Editing Talk:Playstation Update Package (PUP)

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
= Changelogs =
= Playstation Update Package (PUP) - Discussion/Talk =


Wikipedia is removing firmware changelogs, last complete version:
What is the part that defines, what firmware it really is?. I mean, for firmwares below 3.55 we have all the keys so whe can forge any PUP and make it appear as a +3.55, that would be a way to downgrade, without the need of a dongle and recovery mode.


PSVita: https://en.wikipedia.org/w/index.php?title=PlayStation_Vita_system_software&oldid=668447442
I know there are version strings in pupheader,version.txt, info0, and in vsh.self.. but what is missing? What isn´t correclty set in mfw to make it pass the checks of a legit +3.55 fw?  


PSP: https://en.wikipedia.org/w/index.php?title=PlayStation_Portable_system_software&oldid=672507694
We are using recovery mode to downgrade because, we haven´t found a way to create a legit +3.55


= PS3 talk =
What is the part that defines what firmware it really is? I mean, for firmwares below 3.55 we have all the keys so we can forge any .PUP and make it appear as a +3.55, that would be a way to downgrade, without the need of a dongle and recovery mode.
I know there are version strings in pupheader, version.txt, info0, and in vsh.self. But what is missing? What isn´t correctly set in the MFW to make it pass the checks of a legit +3.55 FW?.
We are using recovery mode to downgrade because we haven´t found a way to create a legit +3.55 firmware
== Unpacking a PlayStation Update Package ==
=== Unpack the PUP ===


== Unpacking a firmware ==
===Unpack the PUP===
  Dots.txt
  Dots.txt
  license.xml
  EULA.xml
ps3swu.self
ps3swu2.self
spkg_hdr.tar
  Update_Files.tar
  Update_Files.tar
  update_flags.txt
  Updater.self
  Version.txt
  Version.txt
  VSH.tar
  VSH.tar
 
Zeros.bin
=== Untar the Update_Files.tar ===
=== Untar the Update_Files.tar ===
  BDIT_FIRMWARE_PACKAGE.pkg
  BDIT_FIRMWARE_PACKAGE.pkg
Line 37: Line 25:
  BDPT_FIRMWARE_PACKAGE_306R.pkg
  BDPT_FIRMWARE_PACKAGE_306R.pkg
  BDPT_FIRMWARE_PACKAGE_308R.pkg
  BDPT_FIRMWARE_PACKAGE_308R.pkg
BDPT_FIRMWARE_PACKAGE_310R.pkg
BDPT_FIRMWARE_PACKAGE_312R.pkg
BDPT_FIRMWARE_PACKAGE_314R.pkg
BDPT_FIRMWARE_PACKAGE_316R.pkg
  BLUETOOTH_FIRMWARE.pkg
  BLUETOOTH_FIRMWARE.pkg
  CORE_OS_PACKAGE.pkg
  CORE_OS_PACKAGE.pkg
  dev_flash3_023.tar.aa.2013_06_20_055817
  dev_flash3_022.tar.aa.2010_11_27_051800
  dev_flash_000.tar.aa.2013_06_20_055817
  dev_flash_000.tar.aa.2010_11_27_051337
  dev_flash_001.tar.aa.2013_06_20_055817
  dev_flash_001.tar.aa.2010_11_27_051337
  dev_flash_002.tar.aa.2013_06_20_055817
  dev_flash_002.tar.aa.2010_11_27_051337
  dev_flash_003.tar.aa.2013_06_20_055817
  dev_flash_003.tar.aa.2010_11_27_051337
  dev_flash_004.tar.aa.2013_06_20_055817
  dev_flash_004.tar.aa.2010_11_27_051337
  dev_flash_005.tar.aa.2013_06_20_051337
  dev_flash_005.tar.aa.2010_11_27_051337
  dev_flash_006.tar.aa.2013_06_20_051337
  dev_flash_006.tar.aa.2010_11_27_051337
  dev_flash_007.tar.aa.2013_06_20_051337
  dev_flash_007.tar.aa.2010_11_27_051337
  dev_flash_008.tar.aa.2013_06_20_051337
  dev_flash_008.tar.aa.2010_11_27_051337
  dev_flash_009.tar.aa.2013_06_20_051337
  dev_flash_009.tar.aa.2010_11_27_051337
  dev_flash_010.tar.aa.2013_06_20_051337
  dev_flash_010.tar.aa.2010_11_27_051337
  dev_flash_011.tar.aa.2013_06_20_051337
  dev_flash_011.tar.aa.2010_11_27_051337
  dev_flash_012.tar.aa.2013_06_20_051337
  dev_flash_012.tar.aa.2010_11_27_051337
  dev_flash_013.tar.aa.2013_06_20_051337
  dev_flash_013.tar.aa.2010_11_27_051337
  dev_flash_014.tar.aa.2013_06_20_051337
  dev_flash_014.tar.aa.2010_11_27_051337
  dev_flash_015.tar.aa.2013_06_20_051337
  dev_flash_015.tar.aa.2010_11_27_051337
  dev_flash_016.tar.aa.2013_06_20_051337
  dev_flash_016.tar.aa.2010_11_27_051337
  dev_flash_017.tar.aa.2013_06_20_051337
  dev_flash_017.tar.aa.2010_11_27_051337
  dev_flash_018.tar.aa.2013_06_20_051337
  dev_flash_018.tar.aa.2010_11_27_051337
  dev_flash_019.tar.aa.2013_06_20_051337
  dev_flash_019.tar.aa.2010_11_27_051337
  dev_flash_020.tar.aa.2013_06_20_051337
  dev_flash_020.tar.aa.2010_11_27_051337
  dev_flash_021.tar.aa.2013_06_20_051337
  dev_flash_021.tar.aa.2010_11_27_051337
dev_flash_022.tar.aa.2013_06_20_055817
  MULTI_CARD_FIRMWARE.pkg
  MULTI_CARD_FIRMWARE.pkg
  RL_FOR_PACKAGE.img
  RL_FOR_PACKAGE.img
Line 110: Line 93:
====== unself the self's ======
====== unself the self's ======
...
...
==== unpkg dev_flash* ====
==== unpkg dev_flash* ====
  content
  content
Line 229: Line 211:
  │      ├── info0
  │      ├── info0
  │      └── info1
  │      └── info1
├── update_files.tar
  ├── update_flags.txt
  ├── update_flags.txt
  ├── version.txt
  ├── version.txt
  └── vsh.tar
  └── vsh.tar
    └──a
 
