DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 0 5 B C D E F G I K L M N P R S T X h p q s

⟦c683112a0⟧ Bits:30004361/disk2.imd SW1458 Concurrent DOS Distributionsdiskette 5.0, 5¼" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1261568 (0x134000)
    Description: Bits:30004361/disk2.imd SW1458 Concurrent DOS Distributionsdiskette 5.0
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CpmFSAuto,1024,2048,512,0x0,1<2,2:0-76:1, CpmFSAuto,1024,2048,512,0x0,1<2<3,2:0-76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto,1024,2048,512,0x0,1<2,2:0-76:1
Confidence score:  +88/-15
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 3, 5, 7, 2, 4, 6, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 24064 BDOS.CON ⟦d59d9a655⟧
0 0 280192 CCPM.SYS ⟦2bd3da4e5⟧
0 0 7936 CIO.CON ⟦1e9784089⟧
0 0 640 CLOCK.RSP ⟦da2c4fd73⟧
0 0 60288 GENSYS.CMD ⟦f4f7dc52d⟧
0 0 1024 GENSYS.CNF ⟦46c7ade49⟧ 0xe5[0x400]
0 0 28544 IMC.CMD ⟦e1ec1818f⟧
0 0 9856 IMCSTART.CMD ⟦a8b2dc678⟧
0 0 9856 IMCSTOP.CMD ⟦bc28b5dee⟧
0 0 38784 LANREL.CMD ⟦77989cece⟧
0 0 28928 LIST.CMD ⟦f1d35a5e7⟧
0 0 39680 MATREL.CMD ⟦222cb0f9e⟧
0 0 18560 MATRELHW.CMD ⟦c23c91ee3⟧
0 0 19712 MATRELSW.CMD ⟦903f8f0a3⟧
0 0 6912 MEM.CON ⟦f0b2639ec⟧
0 0 34688 NETDRV.RSP ⟦60f3f8f9b⟧
0 0 1024 NETSYS.CNF ⟦e5858fbd8⟧
0 0 3072 PIN759.RSP ⟦fc45148a7⟧
0 0 4864 RCDSP.CMD ⟦5d772e667⟧
0 0 58880 RCGENDOS.CMD ⟦8ac78b2fb⟧
0 0 45824 RCGENNET.CMD ⟦157654ece⟧
0 0 1920 RCNIOS.CMD ⟦94ca288e9⟧
0 0 16896 RCSPL.CMD ⟦1d9a631cb⟧
0 0 7424 REDIR.RSP ⟦87138b3b0⟧
0 0 29056 RNET.CMD ⟦866e1c4bc⟧
0 0 35456 RSNET.CMD ⟦27a424ead⟧
0 0 7808 RTM.CON ⟦b31ddbf63⟧
0 0 6272 SCROLL.RSP ⟦ea92766d5⟧
0 0 38528 SIOREL.CMD ⟦ad1aa735a⟧
0 0 18560 SNET.CMD ⟦af70db4a8⟧
0 0 42368 SPOOL.CMD ⟦f4384dcb0⟧
0 0 9216 SUP.CON ⟦aa994abb9⟧
0 0 3328 SYSDAT.CON ⟦d950fa981⟧
0 0 49024 SYSVEDL.CMD ⟦a63691385⟧
0 0 36736 TMP759.RSP ⟦e20c2c4b0⟧
0 0 38528 XIOS.CON ⟦2e68a24e9⟧

