DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 B C G I L M N P R S T V X

⟦7e377500c⟧ Bits:30004107/disk2.imd SW1400 CCP/M 86 Distributionsdiskette 3.1, 5¼" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1261568 (0x134000)
    Description: Bits:30004107/disk2.imd SW1400 CCP/M 86 Distributionsdiskette 3.1
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1
Confidence score:  +96/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 15744 BDOS.CON ⟦29527f612⟧
0 0 41984 BESKED.CMD ⟦4ed544a99⟧
0 0 146816 CCPM.SYS ⟦4c4c1ae5e⟧
0 0 102272 CCPM1.SYS ⟦f0accac84⟧
0 0 112256 CCPM4.SYS ⟦d0681ea02⟧
0 0 5504 CIO.CON ⟦2978aa9f5⟧
0 0 640 CLOCK.RSP ⟦9b24ff61d⟧
0 0 52608 GENCCPM.CMD ⟦88da7febd⟧
0 0 384 GENINST.SUB ⟦99d7441ca⟧ TextFile
0 0 11392 LOCAL.CMD ⟦df81e6a32⟧
0 0 16512 LOGOFF.CMD ⟦054f6893e⟧
0 0 18432 LOGON.CMD ⟦125709716⟧
0 0 6144 MEM.CON ⟦58dce6dfa⟧
0 0 1792 MINTERN.CMD ⟦6f10a2e4e⟧
0 0 16000 NAMES.CMD ⟦003bd88d2⟧
0 0 22912 NAMESMOD.CMD ⟦ea69a1aa9⟧
0 0 17536 NET.CMD ⟦4f982e6be⟧
0 0 17792 NETDRV.RSP ⟦001d6c69e⟧
0 0 128 NETKONF ⟦97a2d453d⟧ TextFile
0 0 16384 NETOFF.CMD ⟦8243b6545⟧
0 0 16384 NETON.CMD ⟦e55271ee9⟧
0 0 17920 NETSTAT.CMD ⟦c67d05638⟧
0 0 51584 NETVEDL.CMD ⟦b9e311192⟧
0 0 3328 PIN759.RSP ⟦0538d9e1a⟧
0 0 17280 PINTERN.CMD ⟦3100e53f9⟧
0 0 8960 PIP.CMD ⟦e5b107109⟧
0 0 37888 POSTHUS.CMD ⟦1b189b7b6⟧
0 0 35200 RCADDNET.CMD ⟦cbc8968e2⟧
0 0 5120 RCDSP.CMD ⟦b95b71ff5⟧
0 0 46976 RCGENNET.CMD ⟦2233d1336⟧
0 0 1920 RCNIOS.CMD ⟦1a810ffb0⟧
0 0 16384 RCSPL.CMD ⟦60f369d2a⟧
0 0 27264 RNET.CMD ⟦8f05f5de3⟧
0 0 33408 RSNET.CMD ⟦a680eabbb⟧
0 0 7552 RTM.CON ⟦128c4fa8e⟧
0 0 640 SCROLL.RSP ⟦f3378549e⟧
0 0 19712 SNET.CMD ⟦e3a195892⟧
0 0 42240 SPOOL.CMD ⟦e6b957ea9⟧
0 0 256 STDKONF ⟦d33af0ee7⟧ TextFile
0 0 3584 SUBMIT.CMD ⟦146b2ae19⟧
0 0 5632 SUP.CON ⟦a66e527ee⟧
0 0 3328 SYSDAT.CON ⟦13f8b41e3⟧
0 0 7424 TMP759.RSP ⟦aa4022f9a⟧
0 0 2944 VOUT.RSP ⟦f665ed891⟧
0 0 32256 XIOS1.CON ⟦d29edbd7b⟧
0 0 36224 XIOS4.CON ⟦2caa56f69⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 26-26-26-26-3-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 113

