DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 C D E I L P R S T X

⟦fa5b86546⟧ Bits:30002725 SW1609 Digital Research C - CCP/M - Oct 83, 5¼" Floppy Disk, CpmFSAuto

    Length: 1261568 (0x134000)
    Description: Bits:30002725 SW1609 Digital Research C - CCP/M - Oct 83
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1
Confidence score:  +53/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 90752 CLEARL.L86 ⟦67fbf6a03⟧
0 0 77312 CLEARS.L86 ⟦3c7904e39⟧
0 0 1664 CTYPE.H ⟦fd0f539bf⟧ TextFile
0 0 17536 DRC.CMD ⟦b5d79ff8c⟧
0 0 6016 DRC.ERR ⟦5c7f94a74⟧ TextFile
0 0 31872 DRC860.CMD ⟦2cd00941f⟧
0 0 113920 DRC861.CMD ⟦d083a4f00⟧
0 0 29312 DRC862.CMD ⟦7c6d4190a⟧
0 0 17536 DRCRPP.CMD ⟦097448ed8⟧
0 0 896 ERRNO.H ⟦14e0a34a2⟧ TextFile
0 0 512 INSTJOB.SUB ⟦6754bf6a8⟧ TextFile
0 0 13440 LIB86.CMD ⟦19664a2b8⟧
0 0 37632 LINK86.CMD ⟦49b0630e5⟧
0 0 2560 PORTAB.H ⟦8017c1d55⟧ TextFile
0 0 1152 R.CMD ⟦f9f30d548⟧
0 0 44032 RASM86.CMD ⟦d07c8db3e⟧
0 0 8960 READ.ME ⟦aa6a64cc5⟧ TextFile
0 0 256 SAMPLE.C ⟦7aab696f4⟧ TextFile
0 0 1536 SETJMP.H ⟦47f117427⟧ TextFile
0 0 39936 STARTUP.A86 ⟦890eeaec4⟧ TextFile
0 0 1024 STDIO.H ⟦e6d63d51f⟧ TextFile
0 0 1152 TEST.C ⟦e3c2a10cd⟧ TextFile
0 0 17664 XREF86.CMD ⟦8abea63fc⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 26-26-4-2-2-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 66

Block number width: ok16

   8    41     1   252   207  False
  16     0     8   290     0  False

Block Sizes:
    2048 0x00 +49 -0
    4096 0x01 +8 -41
    8192 0x03 +8 -41
   16384 0x07 +8 -41
   32768 0x0f +8 -41
   65536 0x1f +8 -41
    1024 0x00 +4 -45
     512 0x00 +2 -47
     256 0x00 +1 -48
     128 0x00 +0 -49

