|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 B C G I L M N P R S T X
Length: 1261568 (0x134000) Description: Bits:30002704 SW1500 Concurrent DOS 5.2 Disk 2/3 Types: 5¼" Floppy Disk, CpmFSAuto Notes: CpmFSAuto_1024_2048_0x0_512_*3+1+2+3_2:0_76:1
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232} Signature: CpmFSAuto_1024_2048_0x0_512_*3+1+2+3_2:0_76:1 Confidence score: +97/-14 Sector size: 1024 Block size: 2048 Directory entries: 512 Block number size: 16 Extent-mask: 0x00 Sector-interleave: 1, 4, 7, 2, 5, 8, 3, 6 Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user | bc | length | name | artifact |
---|---|---|---|---|
0 | 0 | 24064 | BDOS.CON | ⟦2f9df8b79⟧ |
0 | 0 | 284416 | CCPM.SYS | ⟦504ddf2f1⟧ |
0 | 0 | 7936 | CIO.CON | ⟦59181b0f3⟧ |
0 | 0 | 640 | CLOCK.RSP | ⟦f4390e2dd⟧ |
0 | 0 | 59776 | GENSYS.CMD | ⟦1fb4441c2⟧ |
0 | 0 | 1024 | GENSYS.CNF | ⟦eb712d523⟧ |
0 | 0 | 28544 | IMC.CMD | ⟦519e11555⟧ |
0 | 0 | 9856 | IMCSTART.CMD | ⟦53d2b3783⟧ |
0 | 0 | 9856 | IMCSTOP.CMD | ⟦60bfc5fca⟧ |
0 | 0 | 38784 | LANREL.CMD | ⟦b5c80497e⟧ |
0 | 0 | 24320 | LIST.CMD | ⟦8de436605⟧ |
0 | 0 | 39680 | MATREL.CMD | ⟦3f26317f3⟧ |
0 | 0 | 18560 | MATRELHW.CMD | ⟦f0623d1d0⟧ |
0 | 0 | 19712 | MATRELSW.CMD | ⟦e62be5465⟧ |
0 | 0 | 6912 | MEM.CON | ⟦ace9aa772⟧ |
0 | 0 | 34688 | NETDRV.RSP | ⟦440af8ff8⟧ |
0 | 0 | 1024 | NETSYS.CNF | ⟦69609b559⟧ |
0 | 0 | 3072 | PIN750.RSP | ⟦d688cee65⟧ |
0 | 0 | 4864 | RCDSP.CMD | ⟦da442dada⟧ |
0 | 0 | 58880 | RCGENDOS.CMD | ⟦95517e810⟧ |
0 | 0 | 45824 | RCGENNET.CMD | ⟦da3641123⟧ |
0 | 0 | 1920 | RCNIOS.CMD | ⟦db982ab69⟧ |
0 | 0 | 16896 | RCSPL.CMD | ⟦47129e6f1⟧ |
0 | 0 | 7424 | REDIR.RSP | ⟦159bb0a0e⟧ |
0 | 0 | 3200 | REMOTE.CMD | ⟦ee689b338⟧ |
0 | 0 | 36224 | REMTMP.RSP | ⟦337d39767⟧ |
0 | 0 | 29056 | RNET.CMD | ⟦c011a1311⟧ |
0 | 0 | 35456 | RSNET.CMD | ⟦b159cf852⟧ |
0 | 0 | 7808 | RTM.CON | ⟦3b60f937f⟧ |
0 | 0 | 6272 | SCROLL.RSP | ⟦84e4d7945⟧ |
0 | 0 | 39680 | SIOREL.CMD | ⟦adea9c58e⟧ |
0 | 0 | 18560 | SNET.CMD | ⟦7850ba8b8⟧ |
0 | 0 | 38272 | SPOOL.CMD | ⟦993d2a7f8⟧ |
0 | 0 | 39808 | STRREL.CMD | ⟦15735ece9⟧ |
0 | 0 | 9216 | SUP.CON | ⟦bfdbc1ee2⟧ |
0 | 0 | 3328 | SYSDAT.CON | ⟦7d647b75e⟧ |
0 | 0 | 50560 | SYSVEDL.CMD | ⟦ce8b3e7e9⟧ |
0 | 0 | 36736 | TMP750.RSP | ⟦d53a3adc5⟧ |
0 | 0 | 41600 | XIOS.CON | ⟦73edee140⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]] First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x8000 26-26-26-26-2-2-2-2 (2, 1) 0xa000 2-2-2-2-2-2-2-2 Total credibility: 112 Block number width: ok16 8 421 1 255 215 False 16 0 8 583 0 False Block Sizes: 2048 0x00 +95 -0 1024 0x00 +4 -91 4096 0x01 +4 -91 8192 0x03 +4 -91 16384 0x07 +4 -91 32768 0x0f +4 -91 65536 0x1f +4 -91 512 0x00 +1 -94 128 0x00 +0 -95 256 0x00 +0 -95 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order 0 normal-1 (1-2-3-4-5-6-7-8) [25, 25, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +96/-0 24 normal-2 (1-3-5-7-2-4-6-8) [25, 25, 1, 1, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +96/-13 48 normal-3 (1-4-7-2-5-8-3-6) [25, 25, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1] +97/-14 From the beastiarium: CpmFSCr16 +0/-0 File & label names found: 0x0008000 (2, 0, 1) ProbeDirEnt {status=0x20, name=»SW1500 2-3 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000cd0e1035cd0e1035} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0e, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0f, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x10, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x11, bc=0x00, xh=0x00, rc=0x2e, al=90009100920000000000000000000000} ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=93009400950096009700980099009a00} ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=9b009c009d009e009f00a000a100a200} ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00} ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x53, al=ab00ac00ad00ae00af00b00000000000} ProbeDirEnt {status=0x00, name=»GENSYS CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b1000000000000000000000000000000} 0x0008400 (2, 0, 2) ProbeDirEnt {status=0x00, name=»NETSYS CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b2000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00} ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bb00bc00bd00be00bf00c000c100c200} ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c300c400c500c600c700c800c900ca00} ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x4c, al=cb00cc00cd00ce00cf00000000000000} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d000d100d200d300d400d500d600d700} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d800d900da00db00dc00dd00de00df00} ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x66, al=e000e100e200e300e400e500e6000000} ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=e7000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e800e900ea00eb00ec00ed00ee00ef00} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=f000f100000000000000000000000000} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f200f300f400f500f600f700f800f900} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=fa00fb00fc00fd00fe00ff0000010101} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x15, al=02010301000000000000000000000000} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x63, al=0c010d010e010f011001110112010000} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=13011401150116011701180119011a01} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x3c, al=1b011c011d011e010000000000000000} ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=1f012001210122010000000000000000} ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x36, al=23012401250126010000000000000000} ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=2701280129012a010000000000000000} ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x48, al=2b012c012d012e012f01000000000000} ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=30013101000000000000000000000000} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=32013301340135013601370138013901} 0x0008800 (2, 0, 3) ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=3a013b013c013d013e013f0140014101} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x45, al=42014301440145014601000000000000} ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=47010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=480149014a014b014c014d014e014f01} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=50015101520153015401550156015701} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x0f, al=58010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»PIN750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=59015a01000000000000000000000000} ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b015c015d015e015f01600161016201} ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63016401650166016701680169016a01} ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1f, al=6b016c01000000000000000000000000} ProbeDirEnt {status=0x00, name=»REDIR RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=6d016e016f0170010000000000000000} ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x31, al=71017201730174010000000000000000} ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=750176017701780179017a017b017c01} ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7d017e017f0180018101820183018401} ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1b, al=85018601000000000000000000000000} ProbeDirEnt {status=0x00, name=»REMOTE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=87018801000000000000000000000000} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=89018a018b018c018d018e018f019001} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=91019201930194019501960197019801} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=99019a019b0100000000000000000000} ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9c019d019e019f01a001a101a201a301} ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x04, al=a4010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x26, al=a501a601a70100000000000000000000} ProbeDirEnt {status=0x00, name=»LIST CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a801a901aa01ab01ac01ad01ae01af01} ProbeDirEnt {status=0x00, name=»LIST CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3e, al=b001b101b201b3010000000000000000} 0x0008c00 (2, 0, 4) ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b401b501b601b701b801b901ba01bb01} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bc01bd01be01bf01c001c101c201c301} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c401c501c601c701c801c901ca01cb01} ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0b, al=cc010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cd01ce01cf01d001d101d201d301d401} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d501d601d701d801d901da01db01dc01} ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=dd01de01df0100000000000000000000} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e001e101e201e301e401e501e601e701} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e801e901ea01eb01ec01ed01ee01ef01} ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=f001f101f201f3010000000000000000} ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01} ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=fc01fd01000000000000000000000000} ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fe01ff01000201020202030204020502} ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=06020702000000000000000000000000} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080209020a020b020c020d020e020f02} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10021102120213021402150216021702} ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=180219021a021b020000000000000000} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1c021d021e021f022002210222022302} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2402250226022702280229022a022b02} ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x37, al=2c022d022e022f020000000000000000} ProbeDirEnt {status=0x00, name=»IMC CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=30023102320233023402350236023702} ProbeDirEnt {status=0x00, name=»IMC CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x5f, al=380239023a023b023c023d0200000000} ProbeDirEnt {status=0x00, name=»IMCSTARTCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=3e023f02400241024202000000000000} ProbeDirEnt {status=0x00, name=»IMCSTOP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=43024402450246024702000000000000} 0x0009000 (2, 0, 5) 0x0009400 (2, 0, 6) 0x0009800 (2, 0, 7) 0x0009c00 (2, 0, 8) 0x000a000 (2, 1, 1) 0x000a400 (2, 1, 2) 0x000a800 (2, 1, 3) 0x000ac00 (2, 1, 4) 0x000b000 (2, 1, 5) 0x000b400 (2, 1, 6) 0x000b800 (2, 1, 7) 0x000bc00 (2, 1, 8) + 97 - 14 <Tree 0x0-0x9a000-0x134000> + 96 - 0 <Tree 0x0-0x9a000-0x134000>