 
----
 
 
== PS3 Recovery Menu ==
note: FW 2.50 or higher <br />
CoreOS file: emer_init.self <br />
 
=== Videomode limitations ===
There are no known limitations on the used video output. Works fine on:
* Composite
* Scart-Composite
* Svideo
* RGB
** Scart-RGB
** RGB Dsub
** RGB Cinch
* Component
** Component Dsub
** Component Cinch
* HDMI
 
=== Getting into recovery mode ===
 
# With the system in standby mode. Press and hold the power button down until the system turns on and then off again. Release the power button. Very important to hold the power button until the console shuts off and to release the power button before continuing to step 2.
# After about 1 - 2 seconds press and hold the power button again, until you hear 2 consecutive beeps. Release the power button. During this step you will actually here three beeps. There will be one single beep then a short delay followed by the 2 consecutive beeps. Only release the the power button after the 2 consecutive beeps.
# You will then be instructed to plug in a controller, via the usb cord, and press the PS button : "Connect the controller using a USB cable and then press the PS button".
# At this point the PS3 Recovery Menu will be shown on the screen.
 
Note: some people have trouble hearing the beeps: the led goes off the same moment it beeps, so the 2 consecutive beeps can also be noticed by seeing the green led fast blink off twice.
 
 
=== PS3 Recovery Menu Options ===
 
==== 1. Restart System ====
This option boots your system as normal without changing any settings or files.
 
==== 2. Restore Default Settings ====
Restores all default settings on the PS3 for networking, clock, video, etc. For a full list of the restored settings you can look under settings> system settings > restore defaults on your console. This should not eliminate your game saves or other saved content, including your user login.
 
==== 3. Restore File System ====
This will rewrite the files the PS3 uses to boot. This feature will help if files have become corrupted and are not allowing the console to boot as normal. This should not erase any of your saved data or settings.
 
