Editing Talk:Playstation Update Package (PUP)

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
= Changelogs =
= Playstation Update Package (PUP) - Discussion/Talk =


Wikipedia is removing firmware changelogs, last complete version:
What is the part that defines, what firmware it really is?. I mean, for firmwares below 3.55 we have all the keys so whe can forge any PUP and make it appear as a +3.55, that would be a way to downgrade, without the need of a dongle and recovery mode.


PSVita: https://en.wikipedia.org/w/index.php?title=PlayStation_Vita_system_software&oldid=668447442
I know there are version strings in pupheader,version.txt, info0, and in vsh.self.. but what is missing? What isn´t correclty set in mfw to make it pass the checks of a legit +3.55 fw?  


PSP: https://en.wikipedia.org/w/index.php?title=PlayStation_Portable_system_software&oldid=672507694
We are using recovery mode to downgrade because, we haven´t found a way to create a legit +3.55


= PS3 talk =
What is the part that defines what firmware it really is? I mean, for firmwares below 3.55 we have all the keys so we can forge any .PUP and make it appear as a +3.55, that would be a way to downgrade, without the need of a dongle and recovery mode.
I know there are version strings in pupheader, version.txt, info0, and in vsh.self. But what is missing? What isn´t correctly set in the MFW to make it pass the checks of a legit +3.55 FW?.
We are using recovery mode to downgrade because we haven´t found a way to create a legit +3.55 firmware
== Unpacking a PlayStation Update Package ==
=== Unpack the PUP ===


== Unpacking a firmware ==
===Unpack the PUP===
  Dots.txt
  Dots.txt
  license.xml
  EULA.xml
ps3swu.self
ps3swu2.self
spkg_hdr.tar
  Update_Files.tar
  Update_Files.tar
  update_flags.txt
  Updater.self
  Version.txt
  Version.txt
  VSH.tar
  VSH.tar
 
Zeros.bin
=== Untar the Update_Files.tar ===
=== Untar the Update_Files.tar ===
  BDIT_FIRMWARE_PACKAGE.pkg
  BDIT_FIRMWARE_PACKAGE.pkg
Line 37: Line 25:
  BDPT_FIRMWARE_PACKAGE_306R.pkg
  BDPT_FIRMWARE_PACKAGE_306R.pkg
  BDPT_FIRMWARE_PACKAGE_308R.pkg
  BDPT_FIRMWARE_PACKAGE_308R.pkg
BDPT_FIRMWARE_PACKAGE_310R.pkg
BDPT_FIRMWARE_PACKAGE_312R.pkg
BDPT_FIRMWARE_PACKAGE_314R.pkg
BDPT_FIRMWARE_PACKAGE_316R.pkg
  BLUETOOTH_FIRMWARE.pkg
  BLUETOOTH_FIRMWARE.pkg
  CORE_OS_PACKAGE.pkg
  CORE_OS_PACKAGE.pkg
  dev_flash3_023.tar.aa.2013_06_20_055817
  dev_flash3_022.tar.aa.2010_11_27_051800
  dev_flash_000.tar.aa.2013_06_20_055817
  dev_flash_000.tar.aa.2010_11_27_051337
  dev_flash_001.tar.aa.2013_06_20_055817
  dev_flash_001.tar.aa.2010_11_27_051337
  dev_flash_002.tar.aa.2013_06_20_055817
  dev_flash_002.tar.aa.2010_11_27_051337
  dev_flash_003.tar.aa.2013_06_20_055817
  dev_flash_003.tar.aa.2010_11_27_051337
  dev_flash_004.tar.aa.2013_06_20_055817
  dev_flash_004.tar.aa.2010_11_27_051337
  dev_flash_005.tar.aa.2013_06_20_051337
  dev_flash_005.tar.aa.2010_11_27_051337
  dev_flash_006.tar.aa.2013_06_20_051337
  dev_flash_006.tar.aa.2010_11_27_051337
  dev_flash_007.tar.aa.2013_06_20_051337
  dev_flash_007.tar.aa.2010_11_27_051337
  dev_flash_008.tar.aa.2013_06_20_051337
  dev_flash_008.tar.aa.2010_11_27_051337
  dev_flash_009.tar.aa.2013_06_20_051337
  dev_flash_009.tar.aa.2010_11_27_051337
  dev_flash_010.tar.aa.2013_06_20_051337
  dev_flash_010.tar.aa.2010_11_27_051337
  dev_flash_011.tar.aa.2013_06_20_051337
  dev_flash_011.tar.aa.2010_11_27_051337
  dev_flash_012.tar.aa.2013_06_20_051337
  dev_flash_012.tar.aa.2010_11_27_051337
  dev_flash_013.tar.aa.2013_06_20_051337
  dev_flash_013.tar.aa.2010_11_27_051337
  dev_flash_014.tar.aa.2013_06_20_051337
  dev_flash_014.tar.aa.2010_11_27_051337
  dev_flash_015.tar.aa.2013_06_20_051337
  dev_flash_015.tar.aa.2010_11_27_051337
  dev_flash_016.tar.aa.2013_06_20_051337
  dev_flash_016.tar.aa.2010_11_27_051337
  dev_flash_017.tar.aa.2013_06_20_051337
  dev_flash_017.tar.aa.2010_11_27_051337
  dev_flash_018.tar.aa.2013_06_20_051337
  dev_flash_018.tar.aa.2010_11_27_051337
  dev_flash_019.tar.aa.2013_06_20_051337
  dev_flash_019.tar.aa.2010_11_27_051337
  dev_flash_020.tar.aa.2013_06_20_051337
  dev_flash_020.tar.aa.2010_11_27_051337
  dev_flash_021.tar.aa.2013_06_20_051337
  dev_flash_021.tar.aa.2010_11_27_051337
dev_flash_022.tar.aa.2013_06_20_055817
  MULTI_CARD_FIRMWARE.pkg
  MULTI_CARD_FIRMWARE.pkg
  RL_FOR_PACKAGE.img
  RL_FOR_PACKAGE.img
Line 110: Line 93:
====== unself the self's ======
====== unself the self's ======
...
...
==== unpkg dev_flash* ====
==== unpkg dev_flash* ====
  content
  content
Line 229: Line 211:
  │      ├── info0
  │      ├── info0
  │      └── info1
  │      └── info1
├── update_files.tar
  ├── update_flags.txt
  ├── update_flags.txt
  ├── version.txt
  ├── version.txt
  └── vsh.tar
  └── vsh.tar
    └──a
 
 
----
 
 
== PS3 Recovery Menu ==
note: FW 2.50 or higher <br />
CoreOS file: emer_init.self <br />
 
=== Videomode limitations ===
There are no known limitations on the used video output. Works fine on:
* Composite
* Scart-Composite
* Svideo
* RGB
** Scart-RGB
** RGB Dsub
** RGB Cinch
* Component
** Component Dsub
** Component Cinch
* HDMI
 
=== Getting into recovery mode ===
 
# With the system in standby mode. Press and hold the power button down until the system turns on and then off again. Release the power button. Very important to hold the power button until the console shuts off and to release the power button before continuing to step 2.
# After about 1 - 2 seconds press and hold the power button again, until you hear 2 consecutive beeps. Release the power button. During this step you will actually here three beeps. There will be one single beep then a short delay followed by the 2 consecutive beeps. Only release the the power button after the 2 consecutive beeps.
# You will then be instructed to plug in a controller, via the usb cord, and press the PS button : "Connect the controller using a USB cable and then press the PS button".
# At this point the PS3 Recovery Menu will be shown on the screen.
 
Note: some people have trouble hearing the beeps: the led goes off the same moment it beeps, so the 2 consecutive beeps can also be noticed by seeing the green led fast blink off twice.
 
 
=== PS3 Recovery Menu Options ===
 
==== 1. Restart System ====
This option boots your system as normal without changing any settings or files.
 
==== 2. Restore Default Settings ====
Restores all default settings on the PS3 for networking, clock, video, etc. For a full list of the restored settings you can look under settings> system settings > restore defaults on your console. This should not eliminate your game saves or other saved content, including your user login.
 
==== 3. Restore File System ====
This will rewrite the files the PS3 uses to boot. This feature will help if files have become corrupted and are not allowing the console to boot as normal. This should not erase any of your saved data or settings.
 
==== 4. Rebuild Database ====
This can be a usefull feature if you have lost files on your system for no apparent reason. Try using this feature to see if it can restore those files. This will also rewrite corrupted files within the database, potentially eliminating future issues. This feature should not erase any of your saved data or settings. <br />
Deletes messages, playlists, changes made on "Information" screens, trimming information for pictures in "Photo", video thumbnails, video playback history and video resume information.
This operation may take a long time depending on the type and number of data items.
 
==== 5. Restore PS3 System ====
This will restore your system to original including, formatting and erasing all of the data on the HD and returning all system settings to default. This will not take your system back to a previous Firmware release. Use this option as a last resort, unless you have nothing on the console that you want or you want to erase everything on the console, do not use this option. <br />
This is the same as "Restore PS3 system" on the XMB. All data and settings will be lost by performing this step.
 
==== 6. System Update ====
This will allow the user to update their console with new firmware via a Flash drive or other portable media. This will not allow you to update via an internet connection. This can usefull if your system has become corrupted to the point you can not boot.
Needed for installing same versions MFWs over OFW/MFWs.
 
=== When to use Recovery Menu ===
 
Execute Recovery Menu when the PS3 is experiencing the following symptoms:
 
* When the PS3 is started up, the XMB menu is not displayed (only the wave screen background appears)
* When the PS3 is started up, nothing appears on the screen
* When the PS3 is started up, a message stating "The hard disk's file system is corrupted and will be restored." is displayed and prompts the user to press X to Restore the system. Original message is displayed again or the system stops during restoration.
* When the PS3 system is started up, an error message stating "The hard disk's database will be rebuilt." is displayed and prompts the user to press X. The system again fails start up or stops while formatting the hard drive.
* The system stops while restarting after a PS3 system update or while updating or rebuilding the database.
* When wanting to install a same version firmware (e.g. MFW/CFW over an OFW).
 
 
----
----


Line 242: Line 293:
  appldr,. lv2.self and game_ext_plugin need patching for new games support
  appldr,. lv2.self and game_ext_plugin need patching for new games support
  vsh.self maybe too
  vsh.self maybe too
[http://www.ps3hax.net/showpost.php?p=260186&postcount=14 Creating a MFW? (3.41/3.55 with 3.56 keys)]




Proof of concept with added keys to appldr (and none of the other mentioned files above) : [[Talk:Patches#appldr_3.55_add_3.56.2F3.60_keys|appldr 3.55 add 3.56/3.60 keys]]
----


----


== Using fake upgrade to get lowest firmware version info ==
== Using fake upgrade to get lowest firmware version info ==
<div style="float:right">[[File:PS3 MinVerChk PUP on USB.jpg|thumb|left|PS3 MinVerChk PUP on USB]]</div>


<span style="text-decoration: line-through;">https://web.archive.org/web/*/http://ps3devwiki.com/files/firmware/MFW-CEX/MinVerCheck/</span>  // <span style="text-decoration: line-through;">[http://www.mirrorcreator.com/files/KMIA5YMJ/MinVerCheck.rar_links MinVerChk.rar (1.28 KB)]</span> / <span style="text-decoration: line-through;">[http://www.sendspace.com/file/l2fixi mirror]</span> --- [https://mega.nz/#!FUVm1C7a!IbCyN_uzCQh7hZb7eu3pRrwBuezLh1r4Ha7eeB9RlZk mirror 2]
[http://www.multiupload.com/RW55LOETIW MinVerChk.rar (3.96 KB)]
CRC-16: 9A11
# Unrar and copy the MinVerChk PUP to your USB stick, the same way as if it was an firmware upgrade.
CRC-32 (Ethernet and PKZIP): 50EE9A92
SHA-1: 1B60E0ADE8E698D9796AA78B7AD54B10E05A9B0B
MD-5: BB39828156BC7DF144E4D06D81C801AB
# Unrar and copy this MinVerChk PUP to your USB stick (/PS3/UPDATE/PS3UPDAT.PUP), the same way as if it was an firmware upgrade.
# Insert the USB stick into the PS3.
# Insert the USB stick into the PS3.
# Start a firmware update like normal from XMB (Don’t worry, it will not update!)
# Start a firmware update like normal from XMB (Don’t worry, it will not update!)
# It will shortly fail and display the Firmware Base Value
# It will shortly fail and display the Firmware Base Value


Note: console needs to run at least FW 2.50? (2.30 didn't work); This only works when the minimum update version is 1.00, otherwise any minimum value lower than 1.00 reports as 1.00 using this method.
Note: console needs to run at least FW 2.50? (2.30 didn't work)
DECR-1000 (0.08), DEH-H1000A-E (??0.92??), DEH-H1001-D (??0.92??), DECHA00A (??0.92??) are effectively affected by this.
 
----
 
== Cinavia DRM ==
Watermark which survives ripping to e.g. xvid/mp3
Detection of watermark
 
According to Cinavia website (www cinavia com) there are 4 possible warning messages on detection:
 
=== Message Code 1: Playback stopped ===
<pre>Typical on-screen message:
 
“Playback stopped. The content being played is protected by Cinavia™ and is not authorized for playback on this device.
For more information, see http://www.cinavia.com.
Message Code 1.
Typical front panel message:
 
“Cinavia™ playback restriction (1).
 
 
Explanation
 
The audio track of the video that you are playing contains a Cinavia code indicating it was intended for presentation using professional equipment only (for example, in a theater) and is not authorized for playback by consumers.
 
 
Recommendations
 
If the video that you are playing is a professionally produced video (such as a movie or television show), you will need to obtain a copy that was made with the permission of the copyright owner.
 