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [25, 25, 3, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +53/-0
     24  normal-2     (1-3-5-7-2-4-6-8)                                                         [25, 3, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +50/-5
     26  normal-3     (1-4-7-2-5-8-3-6)                                                         [25, 1, 1, 25, 1, 1, 3, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +50/-7
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»SW1609     «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000ef080836ef080836}
    ProbeDirEnt {status=0x00, name=»READ    ME «, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=080009000a000b000c00000000000000}
    ProbeDirEnt {status=0x00, name=»STDIO   H  «, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=0d000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PORTAB  H  «, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=0e000f00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CTYPE   H  «, xl=0x00, bc=0x00, xh=0x00, rc=0x0d, al=10000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ERRNO   H  «, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=11000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SETJMP  H  «, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=12000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SAMPLE  C  «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=13000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TEST    C  «, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=14000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»STARTUP A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=150016001700180019001a001b001c00}
    ProbeDirEnt {status=0x00, name=»STARTUP A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1d001e001f0020002100220023002400}
    ProbeDirEnt {status=0x00, name=»STARTUP A86«, xl=0x02, bc=0x00, xh=0x00, rc=0x38, al=25002600270028000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLEARS  L86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=29002a002b002c002d002e002f003000}
    ProbeDirEnt {status=0x00, name=»CLEARS  L86«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=31003200330034003500360037003800}
    ProbeDirEnt {status=0x00, name=»CLEARS  L86«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=39003a003b003c003d003e003f004000}
    ProbeDirEnt {status=0x00, name=»CLEARS  L86«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800}
    ProbeDirEnt {status=0x00, name=»CLEARS  L86«, xl=0x04, bc=0x00, xh=0x00, rc=0x5c, al=49004a004b004c004d004e0000000000}
    ProbeDirEnt {status=0x00, name=»CLEARL  L86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4f005000510052005300540055005600}
    ProbeDirEnt {status=0x00, name=»CLEARL  L86«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5700580059005a005b005c005d005e00}
    ProbeDirEnt {status=0x00, name=»CLEARL  L86«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=5f006000610062006300640065006600}
    ProbeDirEnt {status=0x00, name=»CLEARL  L86«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=6700680069006a006b006c006d006e00}
    ProbeDirEnt {status=0x00, name=»CLEARL  L86«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=6f007000710072007300740075007600}
    ProbeDirEnt {status=0x00, name=»CLEARL  L86«, xl=0x05, bc=0x00, xh=0x00, rc=0x45, al=7700780079007a007b00000000000000}
    ProbeDirEnt {status=0x00, name=»DRC     ERR«, xl=0x00, bc=0x00, xh=0x00, rc=0x2f, al=7c007d007e0000000000000000000000}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»R       CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=7f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DRC     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
    ProbeDirEnt {status=0x00, name=»DRC     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=88000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DRC860  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=89008a008b008c008d008e008f009000}
    ProbeDirEnt {status=0x00, name=»DRC860  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x79, al=91009200930094009500960097009800}
    ProbeDirEnt {status=0x00, name=»DRC861  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=99009a009b009c009d009e009f00a000}
    ProbeDirEnt {status=0x00, name=»DRC861  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a100a200a300a400a500a600a700a800}
    ProbeDirEnt {status=0x00, name=»DRC861  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=a900aa00ab00ac00ad00ae00af00b000}
    ProbeDirEnt {status=0x00, name=»DRC861  CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=b100b200b300b400b500b600b700b800}
    ProbeDirEnt {status=0x00, name=»DRC861  CMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=b900ba00bb00bc00bd00be00bf00c000}
    ProbeDirEnt {status=0x00, name=»DRC861  CMD«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=c100c200c300c400c500c600c700c800}
    ProbeDirEnt {status=0x00, name=»DRC861  CMD«, xl=0x06, bc=0x00, xh=0x00, rc=0x7a, al=c900ca00cb00cc00cd00ce00cf00d000}
    ProbeDirEnt {status=0x00, name=»DRC862  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d100d200d300d400d500d600d700d800}
    ProbeDirEnt {status=0x00, name=»DRC862  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x65, al=d900da00db00dc00dd00de00df000000}
    ProbeDirEnt {status=0x00, name=»DRCRPP  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e000e100e200e300e400e500e600e700}
    ProbeDirEnt {status=0x00, name=»DRCRPP  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=e8000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LINK86  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e900ea00eb00ec00ed00ee00ef00f000}
    ProbeDirEnt {status=0x00, name=»LINK86  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f100f200f300f400f500f600f700f800}
    ProbeDirEnt {status=0x00, name=»LINK86  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x26, al=f900fa00fb0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LIB86   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x69, al=fc00fd00fe00ff000001010102010000}
    ProbeDirEnt {status=0x00, name=»RASM86  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=03010401050106010701080109010a01}
    ProbeDirEnt {status=0x00, name=»RASM86  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0b010c010d010e010f01100111011201}
    ProbeDirEnt {status=0x00, name=»RASM86  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x58, al=13011401150116011701180100000000}
    ProbeDirEnt {status=0x00, name=»XREF86  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=19011a011b011c011d011e011f012001}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»XREF86  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=21010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INSTJOB SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=22010000000000000000000000000000}
  0x0008c00 (2, 0, 4)
  0x0009000 (2, 0, 5)
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+  53 -   0 <Tree 0x0-0x9a000-0x134000>
+  50 -   5 <Tree 0x0-0x9a000-0x134000>

Full view