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto,1024,2048,512,0x0,1<2<3,2:0-76:1
Confidence score:  +88/-15
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 4, 7, 2, 5, 8, 3, 6
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 24064 BDOS.CON ⟦3e3a7f8f7⟧
0 0 280192 CCPM.SYS ⟦696c79b34⟧
0 0 7936 CIO.CON ⟦c570ee909⟧
0 0 640 CLOCK.RSP ⟦fa5d82f35⟧
0 0 60288 GENSYS.CMD ⟦a3fc71689⟧
0 0 1024 GENSYS.CNF ⟦5f70bf18a⟧ 0x00[0x400]
0 0 28544 IMC.CMD ⟦c7e141052⟧
0 0 9856 IMCSTART.CMD ⟦238d53bd0⟧
0 0 9856 IMCSTOP.CMD ⟦1f54af6ba⟧
0 0 38784 LANREL.CMD ⟦6312c2175⟧
0 0 28928 LIST.CMD ⟦cd06963fe⟧
0 0 39680 MATREL.CMD ⟦f343ac279⟧
0 0 18560 MATRELHW.CMD ⟦f2ce1585e⟧
0 0 19712 MATRELSW.CMD ⟦195d93e91⟧
0 0 6912 MEM.CON ⟦cf8f67bce⟧
0 0 34688 NETDRV.RSP ⟦440af8ff8⟧
0 0 1024 NETSYS.CNF ⟦e5858fbd8⟧
0 0 3072 PIN759.RSP ⟦35a42813b⟧
0 0 4864 RCDSP.CMD ⟦98c9b77ad⟧
0 0 58880 RCGENDOS.CMD ⟦9174a15b8⟧
0 0 45824 RCGENNET.CMD ⟦d918cd0c1⟧
0 0 1920 RCNIOS.CMD ⟦145a48d46⟧
0 0 16896 RCSPL.CMD ⟦20e365c54⟧
0 0 7424 REDIR.RSP ⟦d53050633⟧
0 0 29056 RNET.CMD ⟦3633bdcdb⟧
0 0 35456 RSNET.CMD ⟦d51e5e448⟧
0 0 7808 RTM.CON ⟦38ee61c38⟧
0 0 6272 SCROLL.RSP ⟦ce2b1bcb8⟧
0 0 38528 SIOREL.CMD ⟦4ae29cab4⟧
0 0 18560 SNET.CMD ⟦6c131f9ff⟧
0 0 42368 SPOOL.CMD ⟦599e388ac⟧
0 0 9216 SUP.CON ⟦21c21012b⟧
0 0 3328 SYSDAT.CON ⟦bbeb785a4⟧
0 0 49024 SYSVEDL.CMD ⟦c56941081⟧
0 0 36736 TMP759.RSP ⟦d53a3adc5⟧
0 0 38528 XIOS.CON ⟦cf1cd678a⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 26-26-26-18-2-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 104

