DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 B C G I L M N P R S T X

⟦6cdf406b0⟧ Bits:30002704 SW1500 Concurrent DOS 5.2 Disk 2/3, 5¼" Floppy Disk, CpmFSAuto

    Length: 1261568 (0x134000)
    Description: Bits:30002704 SW1500 Concurrent DOS 5.2 Disk 2/3
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CpmFSAuto_1024_2048_0x0_512_*3+1+2+3_2:0_76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto_1024_2048_0x0_512_*3+1+2+3_2:0_76:1
Confidence score:  +97/-14
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 4, 7, 2, 5, 8, 3, 6
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 24064 BDOS.CON ⟦2f9df8b79⟧
0 0 284416 CCPM.SYS ⟦504ddf2f1⟧
0 0 7936 CIO.CON ⟦59181b0f3⟧
0 0 640 CLOCK.RSP ⟦f4390e2dd⟧
0 0 59776 GENSYS.CMD ⟦1fb4441c2⟧
0 0 1024 GENSYS.CNF ⟦eb712d523⟧
0 0 28544 IMC.CMD ⟦519e11555⟧
0 0 9856 IMCSTART.CMD ⟦53d2b3783⟧
0 0 9856 IMCSTOP.CMD ⟦60bfc5fca⟧
0 0 38784 LANREL.CMD ⟦b5c80497e⟧
0 0 24320 LIST.CMD ⟦8de436605⟧
0 0 39680 MATREL.CMD ⟦3f26317f3⟧
0 0 18560 MATRELHW.CMD ⟦f0623d1d0⟧
0 0 19712 MATRELSW.CMD ⟦e62be5465⟧
0 0 6912 MEM.CON ⟦ace9aa772⟧
0 0 34688 NETDRV.RSP ⟦440af8ff8⟧
0 0 1024 NETSYS.CNF ⟦69609b559⟧
0 0 3072 PIN750.RSP ⟦d688cee65⟧
0 0 4864 RCDSP.CMD ⟦da442dada⟧
0 0 58880 RCGENDOS.CMD ⟦95517e810⟧
0 0 45824 RCGENNET.CMD ⟦da3641123⟧
0 0 1920 RCNIOS.CMD ⟦db982ab69⟧
0 0 16896 RCSPL.CMD ⟦47129e6f1⟧
0 0 7424 REDIR.RSP ⟦159bb0a0e⟧
0 0 3200 REMOTE.CMD ⟦ee689b338⟧
0 0 36224 REMTMP.RSP ⟦337d39767⟧
0 0 29056 RNET.CMD ⟦c011a1311⟧
0 0 35456 RSNET.CMD ⟦b159cf852⟧
0 0 7808 RTM.CON ⟦3b60f937f⟧
0 0 6272 SCROLL.RSP ⟦84e4d7945⟧
0 0 39680 SIOREL.CMD ⟦adea9c58e⟧
0 0 18560 SNET.CMD ⟦7850ba8b8⟧
0 0 38272 SPOOL.CMD ⟦993d2a7f8⟧
0 0 39808 STRREL.CMD ⟦15735ece9⟧
0 0 9216 SUP.CON ⟦bfdbc1ee2⟧
0 0 3328 SYSDAT.CON ⟦7d647b75e⟧
0 0 50560 SYSVEDL.CMD ⟦ce8b3e7e9⟧
0 0 36736 TMP750.RSP ⟦d53a3adc5⟧
0 0 41600 XIOS.CON ⟦73edee140⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 26-26-26-26-2-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 112

Block number width: ok16

   8   421     1   255   215  False
  16     0     8   583     0  False

Block Sizes:
    2048 0x00 +95 -0
    1024 0x00 +4 -91
    4096 0x01 +4 -91
    8192 0x03 +4 -91
   16384 0x07 +4 -91
   32768 0x0f +4 -91
   65536 0x1f +4 -91
     512 0x00 +1 -94
     128 0x00 +0 -95
     256 0x00 +0 -95

