|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 B C G I L M N P R S T V X
Length: 1261568 (0x134000) Description: Bits:30004229/disk2.imd SW1400 CCP/M 86 Distributionsdiskette 3.1a Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer Notes: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232} Signature: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1 Confidence score: +96/-0 Sector size: 1024 Block size: 2048 Directory entries: 512 Block number size: 16 Extent-mask: 0x00 Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8 Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user | bc | length | name | artifact |
---|---|---|---|---|
0 | 0 | 15744 | BDOS.CON | ⟦bceab8e24⟧ |
0 | 0 | 41984 | BESKED.CMD | ⟦4ed544a99⟧ |
0 | 0 | 146816 | CCPM.SYS | ⟦7c8ffee17⟧ |
0 | 0 | 102272 | CCPM1.SYS | ⟦5ed249fa1⟧ |
0 | 0 | 112256 | CCPM4.SYS | ⟦2ca317e83⟧ |
0 | 0 | 5504 | CIO.CON | ⟦1f71bae28⟧ |
0 | 0 | 640 | CLOCK.RSP | ⟦9b24ff61d⟧ |
0 | 0 | 52608 | GENCCPM.CMD | ⟦ec5584118⟧ |
0 | 0 | 384 | GENINST.SUB | ⟦99d7441ca⟧ TextFile |
0 | 0 | 11392 | LOCAL.CMD | ⟦df81e6a32⟧ |
0 | 0 | 16512 | LOGOFF.CMD | ⟦054f6893e⟧ |
0 | 0 | 18432 | LOGON.CMD | ⟦b1d51b0d1⟧ |
0 | 0 | 6144 | MEM.CON | ⟦272ffa888⟧ |
0 | 0 | 1792 | MINTERN.CMD | ⟦6f10a2e4e⟧ |
0 | 0 | 16000 | NAMES.CMD | ⟦003bd88d2⟧ |
0 | 0 | 22912 | NAMESMOD.CMD | ⟦ea69a1aa9⟧ |
0 | 0 | 17536 | NET.CMD | ⟦4f982e6be⟧ |
0 | 0 | 17792 | NETDRV.RSP | ⟦001d6c69e⟧ |
0 | 0 | 128 | NETKONF | ⟦97a2d453d⟧ TextFile |
0 | 0 | 16384 | NETOFF.CMD | ⟦8243b6545⟧ |
0 | 0 | 16384 | NETON.CMD | ⟦fb959619e⟧ |
0 | 0 | 17920 | NETSTAT.CMD | ⟦c67d05638⟧ |
0 | 0 | 51584 | NETVEDL.CMD | ⟦b9e311192⟧ |
0 | 0 | 3328 | PIN759.RSP | ⟦0538d9e1a⟧ |
0 | 0 | 17280 | PINTERN.CMD | ⟦3100e53f9⟧ |
0 | 0 | 8960 | PIP.CMD | ⟦e5b107109⟧ |
0 | 0 | 37888 | POSTHUS.CMD | ⟦1b189b7b6⟧ |
0 | 0 | 35200 | RCADDNET.CMD | ⟦cbc8968e2⟧ |
0 | 0 | 5120 | RCDSP.CMD | ⟦b95b71ff5⟧ |
0 | 0 | 46976 | RCGENNET.CMD | ⟦2233d1336⟧ |
0 | 0 | 1920 | RCNIOS.CMD | ⟦1a810ffb0⟧ |
0 | 0 | 16384 | RCSPL.CMD | ⟦60f369d2a⟧ |
0 | 0 | 27264 | RNET.CMD | ⟦faa04a7ab⟧ |
0 | 0 | 33408 | RSNET.CMD | ⟦d576ef0e3⟧ |
0 | 0 | 7552 | RTM.CON | ⟦7b18901b9⟧ |
0 | 0 | 640 | SCROLL.RSP | ⟦f3378549e⟧ |
0 | 0 | 19712 | SNET.CMD | ⟦33a2affd9⟧ |
0 | 0 | 42240 | SPOOL.CMD | ⟦e6b957ea9⟧ |
0 | 0 | 256 | STDKONF | ⟦d33af0ee7⟧ TextFile |
0 | 0 | 3584 | SUBMIT.CMD | ⟦146b2ae19⟧ |
0 | 0 | 5632 | SUP.CON | ⟦58d06b598⟧ |
0 | 0 | 3328 | SYSDAT.CON | ⟦13f8b41e3⟧ |
0 | 0 | 7424 | TMP759.RSP | ⟦aa4022f9a⟧ |
0 | 0 | 2944 | VOUT.RSP | ⟦f665ed891⟧ |
0 | 0 | 32256 | XIOS1.CON | ⟦d29edbd7b⟧ |
0 | 0 | 36224 | XIOS4.CON | ⟦2caa56f69⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]] First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x8000 26-26-26-26-3-2-2-2 (2, 1) 0xa000 2-2-2-2-2-2-2-2 Total credibility: 113 Block number width: ok16 8 390 1 255 216 False 16 0 8 565 0 False 00:CCPM4 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} 00:CCPM4 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} 00:CCPM4 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} 00:CCPM4 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} 00:CCPM4 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} 00:CCPM4 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} 00:CCPM4 SYS rc=0x06d c=0x007 ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x6d, al=380039003a003b003c003d003e000000} 00:NETKONF rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»NETKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3f000000000000000000000000000000} 00:CCPM1 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} 00:CCPM1 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00} 00:CCPM1 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700} 00:CCPM1 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00} 00:CCPM1 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700} 00:CCPM1 SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00} 00:CCPM1 SYS rc=0x01f c=0x002 ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x1f, al=70007100000000000000000000000000} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72007300740075007600770078007900} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7a007b007c007d007e007f0080008100} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=82008300840085008600870088008900} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=8a008b008c008d008e008f0090009100} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=92009300940095009600970098009900} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=9a009b009c009d009e009f00a000a100} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=a200a300a400a500a600a700a800a900} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=aa00ab00ac00ad00ae00af00b000b100} 00:CCPM SYS rc=0x07b c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x7b, al=b200b300b400b500b600b700b800b900} 00:XIOS4 CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ba00bb00bc00bd00be00bf00c000c100} 00:XIOS4 CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900} 00:XIOS4 CON rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x1b, al=ca00cb00000000000000000000000000} 