Block number width: ok16

   8   343     1   255   214  False
  16     0     8   542     0  False

00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0e, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0f, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
00:CCPM    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x10, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
00:CCPM    SYS rc=0x00d c=0x001 ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x11, bc=0x00, xh=0x00, rc=0x0d, al=90000000000000000000000000000000}
00:GENSYS  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=91009200930094009500960097009800}
00:GENSYS  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=99009a009b009c009d009e009f00a000}
00:GENSYS  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=a100a200a300a400a500a600a700a800}
00:GENSYS  CMD rc=0x057 c=0x006 ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x57, al=a900aa00ab00ac00ad00ae0000000000}
00:GENSYS  CNF rc=0x008 c=0x001 ProbeDirEnt {status=0x00, name=»GENSYS  CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=af000000000000000000000000000000}
00:NETSYS  CNF rc=0x008 c=0x001 ProbeDirEnt {status=0x00, name=»NETSYS  CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b0000000000000000000000000000000}
00:RCGENDOSCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b100b200b300b400b500b600b700b800}
00:RCGENDOSCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b900ba00bb00bc00bd00be00bf00c000}
00:RCGENDOSCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c100c200c300c400c500c600c700c800}
00:RCGENDOSCMD rc=0x04c c=0x005 ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x4c, al=c900ca00cb00cc00cd00000000000000}
00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ce00cf00d000d100d200d300d400d500}
00:RCGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d600d700d800d900da00db00dc00dd00}
00:RCGENNETCMD rc=0x066 c=0x007 ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x66, al=de00df00e000e100e200e300e4000000}
00:RCNIOS  CMD rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»RCNIOS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=e5000000000000000000000000000000}
00:SNET    CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e600e700e800e900ea00eb00ec00ed00}
00:SNET    CMD rc=0x011 c=0x002 ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=ee00ef00000000000000000000000000}
00:RSNET   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f000f100f200f300f400f500f600f700}
00:RSNET   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f800f900fa00fb00fc00fd00fe00ff00}
00:RSNET   CMD rc=0x015 c=0x002 ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x15, al=00010101000000000000000000000000}
00:RNET    CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=02010301040105010601070108010901}
00:RNET    CMD rc=0x063 c=0x007 ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x63, al=0a010b010c010d010e010f0110010000}
00:BDOS    CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=11011201130114011501160117011801}
00:BDOS    CON rc=0x03c c=0x004 ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x3c, al=19011a011b011c010000000000000000}
00:CIO     CON rc=0x03e c=0x004 ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=1d011e011f0120010000000000000000}
00:MEM     CON rc=0x036 c=0x004 ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x36, al=21012201230124010000000000000000}
00:RTM     CON rc=0x03d c=0x004 ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=25012601270128010000000000000000}
00:SUP     CON rc=0x048 c=0x005 ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x48, al=29012a012b012c012d01000000000000}
00:SYSDAT  CON rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=2e012f01000000000000000000000000}
00:XIOS    CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=30013101320133013401350136013701}
00:XIOS    CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01}
00:XIOS    CON rc=0x02d c=0x003 ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=40014101420100000000000000000000}
00:CLOCK   RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=43010000000000000000000000000000}
00:NETDRV  RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4401450146014701480149014a014b01}
00:NETDRV  RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4c014d014e014f015001510152015301}
00:NETDRV  RSP rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x0f, al=54010000000000000000000000000000}
00:PIN759  RSP rc=0x018 c=0x002 ProbeDirEnt {status=0x00, name=»PIN759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=55015601000000000000000000000000}
00:TMP759  RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5701580159015a015b015c015d015e01}
00:TMP759  RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5f016001610162016301640165016601}
00:TMP759  RSP rc=0x01f c=0x002 ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1f, al=67016801000000000000000000000000}
00:REDIR   RSP rc=0x03a c=0x004 ProbeDirEnt {status=0x00, name=»REDIR   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=69016a016b016c010000000000000000}
00:SCROLL  RSP rc=0x031 c=0x004 ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x31, al=6d016e016f0170010000000000000000}
00:SPOOL   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=71017201730174017501760177017801}
00:SPOOL   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=79017a017b017c017d017e017f018001}
00:SPOOL   CMD rc=0x04b c=0x005 ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4b, al=81018201830184018501000000000000}
00:RCSPL   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86018701880189018a018b018c018d01}
00:RCSPL   CMD rc=0x004 c=0x001 ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x04, al=8e010000000000000000000000000000}
00:RCDSP   CMD rc=0x026 c=0x003 ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x26, al=8f019001910100000000000000000000}
00:LIST    CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LIST    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901}
00:LIST    CMD rc=0x062 c=0x007 ProbeDirEnt {status=0x00, name=»LIST    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x62, al=9a019b019c019d019e019f01a0010000}
00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a101a201a301a401a501a601a701a801}
00:SYSVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a901aa01ab01ac01ad01ae01af01b001}
00:SYSVEDL CMD rc=0x07f c=0x008 ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x7f, al=b101b201b301b401b501b601b701b801}
00:LANREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b901ba01bb01bc01bd01be01bf01c001}
00:LANREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c101c201c301c401c501c601c701c801}
00:LANREL  CMD rc=0x02f c=0x003 ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=c901ca01cb0100000000000000000000}
00:MATREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc01cd01ce01cf01d001d101d201d301}
00:MATREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d401d501d601d701d801d901da01db01}
00:MATREL  CMD rc=0x036 c=0x004 ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=dc01dd01de01df010000000000000000}
00:MATRELHWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e001e101e201e301e401e501e601e701}
00:MATRELHWCMD rc=0x011 c=0x002 ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=e801e901000000000000000000000000}
00:MATRELSWCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ea01eb01ec01ed01ee01ef01f001f101}
00:MATRELSWCMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=f201f301000000000000000000000000}
00:SIOREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01}
00:SIOREL  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=fc01fd01fe01ff010002010202020302}
00:SIOREL  CMD rc=0x02d c=0x003 ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=04020502060200000000000000000000}
00:IMC     CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»IMC     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0702080209020a020b020c020d020e02}
00:IMC     CMD rc=0x05f c=0x006 ProbeDirEnt {status=0x00, name=»IMC     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x5f, al=0f021002110212021302140200000000}
00:IMCSTARTCMD rc=0x04d c=0x005 ProbeDirEnt {status=0x00, name=»IMCSTARTCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=15021602170218021902000000000000}
00:IMCSTOP CMD rc=0x04d c=0x005 ProbeDirEnt {status=0x00, name=»IMCSTOP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=1a021b021c021d021e02000000000000}
Block Size 2048.00 2048 extent_mask = 0x0

