DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 A B C D G I L M N P R S T V X

⟦0ef4a8f52⟧ Bits:30007365/disk2.imd SW1500 CCP/M 86 v. 3.1 Release 2.2, 5¼" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1261568 (0x134000)
    Description: Bits:30007365/disk2.imd SW1500 CCP/M 86 v. 3.1 Release 2.2
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_128)

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         1024_2048_0x0_*1+1_2:0_76:1_128
Confidence score:  +107/-0 
Sector size:       1024
Block size:        2048
Directory entries: 128
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 12544 ADDNET.CMD ⟦5b727c266⟧
0 0 15744 BDOS.CON ⟦bd8af7c56⟧
0 0 143744 CCPM.SYS ⟦fde7a1305⟧
0 0 5504 CIO.CON ⟦854488341⟧
0 0 640 CLOCK.RSP ⟦9b24ff61d⟧
0 0 24192 CPADDNET.CMD ⟦ae28f2c25⟧
0 0 41344 CPGENNET.CMD ⟦32cb584f7⟧
0 0 35584 DRNET.CMD ⟦2dc63c38e⟧
0 0 12800 DSP.CMD ⟦acf6871d9⟧
0 0 52608 GENCCPM.CMD ⟦12c309ec9⟧
0 0 12544 GENNET.CMD ⟦cb9d43b50⟧
0 0 11392 LOCAL.CMD ⟦df81e6a32⟧
0 0 16512 LOGOFF.CMD ⟦054f6893e⟧
0 0 18432 LOGON.CMD ⟦711ff7e7d⟧
0 0 6144 MEM.CON ⟦a45ffee3e⟧
0 0 16000 NAMES.CMD ⟦003bd88d2⟧
0 0 22912 NAMESMOD.CMD ⟦ea69a1aa9⟧
0 0 17536 NET.CMD ⟦4f982e6be⟧
0 0 17664 NETDRV.RSP ⟦6de4aef19⟧
0 0 22784 NETDRVB.RSP ⟦8077c95d5⟧
0 0 16384 NETOFF.CMD ⟦8243b6545⟧
0 0 16384 NETON.CMD ⟦d0b4b8648⟧
0 0 17920 NETSTAT.CMD ⟦c67d05638⟧
0 0 38144 NETVEDL.CMD ⟦48cbc5d3c⟧
0 0 1920 NIOS.CMD ⟦386443e78⟧
0 0 1792 NIOS1.CMD ⟦ea6840b62⟧
0 0 3328 PIN750.RSP ⟦5cd968efd⟧
0 0 1152 R.CMD ⟦fda426646⟧
0 0 128 RDEF ⟦1a934559b⟧ TextFile
0 0 3072 REMOTE.CMD ⟦6a294b3bd⟧
0 0 7296 REMTMP.RSP ⟦42279eb5b⟧
0 0 27264 RNET.CMD ⟦48b2b85ba⟧
0 0 128 RSDEF ⟦0adbbdd18⟧ TextFile
0 0 33408 RSNET.CMD ⟦0eabf50a3⟧
0 0 7552 RTM.CON ⟦54ac68e7e⟧
0 0 640 SCROLL.RSP ⟦27844af8c⟧
0 0 128 SDEF ⟦4eb454ef9⟧ TextFile
0 0 19712 SNET.CMD ⟦5dce97f5c⟧
0 0 21120 SPL.CMD ⟦ffcd99468⟧
0 0 33664 SPOOL.CMD ⟦2856ddf89⟧
0 0 256 STDKONF ⟦978f529ee⟧ TextFile
0 0 5632 SUP.CON ⟦8b0838509⟧
0 0 3328 SYSDAT.CON ⟦13f8b41e3⟧
0 0 7168 TMP750.RSP ⟦d1d8fec28⟧
0 0 2944 VOUT.RSP ⟦f665ed891⟧
0 0 33280 XIOS.CON ⟦a15559863⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 25-25-25-10-1-1-1-1
   (2, 1)  0xa000 1-1-1-1-1-1-1-1