If the video that you are playing back is a home movie or other personal recording, that includes some professionally produced content (including the audio track of a professionally produced movie or television show), you will need to either skip over the parts of the video that contain the professionally produced content during playback or else create or obtain a version of the video that does not include this protected material.</pre>
=== Message Code 2: Copying stopped ===
<pre>Typical on-screen message:
 
“Copying stopped. The content being copied is protected by Cinavia™ and is not authorized for copying from this device.
For more information, see http:// www.cinavia.com.
Message Code 2.”
Typical front panel message:
 
“Cinavia™ copy restriction (2)”
 
 
Explanation
 
The audio track of the video that you are copying contains a Cinavia code indicating that it was intended for duplication using professional equipment only (for example, by a professional replicator) and is not authorized for copying by consumers.
 
 
Recommendations
 
If the video that you are copying is a professionally produced movie or television show, you will need to obtain a copy that was made with the permission of its copyright owner.
 
If the video that you are copying is a home movie or other personal recording that includes some professionally produced content (including the audio track of a professionally produced movie or television show), in order to make a copy you will need to either copy only those parts of the recording that do not include professionally produced content or else you may create or obtain a version of the video that does not include this protected material.</pre>
=== Message Code 3: Audio muted ===
<pre>Typical on-screen message:
 
“Audio outputs temporarily muted. Do not adjust the playback volume. The content being played is protected by Cinavia™
and is not authorized for playback on this device. For more information, see http://www.cinavia.com. Message Code 3.”
Typical front panel message:
 
“Cinavia™ playback restriction (3)”
 
 
Explanation
 
The audio track of the video that you are playing contains a Cinavia code indicating that it is an unauthorized copy of professionally-produced content.
 
 
Recommendations
 
If the video that you are playing is a professionally produced video (such as a movie or television show), you will need to obtain a copy that was made with the permission of the copyright owner.


<gallery>
If the video that you are playing is a home movie or other personal recording that includes some professionally produced content (including the audio track of a professionally produced video), to play your recording without muting you may either:
File:PS3 MinVerChk Result CECHC04.JPG|PS3 MinVerChk on the CECHC04
File:PS3 MinVerChk used on CECHG04 SEM-001.jpg|PS3 MinVerChk on the CECHG04
</gallery>


== Hashes ==
    Pause the video, wait 30 seconds for the audio to be un-muted, then skip over those portions where the professionally produced material is used and continue playing the rest of the video, or
{| border="1" cellspacing="0" cellpadding="5" border="#999" class="wikitable sortable" style="border:1px solid #999; border-collapse: collapse;"
    Pause the video, wait 30 seconds for the audio to be un-muted, then play video from a different optical disc for at least 10 minutes before continuing playback of this video.
|- bgcolor="#cccccc"
! Version !! MD5 !! SHA1 !! CRC32 !! CRC16 !! HMAC_SHA1
|-
| 0 file (do not use)      || MD5::1f5039e50bd66b290c56684d8550c6c2 || SHA1::7b91dbdc56c5781edf6c8847b4aa6965566c5c75 || CRC32::2A0E7DBB || CRC16::0 || HMAC_SHA1::
|-
| 3.41 RETAIL/CEX PSJB      || MD5::6f1ef9144c43c9a6f00f7ee7464a6689 || SHA1::f3c19e06c0e7b8cc550bb3244f5f88356173fa6d || CRC32::8A1E7548 || CRC16::7FFC || HMAC_SHA1::9F7001A6A93AE03A61ED7CFB7156A68DF0740708
|-
|}


For information on how this professionally produced content can be included in your home movies or other personal recordings in a way that will not be limited by Blu-ray Disc players, see Cinavia website : Guidelines for Use of Content in Home Movies.</pre>
=== Message Code 4: Copying stopped ===
<pre>Typical on-screen message:


=== PS3UPDAT.SHA ===
“Copying stopped. This content is protected by Cinavia™
and is not authorized for copying from this device.
For more information, see http://www.cinavia.com”
Typical front panel message:


Some BluRay-Movie Discs contain firmware updates for the Playstation 3 Console. Inside the /PS3/UPDATE folder can be a file called "PS3UPDAT.SHA".
“Cinavia™ copy restriction (4)”


==== example ====


This is an example from the movie "Priest" with [[3.50 CEX|3.50]] firmware
Explanation
The audio track of the video that you are copying contains a Cinavia code indicating that it is an unauthorized copy of professionally produced content.


{| class="wikitable"
|-
! 0x002F070 - 0x002F8CF
|-
| <pre>Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
00000000  61 7F 7F 6B 07 07 07 0B 00 00 00 00 00 00 00 00  a..k............
00000010  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
00000020  B8 19 86 1F 75 D5 08 82 14 2C BE C8 AF 54 B0 00  ....u....,...T..
00000030  12 BC 04 9D 00 00 00 00 00 00 00 00 00 00 00 00  ................
</pre>
|-
|}
==== structure ====
{|class="wikitable"
|-
! Address !! Size !! Value !! Description !! Observations
|-
| 0x0 || 0x8 || 61 7F 7F 6B 07 07 07 0B || Unknown  ||
|-
| 0x8 || 0x18 || 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 || Padding ||
|-
| 0x20 || 0x14 || B8 19 86 1F 75 D5 08 82 14 2C BE C8 AF 54 B0 00 12 BC 04 9D || SHA1 hash of PS3UPDAT.PUP ||
|-
| 0x34 || 0xC || 00 00 00 00 00 00 00 00 00 00 00 00 || Padding ||
|-
| Rest || Rest || Rest || Encrypted Data ||
|}


Recommendation


----
If the video that you are copying is a professionally produced video (such as a movie or television show), you should obtain a copy that was made with the permission of the copyright owner.


==Repositories==
If the video that you are copying is a home movie or other personal recording that includes some professionally produced material (including the audio track of a professionally produced movie or television show), in order to make a copy without interruption you will need to either copy only those parts of the recording that do not include professionally produced content or else you may create or obtain a version of the video that does not include this protected material.


[http://pubrepo.stoker25.com/Consoles/Playstation%203/updates/ stoker25 - specialises in debug/DEX and DECR/TOOL firmwares] (self hosted)
For information on how this professionally produced material can be included in your home movies or other personal recordings in a way that will not be limited by Blu-ray Disc players, see Guidelines for Use of Content in Home Movies.</pre>


== Remark @ Installation ==
=== PS3 specifics ===


ps3d storage region 3 on the internal harddisk (ps3dc) is used by the PS3 as temp for installing updates. When installing PUP files, the PUP content gets unpacked there, checked - the system flags the update bit and prompts for reboot. After reboot it sees the update bit set and installs the files from ps3dc without rechecking (!) -> possible attack vector for circumventing checks, like down-/crossgrading). edit-note: doesn't seem to be true, it is still checked.
Cinavia is not experienced in firmware 3.01 and older - firmware 3.10 and higher contain Cinavia DRM
Most likely suspects for the DRM are the player, streamsplitter and video- / audio decoders (e.g. libmp3dec.sprx)
Content known to trigger Cinavia DRM: certain xvid/mp3 rips (e.g. Battle_Los_Angeles_2011_R5_XViD-IMAGiNE &amp; the R5.LiNE.XViD-FOAM release of that same title / The.Tourist.DVDR-TWiZTED)


ps3d - 4 possible regions :
Playing Cinavia DRM protected content with Showtime works without problems (Showtime uses ffmpg), PS3 Media Server can also be used with the MEncoder transcoder otherwise it fails.
ps3da : whole disk
  ps3db : UFS2 : GameOS
  ps3dc : FAT (2GB) : Update
  ps3dd : EXT3 : OtherOS (in the <=3.15 way)


Debug firmware doesnt contain Cinavia DRM, neither has Rebug which uses same Debug system files (only CoreOS = Retail on Rebug)


== No applicable data found - technical pov ==
====30.07.2011 addition====
''''I have traced the Cinavia DRM checks to 4 separate sprx files and after a long time trying to patch these files I have found that 3 of those files are present in the DEBUG (DEX) firmware don’t have the Cinavia DRM checks enabled. Files are videoplayer_util sprx, videoplayer_plugin sprx and videoeditor_plugin sprx.''


Reasons why the playstation updating process does not recognize a pup.
''I have successfully copied these 3 sprx files from DEBUG (DEX) FW 341 over to my retail PS3 unit running OFW 341 using dev_blind and Cinavia seems to be now disabled. I’ve confirmed this by playing back a number of Cinavia affected video files.''


* 1) Missing files/Reading failure of:
''This means that Cinavia is now disabled for all DLNA playback and copying, but Cinavia checks on AVCHD and BD playback are still present with Message Code 3 that mutes the audio as the sprx file with the Cinavia check bdp_plugin sprx is not present in DEX firmware because BD playback is disabled in DEBUG. If someone is able to patch Cinavia out of bdp_plugin sprx this will be solved too.''
** [[patch_build.txt]] (vsh target)
** [[promo_flags.txt]] (incorrect flag will result in "data corrupt")


* 2) [[update_files.tar]]
''I have created a new task for PS3MFW so this can be easily made part of any new MFW’s as needed. Any FW version that has had the DEX firmware leaked should be able to be used to create a CFW of the same version. eg DEX 3.41 -> MFW 341 or DEX 355 -> MFW 355 etc etc. Don’t use sprx files from different FW versions! See git hacks for change_cinavia_files task source.''
** unable to open PUP (rb)
** unable to read first 0x30 Bytes (header)
** unable to read further 0x20 Bytes sized segment_table (aka file tables)
** unable to find [[CoreOS|core os package.pkg]] inside update_files.tar


* 3) Unable to open Storage Region 1/2 on HDD.
''Big thanks to the KaKaRoTo and REBUG team for their community contributions as this would have never been possible without the knowledge they’ve shared with us.''''
* 4) No Media present. (no success when fstat)
http://git.dashhacks.com/~tical/ps3mfw/ticals-tasks <br />
[http://www.multiupload.com/EOM4RB3DPB change_cinavia_files.tcl (4.22 KB)]  <br />


== Sample Logs normal installation ==
http://pastie.org/10059999
<pre>
<pre>
cellFsUtilMount: /dev_hdd0
#!/usr/bin/tclsh
Configuration read. bd_video_region=0,dvd_video_region=0
#
spoof_version = 0000, spoof_revision = 0
# ps3mfw -- PS3 MFW creator
BDemulator: disabled
#
real disc type = ff71
# Copyright (C) Anonymous Developers (Code Monkeys)
effective disc type = ff71, fake disc type = 0
#
probe hdd
# This software is distributed under the terms of the GNU General Public
(v)HDD found.
# License ("GPL") version 3, as published by the Free Software Foundation.
probe hdd done
#
vflash is enabled. search system region.
 
