DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 B C D F H I M N P S T W

⟦ca21d2fb9⟧ Bits:30007368/disk3.imd SW1500 Concurrent DOS 5.0, 5¼" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1261568 (0x134000)
    Description: Bits:30007368/disk3.imd SW1500 Concurrent DOS 5.0
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_96)

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         1024_2048_0x0_*1+1_2:0_76:1_96
Confidence score:  +77/-0 
Sector size:       1024
Block size:        2048
Directory entries: 96
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 41984 BESKED.CMD ⟦0040c4234⟧
0 0 13184 CHAR8.CMD ⟦fafa8c9b8⟧
0 0 12800 CHKDSK.CMD ⟦3a24239b5⟧
0 0 22272 CHSET.CMD ⟦06aa7f63c⟧
0 0 2944 COPY.CMD ⟦3480650a2⟧
0 0 71168 CPMWDINI.CMD ⟦48360333e⟧
0 0 2560 DATE.EXE ⟦7d83224b0⟧
0 0 71168 DOSWDINI.CMD ⟦b554392be⟧
0 0 21760 FILEX.A86 ⟦651a0c044⟧ TextFile
0 0 2688 FILEX.CMD ⟦68906f009⟧
0 0 7680 FSET.CMD ⟦5562ef678⟧
0 0 7552 HELP.CMD ⟦536337e23⟧
0 0 54912 HELP.HLP ⟦ff68dd064⟧
0 0 36992 INITDIR.CMD ⟦e18a85039⟧
0 0 1792 MINTERN.CMD ⟦6f10a2e4e⟧
0 0 7168 NAMES.CMD ⟦8ca2bd5a4⟧
0 0 12672 NAMESMOD.CMD ⟦4ff9cb3fa⟧
0 0 8960 NETSTAT.CMD ⟦69ed20a06⟧
0 0 17280 PINTERN.CMD ⟦3100e53f9⟧
0 0 9472 PIP.CMD ⟦8ea0aa9f2⟧
0 0 37888 POSTHUS.CMD ⟦927e5f275⟧
0 0 13312 SDIR.CMD ⟦52fd90d9c⟧
0 0 7680 SET.CMD ⟦5562ef678⟧
0 0 7424 SHOW.CMD ⟦daba389e1⟧
0 0 9344 STOP.CMD ⟦ffadb992b⟧
0 0 3584 SUBMIT.CMD ⟦3ece11c64⟧
0 0 2048 TIME.EXE ⟦d969753c3⟧
0 0 7040 TREE.CMD ⟦8a5fe4f22⟧
0 0 29440 WDINIT.CMD ⟦16dac697c⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 25-25-4-1-1-1-1-1
   (2, 1)  0xa000 1-1-1-1-1-1-1-1

Total credibility: 51

Block number width: ok16

   8    36     1   249   207  False
  16     0     8   286     0  False

Block Sizes:
    2048 0x00 +50 -0
    4096 0x01 +2 -48
    8192 0x03 +2 -48
   16384 0x07 +2 -48
   32768 0x0f +2 -48
   65536 0x1f +2 -48
    1024 0x00 +1 -49
     128 0x00 +0 -50
     256 0x00 +0 -50
     512 0x00 +0 -50

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [24, 24, 3]   +77/-0
     26  normal-2     (1-3-5-7-2-4-6-8)                                                         [24, 3, 0, 0, 24]   +61/-11
     31  normal-3     (1-4-7-2-5-8-3-6)                                                         [24, 0, 0, 24, 0, 0, 3]   +66/-16
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»SW1500 3/3 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000480d1130480d1130}
    ProbeDirEnt {status=0x00, name=»COPY    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=08000900000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHAR8   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x67, al=0a000b000c000d000e000f0010000000}
    ProbeDirEnt {status=0x00, name=»CHSET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=11001200130014001500160017001800}
    ProbeDirEnt {status=0x00, name=»CHSET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x2e, al=19001a001b0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DATE    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=1c001d00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»FSET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=1e001f00200021000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4a, al=22002300240025002600000000000000}
    ProbeDirEnt {status=0x00, name=»SDIR    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x68, al=2700280029002a002b002c002d000000}
    ProbeDirEnt {status=0x00, name=»SHOW    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=2e002f00300031000000000000000000}
    ProbeDirEnt {status=0x00, name=»STOP    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=32003300340035003600000000000000}
    ProbeDirEnt {status=0x00, name=»TIME    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=37000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TREE    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x37, al=380039003a003b000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=3c003d003e003f000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x63, al=40004100420043004400450046000000}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=4700480049004a004b00000000000000}
    ProbeDirEnt {status=0x00, name=»HELP    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=4c004d004e004f000000000000000000}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x03, bc=0x00, xh=0x00, rc=0x2d, al=680069006a0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6b006c006d006e006f00700071007200}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=73007400750076007700780079007a00}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=7b007c007d007e007f00000000000000}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=90009100920000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=93000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9400950096009700980099009a009b00}
    ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=9c000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9d009e009f00a000a100a200a300a400}
    ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a500a600a700a800a900aa00ab00ac00}
    ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x21, al=ad00ae00af0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHKDSK  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x64, al=b000b100b200b300b400b500b6000000}
    ProbeDirEnt {status=0x00, name=»WDINIT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b700b800b900ba00bb00bc00bd00be00}
    ProbeDirEnt {status=0x00, name=»WDINIT  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x66, al=bf00c000c100c200c300c400c5000000}
    ProbeDirEnt {status=0x00, name=»CPMWDINICMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c600c700c800c900ca00cb00cc00cd00}
    ProbeDirEnt {status=0x00, name=»CPMWDINICMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ce00cf00d000d100d200d300d400d500}
    ProbeDirEnt {status=0x00, name=»CPMWDINICMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=d600d700d800d900da00db00dc00dd00}
    ProbeDirEnt {status=0x00, name=»CPMWDINICMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500}
    ProbeDirEnt {status=0x00, name=»CPMWDINICMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x2c, al=e600e700e80000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DOSWDINICMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e900ea00eb00ec00ed00ee00ef00f000}
    ProbeDirEnt {status=0x00, name=»DOSWDINICMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f100f200f300f400f500f600f700f800}
    ProbeDirEnt {status=0x00, name=»DOSWDINICMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=f900fa00fb00fc00fd00fe00ff000001}
    ProbeDirEnt {status=0x00, name=»DOSWDINICMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=01010201030104010501060107010801}
    ProbeDirEnt {status=0x00, name=»DOSWDINICMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x2c, al=09010a010b0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»FILEX   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x15, al=0c010d01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0e010f01100111011201130114011501}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=16011701180100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=19011a011b011c010000000000000000}
    ProbeDirEnt {status=0x00, name=»SUBMIT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=1d011e01000000000000000000000000}
*  77 -   0 [1, 2, 3, 4, 5, 6, 7, 8]
+  61 -  11 [1, 3, 5, 7, 2, 4, 6, 8]
+  66 -  16 [1, 4, 7, 2, 5, 8, 3, 6]

Full view