Block number width: ok16

   8   390     1   255   216  False
  16     0     8   565     0  False

00:CCPM4   SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
00:CCPM4   SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
00:CCPM4   SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
00:CCPM4   SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
00:CCPM4   SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
00:CCPM4   SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
00:CCPM4   SYS rc=0x06d c=0x007 ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x6d, al=380039003a003b003c003d003e000000}
00:NETKONF     rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»NETKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3f000000000000000000000000000000}
00:CCPM1   SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
00:CCPM1   SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
00:CCPM1   SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
00:CCPM1   SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
00:CCPM1   SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
00:CCPM1   SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
00:CCPM1   SYS rc=0x01f c=0x002 ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x1f, al=70007100000000000000000000000000}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72007300740075007600770078007900}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7a007b007c007d007e007f0080008100}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=82008300840085008600870088008900}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=8a008b008c008d008e008f0090009100}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=92009300940095009600970098009900}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=9a009b009c009d009e009f00a000a100}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=a200a300a400a500a600a700a800a900}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=aa00ab00ac00ad00ae00af00b000b100}
00:CCPM    SYS rc=0x07b c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x7b, al=b200b300b400b500b600b700b800b900}
00:XIOS4   CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ba00bb00bc00bd00be00bf00c000c100}
00:XIOS4   CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900}
00:XIOS4   CON rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x1b, al=ca00cb00000000000000000000000000}
00:XIOS1   CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS1   CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300}
00:XIOS1   CON rc=0x07c c=0x008 ProbeDirEnt {status=0x00, name=»XIOS1   CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x7c, al=d400d500d600d700d800d900da00db00}
00:RCDSP   CMD rc=0x028 c=0x003 ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=dc00dd00de0000000000000000000000}
00:RCSPL   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=df00e000e100e200e300e400e500e600}
00:SPOOL   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00}
00:SPOOL   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ef00f000f100f200f300f400f500f600}
00:SPOOL   CMD rc=0x04a c=0x005 ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=f700f800f900fa00fb00000000000000}
00:POSTHUS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fc00fd00fe00ff000001010102010301}
00:POSTHUS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
00:POSTHUS CMD rc=0x028 c=0x003 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=0c010d010e0100000000000000000000}
00:BESKED  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0f011001110112011301140115011601}
00:BESKED  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1701180119011a011b011c011d011e01}
00:BESKED  CMD rc=0x048 c=0x005 ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1f012001210122012301000000000000}
00:MINTERN CMD rc=0x00e c=0x001 ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=24010000000000000000000000000000}
00:PINTERN CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=250126012701280129012a012b012c01}
00:PINTERN CMD rc=0x007 c=0x001 ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=2d010000000000000000000000000000}
00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2e012f01300131013201330134013501}
00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=36013701380139013a013b013c013d01}
00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=3e013f01400141014201430144014501}
00:NETVEDL CMD rc=0x013 c=0x002 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x13, al=46014701000000000000000000000000}
00:PIP     CMD rc=0x046 c=0x005 ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=480149014a014b014c01000000000000}
00:SUBMIT  CMD rc=0x01c c=0x002 ProbeDirEnt {status=0x00, name=»SUBMIT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=4d014e01000000000000000000000000}
00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4f015001510152015301540155015601}
00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5701580159015a015b015c015d015e01}
00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=5f016001610162016301640165016601}
00:GENCCPM CMD rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=67016801000000000000000000000000}
00:RCADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=69016a016b016c016d016e016f017001}
00:RCADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=71017201730174017501760177017801}
00:RCADDNETCMD rc=0x013 c=0x002 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x13, al=79017a01000000000000000000000000}
00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7b017c017d017e017f01800181018201}
00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=83018401850186018701880189018a01}
00:RCGENNETCMD rc=0x06f c=0x007 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6f, al=8b018c018d018e018f01900191010000}
00:RNET    CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901}
00:RNET    CMD rc=0x055 c=0x006 ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=9a019b019c019d019e019f0100000000}
00:SNET    CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a001a101a201a301a401a501a601a701}
00:SNET    CMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=a801a901000000000000000000000000}
00:RSNET   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=aa01ab01ac01ad01ae01af01b001b101}
00:RSNET   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b201b301b401b501b601b701b801b901}
00:RSNET   CMD rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=ba010000000000000000000000000000}
00:RCNIOS  CMD rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»RCNIOS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=bb010000000000000000000000000000}
00:NET     CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bc01bd01be01bf01c001c101c201c301}
00:NET     CMD rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=c4010000000000000000000000000000}
00:NAMES   CMD rc=0x07d c=0x008 ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=c501c601c701c801c901ca01cb01cc01}
00:NETON   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cd01ce01cf01d001d101d201d301d401}
00:LOCAL   CMD rc=0x059 c=0x006 ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=d501d601d701d801d901da0100000000}
00:LOGON   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=db01dc01dd01de01df01e001e101e201}
00:LOGON   CMD rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=e3010000000000000000000000000000}
00:NAMESMODCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e401e501e601e701e801e901ea01eb01}
00:NAMESMODCMD rc=0x033 c=0x004 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=ec01ed01ee01ef010000000000000000}
00:NETOFF  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f001f101f201f301f401f501f601f701}
00:NETSTAT CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f801f901fa01fb01fc01fd01fe01ff01}
00:NETSTAT CMD rc=0x00c c=0x001 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=00020000000000000000000000000000}
00:LOGOFF  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01020202030204020502060207020802}
00:LOGOFF  CMD rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=09020000000000000000000000000000}
00:RTM     CON rc=0x03b c=0x004 ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=0a020b020c020d020000000000000000}
00:BDOS    CON rc=0x07b c=0x008 ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0e020f02100211021202130214021502}
00:SUP     CON rc=0x02c c=0x003 ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=16021702180200000000000000000000}
00:CIO     CON rc=0x02b c=0x003 ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=19021a021b0200000000000000000000}
00:MEM     CON rc=0x030 c=0x003 ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=1c021d021e0200000000000000000000}
00:SYSDAT  CON rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=1f022002000000000000000000000000}
00:NETDRV  RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=21022202230224022502260227022802}
00:NETDRV  RSP rc=0x00b c=0x001 ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0b, al=29020000000000000000000000000000}
00:VOUT    RSP rc=0x017 c=0x002 ProbeDirEnt {status=0x00, name=»VOUT    RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=2a022b02000000000000000000000000}
00:SCROLL  RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=2c020000000000000000000000000000}
00:TMP759  RSP rc=0x03a c=0x004 ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=2d022e022f0230020000000000000000}
00:CLOCK   RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=31020000000000000000000000000000}
00:PIN759  RSP rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»PIN759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=32023302000000000000000000000000}
00:GENINST SUB rc=0x003 c=0x001 ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=34020000000000000000000000000000}
00:STDKONF     rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=35020000000000000000000000000000}
Block Size 2048.00 2048 extent_mask = 0x0