search system region
# Notes: videoplayer_util.sprx, videoplayer_plugin.sprx and videoeditor_plugin.sprx
device_id = 0x101000000000007, system_region_id = 0x1
#        have Cinavia DRM checks. These checks are disabled in DEX firmware so these
ACL[0]: LAID = 0x1070000001000001 : ACL =0xb
#        files can be replaced by those from the equivalent DEX firmware or if they
system region found(mode = 0).
#        have been manually patched.  
search system region done.
#        TODO: bdp_plugin.sprx also contains checks but BD playback is disabled on
search flash regions
#        DEX firmware so this file is not included in DEX firmware. This means that
cellFsUtilMount: /dev_flash
#        DNLA copy/playback won't have any Cinavia checks done on it but a copied BD
/dev_flash is clean.
#        playback will still check for Cinavia and mute the audio (Message Code 3)
[(v)flash]
#        until DEX firmware with a bdp_plugin.sprx is released or someone patches
        info.vendor_id = 0x0
#        this file manually.
        info.device_id = 0x0
        info.sector_size = 0x200
        info.media_count = 0x1
        info.capacity = 0x80000
[device_id = 0x100000200000001]
        info.capacity = 0x63e00
flash region 0x2 found.
expected: start sectors = 0x7800, n_sectors = 0x63e00
start sector = 0x7800.
start sector is correct
region size is correct
[device_id = 0x100000300000001]
        info.capacity = 0x8000
flash region 0x3 found.
expected: start sectors = 0x6b600, n_sectors = 0x8000
start sector = 0x6b600.
[device_id = 0x100000400000001]
        info.capacity = 0x400
flash region 0x4 found.
expected: start sectors = 0x73600, n_sectors = 0x400
start sector = 0x73600.
[device_id = 0x100000500000001]
        info.capacity = 0x2000
flash region 0x5 found.
expected: start sectors = 0x73a00, n_sectors = 0x2000
start sector = 0x73a00.
found all flash regions.
search normal region
normal region 1 found.
search normal region done.
normal region 2 found.
Storage event: 7  0  10300000000000a
Storage event: 3  0  10300000000000a
search update package
seach update package in GAME disc
Disc auth: 5004 29 (process: 01000200_main_mer_init.self)
set drive policy success
profile = 0xff71
umount BDVD
umount /dev_bdvd failure = 0x80010002
mount BDVD
cellFsUtilMount: /dev_bdvd
mount /dev_bdvd success
/dev_bdvd/PS3_UPDATE/PS3UPDAT.PUP found
verify /dev_bdvd/PS3_UPDATE/PS3UPDAT.PUP
Initializing
taking a while...
start Updating Proccess
Initialize elapsed time = 3325 msec
check UPL
Check UPL elapsed time = 79 msec
check Package Size
get package size elapsed time = 25 msec
start Verifying Package only
update package elapsed time = 1731 msec
Updating or Verifying failure 0x8002f169
USB storage: id = 0x10300000000000a
        lun = 0x0
        info.capacity = 0xffffffffe8df8800
lun = 0x0, dev_index = 0xa
index = 0x0, pkg_index = 0x2
mount USB storage 0
mp_name = /dev_usb000
umount /dev_usb000 failure = 0x80010002
mount USB storage 0(LUN=0x0)
dev_name = CELL_FS_IOS:USB_MASS_STORAGE000, mp_name = /dev_usb000
cellFsUtilMount: /dev_usb000
mount /dev_usb000 success
/dev_usb000/PS3/UPDATE/PS3UPDAT.PUP found
verify /dev_usb000/PS3/UPDATE/PS3UPDAT.PUP
Storage event: 4  0  101000000000006
Disc removed.
Storage event: 8  0  101000000000006
Initialize elapsed time = 547 msec
Check UPL elapsed time = 148 msec
get package size elapsed time = 17 msec
update package elapsed time = 18979 msec
post processiong...
post processiong done
search update package done
not to be skipped formatting system region.
re-use old partitions.
re-use old flash partitions.
cellFsUtilMount: /dev_hdd1
setup environment for ps3updater
mount game cache
mount game cache success
mkdir /dev_hdd1/PS3UPDATE success
mkdir /dev_hdd1/PS3UPDATE/vsh success
mkdir /dev_hdd1/PS3UPDATE/vsh/etc success
mkdir /dev_hdd1/PS3UPDATE/data success
mkdir /dev_hdd1/PS3UPDATE/data/font success
Initialize elapsed time = 582 msec
Check UPL elapsed time = 160 msec
update package elapsed time = 20137 msec
copy /dev_usb000/PS3/UPDATE/PS3UPDAT.PUP to /dev_hdd1/PS3UPDATE/PS3UPDAT.PUP
copy id = 0x100, dst = /dev_hdd1/PS3UPDATE/ps3version.txt
copy id = 0x601, dst = /dev_hdd1/PS3UPDATE/ps3swu.self
extarct id = 0x201, dst = /dev_hdd1/PS3UPDATE
segment = 0x300, offset = 0x56f5b0, size = 0xc0e4c00
file_num = 51
required patch_name : /BDIT_FIRMWARE_PACKAGE.pkg.spkg_hdr.1
segment = 0x501, offset = 0xc6541b0, size = 0x14000
file_num = 49
patch found: offset = 0xc6543b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_301R.pkg.spkg_hdr.1
patch found: offset = 0xc6549b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_302R.pkg.spkg_hdr.1
patch found: offset = 0xc654fb0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_303R.pkg.spkg_hdr.1
patch found: offset = 0xc6555b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_304R.pkg.spkg_hdr.1
patch found: offset = 0xc655bb0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_306R.pkg.spkg_hdr.1
patch found: offset = 0xc6561b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_308R.pkg.spkg_hdr.1
patch found: offset = 0xc6567b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_310R.pkg.spkg_hdr.1
patch found: offset = 0xc656db0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_312R.pkg.spkg_hdr.1
patch found: offset = 0xc6573b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_314R.pkg.spkg_hdr.1
patch found: offset = 0xc6579b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_316R.pkg.spkg_hdr.1
patch found: offset = 0xc657fb0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_318R.pkg.spkg_hdr.1
patch found: offset = 0xc6585b0, size = 0x280
required patch_name : /BLUETOOTH_FIRMWARE.pkg.spkg_hdr.1
patch found: offset = 0xc658bb0, size = 0x280
required patch_name : /CORE_OS_PACKAGE.pkg.spkg_hdr.1
patch found: offset = 0xc6591b0, size = 0x280
required patch_name : /MULTI_CARD_FIRMWARE.pkg.spkg_hdr.1
patch found: offset = 0xc6597b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01000006.pkg.spkg_hdr.1
patch found: offset = 0xc659db0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01010303.pkg.spkg_hdr.1
patch found: offset = 0xc65a3b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01020302.pkg.spkg_hdr.1
patch found: offset = 0xc65a9b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01030302.pkg.spkg_hdr.1
patch found: offset = 0xc65afb0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01040402.pkg.spkg_hdr.1
patch found: offset = 0xc65b5b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01050002.pkg.spkg_hdr.1
patch found: offset = 0xc65bbb0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01050101.pkg.spkg_hdr.1
patch found: offset = 0xc65c1b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_S1_00010002083E0832.pkg.spkg_hdr.1
patch found: offset = 0xc65c7b0, size = 0x280
required patch_name : /UPL.xml.pkg.spkg_hdr.1
patch found: offset = 0xc65cdb0, size = 0x280
required patch_name : /RL_FOR_PACKAGE.img.spkg_hdr.1
patch for /RL_FOR_PACKAGE.img not found. skipped
required patch_name : /RL_FOR_PROGRAM.img.spkg_hdr.1
patch for /RL_FOR_PROGRAM.img not found. skipped
required patch_name : /dev_flash3_024.tar.aa.2015_02_05_035051.spkg_hdr.1
patch found: offset = 0xc65d3b0, size = 0x280
required patch_name : /dev_flash_000.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65d9b0, size = 0x280
required patch_name : /dev_flash_001.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65dfb0, size = 0x280
dir_num = 1
dirname = /dev_flash/data/font/
dstname = /dev_hdd1/PS3UPDATE/data/font/
file_num = 20
filename = /dev_flash/data/font/SCE-PS3-RD-R-LATIN2.TTF, offset = 0400, size = 0xd67c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-R-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-R-LATIN.TTF, offset = 0de00, size = 0x95f4
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-R-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-VR-R-LATIN2.TTF, offset = 017600, size = 0x218b0
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-VR-R-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-SR-R-LATIN2.TTF, offset = 039200, size = 0x12ee8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-B-LATIN.TTF, offset = 04c400, size = 0x12184
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-B-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-L-LATIN.TTF, offset = 05e800, size = 0x9714
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-L-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-YG-R-KOR.TTF, offset = 068200, size = 0x79728
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-YG-R-KOR.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-I-LATIN.TTF, offset = 0e1c00, size = 0x9ea4
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-I-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-BI-LATIN.TTF, offset = 0ebe00, size = 0x9c80
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-BI-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-LI-LATIN.TTF, offset = 0f5e00, size = 0xa038
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-LI-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-L-JPN.TTF, offset = 0100200, size = 0x2f0eb4
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-L-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-CP-R-KANA.TTF, offset = 03f1400, size = 0xf27c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-CP-R-KANA.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-BI-LATIN.TTF, offset = 0400a00, size = 0x13128
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-BI-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-I-LATIN.TTF, offset = 0413e00, size = 0x133d8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-I-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-SR-R-EXT.TTF, offset = 0427400, size = 0x43450
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-EXT.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-L-LATIN2.TTF, offset = 046ac00, size = 0xd7fc
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-L-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-SR-R-LATIN.TTF, offset = 0478600, size = 0xd1b0
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-R-JPN.TTF, offset = 0485a00, size = 0x2f5c38
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-R-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-YG-B-KOR.TTF, offset = 077ba00, size = 0x78ec8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-YG-B-KOR.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-R-EXT.TTF, offset = 07f4c00, size = 0x443b8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-R-EXT.TTF
required patch_name : /dev_flash_002.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65e5b0, size = 0x280
dir_num = 0
file_num = 3
filename = /dev_flash/data/font/SCE-PS3-SR-R-JPN.TTF, offset = 0200, size = 0x47380c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-B-JPN.TTF, offset = 0473e00, size = 0x2d9724
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-B-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-R-LATIN.TTF, offset = 074d800, size = 0x1202c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-R-LATIN.TTF
required patch_name : /dev_flash_003.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65ebb0, size = 0x280
dirname = /dev_flash/data/font/SONY-CC/
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/
file_num = 12
filename = /dev_flash/data/font/SCE-PS3-DH-R-CGB.TTF, offset = 0200, size = 0x7d8884
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-DH-R-CGB.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-B-LATIN2.TTF, offset = 07d8e00, size = 0xd328
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-B-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-YG-L-KOR.TTF, offset = 07e6400, size = 0x78f68
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-YG-L-KOR.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-B-LATIN.TTF, offset = 085f600, size = 0x9430
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-B-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-VR-R-LATIN.TTF, offset = 0868e00, size = 0x10344
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-VR-R-LATIN.TTF
filename = /dev_flash/data/font/SONY-CC/k006004ds.ttf, offset = 0879600, size = 0xeb94
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/k006004ds.ttf
filename = /dev_flash/data/font/SONY-CC/e046323ts.ttf, offset = 0888400, size = 0xd960
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/e046323ts.ttf
filename = /dev_flash/data/font/SONY-CC/c041056ts.ttf, offset = 0896000, size = 0x116dc
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/c041056ts.ttf
filename = /dev_flash/data/font/SONY-CC/n023055ms.ttf, offset = 08a7a00, size = 0xb38c
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/n023055ms.ttf
filename = /dev_flash/data/font/SONY-CC/e046323ms.ttf, offset = 08b3000, size = 0xc25c
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/e046323ms.ttf
filename = /dev_flash/data/font/SONY-CC/n023055ts.ttf, offset = 08bf600, size = 0xc9c0
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/n023055ts.ttf
filename = /dev_flash/data/font/SONY-CC/d013013ds.ttf, offset = 08cc200, size = 0x11174
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/d013013ds.ttf
required patch_name : /dev_flash_004.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65f1b0, size = 0x280
dir_num = 2
dirname = /dev_flash/vsh/etc/
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/
dirname = /dev_flash/vsh/etc/print/
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/print/
file_num = 11
filename = /dev_flash/vsh/etc/layout_factor_table_720.txt, offset = 0400, size = 0x1ff
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_720.txt
filename = /dev_flash/vsh/etc/layout_grid_table_720.txt, offset = 0800, size = 0x3fd5
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_720.txt
filename = /dev_flash/vsh/etc/layout_grid_table_1080.txt, offset = 04a00, size = 0x41f6
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_1080.txt
filename = /dev_flash/vsh/etc/index.dat, offset = 08e00, size = 0x4f0
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/index.dat
filename = /dev_flash/vsh/etc/layout_factor_table_272.txt, offset = 09600, size = 0x1dd
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_272.txt
filename = /dev_flash/vsh/etc/version.txt, offset = 09a00, size = 0x4ce
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/version.txt
filename = /dev_flash/vsh/etc/layout_grid_table_480.txt, offset = 0a200, size = 0x3dc9
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_480.txt
filename = /dev_flash/vsh/etc/print/epson.pmd, offset = 0e400, size = 0x7154
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/print/epson.pmd
filename = /dev_flash/vsh/etc/layout_grid_table_272.txt, offset = 015800, size = 0x3df7
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_272.txt
filename = /dev_flash/vsh/etc/layout_factor_table_480.txt, offset = 019800, size = 0x1dc
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_480.txt
filename = /dev_flash/vsh/etc/layout_factor_table_1080.txt, offset = 019c00, size = 0x1f2
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_1080.txt
required patch_name : /dev_flash_005.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65f7b0, size = 0x280
required patch_name : /dev_flash_006.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65fdb0, size = 0x280
required patch_name : /dev_flash_007.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6603b0, size = 0x280
required patch_name : /dev_flash_008.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6609b0, size = 0x280
required patch_name : /dev_flash_009.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc660fb0, size = 0x280
required patch_name : /dev_flash_010.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6615b0, size = 0x280
required patch_name : /dev_flash_011.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc661bb0, size = 0x280
required patch_name : /dev_flash_012.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6621b0, size = 0x280
required patch_name : /dev_flash_013.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6627b0, size = 0x280
required patch_name : /dev_flash_014.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc662db0, size = 0x280
required patch_name : /dev_flash_015.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6633b0, size = 0x280
required patch_name : /dev_flash_016.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6639b0, size = 0x280
required patch_name : /dev_flash_017.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc663fb0, size = 0x280
required patch_name : /dev_flash_018.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6645b0, size = 0x280
required patch_name : /dev_flash_019.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc664bb0, size = 0x280
required patch_name : /dev_flash_020.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6651b0, size = 0x280
required patch_name : /dev_flash_021.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6657b0, size = 0x280
required patch_name : /dev_flash_022.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc665db0, size = 0x280
required patch_name : /dev_flash_023.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6663b0, size = 0x280
setup environment for ps3updater done.
umount game cache
umount game cache success
Unmount:: not call unset_storage_event_handler
UfsSysUinit2:not call ffs_uninitUnmount:: not call free


Prepare to shutdown .....Going to shutdown.
# Priority: 2300
Stage 2 says hello (load base = 0x8000000000540000, end = 0x8000000000558330) (version = 0104700F)
# Description: Change Cinavia DRM affected files
OK


###
# Option --cinavia-videoplayerutil: Patched videoplayer_util.sprx filename
### Software update mode
# Option --cinavia-videoplayerplugin: Patched videoplayer_plugin.sprx filename
# Option --cinavia-videoeditorplugin: Patched videoeditor_plugin.sprx filename
# Option --cinavia-bdpplugin: Patched bdp_plugin.sprx filename


mounting the builtin HDD1 : cellFsUtilMount: /dev_hdd1
# Type --cinavia-videoplayerutil: file open {"SPRX library" {sprx}}
PROCESS /dev_hdd1/PS3UPDATE/ps3swu.self (01000200) loaded
# Type --cinavia-videoplayerplugin: file open {"SPRX library" {sprx}}
PROCESS /dev_hdd1/PS3UPDATE/ps3swu.self (01000200_main_ps3swu.self) (01000200) created from parent process:
# Type --cinavia-videoeditorplugin: file open {"SPRX library" {sprx}}
creating the initial system process : OK
# Type --cinavia-bdpplugin: file open {"SPRX library" {sprx}}
cellFsUtilMount: /dev_flash2
 
cellFsUtilMount: /dev_flash3
namespace eval change_cinavia_files {
Registry: running in recovery mode
 