00:XIOS1 CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300} 00:XIOS1 CON rc=0x07c c=0x008 ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x7c, al=d400d500d600d700d800d900da00db00} 00:RCDSP CMD rc=0x028 c=0x003 ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=dc00dd00de0000000000000000000000} 00:RCSPL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=df00e000e100e200e300e400e500e600} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ef00f000f100f200f300f400f500f600} 00:SPOOL CMD rc=0x04a c=0x005 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=f700f800f900fa00fb00000000000000} 00:POSTHUS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fc00fd00fe00ff000001010102010301} 00:POSTHUS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01} 00:POSTHUS CMD rc=0x028 c=0x003 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=0c010d010e0100000000000000000000} 00:BESKED CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0f011001110112011301140115011601} 00:BESKED CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1701180119011a011b011c011d011e01} 00:BESKED CMD rc=0x048 c=0x005 ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1f012001210122012301000000000000} 00:MINTERN CMD rc=0x00e c=0x001 ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=24010000000000000000000000000000} 00:PINTERN CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=250126012701280129012a012b012c01} 00:PINTERN CMD rc=0x007 c=0x001 ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=2d010000000000000000000000000000} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2e012f01300131013201330134013501} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=36013701380139013a013b013c013d01} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=3e013f01400141014201430144014501} 00:NETVEDL CMD rc=0x013 c=0x002 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x13, al=46014701000000000000000000000000} 00:PIP CMD rc=0x046 c=0x005 ProbeDirEnt {status=0x00, name=»PIP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=480149014a014b014c01000000000000} 00:SUBMIT CMD rc=0x01c c=0x002 ProbeDirEnt {status=0x00, name=»SUBMIT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=4d014e01000000000000000000000000} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4f015001510152015301540155015601} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5701580159015a015b015c015d015e01} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=5f016001610162016301640165016601} 00:GENCCPM CMD rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=67016801000000000000000000000000} 00:RCADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=69016a016b016c016d016e016f017001} 00:RCADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=71017201730174017501760177017801} 00:RCADDNETCMD rc=0x013 c=0x002 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x13, al=79017a01000000000000000000000000} 00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7b017c017d017e017f01800181018201} 00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=83018401850186018701880189018a01} 00:RCGENNETCMD rc=0x06f c=0x007 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6f, al=8b018c018d018e018f01900191010000} 00:RNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901} 00:RNET CMD rc=0x055 c=0x006 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=9a019b019c019d019e019f0100000000} 00:SNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a001a101a201a301a401a501a601a701} 00:SNET CMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=a801a901000000000000000000000000} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=aa01ab01ac01ad01ae01af01b001b101} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b201b301b401b501b601b701b801b901} 00:RSNET CMD rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=ba010000000000000000000000000000} 00:RCNIOS CMD rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=bb010000000000000000000000000000} 00:NET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bc01bd01be01bf01c001c101c201c301} 00:NET CMD rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=c4010000000000000000000000000000} 00:NAMES CMD rc=0x07d c=0x008 ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=c501c601c701c801c901ca01cb01cc01} 00:NETON CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cd01ce01cf01d001d101d201d301d401} 00:LOCAL CMD rc=0x059 c=0x006 ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=d501d601d701d801d901da0100000000} 00:LOGON CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=db01dc01dd01de01df01e001e101e201} 00:LOGON CMD rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=e3010000000000000000000000000000} 00:NAMESMODCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e401e501e601e701e801e901ea01eb01} 00:NAMESMODCMD rc=0x033 c=0x004 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=ec01ed01ee01ef010000000000000000} 00:NETOFF CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f001f101f201f301f401f501f601f701} 00:NETSTAT CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f801f901fa01fb01fc01fd01fe01ff01} 00:NETSTAT CMD rc=0x00c c=0x001 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=00020000000000000000000000000000} 00:LOGOFF CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01020202030204020502060207020802} 00:LOGOFF CMD rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=09020000000000000000000000000000} 00:RTM CON rc=0x03b c=0x004 ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=0a020b020c020d020000000000000000} 00:BDOS CON rc=0x07b c=0x008 ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0e020f02100211021202130214021502} 00:SUP CON rc=0x02c c=0x003 ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=16021702180200000000000000000000} 00:CIO CON rc=0x02b c=0x003 ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=19021a021b0200000000000000000000} 00:MEM CON rc=0x030 c=0x003 ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=1c021d021e0200000000000000000000} 00:SYSDAT CON rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=1f022002000000000000000000000000} 00:NETDRV RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=21022202230224022502260227022802} 00:NETDRV RSP rc=0x00b c=0x001 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0b, al=29020000000000000000000000000000} 00:VOUT RSP rc=0x017 c=0x002 ProbeDirEnt {status=0x00, name=»VOUT RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=2a022b02000000000000000000000000} 00:SCROLL RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=2c020000000000000000000000000000} 00:TMP759 RSP rc=0x03a c=0x004 ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=2d022e022f0230020000000000000000} 00:CLOCK RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=31020000000000000000000000000000} 00:PIN759 RSP rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»PIN759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=32023302000000000000000000000000} 00:GENINST SUB rc=0x003 c=0x001 ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=34020000000000000000000000000000} 00:STDKONF rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=35020000000000000000000000000000} Block Size 2048.00 2048 extent_mask = 0x0 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order 0 normal-1 (1-2-3-4-5-6-7-8) [25, 25, 25, 25, 2, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +96/-0 24 normal-2 (1-3-5-7-2-4-6-8) [25, 25, 2, 1, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +96/-11 48 normal-3 (1-4-7-2-5-8-3-6) [25, 25, 1, 25, 2, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1] +96/-15 From the beastiarium: CpmFSCr16 +0/-0 File & label names found: 0x0008000 (2, 0, 1) ProbeDirEnt {status=0x20, name=»Rel3-1 D2/4«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000fc0c1501fc0c1501} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x6d, al=380039003a003b003c003d003e000000} ProbeDirEnt {status=0x00, name=»NETKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3f000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x1f, al=70007100000000000000000000000000} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72007300740075007600770078007900} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7a007b007c007d007e007f0080008100} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=82008300840085008600870088008900} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=8a008b008c008d008e008f0090009100} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=92009300940095009600970098009900} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=9a009b009c009d009e009f00a000a100} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=a200a300a400a500a600a700a800a900} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=aa00ab00ac00ad00ae00af00b000b100} 0x0008400 (2, 0, 2) ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x7b, al=b200b300b400b500b600b700b800b900} ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ba00bb00bc00bd00be00bf00c000c100} ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900} ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x1b, al=ca00cb00000000000000000000000000} ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300} ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x7c, al=d400d500d600d700d800d900da00db00} ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=dc00dd00de0000000000000000000000} ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=df00e000e100e200e300e400e500e600} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ef00f000f100f200f300f400f500f600} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=f700f800f900fa00fb00000000000000} ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fc00fd00fe00ff000001010102010301} ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01} ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=0c010d010e0100000000000000000000} ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0f011001110112011301140115011601} ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1701180119011a011b011c011d011e01} ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1f012001210122012301000000000000} ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=24010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=250126012701280129012a012b012c01} ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=2d010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2e012f01300131013201330134013501} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=36013701380139013a013b013c013d01} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=3e013f01400141014201430144014501} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x13, al=46014701000000000000000000000000} 0x0008800 (2, 0, 3) ProbeDirEnt {status=0x00, name=»PIP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=480149014a014b014c01000000000000} ProbeDirEnt {status=0x00, name=»SUBMIT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=4d014e01000000000000000000000000} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4f015001510152015301540155015601} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5701580159015a015b015c015d015e01} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=5f016001610162016301640165016601} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=67016801000000000000000000000000} ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=69016a016b016c016d016e016f017001} ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=71017201730174017501760177017801} ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x13, al=79017a01000000000000000000000000} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7b017c017d017e017f01800181018201} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=83018401850186018701880189018a01} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6f, al=8b018c018d018e018f01900191010000} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=9a019b019c019d019e019f0100000000} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a001a101a201a301a401a501a601a701} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=a801a901000000000000000000000000} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=aa01ab01ac01ad01ae01af01b001b101} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b201b301b401b501b601b701b801b901} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=ba010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=bb010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bc01bd01be01bf01c001c101c201c301} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=c4010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=c501c601c701c801c901ca01cb01cc01} ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cd01ce01cf01d001d101d201d301d401} 0x0008c00 (2, 0, 4) ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=d501d601d701d801d901da0100000000} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=db01dc01dd01de01df01e001e101e201} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=e3010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e401e501e601e701e801e901ea01eb01} ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=ec01ed01ee01ef010000000000000000} ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f001f101f201f301f401f501f601f701} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f801f901fa01fb01fc01fd01fe01ff01} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=00020000000000000000000000000000} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01020202030204020502060207020802} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=09020000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=0a020b020c020d020000000000000000} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0e020f02100211021202130214021502} ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=16021702180200000000000000000000} ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=19021a021b0200000000000000000000} ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=1c021d021e0200000000000000000000} ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=1f022002000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=21022202230224022502260227022802} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0b, al=29020000000000000000000000000000} ProbeDirEnt {status=0x00, name=»VOUT RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=2a022b02000000000000000000000000} ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=2c020000000000000000000000000000} ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=2d022e022f0230020000000000000000} ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=31020000000000000000000000000000} ProbeDirEnt {status=0x00, name=»PIN759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=32023302000000000000000000000000} ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=34020000000000000000000000000000} 0x0009000 (2, 0, 5) ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=35020000000000000000000000000000} 0x0009400 (2, 0, 6) 0x0009800 (2, 0, 7) 0x0009c00 (2, 0, 8) 0x000a000 (2, 1, 1) 0x000a400 (2, 1, 2) 0x000a800 (2, 1, 3) 0x000ac00 (2, 1, 4) 0x000b000 (2, 1, 5) 0x000b400 (2, 1, 6) 0x000b800 (2, 1, 7) 0x000bc00 (2, 1, 8) + 96 - 0 <Tree 0x0-0x9a000-0x134000> + 96 - 11 <Tree 0x0-0x9a000-0x134000>