=0x02f c=0x003 ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=dd01de01df0100000000000000000000} 00:MATREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e001e101e201e301e401e501e601e701} 00:MATREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e801e901ea01eb01ec01ed01ee01ef01} 00:MATREL CMD rc=0x036 c=0x004 ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=f001f101f201f3010000000000000000} 00:MATRELHWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01} 00:MATRELHWCMD rc=0x011 c=0x002 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=fc01fd01000000000000000000000000} 00:MATRELSWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fe01ff01000201020202030204020502} 00:MATRELSWCMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=06020702000000000000000000000000} 00:SIOREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080209020a020b020c020d020e020f02} 00:SIOREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10021102120213021402150216021702} 00:SIOREL CMD rc=0x036 c=0x004 ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=180219021a021b020000000000000000} 00:STRREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1c021d021e021f022002210222022302} 00:STRREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2402250226022702280229022a022b02} 00:STRREL CMD rc=0x037 c=0x004 ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x37, al=2c022d022e022f020000000000000000} 00:IMC CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»IMC CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=30023102320233023402350236023702} 00:IMC CMD rc=0x05f c=0x006 ProbeDirEnt {status=0x00, name=»IMC CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x5f, al=380239023a023b023c023d0200000000} 00:IMCSTARTCMD rc=0x04d c=0x005 ProbeDirEnt {status=0x00, name=»IMCSTARTCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=3e023f02400241024202000000000000} 00:IMCSTOP CMD rc=0x04d c=0x005 ProbeDirEnt {status=0x00, name=»IMCSTOP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=43024402450246024702000000000000} Block Size 2048.00 2048 extent_mask = 0x0 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order 0 normal-1 (1-2-3-4-5-6-7-8) [25, 25, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +96/-0 24 normal-2 (1-3-5-7-2-4-6-8) [25, 25, 1, 1, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +96/-13 48 normal-3 (1-4-7-2-5-8-3-6) [25, 25, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1] +97/-14 From the beastiarium: CpmFSCr16 +0/-0 File & label names found: 0x0008000 (2, 0, 1) ProbeDirEnt {status=0x20, name=»SW1500 2-3 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000cd0e1035cd0e1035} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0e, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0f, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x10, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x11, bc=0x00, xh=0x00, rc=0x2e, al=90009100920000000000000000000000} ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=93009400950096009700980099009a00} ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=9b009c009d009e009f00a000a100a200} ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00} ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x53, al=ab00ac00ad00ae00af00b00000000000} ProbeDirEnt {status=0x00, name=»GENSYS CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b1000000000000000000000000000000} 0x0008400 (2, 0, 2) ProbeDirEnt {status=0x00, name=»NETSYS CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b2000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00} ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bb00bc00bd00be00bf00c000c100c200} ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c300c400c500c600c700c800c900ca00} ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x4c, al=cb00cc00cd00ce00cf00000000000000} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d000d100d200d300d400d500d600d700} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d800d900da00db00dc00dd00de00df00} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x66, al=e000e100e200e300e400e500e6000000} ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=e7000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e800e900ea00eb00ec00ed00ee00ef00} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=f000f100000000000000000000000000} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f200f300f400f500f600f700f800f900} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=fa00fb00fc00fd00fe00ff0000010101} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x15, al=02010301000000000000000000000000} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x63, al=0c010d010e010f011001110112010000} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=13011401150116011701180119011a01} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x3c, al=1b011c011d011e010000000000000000} ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=1f012001210122010000000000000000} ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x36, al=23012401250126010000000000000000} ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=2701280129012a010000000000000000} ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x48, al=2b012c012d012e012f01000000000000} ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=30013101000000000000000000000000} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=32013301340135013601370138013901} 0x0008800 (2, 0, 3) ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=3a013b013c013d013e013f0140014101} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x45, al=42014301440145014601000000000000} ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=47010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=480149014a014b014c014d014e014f01} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=50015101520153015401550156015701} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x0f, al=58010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»PIN750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=59015a01000000000000000000000000} ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b015c015d015e015f01600161016201} ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63016401650166016701680169016a01} ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1f, al=6b016c01000000000000000000000000} ProbeDirEnt {status=0x00, name=»REDIR RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=6d016e016f0170010000000000000000} ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x31, al=71017201730174010000000000000000} ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=750176017701780179017a017b017c01} ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7d017e017f0180018101820183018401} ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1b, al=85018601000000000000000000000000} ProbeDirEnt {status=0x00, name=»REMOTE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=87018801000000000000000000000000} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=89018a018b018c018d018e018f019001} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=91019201930194019501960197019801} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=99019a019b0100000000000000000000} ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9c019d019e019f01a001a101a201a301} ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x04, al=a4010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x26, al=a501a601a70100000000000000000000} ProbeDirEnt {status=0x00, name=»LIST CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a801a901aa01ab01ac01ad01ae01af01} ProbeDirEnt {status=0x00, name=»LIST CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3e, al=b001b101b201b3010000000000000000} 0x0008c00 (2, 0, 4) ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b401b501b601b701b801b901ba01bb01} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bc01bd01be01bf01c001c101c201c301} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c401c501c601c701c801c901ca01cb01} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0b, al=cc010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cd01ce01cf01d001d101d201d301d401} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d501d601d701d801d901da01db01dc01} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=dd01de01df0100000000000000000000} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e001e101e201e301e401e501e601e701} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e801e901ea01eb01ec01ed01ee01ef01} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=f001f101f201f3010000000000000000} ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01} ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=fc01fd01000000000000000000000000} ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fe01ff01000201020202030204020502} ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=06020702000000000000000000000000} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080209020a020b020c020d020e020f02} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10021102120213021402150216021702} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=180219021a021b020000000000000000} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1c021d021e021f022002210222022302} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2402250226022702280229022a022b02} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x37, al=2c022d022e022f020000000000000000} ProbeDirEnt {status=0x00, name=»IMC CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=30023102320233023402350236023702} ProbeDirEnt {status=0x00, name=»IMC CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x5f, al=380239023a023b023c023d0200000000} ProbeDirEnt {status=0x00, name=»IMCSTARTCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=3e023f02400241024202000000000000} ProbeDirEnt {status=0x00, name=»IMCSTOP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=43024402450246024702000000000000} 0x0009000 (2, 0, 5) 0x0009400 (2, 0, 6) 0x0009800 (2, 0, 7) 0x0009c00 (2, 0, 8) 0x000a000 (2, 1, 1) 0x000a400 (2, 1, 2) 0x000a800 (2, 1, 3) 0x000ac00 (2, 1, 4) 0x000b000 (2, 1, 5) 0x000b400 (2, 1, 6) 0x000b800 (2, 1, 7) 0x000bc00 (2, 1, 8) + 97 - 14 <Tree 0x0-0x9a000-0x134000> + 96 - 0 <Tree 0x0-0x9a000-0x134000>