==== 4. Rebuild Database ====
This can be a usefull feature if you have lost files on your system for no apparent reason. Try using this feature to see if it can restore those files. This will also rewrite corrupted files within the database, potentially eliminating future issues. This feature should not erase any of your saved data or settings. <br />
Deletes messages, playlists, changes made on "Information" screens, trimming information for pictures in "Photo", video thumbnails, video playback history and video resume information.
This operation may take a long time depending on the type and number of data items.
 
==== 5. Restore PS3 System ====
This will restore your system to original including, formatting and erasing all of the data on the HD and returning all system settings to default. This will not take your system back to a previous Firmware release. Use this option as a last resort, unless you have nothing on the console that you want or you want to erase everything on the console, do not use this option. <br />
This is the same as "Restore PS3 system" on the XMB. All data and settings will be lost by performing this step.
 
==== 6. System Update ====
This will allow the user to update their console with new firmware via a Flash drive or other portable media. This will not allow you to update via an internet connection. This can usefull if your system has become corrupted to the point you can not boot.
Needed for installing same versions MFWs over OFW/MFWs.
 
=== When to use Recovery Menu ===
 
Execute Recovery Menu when the PS3 is experiencing the following symptoms:
 
* When the PS3 is started up, the XMB menu is not displayed (only the wave screen background appears)
* When the PS3 is started up, nothing appears on the screen
* When the PS3 is started up, a message stating "The hard disk's file system is corrupted and will be restored." is displayed and prompts the user to press X to Restore the system. Original message is displayed again or the system stops during restoration.
* When the PS3 system is started up, an error message stating "The hard disk's database will be rebuilt." is displayed and prompts the user to press X. The system again fails start up or stops while formatting the hard drive.
* The system stops while restarting after a PS3 system update or while updating or rebuilding the database.
* When wanting to install a same version firmware (e.g. MFW/CFW over an OFW).
 
 
----
----


Line 243: Line 294:
  vsh.self maybe too
  vsh.self maybe too
[http://www.ps3hax.net/showpost.php?p=260186&postcount=14 Creating a MFW? (3.41/3.55 with 3.56 keys)]
[http://www.ps3hax.net/showpost.php?p=260186&postcount=14 Creating a MFW? (3.41/3.55 with 3.56 keys)]
Proof of concept with added keys to appldr (and none of the other mentioned files above) : [[Talk:Patches#appldr_3.55_add_3.56.2F3.60_keys|appldr 3.55 add 3.56/3.60 keys]]


----
----


== Using fake upgrade to get lowest firmware version info ==
== Using fake upgrade to get lowest firmware version info ==
<div style="float:right">[[File:PS3 MinVerChk PUP on USB.jpg|thumb|left|PS3 MinVerChk PUP on USB]]</div>


<span style="text-decoration: line-through;">https://web.archive.org/web/*/http://ps3devwiki.com/files/firmware/MFW-CEX/MinVerCheck/</span>  // <span style="text-decoration: line-through;">[http://www.mirrorcreator.com/files/KMIA5YMJ/MinVerCheck.rar_links MinVerChk.rar (1.28 KB)]</span> / <span style="text-decoration: line-through;">[http://www.sendspace.com/file/l2fixi mirror]</span> --- [https://mega.nz/#!FUVm1C7a!IbCyN_uzCQh7hZb7eu3pRrwBuezLh1r4Ha7eeB9RlZk mirror 2]
[http://www.multiupload.com/RW55LOETIW MinVerChk.rar (3.96 KB)]
CRC-16: 9A11
# Unrar and copy the MinVerChk PUP to your USB stick, the same way as if it was an firmware upgrade.
CRC-32 (Ethernet and PKZIP): 50EE9A92
SHA-1: 1B60E0ADE8E698D9796AA78B7AD54B10E05A9B0B
MD-5: BB39828156BC7DF144E4D06D81C801AB
# Unrar and copy this MinVerChk PUP to your USB stick (/PS3/UPDATE/PS3UPDAT.PUP), the same way as if it was an firmware upgrade.
# Insert the USB stick into the PS3.
# Insert the USB stick into the PS3.
# Start a firmware update like normal from XMB (Don’t worry, it will not update!)
# Start a firmware update like normal from XMB (Don’t worry, it will not update!)
# It will shortly fail and display the Firmware Base Value
# It will shortly fail and display the Firmware Base Value


Note: console needs to run at least FW 2.50? (2.30 didn't work); This only works when the minimum update version is 1.00, otherwise any minimum value lower than 1.00 reports as 1.00 using this method.
Note: console needs to run at least FW 2.50? (2.30 didn't work)
DECR-1000 (0.08), DEH-H1000A-E (??0.92??), DEH-H1001-D (??0.92??), DECHA00A (??0.92??) are effectively affected by this.
 
