DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 C D F H I K L M N P S T W X

⟦d9c4523da⟧ Bits:30003063 Partner test udgave 13, 5¼" Floppy Disk, CpmFSAuto

    Length: 1261568 (0x134000)
    Description: Bits:30003063 Partner test udgave 13
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1
Confidence score:  +95/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 174464 CCPM.SYS ⟦019bc4442⟧
0 0 13184 CHAR8.CMD ⟦23723741b⟧
0 0 2816 COPY.CMD ⟦ebbd12c2a⟧
0 0 2560 DATE.EXE ⟦30586a938⟧
0 0 82176 DISKVEDL.CMD ⟦0a6df36d2⟧
0 0 71168 DOSWDINI.CMD ⟦74cc46a6e⟧
0 0 7680 FSET.CMD ⟦662ab4593⟧
0 0 31616 FUNCTION.CMD ⟦2283300f3⟧
0 0 7552 HELP.CMD ⟦16ca0696e⟧
0 0 54912 HELP.HLP ⟦ff68dd064⟧
0 0 3712 IMENU.MDF ⟦15acb8a79⟧
0 0 39168 ISW1500.CMD ⟦6c4b87271⟧
0 0 55808 KONFIG.CMD ⟦c460c4aae⟧
0 0 38784 LANREL.CMD ⟦c85df84e6⟧
0 0 39680 MATREL.CMD ⟦a49ec55b6⟧
0 0 18560 MATRELHW.CMD ⟦d005f777e⟧
0 0 19712 MATRELSW.CMD ⟦653eb29cf⟧
0 0 19200 MENU.CMD ⟦e14e83cc8⟧
0 0 3712 MENU.MDF ⟦3d0bc46da⟧
0 0 46336 MENUVEDL.CMD ⟦6d3418841⟧
0 0 32000 NEDLUK.CMD ⟦e22a6cce6⟧
0 0 9856 PIP.CMD ⟦8518d9fc1⟧
0 0 13312 SDIR.CMD ⟦89c602ad9⟧
0 0 7680 SET.CMD ⟦662ab4593⟧
0 0 7552 SHOW.CMD ⟦9062b8920⟧
0 0 39680 SIOREL.CMD ⟦6b109be2b⟧
0 0 128 START1 ⟦c52b8fcb4⟧ TextFile
0 0 128 STARTUP.0 ⟦b2dedd9de⟧ TextFile
0 0 128 STARTUP.DOS ⟦8fb9f276e⟧ TextFile
0 0 128 STARTUP1.DOS ⟦7fbc7f97f⟧ TextFile
0 0 39808 STRREL.CMD ⟦f9f58af52⟧
0 18 5760 SW1500.BAK ⟦a80da3e0d⟧ TextFile
0 52 5504 SW1500.IST ⟦b577a5ca4⟧ TextFile
0 0 18816 SYSTAT.CMD ⟦17804bade⟧
0 0 50560 SYSVEDL.CMD ⟦62bddc50a⟧
0 0 29440 WDINIT.CMD ⟦369ccd9a4⟧
0 0 69888 WDVEDL.CMD ⟦9efb193ac⟧
0 68 43136 XTREE.EXE ⟦0ee72f8ba⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 26-25-24-25-2-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 108

Block number width: ok16

   8   413     1   255   199  False
  16     0     8   598     0  False

Block Sizes:
    2048 0x00 +91 -0
     256 0x00 +5 -86
     512 0x00 +5 -86
    1024 0x00 +5 -86
     128 0x00 +4 -87
    4096 0x01 +4 -87
    8192 0x03 +4 -87
   16384 0x07 +4 -87
   32768 0x0f +4 -87
   65536 0x1f +4 -87