Registry initialization start:............ done
    array set ::change_cinavia_files::options {
We are originally in region 82
        --cinavia-videoplayerutil "/path/to/videoplayer_util.sprx"
        --cinavia-videoplayerplugin "/path/to/videoplayer_plugin.sprx"
        --cinavia-videoeditorplugin "/path/to/videoeditor_plugin.sprx"
        --cinavia-bdpplugin "/path/to/bdp_plugin.sprx"
    }
 
    proc main {} {
        variable options
 
        set cinavia_videoplayerutil [file join dev_flash vsh module videoplayer_util.sprx]
        set cinavia_videoplayerplugin [file join dev_flash vsh module videoplayer_plugin.sprx]
        set cinavia_videoeditorplugin [file join dev_flash vsh module videoeditor_plugin.sprx]
        set cinavia_bdpplugin [file join dev_flash vsh module bdp_plugin.sprx]
 
        if {[file exists $options(--cinavia-videoplayerutil)] == 0 } {
            log "Skipping videoplayer_util.sprx, $options(--cinavia-videoplayerutil) does not exist"
        } else {
            ::modify_devflash_file ${cinavia_videoplayerutil} ::change_cinavia_files::copy_cinavia_file $::change_cinavia_files::options(--cinavia-videoplayerutil)
        }
 
        if {[file exists $options(--cinavia-videoplayerplugin)] == 0 } {
            log "Skipping cinavia_videoplayerplugin, $options(--cinavia-videoplayerplugin) does not exist"
        } else {
            ::modify_devflash_file ${cinavia_videoplayerplugin} ::change_cinavia_files::copy_cinavia_file $::change_cinavia_files::options(--cinavia-videoplayerplugin)
        }
 
        if {[file exists $options(--cinavia-videoeditorplugin)] == 0 } {
            log "Skipping cinavia_videoeditorplugin, $options(--cinavia-videoeditorplugin) does not exist"
        } else {
            ::modify_devflash_file ${cinavia_videoeditorplugin} ::change_cinavia_files::copy_cinavia_file $::change_cinavia_files::options(--cinavia-videoeditorplugin)
        }
       
        # TODO: no known bdp_plugin.sprx patch yet
        if {[file exists $options(--cinavia-bdpplugin)] == 0 } {
            log "Skipping cinavia_bdpplugin, $options(--cinavia-bdpplugin) does not exist"
        } else {
            ::modify_devflash_file ${cinavia_bdpplugin} ::change_cinavia_files::copy_cinavia_file $::change_cinavia_files::options(--cinavia-bdpplugin)
        }
    }
 
    proc copy_cinavia_file { dst src } {
        if {[file exists $src] == 0} {
            die "$src does not exist"
        } else {
            if {[file exists $dst] == 0} {
                die "$dst does not exist"
            } else {
                log "Replacing default file [file tail $dst] with patched [file tail $src]"
                copy_file -force $src $dst
            }
        }
    }
}
</pre>
</pre>
other: http://pastie.org/pastes/10056453/text?key=utexzvyefmddeddktp3og


== Factory Service Mode - Installation log breakdown ==
Note:
Explaination from rms: http://rmscrypt.wordpress.com/2011/02/01/the-downgrade-process/
only :
* bdp_plugin sprx
* videoplayer_plugin sprx
might need proper patching, because videoplayer_util.sprx is the same on Retail/CEX and Debug/DEX and videoeditor_plugin sprx might not be used for playback at all.


Sample logs:
edit, correction: videoeditor_plugin.prx is same on CEX and DEX
* http://pastebin.com/XhcjfAjw (downgrade 3.66 -> 3.15)
* http://pastebin.com/SAN7Z3Dq (UPL 3.15)


{| class="wikitable"
[http://www.multiupload.com/4LE67XL4TM cinavia-310.rar (2.32 MB)]
----
 
== Hashes ==
{| border="1" cellspacing="0" cellpadding="5" border="#999" class="wikitable sortable" style="border:1px solid #999; border-collapse: collapse;"
|- bgcolor="#cccccc"
! Version !! MD5 !! SHA1
|-
| 0 file (do not use)      || MD5::1f5039e50bd66b290c56684d8550c6c2 || SHA1::
|-
| 1.00 DEBUG/DEX            || MD5::414577d095cd2b6a4f90f0aae2ac1f43 || SHA1::de3868983d8b7c4bb092c40bb4451b4e173d1749
|-
|-
! log !! Explaination !! Notes
| 1.02 RETAIL/CEX          || MD5::da5438f39b3b6e5ef904d91162d93086 || SHA1::6ce852438c7473abc073cc97911cc538bf7b6bfb
|-
|-
| || manufacturing bit detection in Syscon eeprom, manufacturing mode enabled, looking for lv2_diag.self ||  
| 1.02 RETAIL/CEX-DISK      || MD5::df96debb4c014f5673e0ce259e4fb835 || SHA1::4663d7da046b6bbf78b3c050d946b4b148c5a363
|-
|-
| <pre> manufacturing updating start</pre> || lv2_diag.self initialised ||  
| 1.10 RETAIL/CEX          || MD5::374371771ad1608d0684c4d588440f0b || SHA1::6cd78b1e101e0b8856bc4a7408bb558f525134b3
|-
|-
| <pre>PackageName = /dev_usb000/PS3UPDAT.PUP</pre> || PUP file used for FSM reinstall on USB root ||  
| 1.11 RETAIL/CEX          || MD5::8b6b4fb0a5fdd68bf85f02d4f6a0f096 || SHA1::a3d721a241f9b0f82f885877228415b508994d4b
|-
|-
| <pre> settle polling interval success</pre> || ||  
| 1.30 RETAIL/CEX          || MD5::d2c1aa63e55f5eb74e9846112d843f2b || SHA1::895091bf1c85a1be238eb344dfaaf230a581e325
|-
|-
| <pre> vflash is disabled...
| 1.31 RETAIL/CEX          || MD5::602a1373cf1845d56348698d7037ab1b || SHA1::05e391a3b1be3952ef8837bd047a2773af726e04
boot from nand flash...</pre> || NAND system detected, vflash disabled ||  
|-
|-
| <pre> creating flash regions...
| 1.32 RETAIL/CEX          || MD5::c4b08159eaa9fce111e076fb255aa106 || SHA1::b3abbfec073cb083809b0ec102870305fb7d0c3a
create storage region: (region id = 2)
format partition: (region_id = 2, CELL_FS_IOS:BUILTIN_FLSH1, CELL_FS_FAT)
create storage region: (region id = 3)
format partition: (region_id = 3, CELL_FS_IOS:BUILTIN_FLSH2, CELL_FS_FAT)
create storage region: (region id = 4)
format partition: (region_id = 4, CELL_FS_IOS:BUILTIN_FLSH3, CELL_FS_FAT)
create storage region: (region id = 5)
create storage region: (region id = 6)</pre> || creating FLASH regions 2, 3, 4, 5, 6 and formatting regions 2, 3, 4 ||  
|-
|-
| <pre> Initializing
| 1.50 RETAIL/CEX          || MD5::9d7f3830fb3082febf303bd0ce2f17c9 || SHA1::588b6a58c57a6540384227d65b24c9b2fd8765d5
taking a while...
start Updating Proccess
Initialize elapsed time = 61 msec</pre> || Initializing + Start Updating Proccess ||  
|-
|-
| <pre> check UPL
| 1.50 RETAIL/CEX-DISK      || MD5::c84fe177af97443984696b747e70be51 || SHA1::2fd7928a6f5ba51c0ba1390fee197b6fdbb94421
Check UPL elapsed time = 34 msec
check Package Size
get package size elapsed time = 8 msec
start Updating Package
Update packages num = 29
Update packages total size = 160699026</pre> || UPL.xml.pkg from PUP unpkg'ed and read ||  
|-
|-
| <pre> Update Package Revoke list
| 1.51 DEBUG/DEX            || MD5::6ae921c2f0d511fa6c2785dc89137f35 || SHA1::8b1e825ae1966845f698a20d6124c12afd15d67d
read package revoke list package (576 bytes) elapsed = 6 msec
update package revoke list elapsed = 331 msec
Update Package Revoke list done(0x8002f000)</pre> || RL_FOR_PACKAGE.img copied from PUP to [[Flash#trvk_pkg|trvk_pkg]] ||  
|-
|-
| <pre> Update Core OS Package
| 1.51 RETAIL/CEX          || MD5::afd01d9c72b3b69c03a0206c45d87dda || SHA1::bc7c1b189fb453b4a2387d8dca8d00a6c33bc631
read core os package (5193774 bytes) elapsed = 324 msec
update core os package elapsed = 1965 msec
Update Core OS Package done(0x8002f000)</pre> || [[CoreOS|Core OS]] package (CORE_OS_PACKAGE.pkg) is unpkg'ed from PUP and written to [[Flash#ros|ros]] ||  
|-
|-
| <pre> Update VSH Package
| 1.51 RETAIL/CEX-DISK      || MD5::06008bbf003a6ad46270853d7d077b40 || SHA1::410e17e7718b643623a1cfa93b003827d88cab26
sys_memory_container_create() success(id = 0xc0effffe)
Update VSH's package : 1/21
read vsh package (2070 bytes) elapsed = 8 msec
decrypt and verify vsh package elapsed = 23 msec
write vsh package elapsed = 9259 msec
compare vsh package elapsed = 0 msec
Update VSH's package : 2/21
read vsh package (5616383 bytes) elapsed = 351 msec
decrypt and verify vsh package elapsed = 341 msec
write vsh package elapsed = 1725 msec
compare vsh package elapsed = 402 msec
Update VSH's package : 3/21
read vsh package (3357780 bytes) elapsed = 214 msec
decrypt and verify vsh package elapsed = 227 msec
write vsh package elapsed = 2926 msec
compare vsh package elapsed = 312 msec
Update VSH's package : 4/21
read vsh package (5240122 bytes) elapsed = 328 msec
decrypt and verify vsh package elapsed = 309 msec
write vsh package elapsed = 2776 msec
compare vsh package elapsed = 399 msec
Update VSH's package : 5/21
read vsh package (24029 bytes) elapsed = 9 msec
decrypt and verify vsh package elapsed = 24 msec
write vsh package elapsed = 1185 msec
compare vsh package elapsed = 9 msec
Update VSH's package : 6/21
read vsh package (9831317 bytes) elapsed = 599 msec
decrypt and verify vsh package elapsed = 279 msec
write vsh package elapsed = 11830 msec
compare vsh package elapsed = 466 msec
Update VSH's package : 7/21
read vsh package (8662380 bytes) elapsed = 539 msec
decrypt and verify vsh package elapsed = 272 msec
write vsh package elapsed = 16532 msec
compare vsh package elapsed = 474 msec
Update VSH's package : 8/21
read vsh package (8657372 bytes) elapsed = 541 msec
decrypt and verify vsh package elapsed = 361 msec
write vsh package elapsed = 5911 msec
compare vsh package elapsed = 448 msec
Update VSH's package : 9/21
read vsh package (10445426 bytes) elapsed = 635 msec
decrypt and verify vsh package elapsed = 255 msec
write vsh package elapsed = 5408 msec
compare vsh package elapsed = 467 msec
Update VSH's package : 10/21
read vsh package (10252830 bytes) elapsed = 641 msec
decrypt and verify vsh package elapsed = 262 msec
write vsh package elapsed = 8646 msec
compare vsh package elapsed = 476 msec
Update VSH's package : 11/21
read vsh package (9922968 bytes) elapsed = 621 msec
decrypt and verify vsh package elapsed = 252 msec
write vsh package elapsed = 6950 msec
compare vsh package elapsed = 467 msec
Update VSH's package : 12/21
read vsh package (8214459 bytes) elapsed = 505 msec
decrypt and verify vsh package elapsed = 199 msec
write vsh package elapsed = 5843 msec
compare vsh package elapsed = 386 msec
Update VSH's package : 13/21
read vsh package (9428094 bytes) elapsed = 594 msec
decrypt and verify vsh package elapsed = 244 msec
write vsh package elapsed = 5238 msec
compare vsh package elapsed = 442 msec
Update VSH's package : 14/21
read vsh package (7973335 bytes) elapsed = 498 msec
decrypt and verify vsh package elapsed = 346 msec
write vsh package elapsed = 13617 msec
compare vsh package elapsed = 456 msec
Update VSH's package : 15/21
read vsh package (9766737 bytes) elapsed = 603 msec
decrypt and verify vsh package elapsed = 360 msec
write vsh package elapsed = 17267 msec
compare vsh package elapsed = 529 msec
Update VSH's package : 16/21
read vsh package (9199234 bytes) elapsed = 583 msec
decrypt and verify vsh package elapsed = 407 msec
write vsh package elapsed = 23189 msec
compare vsh package elapsed = 689 msec
Update VSH's package : 17/21
read vsh package (7260896 bytes) elapsed = 466 msec
decrypt and verify vsh package elapsed = 286 msec
write vsh package elapsed = 14751 msec
compare vsh package elapsed = 689 msec
Update VSH's package : 18/21
read vsh package (6563380 bytes) elapsed = 422 msec
decrypt and verify vsh package elapsed = 155 msec
write vsh package elapsed = 1906 msec
compare vsh package elapsed = 357 msec
Update VSH's package : 19/21
read vsh package (6092245 bytes) elapsed = 373 msec
decrypt and verify vsh package elapsed = 227 msec
write vsh package elapsed = 1457 msec
compare vsh package elapsed = 405 msec
Update VSH's package : 20/21
read vsh package (9859067 bytes) elapsed = 590 msec
decrypt and verify vsh package elapsed = 238 msec
write vsh package elapsed = 2187 msec
compare vsh package elapsed = 498 msec
Update VSH's package : 21/21
read vsh package (6492084 bytes) elapsed = 419 msec
decrypt and verify vsh package elapsed = 321 msec
write vsh package elapsed = 17509 msec
compare vsh package elapsed = 674 msec
Update VSH Package done(0x8002f000)</pre> || dev_flash_000.tar.aa.* files from PUP are unpkg'ed to dev_flash ||
|-
|-
| <pre> Bul-ray Disc Player Revoke
| 1.54 RETAIL/CEX          || MD5::891bf61f56808119c4968ac3a9101540 || SHA1::753485bf7937f5294cb7dfb0fc97ebcf018f90f8
read bdp revoke package (1904 bytes) elapsed = 23 msec
decrypt and verify bdp revoke package elapsed = 29 msec
write bdp revoke package elapsed = 2240 msec
compare bdprevoke package elapsed = 57 msec
Bul-ray Disc Player Revoke done(0x8002f000)</pre> || dev_flash3_024.tar.aa.* files from PUP are unpkg'ed to dev_flash3 ||  
|-
|-
| <pre> Update Program Revoke list
| 1.54 RETAIL/CEX-DISK      || MD5::c745c4950aa0b761a06f4a9637f7f6e3 || SHA1::5aa22e8556d5385605be880e3655bc81e7c5f812
read program revoke list package (704 bytes) elapsed = 7 msec
update program revoke list elapsed = 331 msec
Update Program Revoke list done(0x8002f000)</pre> || RL_FOR_PROGRAM.img from PUP is copied to [[Flash#trvk_prg|trvk_prg]] ||  
|-
|-
| <pre> move_2block_status_into_the_region(): region id = 3
| 1.60 RETAIL/CEX          || MD5::3a5f49bcee3948301aa698ed57ecb10e || SHA1::b22abc19ad8d9228967c9a407cdfec7b17cfaf7e
rewrite_region() region id = 0x3, start_lba = 0x0, end_lba = 0x4000
rewrite region done (ret = 0x8002f000)
rewrite region elapsed time = 1262 msec
touch_1st_sector_in_block() region id = 0x3, start_lba = 0x0, end_lba = 0x4000
touch_1st_sector() done (ret = 0x8002f000)
touch_1st_sector() elapsed time = 1121 msec
rewrite_region() region id = 0x3, start_lba = 0x0, end_lba = 0x4000
rewrite region done (ret = 0x8002f000)
rewrite region elapsed time = 1262 msec</pre> || ||  
|-
|-
| <pre> Update BD firmware
| 1.60 TOOL/DECR            || MD5::95fdca0641cc66e1f6afa8a9fd260051 || SHA1::bf19b588024e437e2597b30b4ee13d7e6ef42f09
read BD firmware package (1966992 bytes) elapsed = 142 msec
update BD firmware elapsed = 184 msec
read BD firmware package (951040 bytes) elapsed = 78 msec
update BD firmware elapsed = 142 msec
read BD firmware package (951040 bytes) elapsed = 80 msec
update BD firmware elapsed = 13959 msec
Update BD firmware done(0x8002f000)</pre> || Appropiate [[Bluray_Drive_Firmware|BD firmware]] for that [[Bluray Drive]] is flashed to BD eeprom ||  
|-
|-
| <pre> Update Multi-Card controller firmware
| 1.70 RETAIL/CEX          || MD5::468238974943b45c09aeb632853401f2 || SHA1::e1456431902784999ae0528889c94534a6089c13
read MCC package (28636 bytes) elapsed = 25 msec
update MCC elapsed = 24 msec
Update Multi-Card controller firmware done(0x8002f000)</pre> || If SKU with [[MultiCardReader]] then [[MultiCardReader_Firmware|Multi-Card controller firmware]] is flashed to [[MultiCardReader#SST_39VF010_70-4C-WHE_.28Flash.2C_1Mbit.2C_128K_x8.2C_2.7-3.6V.2C_70ns_TSOP32.29|SST 1mbit Flash]] ||  
|-
|-
| <pre> Update BlueTooth firmware
| 1.70 RETAIL/CEX-DISK      || MD5::8ec2c18e456d3e01603c2ac167879157 || SHA1::0c4e2c1c4fef8dd67059da059c51cafa4678fbe4
read BT package (639368 bytes) elapsed = 62 msec
update BT elapsed = 56 msec
Update BlueTooth firmware done(0x8002f000)</pre> || [[Bluetooth#Spansion_S99AL008D002_0630DBA_H_.28NOR_Flash_8Mbit_3.3V.29|Bluetooth NOR flash]] is updated with
[[Bluetooth_Firmware|BlueTooth firmware]]
|-
|-
| <pre> Update System controller firmware
| 1.70 DEBUG/DEX            || MD5::4bb46cd379332da2587e88af68f6df0a || SHA1::720501c9de220645e4ef22fbef5c0a82aef584d4
read SC patch package (4864 bytes) elapsed = 24 msec
read SC patch package (4864 bytes) elapsed = 24 msec
read SC patch package (4864 bytes) elapsed = 23 msec
Update System controller firmware done(0x8002f000)</pre> || [[Syscon Hardware]] is updated with appropiate [[Syscon Firmware]] ||  
|-
|-
| <pre> update package elapsed time = 228361 msec</pre> || ||  
| 1.80 RETAIL/CEX          || MD5::fd9887626f734b46b271aec58e827cb2 || SHA1::6a750b307a52a8a24937887fbf2c2c9c098cd90d
|-
|-
| <pre> post processiong...
| 1.80 RETAIL/CEX-DISK      || MD5::2f6375d7f28cfc6587dbc038dae5b3f7 || SHA1::39e94123abaee16be602463f9f8121dce078837c
post processiong done
cleanup update status (ret = 0)</pre> || ||  
|-
|-
| <pre> os version = 03.1500
| 1.80 DEBUG/DEX            || MD5::73bb5bb827031a1ec67bf84b009f6848 || SHA1::71bbf83d1807e726b6abf5b64c9431c2bcdea29a
build_version = 38031,20091206</pre> || ||  
|-
|-
| <pre> region of core os package = 0x40000000</pre> || ||  
| 1.81 RETAIL/CEX          || MD5::b81fe78b163b62ce8983ad990306fe57 || SHA1::77e957dc895c2da25a962c03a7e58746818cb6fd
|-
|-
| <pre> build_target = CEX-ww
| 1.82 RETAIL/CEX           || MD5::25de800491e8e88104d7e30b7524e9dc || SHA1::33dbc0d3ec44f7dd9db420f6c8029b92769ec5c9
build target id = 0x83</pre> || ||  
|-
|-
| <pre> manufacturing updating SUCCESS(0x8002f000)</pre> || ||  
| 1.82 RETAIL/CEX-DISK      || MD5::6a4af7814935980c72487ec3d7d55e50 || SHA1::131fd6c01187ab0c7bcdbf9854f0c6ad588f1573
|-
|-
| <pre> set product mode (ret = 0)</pre> || ||  
| 1.90 RETAIL/CEX          || MD5::bcefc8569ae4c2f4b7c09fd52f728c02 || SHA1::cbc6a0347abe558c54864193e42752190f802050
|-
|-
| <pre> Total Elapsed time = 230556 msec</pre> || ||  
| 1.90 RETAIL/CEX-DISK      || MD5::15a301e410815ea9c90dc0ddb6e5c695 || SHA1::9b554b76c48642739f9c41fb6015701f578349ca
|-
|-
|}
| 1.92 RETAIL/CEX          || MD5::0f99147438936578951dd9d3f514000a || SHA1::9b554b76c48642739f9c41fb6015701f578349ca
 