----
 
== Cinavia DRM ==
Watermark which survives ripping to e.g. xvid/mp3
Detection of watermark
 
According to Cinavia website (www cinavia com) there are 4 possible warning messages on detection:
 
=== Message Code 1: Playback stopped ===
<pre>Typical on-screen message:
 
“Playback stopped. The content being played is protected by Cinavia™ and is not authorized for playback on this device.
For more information, see http://www.cinavia.com.
Message Code 1.
Typical front panel message:
 
“Cinavia™ playback restriction (1).
 
 
Explanation
 
The audio track of the video that you are playing contains a Cinavia code indicating it was intended for presentation using professional equipment only (for example, in a theater) and is not authorized for playback by consumers.
 
 
Recommendations
 
If the video that you are playing is a professionally produced video (such as a movie or television show), you will need to obtain a copy that was made with the permission of the copyright owner.
 
If the video that you are playing back is a home movie or other personal recording, that includes some professionally produced content (including the audio track of a professionally produced movie or television show), you will need to either skip over the parts of the video that contain the professionally produced content during playback or else create or obtain a version of the video that does not include this protected material.</pre>
=== Message Code 2: Copying stopped ===
<pre>Typical on-screen message:
 
“Copying stopped. The content being copied is protected by Cinavia™ and is not authorized for copying from this device.
For more information, see http:// www.cinavia.com.
Message Code 2.”
Typical front panel message:
 
“Cinavia™ copy restriction (2)”
 
 
Explanation
 
The audio track of the video that you are copying contains a Cinavia code indicating that it was intended for duplication using professional equipment only (for example, by a professional replicator) and is not authorized for copying by consumers.
 
 
Recommendations
 
If the video that you are copying is a professionally produced movie or television show, you will need to obtain a copy that was made with the permission of its copyright owner.
 
If the video that you are copying is a home movie or other personal recording that includes some professionally produced content (including the audio track of a professionally produced movie or television show), in order to make a copy you will need to either copy only those parts of the recording that do not include professionally produced content or else you may create or obtain a version of the video that does not include this protected material.</pre>
=== Message Code 3: Audio muted ===
<pre>Typical on-screen message:
 
“Audio outputs temporarily muted. Do not adjust the playback volume. The content being played is protected by Cinavia™
and is not authorized for playback on this device. For more information, see http://www.cinavia.com. Message Code 3.”
Typical front panel message:
 
“Cinavia™ playback restriction (3)”
 
 
Explanation
 
The audio track of the video that you are playing contains a Cinavia code indicating that it is an unauthorized copy of professionally-produced content.
 
 
Recommendations
 
If the video that you are playing is a professionally produced video (such as a movie or television show), you will need to obtain a copy that was made with the permission of the copyright owner.


<gallery>
If the video that you are playing is a home movie or other personal recording that includes some professionally produced content (including the audio track of a professionally produced video), to play your recording without muting you may either:
File:PS3 MinVerChk Result CECHC04.JPG|PS3 MinVerChk on the CECHC04
File:PS3 MinVerChk used on CECHG04 SEM-001.jpg|PS3 MinVerChk on the CECHG04
</gallery>


== Hashes ==
    Pause the video, wait 30 seconds for the audio to be un-muted, then skip over those portions where the professionally produced material is used and continue playing the rest of the video, or
{| border="1" cellspacing="0" cellpadding="5" border="#999" class="wikitable sortable" style="border:1px solid #999; border-collapse: collapse;"
    Pause the video, wait 30 seconds for the audio to be un-muted, then play video from a different optical disc for at least 10 minutes before continuing playback of this video.
|- bgcolor="#cccccc"
! Version !! MD5 !! SHA1 !! CRC32 !! CRC16 !! HMAC_SHA1
|-
| 0 file (do not use)      || MD5::1f5039e50bd66b290c56684d8550c6c2 || SHA1::7b91dbdc56c5781edf6c8847b4aa6965566c5c75 || CRC32::2A0E7DBB || CRC16::0 || HMAC_SHA1::
|-
| 3.41 RETAIL/CEX PSJB      || MD5::6f1ef9144c43c9a6f00f7ee7464a6689 || SHA1::f3c19e06c0e7b8cc550bb3244f5f88356173fa6d || CRC32::8A1E7548 || CRC16::7FFC || HMAC_SHA1::9F7001A6A93AE03A61ED7CFB7156A68DF0740708
|-
|}


