|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 B C G L M N P R S T X
Length: 1261568 (0x134000) Description: Bits:30002785 SW1500 Concurrent DOS SYSTEM DISKETTE 4.2 - disk 2/3 Types: 5¼" Floppy Disk, CpmFSAuto Notes: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232} Signature: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1 Confidence score: +96/-0 Sector size: 1024 Block size: 2048 Directory entries: 512 Block number size: 16 Extent-mask: 0x00 Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8 Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user | bc | length | name | artifact |
---|---|---|---|---|
0 | 0 | 23424 | BDOS.CON | ⟦ad8bb84b7⟧ |
0 | 0 | 41984 | BESKED.CMD | ⟦710669035⟧ |
0 | 0 | 214400 | CCPM.SYS | ⟦e31eae776⟧ |
0 | 0 | 6016 | CIO.CON | ⟦028cad1c9⟧ |
0 | 0 | 640 | CLOCK.RSP | ⟦47fd682bf⟧ |
0 | 0 | 49536 | GENCCPM.CMD | ⟦d42cf4f41⟧ |
0 | 0 | 256 | GENINST.SUB | ⟦4ec9be81f⟧ TextFile |
0 | 0 | 39424 | LANREL.CMD | ⟦ebd7ff393⟧ |
0 | 0 | 39680 | MATREL.CMD | ⟦b25b5c439⟧ |
0 | 0 | 19712 | MATRELHW.CMD | ⟦1338cc08b⟧ |
0 | 0 | 19712 | MATRELSW.CMD | ⟦653eb29cf⟧ |
0 | 0 | 6144 | MEM.CON | ⟦4cfb035ee⟧ |
0 | 0 | 1792 | MINTERN.CMD | ⟦6f10a2e4e⟧ |
0 | 0 | 23680 | NETDRV.RSP | ⟦fada983a3⟧ |
0 | 0 | 256 | NETKONF | ⟦f1fb01cb5⟧ TextFile |
0 | 0 | 51968 | NETVEDL.CMD | ⟦a8f127868⟧ |
0 | 0 | 3200 | PIN750.RSP | ⟦65a6ea281⟧ |
0 | 0 | 17280 | PINTERN.CMD | ⟦3100e53f9⟧ |
0 | 0 | 37888 | POSTHUS.CMD | ⟦8a3a813a2⟧ |
0 | 0 | 35200 | RCADDNET.CMD | ⟦21f720976⟧ |
0 | 0 | 5120 | RCDSP.CMD | ⟦b95b71ff5⟧ |
0 | 0 | 46848 | RCGENNET.CMD | ⟦d18d97312⟧ |
0 | 0 | 1920 | RCNIOS.CMD | ⟦1a810ffb0⟧ |
0 | 0 | 16384 | RCSPL.CMD | ⟦60f369d2a⟧ |
0 | 0 | 3072 | REMOTE.CMD | ⟦6a294b3bd⟧ |
0 | 0 | 33280 | REMTMP.RSP | ⟦9f125c73a⟧ |
0 | 0 | 31744 | RNET.CMD | ⟦fc5e67dae⟧ |
0 | 0 | 38528 | RSNET.CMD | ⟦fcab94e27⟧ |
0 | 0 | 7680 | RTM.CON | ⟦63b8d3445⟧ |
0 | 0 | 640 | SCROLL.RSP | ⟦27844af8c⟧ |
0 | 0 | 39680 | SIOREL.CMD | ⟦8dd96606b⟧ |
0 | 0 | 20736 | SNET.CMD | ⟦831a06dce⟧ |
0 | 0 | 42240 | SPOOL.CMD | ⟦ff889c8d1⟧ |
0 | 0 | 256 | STDKONF | ⟦c91424c2d⟧ TextFile |
0 | 0 | 39808 | STRREL.CMD | ⟦674fbb778⟧ |
0 | 0 | 8960 | SUP.CON | ⟦87adeefee⟧ |
0 | 0 | 3456 | SYSDAT.CON | ⟦0644b0037⟧ |
0 | 0 | 50560 | SYSVEDL.CMD | ⟦5af240ab0⟧ |
0 | 0 | 33152 | TMP750.RSP | ⟦6e964a4f6⟧ |
0 | 0 | 44544 | XIOS.CON | ⟦a6cee416e⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]] First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x8000 26-26-26-26-2-2-2-2 (2, 1) 0xa000 2-2-2-2-2-2-2-2 Total credibility: 112 Block number width: ok16 8 399 1 255 207 False 16 0 8 564 0 False 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00} 00:CCPM SYS rc=0x00b c=0x001 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x0b, al=70000000000000000000000000000000} 00:GENINST SUB rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=71000000000000000000000000000000} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72007300740075007600770078007900} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7a007b007c007d007e007f0080008100} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=82008300840085008600870088008900} 00:GENCCPM CMD rc=0x003 c=0x001 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x03, al=8a000000000000000000000000000000} 00:NETKONF rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»NETKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=8b000000000000000000000000000000} 00:STDKONF rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=8c000000000000000000000000000000} 00:BDOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8d008e008f0090009100920093009400} 00:BDOS CON rc=0x037 c=0x004 ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x37, al=95009600970098000000000000000000} 00:CIO CON rc=0x02f c=0x003 ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2f, al=99009a009b0000000000000000000000} 00:MEM CON rc=0x030 c=0x003 ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=9c009d009e0000000000000000000000} 00:RTM CON rc=0x03c c=0x004 ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=9f00a000a100a2000000000000000000} 00:SUP CON rc=0x046 c=0x005 ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=a300a400a500a600a700000000000000} 00:SYSDAT CON rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=a800a900000000000000000000000000} 00:XIOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=aa00ab00ac00ad00ae00af00b000b100} 00:XIOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b200b300b400b500b600b700b800b900} 00:XIOS CON rc=0x05c c=0x006 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x5c, al=ba00bb00bc00bd00be00bf0000000000} 00:CLOCK RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=c0000000000000000000000000000000} 00:NETDRV RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c100c200c300c400c500c600c700c800} 00:NETDRV RSP rc=0x039 c=0x004 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x39, al=c900ca00cb00cc000000000000000000} 00:PIN750 RSP rc=0x019 c=0x002 ProbeDirEnt {status=0x00, name=»PIN750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=cd00ce00000000000000000000000000} 00:REMTMP RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600} 00:REMTMP RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d700d800d900da00db00dc00dd00de00} 00:REMTMP RSP rc=0x004 c=0x001 ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x04, al=df000000000000000000000000000000} 00:SCROLL RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=e0000000000000000000000000000000} 00:TMP750 RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e100e200e300e400e500e600e700e800} 00:TMP750 RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e900ea00eb00ec00ed00ee00ef00f000} 00:TMP750 RSP rc=0x003 c=0x001 ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x03, al=f1000000000000000000000000000000} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f200f300f400f500f600f700f800f900} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=fa00fb00fc00fd00fe00ff0000010101} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=02010301040105010601070108010901} 00:NETVEDL CMD rc=0x016 c=0x002 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x16, al=0a010b01000000000000000000000000} 00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0c010d010e010f011001110112011301} 00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1401150116011701180119011a011b01} 00:RCGENNETCMD rc=0x06e c=0x007 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6e, al=1c011d011e011f012001210122010000} 00:RCADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01} 00:RCADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b012c012d012e012f01300131013201} 00:RCADDNETCMD rc=0x013 c=0x002 ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x13, al=33013401000000000000000000000000} 00:RCNIOS CMD rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=35010000000000000000000000000000} 00:RNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=36013701380139013a013b013c013d01} 00:RNET CMD rc=0x078 c=0x008 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x78, al=3e013f01400141014201430144014501} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=46014701480149014a014b014c014d01} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4e014f01500151015201530154015501} 00:RSNET CMD rc=0x02d c=0x003 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=56015701580100000000000000000000} 00:SNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=59015a015b015c015d015e015f016001} 00:SNET CMD rc=0x022 c=0x003 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x22, al=61016201630100000000000000000000} 00:REMOTE CMD rc=0x018 c=0x002 ProbeDirEnt {status=0x00, name=»REMOTE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=64016501000000000000000000000000} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=66016701680169016a016b016c016d01} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=6e016f01700171017201730174017501} 00:SPOOL CMD rc=0x04a c=0x005 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=76017701780179017a01000000000000} 00:RCDSP CMD rc=0x028 c=0x003 ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=7b017c017d0100000000000000000000} 00:RCSPL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e017f01800181018201830184018501} 00:LANREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86018701880189018a018b018c018d01} 00:LANREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8e018f01900191019201930194019501} 00:LANREL CMD rc=0x034 c=0x004 ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x34, al=96019701980199010000000000000000} 00:MATREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9a019b019c019d019e019f01a001a101} 00:MATREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a201a301a401a501a601a701a801a901} 00:MATREL CMD rc=0x036 c=0x004 ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=aa01ab01ac01ad010000000000000000} 00:MATRELHWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ae01af01b001b101b201b301b401b501} 00:MATRELHWCMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=b601b701000000000000000000000000} 00:MATRELSWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b801b901ba01bb01bc01bd01be01bf01} 00:MATRELSWCMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=c001c101000000000000000000000000} 00:SIOREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c201c301c401c501c601c701c801c901} 00:SIOREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ca01cb01cc01cd01ce01cf01d001d101} 00:SIOREL CMD rc=0x036 c=0x004 ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=d201d301d401d5010000000000000000} 00:STRREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01} 00:STRREL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=de01df01e001e101e201e301e401e501} 00:STRREL CMD rc=0x037 c=0x004 ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x37, al=e601e701e801e9010000000000000000} 00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ea01eb01ec01ed01ee01ef01f001f101} 00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f201f301f401f501f601f701f801f901} 00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=fa01fb01fc01fd01fe01ff0100020102} 00:SYSVEDL CMD rc=0x00b c=0x001 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0b, al=02020000000000000000000000000000} 00:POSTHUS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=03020402050206020702080209020a02} 00:POSTHUS CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0b020c020d020e020f02100211021202} 00:POSTHUS CMD rc=0x028 c=0x003 ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=13021402150200000000000000000000} 00:BESKED CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=16021702180219021a021b021c021d02} 00:BESKED CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1e021f02200221022202230224022502} 00:BESKED CMD rc=0x048 c=0x005 ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=26022702280229022a02000000000000} 00:PINTERN CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2b022c022d022e022f02300231023202} 00:PINTERN CMD rc=0x007 c=0x001 ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=33020000000000000000000000000000} 00:MINTERN CMD rc=0x00e c=0x001 ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=34020000000000000000000000000000} Block Size 2048.00 2048 extent_mask = 0x0 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order 0 normal-1 (1-2-3-4-5-6-7-8) [25, 25, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +96/-0 24 normal-2 (1-3-5-7-2-4-6-8) [25, 25, 1, 1, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +95/-0 48 normal-3 (1-4-7-2-5-8-3-6) [25, 25, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1] +95/-0 From the beastiarium: CpmFSCr16 +0/-0 File & label names found: 0x0008000 (2, 0, 1) ProbeDirEnt {status=0x20, name=» «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000350c1401350c1401} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x0b, al=70000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=71000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72007300740075007600770078007900} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7a007b007c007d007e007f0080008100} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=82008300840085008600870088008900} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x03, al=8a000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=8b000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=8c000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8d008e008f0090009100920093009400} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x37, al=95009600970098000000000000000000} 0x0008400 (2, 0, 2) ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2f, al=99009a009b0000000000000000000000} ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=9c009d009e0000000000000000000000} ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=9f00a000a100a2000000000000000000} ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=a300a400a500a600a700000000000000} ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=a800a900000000000000000000000000} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=aa00ab00ac00ad00ae00af00b000b100} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b200b300b400b500b600b700b800b900} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x5c, al=ba00bb00bc00bd00be00bf0000000000} ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=c0000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c100c200c300c400c500c600c700c800} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x39, al=c900ca00cb00cc000000000000000000} ProbeDirEnt {status=0x00, name=»PIN750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=cd00ce00000000000000000000000000} ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600} ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d700d800d900da00db00dc00dd00de00} ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x04, al=df000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=e0000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e100e200e300e400e500e600e700e800} ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e900ea00eb00ec00ed00ee00ef00f000} ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x03, al=f1000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f200f300f400f500f600f700f800f900} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=fa00fb00fc00fd00fe00ff0000010101} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=02010301040105010601070108010901} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x16, al=0a010b01000000000000000000000000} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0c010d010e010f011001110112011301} 0x0008800 (2, 0, 3) ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1401150116011701180119011a011b01} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6e, al=1c011d011e011f012001210122010000} ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01} ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b012c012d012e012f01300131013201} ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x13, al=33013401000000000000000000000000} ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=35010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=36013701380139013a013b013c013d01} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x78, al=3e013f01400141014201430144014501} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=46014701480149014a014b014c014d01} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4e014f01500151015201530154015501} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=56015701580100000000000000000000} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=59015a015b015c015d015e015f016001} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x22, al=61016201630100000000000000000000} ProbeDirEnt {status=0x00, name=»REMOTE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=64016501000000000000000000000000} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=66016701680169016a016b016c016d01} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=6e016f01700171017201730174017501} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=76017701780179017a01000000000000} ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=7b017c017d0100000000000000000000} ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e017f01800181018201830184018501} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86018701880189018a018b018c018d01} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8e018f01900191019201930194019501} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x34, al=96019701980199010000000000000000} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9a019b019c019d019e019f01a001a101} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a201a301a401a501a601a701a801a901} 0x0008c00 (2, 0, 4) ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=aa01ab01ac01ad010000000000000000} ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ae01af01b001b101b201b301b401b501} ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=b601b701000000000000000000000000} ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b801b901ba01bb01bc01bd01be01bf01} ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=c001c101000000000000000000000000} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c201c301c401c501c601c701c801c901} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ca01cb01cc01cd01ce01cf01d001d101} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=d201d301d401d5010000000000000000} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=de01df01e001e101e201e301e401e501} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x37, al=e601e701e801e9010000000000000000} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ea01eb01ec01ed01ee01ef01f001f101} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f201f301f401f501f601f701f801f901} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=fa01fb01fc01fd01fe01ff0100020102} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0b, al=02020000000000000000000000000000} ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=03020402050206020702080209020a02} ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0b020c020d020e020f02100211021202} ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=13021402150200000000000000000000} ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=16021702180219021a021b021c021d02} ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1e021f02200221022202230224022502} ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=26022702280229022a02000000000000} ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2b022c022d022e022f02300231023202} ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=33020000000000000000000000000000} ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=34020000000000000000000000000000} 0x0009000 (2, 0, 5) 0x0009400 (2, 0, 6) 0x0009800 (2, 0, 7) 0x0009c00 (2, 0, 8) 0x000a000 (2, 1, 1) 0x000a400 (2, 1, 2) 0x000a800 (2, 1, 3) 0x000ac00 (2, 1, 4) 0x000b000 (2, 1, 5) 0x000b400 (2, 1, 6) 0x000b800 (2, 1, 7) 0x000bc00 (2, 1, 8) + 96 - 0 <Tree 0x0-0x9a000-0x134000> + 95 - 0 <Tree 0x0-0x9a000-0x134000>