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      1  normal-1     (1-2-3-4-5-6-7-8)                                                         [25, 24, 23, 24, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +95/-0
     23  normal-2     (1-3-5-7-2-4-6-8)                                                         [25, 23, 1, 1, 24, 24, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +91/-3
     45  normal-3     (1-4-7-2-5-8-3-6)                                                         [25, 24, 1, 24, 1, 1, 23, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +91/-4
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»TEST       «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000100b0849100b0849}
    ProbeDirEnt {status=0x00, name=»COPY    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x16, al=08000900000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DOSWDINICMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ad00ae00f500f60029012a012b012c01}
    ProbeDirEnt {status=0x00, name=»WDVEDL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0a000b000c000d000e000f0010001100}
    ProbeDirEnt {status=0x00, name=»WDVEDL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=12001300140015001600170018001900}
    ProbeDirEnt {status=0x00, name=»WDVEDL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=1a001b001c001d001e001f0020002100}
    ProbeDirEnt {status=0x00, name=»WDVEDL  CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=22002300240025002600270028002900}
    ProbeDirEnt {status=0x00, name=»WDVEDL  CMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x22, al=2a002b002c0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DATE    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=2d002e00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DISKVEDLCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2f003000310032003300340035003600}
    ProbeDirEnt {status=0x00, name=»DISKVEDLCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=3700680069006a006b006c006d006e00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»DISKVEDLCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=6f007000730074007500760077007800}
    ProbeDirEnt {status=0x00, name=»DISKVEDLCMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=79007a007b007c007d00800081008200}
    ProbeDirEnt {status=0x00, name=»STARTUP DOS«, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=71000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DISKVEDLCMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=83008400850086008700880089008a00}
    ProbeDirEnt {status=0x00, name=»DISKVEDLCMD«, xl=0x05, bc=0x00, xh=0x00, rc=0x02, al=8b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»FUNCTIONCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e007f00af00b000c200c300c400c500}
    ProbeDirEnt {status=0x00, name=»ISW1500 CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8c008d008e008f009000910092009300}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»ISW1500 CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=9400950096009700980099009a009b00}
    ProbeDirEnt {status=0x00, name=»ISW1500 CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x32, al=9c009d009e009f000000000000000000}
    ProbeDirEnt {status=0x00, name=»SW1500  BAK«, xl=0x00, bc=0x12, xh=0x00, rc=0x2d, al=a000a100a20000000000000000000000}
    ProbeDirEnt {status=0x00, name=»IMENU   MDF«, xl=0x00, bc=0x00, xh=0x00, rc=0x1d, al=a300a400000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»STARTUP 0  «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=72000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DOSWDINICMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2d012e012f0130013101320133013401}
    ProbeDirEnt {status=0x00, name=»FUNCTIONCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x77, al=c600c700c800c900ca00cb00cc00cd00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=b100b2006d016e016f01700171017201}
    ProbeDirEnt {status=0x00, name=»KONFIG  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00}
    ProbeDirEnt {status=0x00, name=»KONFIG  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bb00bc00bd00be00bf00c000c100ce00}
    ProbeDirEnt {status=0x00, name=»KONFIG  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600}
    ProbeDirEnt {status=0x00, name=»KONFIG  CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x34, al=d700d800d90054010000000000000000}
    ProbeDirEnt {status=0x00, name=»MENU    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=06010701080109010a010b010c010d01}
    ProbeDirEnt {status=0x00, name=»MENU    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x16, al=0e010f01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=da00db00dc00dd008a018b018c018d01}
    ProbeDirEnt {status=0x00, name=»SYSTAT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500}
    ProbeDirEnt {status=0x00, name=»SYSTAT  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x13, al=e600e700000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=e800e900ea00eb00ec00000000000000}
    ProbeDirEnt {status=0x00, name=»DOSWDINICMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=350136013701380139013a013b013c01}
    ProbeDirEnt {status=0x00, name=»STARTUP1DOS«, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=a5000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SW1500  IST«, xl=0x00, bc=0x34, xh=0x00, rc=0x2b, al=a600a700a80000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NEDLUK  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=10011101120113011401150116011701}
    ProbeDirEnt {status=0x00, name=»NEDLUK  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x7a, al=180119011a011b011c011d011e011f01}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=20012101220123012401250126014001}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=49014a014b014c014d014e0155017401}
    ProbeDirEnt {status=0x00, name=»MENU    MDF«, xl=0x00, bc=0x00, xh=0x00, rc=0x1d, al=27012801000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DOSWDINICMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=3d013e013f016b016c01730135023602}
    ProbeDirEnt {status=0x00, name=»DOSWDINICMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x2c, al=37023802390200000000000000000000}
    ProbeDirEnt {status=0x00, name=»FSET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=82018301840185010000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0b, al=75010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=76017701780179017a017b017c017d01}
    ProbeDirEnt {status=0x00, name=»SDIR    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x68, al=ed00ee00ef00f000f100f200f3000000}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7e017f0180018101a401a501a601a701}
    ProbeDirEnt {status=0x00, name=»SET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=f4004f01500151010000000000000000}
    ProbeDirEnt {status=0x00, name=»SHOW    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=52015301560157010000000000000000}
    ProbeDirEnt {status=0x00, name=»WDINIT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=580159015a015b015c015d015e015f01}
    ProbeDirEnt {status=0x00, name=»START1     «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=65010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»WDINIT  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x66, al=6001610162016301640169016a010000}
    ProbeDirEnt {status=0x00, name=»CHAR8   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x67, al=3a023b023c023d023e023f0240020000}
    ProbeDirEnt {status=0x00, name=»XTREE   EXE«, xl=0x00, bc=0x44, xh=0x00, rc=0x80, al=41024202430244024502460247024802}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=a801a901aa0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ab01ac01ad01ae01af01b001c401c501}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c601c701c801c901ca01cb01cc01cd01}
    ProbeDirEnt {status=0x00, name=»XTREE   EXE«, xl=0x01, bc=0x44, xh=0x00, rc=0x80, al=49024a024b024c024d024e024f025002}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»HELP    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=86018701880189010000000000000000}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8e018f01900191019201930194019501}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=96019701980199019a019b019c019d01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=9e019f01a001a101a201a301b901ba01}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=ce01cf01d001d1010000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d201d301d401d501d601d701d801d901}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=bb01bc01bd01be01bf01c001c101c201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x53, al=c3011402150216021702180200000000}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=da01db01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=dc01dd01de01df01e001e101e201e301}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=e401e501000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e601e701e801e901ea01eb01ec01ed01}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ee01ef01f001f101f201f301f401f501}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=f601f701f801f9010000000000000000}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fa01fb01fc01fd01fe01ff0100020102}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=02020302040205020602070208020902}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x37, al=0a020b020c020d020000000000000000}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=0e020f02100211021202130227022802}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x03, bc=0x00, xh=0x00, rc=0x2d, al=29022a022b0200000000000000000000}
    ProbeDirEnt {status=0x00, name=»MENUVEDLCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=19021a021b021c021d021e021f022002}
    ProbeDirEnt {status=0x00, name=»MENUVEDLCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2102220223022402250226022c022d02}
    ProbeDirEnt {status=0x00, name=»MENUVEDLCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6a, al=2e022f02300231023202330234020000}
    ProbeDirEnt {status=0x00, name=»XTREE   EXE«, xl=0x02, bc=0x44, xh=0x00, rc=0x51, al=51025202530254025502560200000000}
  0x0009000 (2, 0, 5)
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+  95 -   0 <Tree 0x0-0x9a000-0x134000>
+  91 -   3 <Tree 0x0-0x9a000-0x134000>

Full view