For information on how this professionally produced content can be included in your home movies or other personal recordings in a way that will not be limited by Blu-ray Disc players, see Cinavia website : Guidelines for Use of Content in Home Movies.</pre>
=== Message Code 4: Copying stopped ===
<pre>Typical on-screen message:


=== PS3UPDAT.SHA ===
“Copying stopped. This content is protected by Cinavia™
and is not authorized for copying from this device.
For more information, see http://www.cinavia.com”
Typical front panel message:


Some BluRay-Movie Discs contain firmware updates for the Playstation 3 Console. Inside the /PS3/UPDATE folder can be a file called "PS3UPDAT.SHA".
“Cinavia™ copy restriction (4)”


==== example ====


This is an example from the movie "Priest" with [[3.50 CEX|3.50]] firmware
Explanation
The audio track of the video that you are copying contains a Cinavia code indicating that it is an unauthorized copy of professionally produced content.


{| class="wikitable"
|-
! 0x002F070 - 0x002F8CF
|-
| <pre>Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
00000000  61 7F 7F 6B 07 07 07 0B 00 00 00 00 00 00 00 00  a..k............
00000010  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
00000020  B8 19 86 1F 75 D5 08 82 14 2C BE C8 AF 54 B0 00  ....u....,...T..
00000030  12 BC 04 9D 00 00 00 00 00 00 00 00 00 00 00 00  ................
</pre>
|-
|}
==== structure ====
{|class="wikitable"
|-
! Address !! Size !! Value !! Description !! Observations
|-
| 0x0 || 0x8 || 61 7F 7F 6B 07 07 07 0B || Unknown  ||
|-
| 0x8 || 0x18 || 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 || Padding ||
|-
| 0x20 || 0x14 || B8 19 86 1F 75 D5 08 82 14 2C BE C8 AF 54 B0 00 12 BC 04 9D || SHA1 hash of PS3UPDAT.PUP ||
|-
| 0x34 || 0xC || 00 00 00 00 00 00 00 00 00 00 00 00 || Padding ||
|-
| Rest || Rest || Rest || Encrypted Data ||
|}


Recommendation


----
If the video that you are copying is a professionally produced video (such as a movie or television show), you should obtain a copy that was made with the permission of the copyright owner.


==Repositories==
If the video that you are copying is a home movie or other personal recording that includes some professionally produced material (including the audio track of a professionally produced movie or television show), in order to make a copy without interruption you will need to either copy only those parts of the recording that do not include professionally produced content or else you may create or obtain a version of the video that does not include this protected material.


[http://pubrepo.stoker25.com/Consoles/Playstation%203/updates/ stoker25 - specialises in debug/DEX and DECR/TOOL firmwares] (self hosted)
For information on how this professionally produced material can be included in your home movies or other personal recordings in a way that will not be limited by Blu-ray Disc players, see Guidelines for Use of Content in Home Movies.</pre>


== Remark @ Installation ==
=== PS3 specifics ===


ps3d storage region 3 on the internal harddisk (ps3dc) is used by the PS3 as temp for installing updates. When installing PUP files, the PUP content gets unpacked there, checked - the system flags the update bit and prompts for reboot. After reboot it sees the update bit set and installs the files from ps3dc without rechecking (!) -> possible attack vector for circumventing checks, like down-/crossgrading). edit-note: doesn't seem to be true, it is still checked.
Cinavia is not experienced in firmware 3.01 and older - firmware 3.10 and higher contain Cinavia DRM
Most likely suspects for the DRM are the player, streamsplitter and video- / audio decoders (e.g. libmp3dec.sprx)
Content known to trigger Cinavia DRM: certain xvid/mp3 rips (e.g. Battle_Los_Angeles_2011_R5_XViD-IMAGiNE &amp; the R5.LiNE.XViD-FOAM release of that same title / The.Tourist.DVDR-TWiZTED)


ps3d - 4 possible regions :
Playing Cinavia DRM protected content with Showtime works without problems (Showtime uses ffmpg), PS3 Media Server can also be used with the MEncoder transcoder otherwise it fails.
ps3da : whole disk
  ps3db : UFS2 : GameOS
  ps3dc : FAT (2GB) : Update
  ps3dd : EXT3 : OtherOS (in the <=3.15 way)