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [25, 25, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +96/-0
     24  normal-2     (1-3-5-7-2-4-6-8)                                                         [25, 25, 1, 1, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +96/-13
     48  normal-3     (1-4-7-2-5-8-3-6)                                                         [25, 25, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +97/-14
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»SW1500 2-3 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000cd0e1035cd0e1035}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0e, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0f, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x10, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x11, bc=0x00, xh=0x00, rc=0x2e, al=90009100920000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=93009400950096009700980099009a00}
    ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=9b009c009d009e009f00a000a100a200}
    ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00}
    ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x53, al=ab00ac00ad00ae00af00b00000000000}
    ProbeDirEnt {status=0x00, name=»GENSYS  CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b1000000000000000000000000000000}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»NETSYS  CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b2000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00}
    ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bb00bc00bd00be00bf00c000c100c200}
    ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c300c400c500c600c700c800c900ca00}
    ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x4c, al=cb00cc00cd00ce00cf00000000000000}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d000d100d200d300d400d500d600d700}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d800d900da00db00dc00dd00de00df00}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x66, al=e000e100e200e300e400e500e6000000}
    ProbeDirEnt {status=0x00, name=»RCNIOS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=e7000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e800e900ea00eb00ec00ed00ee00ef00}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=f000f100000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f200f300f400f500f600f700f800f900}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=fa00fb00fc00fd00fe00ff0000010101}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x15, al=02010301000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x63, al=0c010d010e010f011001110112010000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=13011401150116011701180119011a01}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x3c, al=1b011c011d011e010000000000000000}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=1f012001210122010000000000000000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x36, al=23012401250126010000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=2701280129012a010000000000000000}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x48, al=2b012c012d012e012f01000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=30013101000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=32013301340135013601370138013901}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=3a013b013c013d013e013f0140014101}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x45, al=42014301440145014601000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=47010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=480149014a014b014c014d014e014f01}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=50015101520153015401550156015701}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x0f, al=58010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIN750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=59015a01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b015c015d015e015f01600161016201}
    ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63016401650166016701680169016a01}
    ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1f, al=6b016c01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REDIR   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=6d016e016f0170010000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x31, al=71017201730174010000000000000000}
    ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=750176017701780179017a017b017c01}
    ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7d017e017f0180018101820183018401}
    ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1b, al=85018601000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REMOTE  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=87018801000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=89018a018b018c018d018e018f019001}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=91019201930194019501960197019801}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=99019a019b0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9c019d019e019f01a001a101a201a301}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x04, al=a4010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x26, al=a501a601a70100000000000000000000}
    ProbeDirEnt {status=0x00, name=»LIST    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a801a901aa01ab01ac01ad01ae01af01}
    ProbeDirEnt {status=0x00, name=»LIST    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3e, al=b001b101b201b3010000000000000000}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b401b501b601b701b801b901ba01bb01}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bc01bd01be01bf01c001c101c201c301}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c401c501c601c701c801c901ca01cb01}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0b, al=cc010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cd01ce01cf01d001d101d201d301d401}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d501d601d701d801d901da01db01dc01}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=dd01de01df0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e001e101e201e301e401e501e601e701}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e801e901ea01eb01ec01ed01ee01ef01}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=f001f101f201f3010000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=fc01fd01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fe01ff01000201020202030204020502}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=06020702000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080209020a020b020c020d020e020f02}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10021102120213021402150216021702}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=180219021a021b020000000000000000}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1c021d021e021f022002210222022302}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2402250226022702280229022a022b02}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x37, al=2c022d022e022f020000000000000000}
    ProbeDirEnt {status=0x00, name=»IMC     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=30023102320233023402350236023702}
    ProbeDirEnt {status=0x00, name=»IMC     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x5f, al=380239023a023b023c023d0200000000}
    ProbeDirEnt {status=0x00, name=»IMCSTARTCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=3e023f02400241024202000000000000}
    ProbeDirEnt {status=0x00, name=»IMCSTOP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=43024402450246024702000000000000}
  0x0009000 (2, 0, 5)
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+  97 -  14 <Tree 0x0-0x9a000-0x134000>
+  96 -   0 <Tree 0x0-0x9a000-0x134000>

Full view