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [25, 25, 25, 17, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +87/-0
     24  normal-2     (1-3-5-7-2-4-6-8)                                                         [25, 25, 1, 1, 25, 17, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +88/-15
     48  normal-3     (1-4-7-2-5-8-3-6)                                                         [25, 17, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +88/-15
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»Disk 2/3   «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000210f0800210f0800}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0e, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0f, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x10, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x11, bc=0x00, xh=0x00, rc=0x0d, al=90000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=91009200930094009500960097009800}
    ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=99009a009b009c009d009e009f00a000}
    ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=a100a200a300a400a500a600a700a800}
    ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x57, al=a900aa00ab00ac00ad00ae0000000000}
    ProbeDirEnt {status=0x00, name=»GENSYS  CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=af000000000000000000000000000000}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»NETSYS  CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b0000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b100b200b300b400b500b600b700b800}
    ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b900ba00bb00bc00bd00be00bf00c000}
    ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c100c200c300c400c500c600c700c800}
    ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x4c, al=c900ca00cb00cc00cd00000000000000}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ce00cf00d000d100d200d300d400d500}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d600d700d800d900da00db00dc00dd00}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x66, al=de00df00e000e100e200e300e4000000}
    ProbeDirEnt {status=0x00, name=»RCNIOS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=e5000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e600e700e800e900ea00eb00ec00ed00}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=ee00ef00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f000f100f200f300f400f500f600f700}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f800f900fa00fb00fc00fd00fe00ff00}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x15, al=00010101000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=02010301040105010601070108010901}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x63, al=0a010b010c010d010e010f0110010000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=11011201130114011501160117011801}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x3c, al=19011a011b011c010000000000000000}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=1d011e011f0120010000000000000000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x36, al=21012201230124010000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=25012601270128010000000000000000}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x48, al=29012a012b012c012d01000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=2e012f01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=30013101320133013401350136013701}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=40014101420100000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=43010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4401450146014701480149014a014b01}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4c014d014e014f015001510152015301}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x0f, al=54010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIN759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=55015601000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5701580159015a015b015c015d015e01}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5f016001610162016301640165016601}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1f, al=67016801000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REDIR   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=69016a016b016c010000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x31, al=6d016e016f0170010000000000000000}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=71017201730174017501760177017801}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=79017a017b017c017d017e017f018001}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4b, al=81018201830184018501000000000000}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86018701880189018a018b018c018d01}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x04, al=8e010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x26, al=8f019001910100000000000000000000}
    ProbeDirEnt {status=0x00, name=»LIST    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901}
    ProbeDirEnt {status=0x00, name=»LIST    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x62, al=9a019b019c019d019e019f01a0010000}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a101a201a301a401a501a601a701a801}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a901aa01ab01ac01ad01ae01af01b001}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x7f, al=b101b201b301b401b501b601b701b801}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b901ba01bb01bc01bd01be01bf01c001}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c101c201c301c401c501c601c701c801}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=c901ca01cb0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc01cd01ce01cf01d001d101d201d301}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d401d501d601d701d801d901da01db01}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=dc01dd01de01df010000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e001e101e201e301e401e501e601e701}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=e801e901000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ea01eb01ec01ed01ee01ef01f001f101}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=f201f301000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=fc01fd01fe01ff010002010202020302}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=04020502060200000000000000000000}
    ProbeDirEnt {status=0x00, name=»IMC     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0702080209020a020b020c020d020e02}
    ProbeDirEnt {status=0x00, name=»IMC     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x5f, al=0f021002110212021302140200000000}
    ProbeDirEnt {status=0x00, name=»IMCSTARTCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=15021602170218021902000000000000}
    ProbeDirEnt {status=0x00, name=»IMCSTOP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=1a021b021c021d021e02000000000000}
  0x0009000 (2, 0, 5)
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+  88 -  15 <Tree 0x0-0x9a000-0x134000>
+  88 -  15 <Tree 0x0-0x9a000-0x134000>
+  87 -   0 <Tree 0x0-0x9a000-0x134000>

Full view