Debug firmware doesnt contain Cinavia DRM, neither has Rebug which uses same Debug system files (only CoreOS = Retail on Rebug)


== No applicable data found - technical pov ==
====30.07.2011 addition====
''''I have traced the Cinavia DRM checks to 4 separate sprx files and after a long time trying to patch these files I have found that 3 of those files are present in the DEBUG (DEX) firmware don’t have the Cinavia DRM checks enabled. Files are videoplayer_util sprx, videoplayer_plugin sprx and videoeditor_plugin sprx.''


Reasons why the playstation updating process does not recognize a pup.
''I have successfully copied these 3 sprx files from DEBUG (DEX) FW 341 over to my retail PS3 unit running OFW 341 using dev_blind and Cinavia seems to be now disabled. I’ve confirmed this by playing back a number of Cinavia affected video files.''


* 1) Missing files/Reading failure of:
''This means that Cinavia is now disabled for all DLNA playback and copying, but Cinavia checks on AVCHD and BD playback are still present with Message Code 3 that mutes the audio as the sprx file with the Cinavia check bdp_plugin sprx is not present in DEX firmware because BD playback is disabled in DEBUG. If someone is able to patch Cinavia out of bdp_plugin sprx this will be solved too.''
** [[patch_build.txt]] (vsh target)
** [[promo_flags.txt]] (incorrect flag will result in "data corrupt")


* 2) [[update_files.tar]]
''I have created a new task for PS3MFW so this can be easily made part of any new MFW’s as needed. Any FW version that has had the DEX firmware leaked should be able to be used to create a CFW of the same version. eg DEX 3.41 -> MFW 341 or DEX 355 -> MFW 355 etc etc. Don’t use sprx files from different FW versions! See git hacks for change_cinavia_files task source.''
** unable to open PUP (rb)
** unable to read first 0x30 Bytes (header)
** unable to read further 0x20 Bytes sized segment_table (aka file tables)
** unable to find [[CoreOS|core os package.pkg]] inside update_files.tar


* 3) Unable to open Storage Region 1/2 on HDD.
''Big thanks to the KaKaRoTo and REBUG team for their community contributions as this would have never been possible without the knowledge they’ve shared with us.''''
* 4) No Media present. (no success when fstat)
http://git.dashhacks.com/~tical/ps3mfw/ticals-tasks <br />
[http://www.multiupload.com/EOM4RB3DPB change_cinavia_files.tcl (4.22 KB)]  <br />


== Sample Logs normal installation ==
http://pastie.org/10059999
<pre>
<pre>
cellFsUtilMount: /dev_hdd0
#!/usr/bin/tclsh
Configuration read. bd_video_region=0,dvd_video_region=0
#
spoof_version = 0000, spoof_revision = 0
# ps3mfw -- PS3 MFW creator
BDemulator: disabled
#
real disc type = ff71
# Copyright (C) Anonymous Developers (Code Monkeys)
effective disc type = ff71, fake disc type = 0
#
probe hdd
# This software is distributed under the terms of the GNU General Public
(v)HDD found.
# License ("GPL") version 3, as published by the Free Software Foundation.
probe hdd done
#
vflash is enabled. search system region.
 
search system region
# Notes: videoplayer_util.sprx, videoplayer_plugin.sprx and videoeditor_plugin.sprx
device_id = 0x101000000000007, system_region_id = 0x1
#        have Cinavia DRM checks. These checks are disabled in DEX firmware so these
ACL[0]: LAID = 0x1070000001000001 : ACL =0xb
#        files can be replaced by those from the equivalent DEX firmware or if they
system region found(mode = 0).
#        have been manually patched.  
search system region done.
#        TODO: bdp_plugin.sprx also contains checks but BD playback is disabled on
search flash regions
#        DEX firmware so this file is not included in DEX firmware. This means that
cellFsUtilMount: /dev_flash
#        DNLA copy/playback won't have any Cinavia checks done on it but a copied BD
/dev_flash is clean.
#        playback will still check for Cinavia and mute the audio (Message Code 3)
[(v)flash]
#        until DEX firmware with a bdp_plugin.sprx is released or someone patches
        info.vendor_id = 0x0
#        this file manually.
        info.device_id = 0x0
 
        info.sector_size = 0x200
# Priority: 2300
        info.media_count = 0x1
# Description: Change Cinavia DRM affected files
        info.capacity = 0x80000
 
