|
|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 B C G I L M N P R S T X
Length: 1261568 (0x134000)
Description: Bits:30007368/disk2.imd SW1500 Concurrent DOS 5.0
Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_128)
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature: 1024_2048_0x0_*1+1_2:0_76:1_128
Confidence score: +114/-0
Sector size: 1024
Block size: 2048
Directory entries: 128
Block number size: 16
Extent-mask: 0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
| user | bc | length | name | artifact |
|---|---|---|---|---|
| 0 | 0 | 23936 | BDOS.CON | ⟦8621ffbb8⟧ |
| 0 | 0 | 281984 | CCPM.SYS | ⟦ca2eb360c⟧ |
| 0 | 0 | 7936 | CIO.CON | ⟦67dcf8033⟧ |
| 0 | 0 | 640 | CLOCK.RSP | ⟦47fd682bf⟧ |
| 0 | 0 | 59776 | GENSYS.CMD | ⟦a1e7d4e8e⟧ |
| 0 | 0 | 1024 | GENSYS.CNF | ⟦f5a0d9d29⟧ |
| 0 | 0 | 28160 | IMC.CMD | ⟦4f0ae10f1⟧ |
| 0 | 0 | 38784 | LANREL.CMD | ⟦493d6d0b9⟧ |
| 0 | 0 | 24192 | LIST.CMD | ⟦b303e29f8⟧ |
| 0 | 0 | 39680 | MATREL.CMD | ⟦d412d1cff⟧ |
| 0 | 0 | 19712 | MATRELHW.CMD | ⟦1338cc08b⟧ |
| 0 | 0 | 19712 | MATRELSW.CMD | ⟦653eb29cf⟧ |
| 0 | 0 | 6784 | MEM.CON | ⟦aca410c64⟧ |
| 0 | 0 | 33664 | NETDRV.RSP | ⟦00ce2bd93⟧ |
| 0 | 0 | 1024 | NETSYS.CNF | ⟦410df3113⟧ |
| 0 | 0 | 3328 | PIN750.RSP | ⟦69dd7d241⟧ |
| 0 | 0 | 4864 | RCDSP.CMD | ⟦d323dfd11⟧ |
| 0 | 0 | 58752 | RCGENDOS.CMD | ⟦7ca5a5fec⟧ |
| 0 | 0 | 45952 | RCGENNET.CMD | ⟦69b0d0a5b⟧ |
| 0 | 0 | 1920 | RCNIOS.CMD | ⟦adfff54f9⟧ |
| 0 | 0 | 19072 | RCSPL.CMD | ⟦e51c513cb⟧ |
| 0 | 0 | 7296 | REDIR.RSP | ⟦2fcc847a4⟧ |
| 0 | 0 | 3200 | REMOTE.CMD | ⟦0be48bc52⟧ |
| 0 | 0 | 35968 | REMTMP.RSP | ⟦6a945bd99⟧ |
| 0 | 0 | 29056 | RNET.CMD | ⟦2ca0f8d90⟧ |
| 0 | 0 | 35456 | RSNET.CMD | ⟦5b36ada58⟧ |
| 0 | 0 | 7936 | RTM.CON | ⟦7bf75319b⟧ |
| 0 | 0 | 6272 | SCROLL.RSP | ⟦20fc125da⟧ |
| 0 | 0 | 39680 | SIOREL.CMD | ⟦98802ea8c⟧ |
| 0 | 0 | 18560 | SNET.CMD | ⟦86fe80b39⟧ |
| 0 | 0 | 38272 | SPOOL.CMD | ⟦239a161c3⟧ |
| 0 | 0 | 39808 | STRREL.CMD | ⟦485a1c11d⟧ |
| 0 | 0 | 9088 | SUP.CON | ⟦3cdf216b7⟧ |
| 0 | 0 | 3328 | SYSDAT.CON | ⟦fbd531a73⟧ |
| 0 | 0 | 50560 | SYSVEDL.CMD | ⟦ec085f9e8⟧ |
| 0 | 0 | 36480 | TMP750.RSP | ⟦455db13a4⟧ |
| 0 | 0 | 41472 | XIOS.CON | ⟦eb467b79a⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]]
First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records
Credible directory tracks:
(2, 0) 0x8000 25-25-25-23-1-1-1-1
(2, 1) 0xa000 1-1-1-1-1-1-1-1
Total credibility: 94
Block number width: ok16
8 403 1 255 215 False
16 0 8 573 0 False
Block Sizes:
2048 0x00 +93 -0
1024 0x00 +4 -89
4096 0x01 +4 -89
8192 0x03 +4 -89
16384 0x07 +4 -89
32768 0x0f +4 -89
65536 0x1f +4 -89
128 0x00 +0 -93
256 0x00 +0 -93
512 0x00 +0 -93
Candidate interleaves in order of directory credibility:
Penalty Name Order Resulting dir order
0 normal-1 (1-2-3-4-5-6-7-8) [24, 24, 24, 22] +114/-0
26 normal-2 (1-3-5-7-2-4-6-8) [24, 24, 0, 0, 24, 22] +101/-2
51 normal-3 (1-4-7-2-5-8-3-6) [24, 22, 0, 24, 0, 0, 24] +106/-2
From the beastiarium: CpmFSCr16 +0/-0
File & label names found:
0x0008000 (2, 0, 1)
ProbeDirEnt {status=0x20, name=»SW1500 2/3 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000480d1128480d1128}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0e, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0f, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x10, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x11, bc=0x00, xh=0x00, rc=0x1b, al=90009100000000000000000000000000}
ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92009300940095009600970098009900}
ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=9a009b009c009d009e009f00a000a100}
ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=a200a300a400a500a600a700a800a900}
ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x53, al=aa00ab00ac00ad00ae00af0000000000}
ProbeDirEnt {status=0x00, name=»GENSYS CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b0000000000000000000000000000000}
0x0008400 (2, 0, 2)
ProbeDirEnt {status=0x00, name=»NETSYS CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b1000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b200b300b400b500b600b700b800b900}
ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ba00bb00bc00bd00be00bf00c000c100}
ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900}
ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x4b, al=ca00cb00cc00cd00ce00000000000000}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d700d800d900da00db00dc00dd00de00}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x67, al=df00e000e100e200e300e400e5000000}
ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=e6000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00}
ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=ef00f000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f100f200f300f400f500f600f700f800}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f900fa00fb00fc00fd00fe00ff000001}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x15, al=01010201000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=03010401050106010701080109010a01}
ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x63, al=0b010c010d010e010f01100111010000}
ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=12011301140115011601170118011901}
ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x3b, al=1a011b011c011d010000000000000000}
ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=1e011f01200121010000000000000000}
ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x35, al=22012301240125010000000000000000}
ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=26012701280129010000000000000000}
ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x47, al=2a012b012c012d012e01000000000000}
ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=2f013001000000000000000000000000}
ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=31013201330134013501360137013801}
0x0008800 (2, 0, 3)
ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=39013a013b013c013d013e013f014001}
ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x44, al=41014201430144014501000000000000}
ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=46010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4701480149014a014b014c014d014e01}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4f015001510152015301540155015601}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x07, al=57010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»PIN750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=58015901000000000000000000000000}
ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5a015b015c015d015e015f0160016101}
ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=62016301640165016601670168016901}
ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1d, al=6a016b01000000000000000000000000}
ProbeDirEnt {status=0x00, name=»REDIR RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x39, al=6c016d016e016f010000000000000000}
ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x31, al=70017101720173010000000000000000}
ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7401750176017701780179017a017b01}
ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7c017d017e017f018001810182018301}
ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x19, al=84018501000000000000000000000000}
ProbeDirEnt {status=0x00, name=»REMOTE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=86018701000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=880189018a018b018c018d018e018f01}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=90019101920193019401950196019701}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=980199019a0100000000000000000000}
ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9b019c019d019e019f01a001a101a201}
ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x15, al=a301a401000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x26, al=a501a601a70100000000000000000000}
ProbeDirEnt {status=0x00, name=»LIST CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a801a901aa01ab01ac01ad01ae01af01}
ProbeDirEnt {status=0x00, name=»LIST CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=b001b101b201b3010000000000000000}
0x0008c00 (2, 0, 4)
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b401b501b601b701b801b901ba01bb01}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bc01bd01be01bf01c001c101c201c301}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c401c501c601c701c801c901ca01cb01}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0b, al=cc010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cd01ce01cf01d001d101d201d301d401}
ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d501d601d701d801d901da01db01dc01}
ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=dd01de01df0100000000000000000000}
ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e001e101e201e301e401e501e601e701}
ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e801e901ea01eb01ec01ed01ee01ef01}
ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=f001f101f201f3010000000000000000}
ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01}
ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=fc01fd01000000000000000000000000}
ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fe01ff01000201020202030204020502}
ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=06020702000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080209020a020b020c020d020e020f02}
ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10021102120213021402150216021702}
ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=180219021a021b020000000000000000}
ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1c021d021e021f022002210222022302}
ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2402250226022702280229022a022b02}
ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x37, al=2c022d022e022f020000000000000000}
ProbeDirEnt {status=0x00, name=»IMC CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=30023102320233023402350236023702}
ProbeDirEnt {status=0x00, name=»IMC CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x5c, al=380239023a023b023c023d0200000000}
* 114 - 0 [1, 2, 3, 4, 5, 6, 7, 8]
+ 106 - 2 [1, 4, 7, 2, 5, 8, 3, 6]
+ 101 - 2 [1, 3, 5, 7, 2, 4, 6, 8]