DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 B C D E H I L M N P R S T

⟦c64c970f5⟧ Bits:30007367/disk3.imd SW1500 Concurrent DOS 4.2, 5¼" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1261568 (0x134000)
    Description: Bits:30007367/disk3.imd SW1500 Concurrent DOS 4.2
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_64)

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         1024_2048_0x0_*1+1_2:0_76:1_64
Confidence score:  +73/-0 
Sector size:       1024
Block size:        2048
Directory entries: 64
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 10240 BATCH.CMD ⟦dd0f0d8bc⟧
0 0 2432 CHDIR.CMD ⟦0771f485e⟧
0 0 21760 CHSET.CMD ⟦cc23f3506⟧
0 0 28672 COPY.EXE ⟦ce0fea643⟧
0 0 2560 DATE.EXE ⟦08ad9a562⟧
0 0 2432 ERA.CMD ⟦b5aa7b2b4⟧
0 0 3968 ERAQ.CMD ⟦45adc204a⟧
0 0 1536 ERASE.EXE ⟦988769a3c⟧
0 0 7680 HELP.CMD ⟦3cb4a166f⟧
0 0 41984 HELP.HLP ⟦ab2121918⟧
0 0 36992 INITDIR.CMD ⟦e8b36210b⟧
0 0 11392 LOCAL.CMD ⟦e9ff9621a⟧
0 0 16384 LOGOFF.CMD ⟦91086fa6f⟧
0 0 18304 LOGON.CMD ⟦edc51be3e⟧
0 0 2304 MKDIR.CMD ⟦44cba90dc⟧
0 0 15872 NAMES.CMD ⟦d8b762cc7⟧
0 0 22784 NAMESMOD.CMD ⟦0db2a04fd⟧
0 0 17536 NET.CMD ⟦8f8da0d3e⟧
0 0 16256 NETOFF.CMD ⟦6680e30d8⟧
0 0 16384 NETON.CMD ⟦46e6fba12⟧
0 0 17920 NETSTAT.CMD ⟦724e13c09⟧
0 0 2560 PATH.EXE ⟦e69ce8108⟧
0 0 9344 PIP.CMD ⟦f429b7770⟧
0 0 2048 REN.EXE ⟦3436dd0ad⟧
0 0 2176 RMDIR.CMD ⟦6bf6a5b4d⟧
0 0 13312 SDIR.CMD ⟦8de20c283⟧
0 0 7680 SET.CMD ⟦17f01d893⟧
0 0 7424 SHOW.CMD ⟦8d23ccf82⟧
0 0 7168 STOP.CMD ⟦3f44c6d30⟧
0 0 2304 SYSDISK.CMD ⟦14720b360⟧
0 0 2048 TIME.EXE ⟦478867b5d⟧
0 0 2048 TYPE.CMD ⟦c6eb4f8ec⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 25-20-1-1-1-1-1-1
   (2, 1)  0xa000 1-1-1-1-1-1-1-1

Total credibility: 43

Block number width: ok16

   8     0     8   202   153  False
  16     0     8   202     0  False

Block Sizes:
    2048 0x00 +42 -0
    4096 0x01 +4 -38
    8192 0x03 +4 -38
   16384 0x07 +4 -38
   32768 0x0f +4 -38
   65536 0x1f +4 -38
     128 0x00 +0 -42
     256 0x00 +0 -42
     512 0x00 +0 -42
    1024 0x00 +0 -42

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [24, 19]   +73/-0
     21  normal-3     (1-4-7-2-5-8-3-6)                                                         [24, 0, 0, 19]   +61/-1
     22  normal-2     (1-3-5-7-2-4-6-8)                                                         [24, 0, 0, 0, 19]   +49/-0
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»           «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000360c0945360c0945}
    ProbeDirEnt {status=0x00, name=»HELP    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=080009000a000b000000000000000000}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0c000d000e000f001000110012001300}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1400150016001700180019001a001b00}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1c001d001e001f002000000000000000}
    ProbeDirEnt {status=0x00, name=»SET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=21002200230024000000000000000000}
    ProbeDirEnt {status=0x00, name=»STOP    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=25002600270028000000000000000000}
    ProbeDirEnt {status=0x00, name=»ERAQ    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1f, al=29002a00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ERA     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=2b002c00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SDIR    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x68, al=2d002e002f0030003100320033000000}
    ProbeDirEnt {status=0x00, name=»SHOW    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=34003500360037000000000000000000}
    ProbeDirEnt {status=0x00, name=»PATH    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=38003900000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BATCH   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x50, al=3a003b003c003d003e00000000000000}
    ProbeDirEnt {status=0x00, name=»CHDIR   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=3f004000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»COPY    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800}
    ProbeDirEnt {status=0x00, name=»COPY    EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x60, al=49004a004b004c004d004e0000000000}
    ProbeDirEnt {status=0x00, name=»DATE    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=4f005000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ERASE   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=51000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MKDIR   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=52005300000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=54005500560057005800000000000000}
    ProbeDirEnt {status=0x00, name=»RMDIR   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x11, al=59005a00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REN     EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDISK CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=5c005d00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TIME    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5e000000000000000000000000000000}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»TYPE    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHSET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»CHSET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=680069006a0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6b006c006d006e006f00700071007200}
    ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=73007400750076007700780079007a00}
    ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x21, al=7b007c007d0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e007f00800081008200830084008500}
    ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7f, al=86008700880089008a008b008c008d00}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0f, al=96000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9700980099009a009b009c009d009e00}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9f00a000a100a200a300a400a500a600}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=a7000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a800a900aa00ab00ac00ad0000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7c, al=ae00af00b000b100b200b300b400b500}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b600b700b800b900ba00bb00bc00bd00}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=be00bf00c000c1000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=ca000000000000000000000000000000}
*  73 -   0 [1, 2, 3, 4, 5, 6, 7, 8]
+  61 -   1 [1, 4, 7, 2, 5, 8, 3, 6]
+  49 -   0 [1, 3, 5, 7, 2, 4, 6, 8]

Full view