|-
== old crossgrading Retail/CEX to Debug/DEX ==
| 1.92 DEBUG/DEX           || MD5::be4b4cb17bad2a1fa381475d00e4a23a || SHA1::8db3a32cf51183bc3c49b23c8f855669cb5b56cb
'''Note'''<br />
|-
For this to work your system must be below or at 1.80 for the 1.80 debug update and below or on 2.01 for the 2.15 debug update. Just use the next version up from your current firmware version for the retail update.
| 1.92 TOOL/DECR            || MD5::21460d2710f2b0910f0caf6e0213cea3 || SHA1::c99d8d91084665d4bef38cab32f2b2f96216c6a8
 
|-
It's not very usefull, esp. nowadays, added for historic reasons
| 1.93 RETAIL/CEX          || MD5::9c95692d4dd1c1e17c2b0ce5dcaebba1 || SHA1::417e133e07ad0d1f746c32d9f8a6c299b41bce35
 
|-
===How to install debug firmware on retail PS3===
| 1.93 RETAIL/CEX-DISK      || MD5::fa45c168f87f2f42e91675cda9f79cc7 || SHA1::dfcc94dfe4208ff09ea8e084e0f8725235698b8f
old source: <span style="text-decoration: line-through;">http://www.ps3hax.net/other-misc-tutorials/4808-tutorial-how-install-debug-firmware-retail-ps3-partially-hdd-swap-method.html</span>
|-
 
| 1.94 RETAIL/CEX-DISK      || MD5::f172f9bd37ca3e779dfaaf20ebfe632b || SHA1::64a98bdd2643448a9b9eb48f5d7bac3c228a168b
====Tools needed====
|-
* 1 PS3 system
| 2.00 RETAIL/CEX          || MD5::f9df10bb57cdeeef8395c39415f54965 || SHA1::adf17bce368d9b93491280a9703f8ccc826a6df2
* 2 PS3 hard drives that are the same size
|-
* 1 retail firmware upgrade
| 2.00 DEBUG/DEX            || MD5::42e46630761b927432b997ebf54b5561 || SHA1::f192c779ed74ecbed12d4e3e2c5a634a013d7de0
* 1.80 Or 2.15 debug firmware
|-
 
| 2.01 RETAIL/CEX          || MD5::1d8e69249aa1a5593307cf7d8ca8a331 || SHA1::ed02e584900899e4d3b805b8c2c49013c8b140c8
====Instructions====
|-
 
| 2.01 RETAIL/CEX-DISK      || MD5::13eb4a6d72ddbe1e43a637bdea424e48 || SHA1::b292f1ae622429aa01ac83da43d4cb85ab331c6a
# Format both hard drives on the PS3 system.
|-
# Download a debug PS3 firmware and place it in USB stick, and start the update. This will copy all the debug firmware files to the PS3's HDD-A.
| 2.10 RETAIL/CEX          || MD5::08393f1bd8e91589c95837142caf0a58 || SHA1::50abf8f325f5820438bfe94d78b043f141deaf89
# After copied the PS3 will restart and you will see the normal update menu which prompts you to click the button to start update. Do NOT update your PS3, but power it off.
|-
# Next remove the HDD-A, and place in the second HDD, HDD-B in the PS3.
| 2.10 RETAIL/CEX-DISK      || MD5::9d3477d4bf6fd683e6ee4bbeab58d462 || SHA1::796f4771b95d003bb4d6d8a8b2434279b23f6085
# Download and copy a retail PS3 firmware to a USB stick.
|-
# Again as before place USB in PS3 and update the PS3 as normal but when you get to the screen where it asks for you to press button, do that but stop when it asks you to AGREE to Terms and Condition Page.
| 2.10 DEBUG/DEX            || MD5::c614ec1e0daad8212b9a893af90fbcf1 || SHA1::b020eb59aaa3a85c4be54bbdbd51eff42e5765a1
# While the system is still powered on and on the update screen, REMOVE HDD-B, and insert HDD-A.
|-
# After swapping the HDD's continuie to update the PS3 as normal and the PS3 will install the debug PS3 firmware=
| 2.15 DEBUG/DEX            || MD5::36b23713abccf0f3cec0e514ba8ac0d9 || SHA1::afe1016d413a87e07d76d1c399b1c4f21678ca75
# Go to the settings and check firmware version and there you will also see the debugging PS3 options :)
|-
 
| 2.16 RETAIL/CEX-DISK      || MD5::73fe70e0198b80f01525b6b72774af25 || SHA1::62dbf5e4512a2f067b0da5cd1d9808e08a20ae18
 
|-
 
| 2.17 RETAIL/CEX          || MD5::b859ca0f15fe9516d85fd0d89444ac5b || SHA1::bb578fb1a47078d5852ff91a768c68bd096ce866
----
|-
 
| 2.17 RETAIL/CEX-DISK      || MD5::9cc63afcbc1b2ddf1900ceac4d896f32 || SHA1::3f3cfa72423fe3c9222d8107131069690a60c628
 
|-
== Ancient preproduction / prototype ==
| 2.17 DEBUG/DEX            || MD5::9171f52305e1478f59be247d477be60c || SHA1::5621e8a6716fa21b25e87a09b4e2a0e20bcfb9b1
ceb decrypter (works on 0.50.004.r010, may work on others)
|-
 
| 2.20 RETAIL/CEX          || MD5::d33eb3ef5721bc940ca29b4c80b96bde || SHA1::4bfb597b766bd6b99c6612963519bce9a4e1ec7b
http://pastie.org/private/al9p0vkw3g0lgat2yeazw#4,11
|-
 
| 2.20 RETAIL/CEX-DISK      || MD5::8129880df87704e9aa84740af3afcb23 || SHA1::0022412e0f12dfaf6d1236a89c4cab94c9bcf720
  CEB-201x, DEH-R1030 etc.
|-
 
| 2.20 DEBUG/DEX            || MD5::1e1c45341d152fc554cddbd091729da8 || SHA1::100843290fb3c8296ad9e53a0e411a27addc9424
  old SDKs contain these binairy files in \cell\target\bootrom,
|-
  while knowledge about previous version existance can be revealed by the documentation in \cell\info\old\XXX
| 2.30 RETAIL/CEX          || MD5::dd2e675fce5d2eb28ca93bc32edb3de6 || SHA1::fb639b3ed4e7cd5c457855cf1c9b59e06c05c87a
 