[device_id = 0x100000200000001]
# Option --cinavia-videoplayerutil: Patched videoplayer_util.sprx filename
        info.capacity = 0x63e00
# Option --cinavia-videoplayerplugin: Patched videoplayer_plugin.sprx filename
flash region 0x2 found.
# Option --cinavia-videoeditorplugin: Patched videoeditor_plugin.sprx filename
expected: start sectors = 0x7800, n_sectors = 0x63e00
# Option --cinavia-bdpplugin: Patched bdp_plugin.sprx filename
start sector = 0x7800.
 
start sector is correct
# Type --cinavia-videoplayerutil: file open {"SPRX library" {sprx}}
region size is correct
# Type --cinavia-videoplayerplugin: file open {"SPRX library" {sprx}}
[device_id = 0x100000300000001]
# Type --cinavia-videoeditorplugin: file open {"SPRX library" {sprx}}
        info.capacity = 0x8000
# Type --cinavia-bdpplugin: file open {"SPRX library" {sprx}}
flash region 0x3 found.
 
expected: start sectors = 0x6b600, n_sectors = 0x8000
namespace eval change_cinavia_files {
start sector = 0x6b600.
 
[device_id = 0x100000400000001]
    array set ::change_cinavia_files::options {
        info.capacity = 0x400
        --cinavia-videoplayerutil "/path/to/videoplayer_util.sprx"
flash region 0x4 found.
        --cinavia-videoplayerplugin "/path/to/videoplayer_plugin.sprx"
expected: start sectors = 0x73600, n_sectors = 0x400
        --cinavia-videoeditorplugin "/path/to/videoeditor_plugin.sprx"
start sector = 0x73600.
        --cinavia-bdpplugin "/path/to/bdp_plugin.sprx"
[device_id = 0x100000500000001]
    }
        info.capacity = 0x2000
 