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [25, 25, 25, 25, 2, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +96/-0
     24  normal-2     (1-3-5-7-2-4-6-8)                                                         [25, 25, 2, 1, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +96/-11
     48  normal-3     (1-4-7-2-5-8-3-6)                                                         [25, 25, 1, 25, 2, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +96/-15
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»Rel3-1 D2/4«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000fc0c1501fc0c1501}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x6d, al=380039003a003b003c003d003e000000}
    ProbeDirEnt {status=0x00, name=»NETKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x1f, al=70007100000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72007300740075007600770078007900}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7a007b007c007d007e007f0080008100}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=82008300840085008600870088008900}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=8a008b008c008d008e008f0090009100}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=92009300940095009600970098009900}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=9a009b009c009d009e009f00a000a100}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=a200a300a400a500a600a700a800a900}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=aa00ab00ac00ad00ae00af00b000b100}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x7b, al=b200b300b400b500b600b700b800b900}
    ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ba00bb00bc00bd00be00bf00c000c100}
    ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900}
    ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x1b, al=ca00cb00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS1   CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300}
    ProbeDirEnt {status=0x00, name=»XIOS1   CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x7c, al=d400d500d600d700d800d900da00db00}
    ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=dc00dd00de0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=df00e000e100e200e300e400e500e600}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ef00f000f100f200f300f400f500f600}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=f700f800f900fa00fb00000000000000}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fc00fd00fe00ff000001010102010301}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=0c010d010e0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0f011001110112011301140115011601}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1701180119011a011b011c011d011e01}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1f012001210122012301000000000000}
    ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=24010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=250126012701280129012a012b012c01}
    ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=2d010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2e012f01300131013201330134013501}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=36013701380139013a013b013c013d01}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=3e013f01400141014201430144014501}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x13, al=46014701000000000000000000000000}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=480149014a014b014c01000000000000}
    ProbeDirEnt {status=0x00, name=»SUBMIT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=4d014e01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4f015001510152015301540155015601}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5701580159015a015b015c015d015e01}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=5f016001610162016301640165016601}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=67016801000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=69016a016b016c016d016e016f017001}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=71017201730174017501760177017801}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x13, al=79017a01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7b017c017d017e017f01800181018201}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=83018401850186018701880189018a01}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6f, al=8b018c018d018e018f01900191010000}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=9a019b019c019d019e019f0100000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a001a101a201a301a401a501a601a701}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=a801a901000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=aa01ab01ac01ad01ae01af01b001b101}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b201b301b401b501b601b701b801b901}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=ba010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCNIOS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=bb010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bc01bd01be01bf01c001c101c201c301}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=c4010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=c501c601c701c801c901ca01cb01cc01}
    ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cd01ce01cf01d001d101d201d301d401}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=d501d601d701d801d901da0100000000}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=db01dc01dd01de01df01e001e101e201}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=e3010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e401e501e601e701e801e901ea01eb01}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=ec01ed01ee01ef010000000000000000}
    ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f001f101f201f301f401f501f601f701}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f801f901fa01fb01fc01fd01fe01ff01}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=00020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01020202030204020502060207020802}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=09020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=0a020b020c020d020000000000000000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0e020f02100211021202130214021502}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=16021702180200000000000000000000}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=19021a021b0200000000000000000000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=1c021d021e0200000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=1f022002000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=21022202230224022502260227022802}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0b, al=29020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VOUT    RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=2a022b02000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=2c020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=2d022e022f0230020000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=31020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIN759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=32023302000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=34020000000000000000000000000000}
  0x0009000 (2, 0, 5)
    ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=35020000000000000000000000000000}
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+  96 -   0 <Tree 0x0-0x9a000-0x134000>
+  96 -  11 <Tree 0x0-0x9a000-0x134000>

Full view