|-
=== ebootrom structure ===
| 2.30 RETAIL/CEX-DISK      || MD5::b34951b1c3a181811b11238204044493 || SHA1::999a238c0553db6129c5bb89982ed190ebee2867
====Header====
|-
{| class="wikitable"
| 2.30 DEBUG/DEX            || MD5::0f0dd5dd43d69bf54f1adc3cd1abfaeb || SHA1::c84d8f8eb667d5c67180e77ac8155144a1c304e4
|-
| 2.35 RETAIL/CEX          || MD5::db48cbcde359982c065c2f5503204b67 || SHA1::cef64aae9f27914f1078046f5d3fd309d2e92251
|-
| 2.35 RETAIL/CEX-DISK      || MD5::3e4fce1a5648997898300937d081e901 || SHA1::7dc086684ba8cb061e43aba5c31f574179a1f1f8
|-
| 2.36 RETAIL/CEX          || MD5::0274382cb3e21aa90e319eba358588c6 || SHA1::f46d5db533590f00d14e1cd739c10fd99e219d5e
|-
| 2.36 DEBUG/DEX            || MD5::f47aa0788201c60c32963e38f1763d4b || SHA1::ea600e94dd19725b5a7d02e861ba8b6b755c0262
|-
| 2.40 RETAIL/CEX          || MD5::96e9def601672c5abcbb4604bb2346f1 || SHA1::4e399dbdaa8dfe87d008213f9e9a7b456c47fa01
|-
| 2.40 DEBUG/DEX            || MD5::57536eaaecf38bff5d9e69ec41ba7df1 || SHA1::9a66a816b326d12b128ea9cd33917bfde7abd0b2
|-
| 2.41 RETAIL/CEX          || MD5::67c660325b0b97acdeda6c0913dc1f74 || SHA1::5aa877ff1368c83d30f90c4a5f64904e6f06e58a
|-
| 2.41 RETAIL/CEX-DISK      || MD5::f7d2330ce9162ea512f8474c81a49460 || SHA1::c32b24e8d6ca080d31680e8fc21fff168492c1c8
|-
| 2.41 DEBUG/DEX            || MD5::0c4b9b67a9e6ed4f75bff57eb94c2b0b || SHA1::c31775c6975a5e418992339676b878541f6da811
|-
| 2.42 RETAIL/CEX          || MD5::60a6c36e2dd2000b3fda3205428665dc || SHA1::1acc37f4eb6f35bb7b79e24b8d8cc490040ef0ea
|-
| 2.42 RETAIL/CEX-DISK      || MD5::3637aa0bf185d050b7550c4140c76f3a || SHA1::d5cd94d1797e4a261e0751eb27df654eee581cbc
|-
| 2.42 DEBUG/DEX            || MD5::3ef6023ccff3d7656665162495d25f5d || SHA1::2d64ead7ba5213c1c3fd83f4a1187654687058a8
|-
| 2.42 SHOP/SEX            || MD5::8a07b080e7812eb5063c5d449fa67ac8 || SHA1::
|-
| 2.43 RETAIL/CEX          || MD5::da62cbc7eafde9f6792b8a76a4aef004 || SHA1::6e206243d27c1c5232890c6568dd3121320dfba9
|-
| 2.43 RETAIL/CEX JIG      || MD5::1c4baa950f6d74d65742fc77c2470341 || SHA1::8caddcd518ab2ad59f88865c932b1b53bef6433c
|-
| 2.50 RETAIL/CEX          || MD5::823ab63c96d570510b254a80755df446 || SHA1::61bcdff915a88596902d81a756351cb6348a78c3
|-
| 2.50 RETAIL/CEX-DISK      || MD5::576413892da8d248ef25701b20b4b7a1 || SHA1::9e7c47851ce010f3534a22a3392b9cead735fab5
|-
| 2.51 SHOP/SEX            || MD5::252d34d7cdd598ba95ad0fe5662bb60b || SHA1::
|-
| 2.52 RETAIL/CEX          || MD5::e9cd7c268667ee695a708bf00c6853d8 || SHA1::78d91ef41b399897ff438034aa15b187d29d5f8f
|-
| 2.52 RETAIL/CEX-DISK      || MD5::d575a627aefffca7323c7b5df2b6672e || SHA1::b39c956cc5d4b71a054bbd196580a215faa9b920
|-
| 2.52 DEBUG/DEX            || MD5::ea6b021f6e4cbb69fa46fb9d9845078f || SHA1::123aa42642f2c069d997b159f8609253eb8a53d5
|-
| 2.53 RETAIL/CEX          || MD5::5b0e9d62ff6e9edc796db9a2916824f0 || SHA1::30050179863704e2d3c4e8032fa00bfa4df4ab51
|-
| 2.53 DEBUG/DEX            || MD5::269b87f8f8203128c05cddbaf0ba187d || SHA1::c913bf5f056ac1b725d09813b472672e1afa1f6f
|-
| 2.60 RETAIL/CEX          || MD5::043067d8624040f9f3f1a8dc2e662bce || SHA1::0753ae458e0c94ea0f16e20324ac6b397a45b33a
|-
| 2.60 RETAIL/CEX-DISK      || MD5::e39cbd60e584c1ce363407918ae5f076 || SHA1::c691afdd25c575fa78eebec1e61dc0b763646926
|-
| 2.60 DEBUG/DEX            || MD5::ba37e05fd07b7ad998718e279cf3824e || SHA1::9c45fdb997844c21b9b3667f12cd62da7e88825c
|-
| 2.70 RETAIL/CEX          || MD5::3352adc32e39ec5f7b4cdeb8b861052a || SHA1::75049536382808b734d6c9c2cd838358df0aab0f
|-
| 2.70 DEBUG/DEX            || MD5::afd11f0158ee7230b95929f59d999c4d || SHA1::824846af35876cb203b53fc7cb421424d12654cd
|-
| 2.76 RETAIL/CEX          || MD5::d6856f234f3066b94dc88ab430a63bfb || SHA1::0bc9c54add04a7adabc90e3da5a4fabba9a1e6c5
|-
| 2.76 RETAIL/CEX-DISK      || MD5::7698f1d1d0a4601aa6fe72f784dea498 || SHA1::33a31ca86f8a69845263139a6bb1803edc7521ea
|-
| 2.76 DEBUG/DEX            || MD5::0afa6ec363beab79155162070486dd02 || SHA1::6f26f397d6977f0028ae07f80da4c8d3efa54864
|-
| 2.80 RETAIL/CEX          || MD5::d69362743142953be7cb44a5fd5cc888 || SHA1::1bca8ac0573f55217cd5b531f9829ef7f712c349
|-
| 2.80 RETAIL/CEX-DISK      || MD5::8f8da49b69a73ef0ae4807d367ea7c3d || SHA1::3758ee3505481ba0d2f3d3fb86326ccf0876bf67
|-
| 2.80 DEBUG/DEX            || MD5::196b9eb2e1f1c2c8ab16ddfda876f579 || SHA1::907b8d38ef9e24e97350f3cbac1492116785b31f
|-
| 3.00 RETAIL/CEX          || MD5::c049de7a6a4b03d53e7f9fde04e0fc08 || SHA1::3e439744e6905231ca42c2fd33e5e5c568303744
|-
| 3.00 DEBUG/DEX            || MD5::c0427348a618021050a74c60fadd6d5f || SHA1::82a7ec538c46eeee7994597d9e18c2943321c7a1
|-
| 3.01 RETAIL/CEX          || MD5::6d956116eb5094564359339f60650f56 || SHA1::a4e3962bb1bf845df93f322adb014c8c7d10d536
|-
| 3.01 RETAIL/CEX-DISK      || MD5::59e7c4e39af57db067c65814a9d33f0b || SHA1::be57e8d752bc05f61b08390bfd223bf8820692f8
|-
|-
! Offset !! Length !! Type !! Information
| 3.01 DEBUG/DEX            || MD5::052ced72a250fd459fae757152d6e527 || SHA1::011aa215b8d1542cbe8a04df9a5584db5eb7b380
|-
|-
| 0x0 || 0x4 || unsigned long || Unknown
| 3.10 RETAIL/CEX          || MD5::70296b36d559e35752ae6efd04f702c0 || SHA1::87bfeb3dc793169bd793e5e5e75ab8aa5a364cab
|-
|-
| 0x4 || 0x4 || unsigned long || File Count
| 3.10 DEBUG/DEX            || MD5::2d2dbffd1c1cd5549d913d159ef65e8c || SHA1::2f652d0dedbef8bfc400eedf93af5ac8e77d37d9
|-
|-
| 0x8 || 0x8 || unsigned long || File Length
| 3.15 RETAIL/CEX          || MD5::54ee80e14e479f8351a988eb9a472072 || SHA1::fc4e891e84333f9b37ff7f253eca165aa416c6ad
|-
|-
| 0x10 || 0x30 * '''File Count''' || '''File Table''' || File Table
| 3.15 RETAIL/CEX-DISK      || MD5::80d7f3ec2cfebf582926228ac3a11e21 || SHA1::7fe68e92353bac93225272f27bf2deb9ab6366a6
|-
|-
|}
| 3.15 DEBUG/DEX            || MD5::3f40abc76dfad368d3f4411d7d92b475 || SHA1::0d2a15102a142203658db14df554643945817244
====File Table====
The file table consists of a number of file entries determined by '''File Count''', with the format below:
{| class="wikitable"
|-
|-
! Offset !! Length !! Type !! Information
| 3.20 DEBUG/DEX            || MD5::b21950add14020561c5426b2c974a9a7 || SHA1::93d14576f2888d1193b80a437e1551258b39649c
|-
|-
| 0x0 || 0x8 || unsigned long || Data Offset
| 3.21 RETAIL/CEX          || MD5::3a08ef6164a7770ae3e7d5b9f366437a || SHA1::ccf002575ca03b2a48af2b2303732d0b288a638e
|-
|-
| 0x10 || 0x8 || unsigned long || Data Length
| 3.21 RETAIL/CEX-DISK      || MD5::ea615a368a710f961b6a67eb1a6cc16a || SHA1::a9763705f9dc443e48c8b4a333b63247c5b2b570
|-
|-
| 0x20 || 0x20 || unsigned long || Data FileName (see below)
| 3.21 DEBUG/DEX            || MD5::b43ee87e445d7e0077a974a6d7c16399 || SHA1::4efa7aea94727ac9e9b2442b1ed032a555351797
|}
====Filename IDs====
{| class="wikitable"
|-
|-
! File Entry ID !! Filename
| 3.30 DEBUG/DEX            || MD5::133296059ced19cfb93f8e0bb4b5c6de || SHA1::e3ff61545eb3b1396adce5029e9c6a083e3f803d
|-
|-
| 0x1 || sdk_version
| 3.30 RETAIL/CEX          || MD5::6bdf1b2409d705a0136c40746c62e85d || SHA1::c639707de85470fd222a31fb89499192c65151b7
|-
|-
| 0x2 || version.txt
| 3.30 RETAIL/CEX-DISK      || MD5::905c5ea4b3171bcb99a475118eda047f || SHA1::ad3893712c988c24abdda5e5777f9f0ebdd861fa
|-
|-
| 0x3 || ros (''CORE_OS_PACKAGE.pkg'')
| 3.40 RETAIL/CEX          || MD5::88b2f8d458119f666c97d893c17201cd || SHA1::37dc3afc3e5b7bfdf00c22d3043395185dd551b0
|-
|-
| 0x4 || trvk_prg
| 3.40 RETAIL/CEX-DISK      || MD5::bcef6f6ba312e2ac1cbd25f0a9c22507 || SHA1::9f5d29da1c03e4d39f9e4d682e1028117d1a69bb
|-
|-
| 0x5 || trvk_pkg
| 3.41 RETAIL/CEX BAD      || MD5::00c835be718fc3d5f793e130a2b74217 || SHA1::c1366a9847034f2581559163cfd04d057a930c74
|-
|-
| 0x6 || nand_update
| 3.41 RETAIL/CEX-DISK      || MD5::949fcbec0187c2c493694ff7ebc733f0 || SHA1::cfb1b45b4f7558584d9a0f3882741e6a8fa71080
|-
|-
| 0x7 || bdit_firmware
| 3.41 RETAIL/CEX FIX      || MD5::e07d2b84c9e9691c261b73e5f1aada20 || SHA1::e7f522ba85c8fc780b8bcbaff6c70d36487e2e45
|-
|-
| 0x8 || bdpt_301r_firmware
| 3.41 DEBUG/DEX            || MD5::2ed02e302dbbbcbb35cac6a661eea561 || SHA1::5066d3af680b721d5c3c26c562e55fa7a1ede07f
|-
|-
| 0x9 || bdpt_303r_firmware
| 3.41 TOOL/DECR            || MD5::28caaa7796e3cb7ad6500d989cf38b71 || SHA1::6251a7af2abadf899f1100bc212aecef78a49d19
|-
|-
|}
| 3.41 RETAIL/CEX PSJB      || MD5::6f1ef9144c43c9a6f00f7ee7464a6689 || SHA1::f3c19e06c0e7b8cc550bb3244f5f88356173fa6d
===== bdit_firmware / bdpt_301r_firmware / bdpt_303r_firmware / nand_update / ros / trvk_pkg / trvk_prg =====
======Header======
{| class="wikitable"
|-
|-
! Offset !! Length !! Type !! Information
| 3.41 SHOP/SEX            || MD5::561b924d2b388fb920f3f7ab12c679ca || SHA1::a216261e3eac55914f8fb5a1a4940ab557c85a17
|-
|-
| 0x0 || 0x4 || unsigned long || Unknown
| 3.41 RETAIL/CEX-PATCH    || MD5::03c376ef09222339531c15a3971ddabb || SHA1::d8d732ddcd3855c7dc63fbb2d6a3f07271107d3e
|-
|-
| 0x4 || 0x4 || unsigned long || File Count
| 3.42 RETAIL/CEX          || MD5::6ba866514589155ab094099a9f358ffd || SHA1::62788f6e1555ed62d32591cab463c59ce393e870
|-
|-
| 0x8 || 0x8 || unsigned long || File Length
| 3.42 RETAIL/CEX-DISK      || MD5::d4a54d6dac5ee949f4491b219783bd6f || SHA1::56555c31beb79fdadec127845b428e4eb5aaa4da
|-
|-
| 0x10 || 0x30 * '''File Count''' || '''File Table''' || File Table
| 3.42 RETAIL/CEX-PATCH    || MD5::f007b6488895021b81ecdf0df52e1e06 || SHA1::686469b05b066f2aa827013240fd9ff4395ca46d
|-
|-
|}
| 3.50 DEBUG/DEX            || MD5::0e4d8bdbba47382c2be4242f3327e1a1 || SHA1::cbd3ec3e3421c9d3d35e36aba71b97654dabb78c
======File Table======
The file table consists of a number of file entries determined by '''File Count''', with the format below:
{| class="wikitable"
|-
|-
! Offset !! Length !! Type !! Information
| 3.50 RETAIL/CEX          || MD5::0215e26d1dadeb950471a9c3397a140a || SHA1::b819861f75d50882142cbec8af54b00012bc049d
|-
|-
| 0x0 || 0x8 || unsigned long || Data Offset
| 3.50 RETAIL/CEX-DISK      || MD5::40b4b53f4900d088b90de328ae2b3989 || SHA1::42b08cdfc4c0ea2acbfafa921364b9b547e2de12
|-
|-
| 0x10 || 0x8 || unsigned long || Data Length
| 3.50 SHOP/SEX            || MD5::6f74bf20342289277f2e1dbb6d09377e || SHA1::b9a9a7cf2fbdbc836d05ece0b19e2e5b5c5a3457
|-
|-
| 0x20 || 0x20 || unsigned long || DataName<br />
| 3.55 TOOL/DECR            || MD5::9085da7157e92fa59157676a429a7c1e || SHA1::b9a9a7cf2fbdbc836d05ece0b19e2e5b5c5a3457
* bdit_firmware -> BDIT_FIRMWARE_PACKAGE.pkg
* bdpt_301r_firmware -> BDPT_FIRMWARE_PACKAGE_301R.pkg
* bdpt_303r_firmware -> BDPT_FIRMWARE_PACKAGE_303R.pkg
* trvk_pkg -> RL_FOR_PACKAGE.img
* trvk_prg -> RL_FOR_PROGRAM.img
* ros -> CORE_OS_PACKAGE.pkg
* nand_update -> NAND_UPDATE.pkg.[01]-[28]
|-
|-
| 0x40 || '''Data Length''' || unsigned long || SCE signed package data
| 3.55 DEBUG/DEX            || MD5::3b6ebc594de5586b5e289225f6d3164a || SHA1::671d90d77c211e350838b3d6428eb0827fc3f7fb
|-
|-
|}
| 3.55 DEBUG/DEX 20101126d  || MD5::047671664d9241c04d44278944e153d9 || SHA1::8ede02636f0dc8905616331bbc6919bc642b556b
====== CORE_OS_PACKAGE.pkg ======
{| class="wikitable"
|-
|-
! File Entry ID !! Filename
| 3.55 DEBUG/DEX DOWNGRADER || MD5::efa62388ee8d2592727ddbdce9b4bec8 || SHA1::9d28c2533c36c0eff801a41f74632182d408a5a9
|-
|-
| || aim_spu_module.self
| 3.55 RETAIL/CEX          || MD5::ca595ad9f3af8f1491d9c9b6921a8c61 || SHA1::a3a0d1c61e17c6a58a5fa247a3dbb51524329e0a
|-
|-
| || appldr
| 3.55 SHOP/SEX            || MD5::a14eaf43b47e6117b6c157c75142ccd1 || SHA1::28ace1db943509092848c525746dad79b5c5a954
|-
|-
| || creserved_0
| 3.55 RETAIL/CEX-PATCH    || MD5::888743a32a40c9a1e3656fc0ef590859 || SHA1::d07b57f1c828ba45d91f06e27b1deb71779e54df
|-
|-
| || default.spp
| 3.56 DEBUG/DEX            || MD5::a42f46b276dac43851250526a8a8cb7a || SHA1::1b516ad73f90196ba3fcc07dfc44aad09d59e122
|-
|-
| || isoldr
| 3.56 RETAIL/CEX BAD      || MD5::6e070c96e0464e993aaf9deac3660863 || SHA1::39f38f0e5015bc20dc162c3cf731ffe39320ff3f
|-
|-
| || lv0
| 3.56 SHOP/SEX BAD        || MD5::ec5e53bc16d1617dd05ae74907c282af || SHA1::775722df0c31393fbe717d21242ab0f3cad353f3
|-
|-
| || lv1.self
| 3.56 RETAIL/CEX FIX      || MD5::2a52196399a4b96ea568aafa65d1a27e || SHA1::c372ce26267590dc851eec66b73a162a8cac76ea
|-
|-
| || lv1ldr
| 3.56 SHOP/SEX FIX        || MD5::bfcfe6e3e1a151817651928f736997f9 || SHA1::20b5695a532f483a10a0990e7fc76b07226e85dc
|-
|-
| || lv2_kernel.self
| 3.60 RETAIL/CEX          || MD5::91ee193a2fa921a6fce780fc40236e3b || SHA1::2399ed938943e85687ed604fb19087058b050cc6
|-
|-
| || lv2ldr
| 3.60 DEBUG/DEX            || MD5::d9d16378dd66aacca6ef0fc8604f9f67 || SHA1::b1f272f8fc28f8dc3cf9fb1ce49f7d2f0a1ca460
|-
|-
| || mc_iso_spu_module.self
| 3.60 SHOP/SEX            || MD5::44e7b52e6423287b6c0861025bf3a377 || SHA1::bc04d3d3e800e6d881735e420e4f0cf4b778ab38
|-
|-
| || me_iso_spu_module.self
| 3.61 RETAIL/CEX          || MD5::f446810aabec0af1340c02d852e4118c || SHA1::f3e27e0cd8e85dcb8acd326ac2764653e09bca0f
|-
|-
| || rvkldr
| 3.61 SHOP/SEX            || MD5::0d56e5992872db318f94abf22073443a || SHA1::f9cea2afd7aa1cfb593cdbb738cd4fc0fb6288cd
|-
|-
| || sb_iso_spu_module.self
| 3.65 DEBUG/DEX            || MD5::c5e6e2d0c01d664851ff1b8b28191da6 || SHA1::
|-
|-
| || sc_iso.self
| 3.65 RETAIL/CEX          || MD5::3001e6becbea7abf30fc35a7819c4478 || SHA1::3efd8c919a984de4e77b76db34467dd3524ca0b2
|-
|-
| || sdk_version
| 3.66 RETAIL/CEX          || MD5::f4cbe2651e9a0c6115028043bdc2c5dd || SHA1::3b1d36df451903fcbf7074e18906c8fe252f7c66
|-
|-
| || spp_verifier.self
| 3.66 SHOP/SEX            || MD5::9eb7f8bb685885e77e31da256cb2dd83 || SHA1::8b85242bf44fde4c7aa16d6f4ed124d85b145654
|-
|-
| || spu_pkg_rvk_verifier.self
| 3.66 DEBUG/DEX            || MD5::62bb8875af0ecab5d2f20dffe887feca || SHA1::d5e19a5231ee1ab9d7a40eb7211377dcb15d4336
|-
|-
| || spu_token_processor.self
| 3.70 DEBUG/DEX            || MD5::a6c5871cd1f33f1caa77134e258174c2 || SHA1::1cd2c1bf92e5052a29b5a07dcd3837c21968b585
|-
|-
| || sv_iso_spu_module.self
| 3.70 RETAIL/CEX          || MD5::7ee6b91bbd07dde1e65a0681de66745b || SHA1::fd8320388e58824249c058ab1bec3f7aecf92cfc
|-
|-
| || sys_init_app.self
| 3.70 SHOP/SEX            || MD5::83802a6dfa1f564b0fdd4d7ac3d4b4ab || SHA1::a3070b5948c89b6daa08bea87b1a29397e904077
|-
|-
| || sys_init_ios.self
| 3.71 DEBUG/DEX            || MD5::                                || SHA1::
|-
|-
| || sysctl.txt
| 3.72 RETAIL/CEX          || MD5::c7d179d273699c2e5d53e401264828f3 || SHA1::a408ca480788bdbe32ffce23277d7e7d453a0861
|-
|-
|}
|}


