DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 B C G I L M N P R S T X

⟦da717493c⟧ Bits:30007367/disk2.imd SW1500 Concurrent DOS 4.2, 5¼" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1261568 (0x134000)
    Description: Bits:30007367/disk2.imd SW1500 Concurrent DOS 4.2
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1
Confidence score:  +96/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 23424 BDOS.CON ⟦012ac5d40⟧
0 0 41984 BESKED.CMD ⟦710669035⟧
0 0 214400 CCPM.SYS ⟦3d9a62f60⟧
0 0 6016 CIO.CON ⟦ff0555208⟧
0 0 640 CLOCK.RSP ⟦47fd682bf⟧
0 0 49536 GENCCPM.CMD ⟦e8f5e2494⟧
0 0 256 GENINST.SUB ⟦4ec9be81f⟧ TextFile
0 0 39424 LANREL.CMD ⟦ebd7ff393⟧
0 0 39680 MATREL.CMD ⟦b25b5c439⟧
0 0 19712 MATRELHW.CMD ⟦1338cc08b⟧
0 0 19712 MATRELSW.CMD ⟦653eb29cf⟧
0 0 6144 MEM.CON ⟦f0ef202cc⟧
0 0 1792 MINTERN.CMD ⟦6f10a2e4e⟧
0 0 23680 NETDRV.RSP ⟦fada983a3⟧
0 0 256 NETKONF ⟦f1fb01cb5⟧ TextFile
0 0 51968 NETVEDL.CMD ⟦a8f127868⟧
0 0 3200 PIN750.RSP ⟦65a6ea281⟧
0 0 17280 PINTERN.CMD ⟦3100e53f9⟧
0 0 37888 POSTHUS.CMD ⟦8a3a813a2⟧
0 0 35200 RCADDNET.CMD ⟦21f720976⟧
0 0 5120 RCDSP.CMD ⟦b95b71ff5⟧
0 0 46848 RCGENNET.CMD ⟦d18d97312⟧
0 0 1920 RCNIOS.CMD ⟦1a810ffb0⟧
0 0 16384 RCSPL.CMD ⟦60f369d2a⟧
0 0 3072 REMOTE.CMD ⟦6a294b3bd⟧
0 0 33280 REMTMP.RSP ⟦10fc93a85⟧
0 0 31744 RNET.CMD ⟦c5201e747⟧
0 0 38528 RSNET.CMD ⟦37cb1f417⟧
0 0 7680 RTM.CON ⟦e4ef5ffa7⟧
0 0 640 SCROLL.RSP ⟦27844af8c⟧
0 0 39680 SIOREL.CMD ⟦8dd96606b⟧
0 0 20736 SNET.CMD ⟦ed24af112⟧
0 0 42240 SPOOL.CMD ⟦ff889c8d1⟧
0 0 256 STDKONF ⟦c91424c2d⟧ TextFile
0 0 39808 STRREL.CMD ⟦674fbb778⟧
0 0 8960 SUP.CON ⟦0e0511756⟧
0 0 3456 SYSDAT.CON ⟦9b121d03c⟧
0 0 50560 SYSVEDL.CMD ⟦5af240ab0⟧
0 0 33152 TMP750.RSP ⟦8993a6ba8⟧
0 0 44544 XIOS.CON ⟦a6cee416e⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 26-26-26-26-2-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 112

Block number width: ok16

   8   399     1   255   207  False
  16     0     8   564     0  False

Block Sizes:
    2048 0x00 +95 -0
    1024 0x00 +9 -86
    4096 0x01 +7 -88
    8192 0x03 +7 -88
   16384 0x07 +7 -88
   32768 0x0f +7 -88
   65536 0x1f +7 -88
     512 0x00 +6 -89
     256 0x00 +3 -92
     128 0x00 +0 -95

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [25, 25, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +96/-0
     24  normal-2     (1-3-5-7-2-4-6-8)                                                         [25, 25, 1, 1, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +95/-0
     48  normal-3     (1-4-7-2-5-8-3-6)                                                         [25, 25, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +95/-0
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»           «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000350c1401350c1401}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x0b, al=70000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=71000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72007300740075007600770078007900}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7a007b007c007d007e007f0080008100}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=82008300840085008600870088008900}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x03, al=8a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=8b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=8c000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8d008e008f0090009100920093009400}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x37, al=95009600970098000000000000000000}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2f, al=99009a009b0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=9c009d009e0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=9f00a000a100a2000000000000000000}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=a300a400a500a600a700000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=a800a900000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=aa00ab00ac00ad00ae00af00b000b100}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b200b300b400b500b600b700b800b900}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x5c, al=ba00bb00bc00bd00be00bf0000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=c0000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c100c200c300c400c500c600c700c800}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x39, al=c900ca00cb00cc000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIN750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=cd00ce00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600}
    ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d700d800d900da00db00dc00dd00de00}
    ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x04, al=df000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=e0000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e100e200e300e400e500e600e700e800}
    ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e900ea00eb00ec00ed00ee00ef00f000}
    ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x03, al=f1000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f200f300f400f500f600f700f800f900}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=fa00fb00fc00fd00fe00ff0000010101}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=02010301040105010601070108010901}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x16, al=0a010b01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0c010d010e010f011001110112011301}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1401150116011701180119011a011b01}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6e, al=1c011d011e011f012001210122010000}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b012c012d012e012f01300131013201}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x13, al=33013401000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCNIOS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=35010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=36013701380139013a013b013c013d01}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x78, al=3e013f01400141014201430144014501}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=46014701480149014a014b014c014d01}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4e014f01500151015201530154015501}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=56015701580100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=59015a015b015c015d015e015f016001}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x22, al=61016201630100000000000000000000}
    ProbeDirEnt {status=0x00, name=»REMOTE  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=64016501000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=66016701680169016a016b016c016d01}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=6e016f01700171017201730174017501}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=76017701780179017a01000000000000}
    ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=7b017c017d0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e017f01800181018201830184018501}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86018701880189018a018b018c018d01}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8e018f01900191019201930194019501}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x34, al=96019701980199010000000000000000}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9a019b019c019d019e019f01a001a101}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a201a301a401a501a601a701a801a901}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=aa01ab01ac01ad010000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ae01af01b001b101b201b301b401b501}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=b601b701000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b801b901ba01bb01bc01bd01be01bf01}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=c001c101000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c201c301c401c501c601c701c801c901}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ca01cb01cc01cd01ce01cf01d001d101}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=d201d301d401d5010000000000000000}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=de01df01e001e101e201e301e401e501}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x37, al=e601e701e801e9010000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ea01eb01ec01ed01ee01ef01f001f101}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f201f301f401f501f601f701f801f901}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=fa01fb01fc01fd01fe01ff0100020102}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0b, al=02020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=03020402050206020702080209020a02}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0b020c020d020e020f02100211021202}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=13021402150200000000000000000000}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=16021702180219021a021b021c021d02}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1e021f02200221022202230224022502}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=26022702280229022a02000000000000}
    ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2b022c022d022e022f02300231023202}
    ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=33020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=34020000000000000000000000000000}
  0x0009000 (2, 0, 5)
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+  96 -   0 <Tree 0x0-0x9a000-0x134000>
+  95 -   0 <Tree 0x0-0x9a000-0x134000>

Full view