Total credibility: 81

Block number width: ok16

   8   188     1   254   209  False
  16     0     8   426     0  False

Block Sizes:
    2048 0x00 +80 -0
    1024 0x00 +10 -70
    4096 0x01 +9 -71
    8192 0x03 +9 -71
   16384 0x07 +9 -71
   32768 0x0f +9 -71
   65536 0x1f +9 -71
     512 0x00 +6 -74
     256 0x00 +5 -75
     128 0x00 +4 -76

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [24, 24, 24, 9]   +107/-0
     26  normal-2     (1-3-5-7-2-4-6-8)                                                         [24, 24, 0, 0, 24, 9]   +87/-10
     51  normal-3     (1-4-7-2-5-8-3-6)                                                         [24, 9, 0, 24, 0, 0, 24]   +97/-11
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»Disk 2/2   «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000030a1303030a1303}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x63, al=480049004a004b004c004d004e000000}
    ProbeDirEnt {status=0x00, name=»ADDNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=4f005000510052005300540055000000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=56005700580059005a005b005c005d00}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=5e005f00600000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=61000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=62006300640065006600670068006900}
    ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=6a006b006c006d000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6e006f00700071007200730074007500}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=76007700780079007a007b007c007d00}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=7e007f00800081008200000000000000}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=83008400850086008700880089008a00}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8b008c008d008e008f00900091009200}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x16, al=93009400000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DSP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x64, al=950096009700980099009a009b000000}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9c009d009e009f00a000a100a200a300}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a400a500a600a700a800a900aa00ab00}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=ac00ad00ae00af00b000b100b200b300}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=b400b500000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=b600b700b800b900ba00bb00bc000000}
    ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=bd00be00bf00c000c100c20000000000}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c300c400c500c600c700c800c900ca00}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=cb000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=d4000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=d500d600d70000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=d800d900da00db00dc00dd00de00df00}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e000e100e200e300e400e500e600e700}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=e800e900ea00eb000000000000000000}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ec00ed00ee00ef00f000f100f200f300}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=f4000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f500f600f700f800f900fa00fb00fc00}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=fd000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fe00ff00000101010201030104010501}
    ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=06010701080109010000000000000000}
    ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0a010b010c010d010e010f0110011101}
    ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=12011301140115011601170118011901}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1a011b011c011d011e011f0120012101}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=22010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b012c012d012e012f01300131013201}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2a, al=33013401350100000000000000000000}
    ProbeDirEnt {status=0x00, name=»NIOS    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=36010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NIOS1   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=37010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIN750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=38013901000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»R       CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=3a010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RDEF       «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3b010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REMOTE  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=3c013d01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x39, al=3e013f01400141010000000000000000}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=42014301440145014601470148014901}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=4a014b014c014d014e014f0100000000}
    ProbeDirEnt {status=0x00, name=»RSDEF      «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=50010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=51015201530154015501560157015801}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=59015a015b015c015d015e015f016001}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=61010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=62016301640165010000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=66010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SDEF       «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=67010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=680169016a016b016c016d016e016f01}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=70017101000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPL     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72017301740175017601770178017901}
    ProbeDirEnt {status=0x00, name=»SPL     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x25, al=7a017b017c0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7d017e017f0180018101820183018401}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=850186018701880189018a018b018c01}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x07, al=8d010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=8e010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=8f019001910100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=92019301000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=94019501960197010000000000000000}
    ProbeDirEnt {status=0x00, name=»VOUT    RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=98019901000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9a019b019c019d019e019f01a001a101}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a201a301a401a501a601a701a801a901}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x04, al=aa010000000000000000000000000000}
* 107 -   0 [1, 2, 3, 4, 5, 6, 7, 8]
+  97 -  11 [1, 4, 7, 2, 5, 8, 3, 6]
+  87 -  10 [1, 3, 5, 7, 2, 4, 6, 8]

Full view