=== known updates ===


==== 0.2 ebootrom ====
----


==== 0.3 ebootrom ====
==Repositories==
 
 
==== 0.60 ebootrom ====
[http://pubrepo.stoker25.com/consoles/ps3/updates/ stoker25 - specialises in debug/DEX and DECR/TOOL firmwares] (self hosted)
<pre>   0.60: lv0 contains string : 'Sony CXD9823 NAND Controller'</pre>
 
<pre>Boot Loader SE Version 0.6 2006-01-31_13:53:04</pre>
 
<pre>Boot Loader SE Version 0.5.2005-12-28_16:10:53</pre>
===Quick mirror downloadlist===
''This should contain all versions posted at above repositories''
 
*http://rapidshare.com/files/460301984/PS3_102_FW_UPDATE.RAR
*http://rapidshare.com/files/460303096/PS3_276_FW_UPDATE.RAR
*http://rapidshare.com/files/460303222/PS3_321_FW_UPDATE.RAR
*http://rapidshare.com/files/460561257/PS3_355_DEBUG_ONLY_BUILD_FW_UPDATE.RAR
*http://rapidshare.com/files/3951885933/PS3_356_DEBUG_ONLY_BUILD_FW_UPDATE.RAR
*http://rapidshare.com/files/460419174/PS3_356_FW_UPDATE_2ND.RAR
 
 
==== Torrents ====
*http://burnbit.com/torrent/172647/PS3UPDAT_PUP (3.66)
*http://burnbit.com/torrent/175396/PS3UPDAT_PUP (3.70)
*http://burnbit.com/torrent/177433/PS3UPDAT_PUP (3.72)
 
== To be crosschecked ==
 
Debug PS3 firmwares
 
*3.72 PATCH <!--// [http://www.multiupload.com/YLWYM95WDS PS3 Debug Firmware Update 3.72.rar (10.93 MB)] //--> NOT PROPER!
MD5: FB906610575F9B51F2AB8E2174F03C0D | SHA1: 4CEEEF8A4A805AE19E0E9ED3BA1E54FC93D353CF | CRC32: 9701527 | CRC16: F676 | HMAC_SHA1: 0xDC05B52D52A2C2E1E1301A8E8B45FE43FC172BA4
Does not seem proper (unpacking dev_flash_001.tar.aa.2011_09_14_050233 error):
unpacking update_files.tar (00000000_0a064000 bytes; hmac: FAIL)...
unpacking spkg_hdr.tar (00000000_00011800 bytes; hmac: FAIL)...
unpacking ps3swu2.self (00000000_00565760 bytes; hmac: FAIL)...
<!--//PUP file information
Package version: 1
Image version: 99999
File count: 9
Header length: 656
Data length: 179844904
PUP file hash : DC05B52D52A2C2E1E1301A8E8B45FE43FC172BA4
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x290
Data length: 5
File hash : 8E20378674A5D312D3CF899B8818BD5DA9530F4E
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x295
Data length: 264283
File hash : 367FCD28D27719525D0A11A4F2679FBF35B4681F
File 2
Entry id: 0x103
Filename : update_flags.txt
Data offset: 0x40AF0
Data length: 5
File hash : 65A0A6DA7FDB7F7A93C50F2439F6D5FE4C55AF74
File 3
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x40AF5
Data length: 5658464
File hash : 635883F388DD46FE3560ADABDBCCC5CD94B67A7A
File 4
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x5A6255
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 5
Entry id: 0x202
Filename : dots.txt
Data offset: 0x5A8A55
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 6
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x5A8A58
Data length: 168181760
File hash : DEFC6880C983CCBB0A5E9127DDE930AB62BD1B05
File 7
Entry id: 0x501
Filename : Unknown entry id
Data offset: 0xA60CA58
Data length: 71680
File hash : 1A76D6F88E36F492583DBFC914D49E2831623255
File 8
Entry id: 0x601
Filename : Unknown entry id
Data offset: 0xA61E258
Data length: 5658464
File hash : F381421D0E990D42DEE1B10B46F877DD243D47BD
//-->
 
*3.70 <!--// [http://www.multiupload.com/P35DSI4LZ2 PS3_370_DEBUG_ONLY_BUILD_FW_UPDATE.RAR (173.18 MB)] //-->
MD5: A6C5871CD1F33F1CAA77134E258174C2 | SHA1: 1CD2C1BF92E5052A29B5A07DCD3837C21968B585 | CRC32: A5956971 | CRC16: 1D2D
 
*3.66 - http://www.multiupload.com/CRBMUMTYAX
MD5: 62BB8875AF0ECAB5D2F20DFFE887FECA | SHA1: D5E19A5231EE1AB9D7A40EB7211377DCB15D4336 | CRC32: BDA761E4 | CRC16: 700E | HMAC_SHA1: 0x64BD8231BF0E27919FF36144C0EA8CC3447D46EE
 
*<strike>3.65 – http://www.multiupload.com/O5COVUH270 –</strike> CONFIRMED FAKE  (same MD5/SHA1 pup & hash vsh.tar as CEX/Retail)
MD5: 3001E6BECBEA7ABF30FC35A7819C4478 | SHA1: 3EFD8C919A984DE4E77B76DB34467DD3524CA0B2 | CRC32: 429612F3 | CRC16: E539
 
*3.60 – <strike>http://www.multiupload.com/E8CJI28F6T</strike> (down) - unique hash for vsh.tar:687213434DA1A8E0BC4021C32E9350885B40AE3B //
 
*360.001.forDEX.release.20110303<!--// http://www.uploadonall.com/files/0YPUD7YC/PS3_360_DEBUG_ONLY_BUILD_FW_UPDATE.RAR //-->
MD5: D9D16378DD66AACCA6EF0FC8604F9F67 | SHA1: B1F272F8FC28F8DC3CF9FB1CE49F7D2F0A1CA460 | CRC32: 429612F3 | CRC16: E539


==== 0.80 ebootrom ====
*3.56 – <strike>http://www.multiupload.com/9EUXP6ZZIU</strike> (down) – unique hash for vsh.tar:E46C507D3DFF7A943AD559F61519AA0E8209578D <!--// http://www.uploadonall.com/files/IVJYPXOS/PS3_356_DEBUG_ONLY_BUILD_FW_UPDATE.RAR //-->
<pre>   key: rev 0x00</pre>
MD5: A42F46B276DAC43851250526A8A8CB7A | SHA1: 1B516AD73F90196BA3FCC07DFC44AAD09D59E122 | CRC32: 1E4F2CC1 | CRC16: C9FC


==== 0.84 ebootrom ====
*3.55 DEX Downgrader
<pre>  0.84: lv0 doesnt contain previous mentioned string</pre>
MD5: EFA62388EE8D2592727DDBDCE9B4BEC8 | SHA1: 9D28C2533C36C0EFF801A41F74632182D408A5A9 | CRC32: F49A0B7E | CRC16: 45D2 | HMAC_SHA1: 0x289154362B4A1BC0D34A3815DE7B480B264188FF <!--//PUP file information
<pre>from decrypted lv0 0.84: Boot Loader SE Version 0.8.4 (Build ID: 822,8517, Build Data: 2006-05-16_17:50:21)</pre>
Package version: 1
Image version: 99999
File count: 9
Header length: 656
Data length: 170101276
PUP file hash : 289154362B4A1BC0D34A3815DE7B480B264188FF
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x290
Data length: 5
File hash : 0E460E25AAC0687D3AFCBD8C0C9363FFB9687514
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x295
Data length: 264247
File hash : AD137A28F4F28A20BB559412650D99C7FB617654
File 2
Entry id: 0x103
Filename : update_flags.txt
Data offset: 0x40ACC
Data length: 5
File hash : 65A0A6DA7FDB7F7A93C50F2439F6D5FE4C55AF74
File 3
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x40AD1
Data length: 5661656
File hash : 8DBE6CE15595261FAF019AC91B6EE95B8B23177D
File 4
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x5A6EA9
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 5
Entry id: 0x202
Filename : dots.txt
Data offset: 0x5A96A9
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 6
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x5A96AC
Data length: 158433280
File hash : CED28A0B89002C2AC7D4587B85BE76B51FAE321F
File 7
Entry id: 0x501
Filename : Unknown entry id
Data offset: 0x9CC16AC
Data length: 71680
File hash : 5591E8ACA40E5FA5468B6D86F0877E8A6D4B6D29
File 8
Entry id: 0x601
Filename : Unknown entry id
Data offset: 0x9CD2EAC
Data length: 5660160
File hash : 9866063D8DAF42FF2964DE0D7F20E92C7C1C0E3A  //-->


==== 0.85 ebootrom ====
*<strike>3.55 – http://www.multiupload.com/0GOMCNU4EH – 3B6EBC594DE5586B5E289225F6D3164A</strike> (already on Wiki)
*<strike>3.50 – http://www.multiupload.com/FCREC0J64G – 0E4D8BDBBA47382C2BE4242F3327E1A1</strike> (already on Wiki)


==== 0.90 ebootrom ====
*Ref.Tool DECR UpdateData.355.001d
MD5: 9085DA7157E92FA59157676A429A7C1E | SHA1: BB3A4A83D3E7576A825555FEF047B4DEF8B0168E | CRC32: B20A77B4 | CRC16: 5996 | HMAC_SHA1: 0xC36454DAD84EB490B1E85436F6A61B743AE32684
<!--// PS3_355_TOOL_ONLY_BUILD_FW_UPDATE.RAR (139.86 MB) http://www.multiupload.com/IUVA4T7UVA
PUP file information
Package version: 1
Image version: 99999
File count: 8
Header length: 592
Data length: 145209856
PUP file hash : C36454DAD84EB490B1E85436F6A61B743AE32684
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x250
Data length: 5
File hash : 0E460E25AAC0687D3AFCBD8C0C9363FFB9687514
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x255
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 2
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x258
Data length: 5661688
File hash : 76CAE611D95399B0E7FD21AC469A0FEEE8FD4600
File 3
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x566650
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 4
Entry id: 0x202
Filename : dots.txt
Data offset: 0x568E50
Data length: 0
File hash : B701CBBD3ACE82CAF2E4018E5327AA16637490DE
File 5
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x568E50
Data length: 133836800
File hash : CF61B9C46DF471FAF27A4343E293450E79B0CABD
File 6
Entry id: 0x501
Filename : Unknown entry id
Data offset: 0x850BE50
Data length: 40960
File hash : B22C9A3069906F0B6A0F320171939D236E338B3C
File 7
Entry id: 0x601
Filename : Unknown entry id
Data offset: 0x8515E50
Data length: 5660160
File hash : 5595648CF3648ED1F20BD820B5452E561D19891E //-->


==== 0.90 PUP ====
*355.001.forDEX.release.20101126d
<pre>  ? 0.90: PS3UPDAT.PUP format was implemented since 0.90 ?</pre>
MD5: 047671664D9241C04D44278944E153D9 | SHA1: 8EDE02636F0DC8905616331BBC6919BC642B556B | CRC32: 1A8B3AEE | CRC16: A42E | HMAC_SHA1: 0xCC7B8DB8425F657B7C29E1550EE04059EBB9E812
<!--// PS3_355_DEBUG_ONLY_BUILD_FW_UPDATE-DECHUpdateData.355.001d.RAR (163.77 MB) http://www.multiupload.com/CM6ZV0WZ3K
PUP file information
Package version: 1
Image version: 99999
File count: 9
Header length: 656
Data length: 170101312
PUP file hash : CC7B8DB8425F657B7C29E1550EE04059EBB9E812
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x290
Data length: 5
File hash : 0E460E25AAC0687D3AFCBD8C0C9363FFB9687514
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x295
Data length: 264283
File hash : 367FCD28D27719525D0A11A4F2679FBF35B4681F
File 2
Entry id: 0x103
Filename : update_flags.txt
Data offset: 0x40AF0
Data length: 5
File hash : 65A0A6DA7FDB7F7A93C50F2439F6D5FE4C55AF74
File 3
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x40AF5
Data length: 5661656
File hash : 8DBE6CE15595261FAF019AC91B6EE95B8B23177D
File 4
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x5A6ECD
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 5
Entry id: 0x202
Filename : dots.txt
Data offset: 0x5A96CD
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 6
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x5A96D0
Data length: 158433280
File hash : CED28A0B89002C2AC7D4587B85BE76B51FAE321F
File 7
Entry id: 0x501
Filename : Unknown entry id
Data offset: 0x9CC16D0
Data length: 71680
File hash : 5591E8ACA40E5FA5468B6D86F0877E8A6D4B6D29
File 8
Entry id: 0x601
Filename : Unknown entry id
Data offset: 0x9CD2ED0
Data length: 5660160
File hash : 9866063D8DAF42FF2964DE0D7F20E92C7C1C0E3A //-->


==== 0.92 ebootrom ====
*Ref.Tool DECR 341.001 <!--// [http://www.multiupload.com/J2LPNI8X62 PS3_341_TOOL_ONLY_BUILD_FW_UPDATE.RAR (130.26 MB)] //-->
<pre>   key: rev 0x01 + NP rev 0x01</pre>
MD5: 28CAAA7796E3CB7AD6500D989CF38B71 | SHA1: 6251A7AF2ABADF899F1100BC212AECEF78A49D19 | CRC32: 96106F79 | CRC16: C81E | HMAC_SHA1: 0x1C9EAF415BA2F247D80783DFAE40CCAB68F53E40
<!--// PUP file information
Package version: 1
Image version: 99999
File count: 6
Header length: 464
Data length: 135238704
PUP file hash : 1C9EAF415BA2F247D80783DFAE40CCAB68F53E40
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x1D0
Data length: 5
File hash : 6E18EB2E98798EA8F05DE734837EB9BE1BC842C4
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x1D5
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 2
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x1D8
Data length: 5661736
File hash : 4FDAF9FA7DE86FAC2BF544CA6264AA2B3CD0D5ED
File 3
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x566600
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 4
Entry id: 0x202
Filename : dots.txt
Data offset: 0x568E00
Data length: 0
File hash : B701CBBD3ACE82CAF2E4018E5327AA16637490DE
File 5
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x568E00
Data length: 129566720
File hash : 468E61C41D3DA72B4E49A8211472F05935389177  //-->


==== 0.93 ebootrom ====
* 3.30 <!--// [http://www.multiupload.com/C3PWSGWR8I PS3_330_DEBUG_ONLY_BUILD_FW_UPDATE.RAR (151.68 MB)] //-->
MD5: 133296059CED19CFB93F8E0BB4B5C6DE | SHA1: E3FF61545EB3B1396ADCE5029E9C6A083E3F803D | CRC32: 6B31B61A | CRC16: A429 | HMAC_SHA1: 0x233E3B7400AF95A6356F723B4F1EE82879ED9420
<!--// PUP file information
Package version: 1
Image version: 99999
File count: 7
Header length: 528
Data length: 158983680
PUP file hash : 233E3B7400AF95A6356F723B4F1EE82879ED9420
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x210
Data length: 5
File hash : C2BC9B07B3F70556051A8ED21CFF1292D7E9C854
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x215
Data length: 264283
File hash : 367FCD28D27719525D0A11A4F2679FBF35B4681F
File 2
Entry id: 0x103
Filename : update_flags.txt
Data offset: 0x40A70
Data length: 5
File hash : 65A0A6DA7FDB7F7A93C50F2439F6D5FE4C55AF74
File 3
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x40A75
Data length: 5662104
File hash : 8C616048FF423C9DA9BEE55060E6EB4FC372D1CC
File 4
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x5A700D
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 5
Entry id: 0x202
Filename : dots.txt
Data offset: 0x5A980D
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 6
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x5A9810
Data length: 153047040
File hash : 30857C394427EEBC8C84C1878AFE39CDB97FF5AC  //-->


==== 0.94 ebootrom ====
* 3.15 <!--// [http://www.multiupload.com/GR63ZHF406 PS3_315_DEBUG_ONLY_BUILD_FW_UPDATE.RAR (150.61 MB)] //-->
MD5: 3F40ABC76DFAD368D3F4411D7D92B475 | SHA1: 0D2A15102A142203658DB14DF554643945817244 | CRC32: 7CCB04C0 | CRC16: 211C | HMAC_SHA1: 0x59D38EF08A176BC33090A8B768B6AAF1ACCC9BD5
<!--// PUP file information
Package version: 1
Image version: 99999
File count: 7
Header length: 528
Data length: 156377029
PUP file hash : 59D38EF08A176BC33090A8B768B6AAF1ACCC9BD5
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x210
Data length: 5
File hash : EC7C40217BFC04CD495CCC44ECF6EB4B19F4A611
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x215
Data length: 260088
File hash : EA1FBD687ACE803C74560223048D1CF2F4CB6B08
File 2
Entry id: 0x103
Filename : update_flags.txt
Data offset: 0x3FA0D
Data length: 5
File hash : 65A0A6DA7FDB7F7A93C50F2439F6D5FE4C55AF74
File 3
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x3FA12
Data length: 5517248
File hash : 5D06F5787430B7D4C61DCCB1334D614E189FD4A0
File 4
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x5829D2
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 5
Entry id: 0x202
Filename : dots.txt
Data offset: 0x5851D2
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 6
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x5851D5
Data length: 150589440
File hash : A0428BC27C7C857615A4297DB7E3BB13E44D06B3 //-->


==== 0.95 PUP ====
* 2.42 <!--// [http://www.multiupload.com/WORYT5HQOA PS3_242_DEBUG_ONLY_BUILD_FW_UPDATE.RAR (117.76 MB)] //-->
MD5: 3EF6023CCFF3D7656665162495D25F5D | SHA1: 2D64EAD7BA5213C1C3FD83F4A1187654687058A8 | CRC32: FDF8213D | CRC16: 44BE | HMAC_SHA1: 0x4F198C97C143B9DAF492A56703D2F09107F9091A
<!--// PUP file information
Package version: 1
Image version: 99999
File count: 6
Header length: 464
Data length: 122267713
PUP file hash : 4F198C97C143B9DAF492A56703D2F09107F9091A
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x1D0
Data length: 5
File hash : 7804A2E9819BD88843105C676A8B681629A9E80A
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x1D5
Data length: 225345
File hash : 296C3DC63AD1C0FFD4E04D6A9DC24F61A24649ED
File 2
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x37216
Data length: 5500920
File hash : B3C72D106EC055CF8ED3F7789B51434C826E45C0
File 3
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x57620E
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 4
Entry id: 0x202
Filename : dots.txt
Data offset: 0x578A0E
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 5
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x578A11
Data length: 116531200
File hash : 78AA89892EC9C90114E95DC343970AA62B5AD7A8 //-->


==== 0.96 PUP ====
----


==== 100.002 ebootrom ====
== Remark @ Installation ==
<pre>from decrypted lv0: Boot Loader SE Version 1.0.0 (Build ID: 1643,16413, Build Data: 2006-10-05_16:32:34)</pre>
[http://www.multiupload.com/FZHV557R2J ebootrom.100.002.rar (51.29 MB)]


* https://mega.co.nz/#!YgsziJjT!j4EzExE18pmIrv6a2ITbfMrRPollgzPdpvTjze1CuEc
ps3d storage region 3 on the internal harddisk (ps3dc) is used by the PS3 as temp for installing updates. When installing PUP files, the PUP content gets unpacked there, checked - the system flags the update bit and prompts for reboot. After reboot it sees the update bit set and installs the files from ps3dc without rechecking (!) -> possible attack vector for circumventing checks, like down-/crossgrading)
 
ps3d - 4 possible regions :
ps3da : whole disk
  ps3db : UFS2 : GameOS
  ps3dc : FAT (2GB) : Update
  ps3dd : EXT3 : OtherOS (in the <=3.15 way)
 
 
----
Please note that all contributions to PS3 Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see PS3 Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)