flash region 0x5 found.
    proc main {} {
expected: start sectors = 0x73a00, n_sectors = 0x2000
        variable options
start sector = 0x73a00.
found all flash regions.
search normal region
normal region 1 found.
search normal region done.
normal region 2 found.
Storage event: 7  0  10300000000000a
Storage event: 3  0  10300000000000a
search update package
seach update package in GAME disc
Disc auth: 5004 29 (process: 01000200_main_mer_init.self)
set drive policy success
profile = 0xff71
umount BDVD
umount /dev_bdvd failure = 0x80010002
mount BDVD
cellFsUtilMount: /dev_bdvd
mount /dev_bdvd success
/dev_bdvd/PS3_UPDATE/PS3UPDAT.PUP found
verify /dev_bdvd/PS3_UPDATE/PS3UPDAT.PUP
Initializing
taking a while...
start Updating Proccess
Initialize elapsed time = 3325 msec
check UPL
Check UPL elapsed time = 79 msec
check Package Size
get package size elapsed time = 25 msec
start Verifying Package only
update package elapsed time = 1731 msec
Updating or Verifying failure 0x8002f169
USB storage: id = 0x10300000000000a
        lun = 0x0
        info.capacity = 0xffffffffe8df8800
lun = 0x0, dev_index = 0xa
index = 0x0, pkg_index = 0x2
mount USB storage 0
mp_name = /dev_usb000
umount /dev_usb000 failure = 0x80010002
mount USB storage 0(LUN=0x0)
dev_name = CELL_FS_IOS:USB_MASS_STORAGE000, mp_name = /dev_usb000
cellFsUtilMount: /dev_usb000
mount /dev_usb000 success
/dev_usb000/PS3/UPDATE/PS3UPDAT.PUP found
verify /dev_usb000/PS3/UPDATE/PS3UPDAT.PUP
Storage event: 4  0  101000000000006
Disc removed.
Storage event: 8  0  101000000000006
Initialize elapsed time = 547 msec
Check UPL elapsed time = 148 msec
get package size elapsed time = 17 msec
update package elapsed time = 18979 msec
post processiong...
post processiong done
search update package done
not to be skipped formatting system region.
re-use old partitions.
re-use old flash partitions.
cellFsUtilMount: /dev_hdd1
setup environment for ps3updater
mount game cache
mount game cache success
mkdir /dev_hdd1/PS3UPDATE success
mkdir /dev_hdd1/PS3UPDATE/vsh success
mkdir /dev_hdd1/PS3UPDATE/vsh/etc success
mkdir /dev_hdd1/PS3UPDATE/data success
mkdir /dev_hdd1/PS3UPDATE/data/font success
Initialize elapsed time = 582 msec
Check UPL elapsed time = 160 msec
update package elapsed time = 20137 msec
copy /dev_usb000/PS3/UPDATE/PS3UPDAT.PUP to /dev_hdd1/PS3UPDATE/PS3UPDAT.PUP
copy id = 0x100, dst = /dev_hdd1/PS3UPDATE/ps3version.txt
copy id = 0x601, dst = /dev_hdd1/PS3UPDATE/ps3swu.self
extarct id = 0x201, dst = /dev_hdd1/PS3UPDATE
segment = 0x300, offset = 0x56f5b0, size = 0xc0e4c00
file_num = 51
required patch_name : /BDIT_FIRMWARE_PACKAGE.pkg.spkg_hdr.1
segment = 0x501, offset = 0xc6541b0, size = 0x14000
file_num = 49
patch found: offset = 0xc6543b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_301R.pkg.spkg_hdr.1
patch found: offset = 0xc6549b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_302R.pkg.spkg_hdr.1
patch found: offset = 0xc654fb0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_303R.pkg.spkg_hdr.1
patch found: offset = 0xc6555b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_304R.pkg.spkg_hdr.1
patch found: offset = 0xc655bb0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_306R.pkg.spkg_hdr.1
patch found: offset = 0xc6561b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_308R.pkg.spkg_hdr.1
patch found: offset = 0xc6567b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_310R.pkg.spkg_hdr.1
patch found: offset = 0xc656db0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_312R.pkg.spkg_hdr.1
patch found: offset = 0xc6573b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_314R.pkg.spkg_hdr.1
patch found: offset = 0xc6579b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_316R.pkg.spkg_hdr.1
patch found: offset = 0xc657fb0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_318R.pkg.spkg_hdr.1
patch found: offset = 0xc6585b0, size = 0x280
required patch_name : /BLUETOOTH_FIRMWARE.pkg.spkg_hdr.1
patch found: offset = 0xc658bb0, size = 0x280
required patch_name : /CORE_OS_PACKAGE.pkg.spkg_hdr.1
patch found: offset = 0xc6591b0, size = 0x280
required patch_name : /MULTI_CARD_FIRMWARE.pkg.spkg_hdr.1
patch found: offset = 0xc6597b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01000006.pkg.spkg_hdr.1
patch found: offset = 0xc659db0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01010303.pkg.spkg_hdr.1
patch found: offset = 0xc65a3b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01020302.pkg.spkg_hdr.1
patch found: offset = 0xc65a9b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01030302.pkg.spkg_hdr.1
patch found: offset = 0xc65afb0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01040402.pkg.spkg_hdr.1
patch found: offset = 0xc65b5b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01050002.pkg.spkg_hdr.1
patch found: offset = 0xc65bbb0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01050101.pkg.spkg_hdr.1
patch found: offset = 0xc65c1b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_S1_00010002083E0832.pkg.spkg_hdr.1
patch found: offset = 0xc65c7b0, size = 0x280
required patch_name : /UPL.xml.pkg.spkg_hdr.1
patch found: offset = 0xc65cdb0, size = 0x280
required patch_name : /RL_FOR_PACKAGE.img.spkg_hdr.1
patch for /RL_FOR_PACKAGE.img not found. skipped
required patch_name : /RL_FOR_PROGRAM.img.spkg_hdr.1
patch for /RL_FOR_PROGRAM.img not found. skipped
required patch_name : /dev_flash3_024.tar.aa.2015_02_05_035051.spkg_hdr.1
patch found: offset = 0xc65d3b0, size = 0x280
required patch_name : /dev_flash_000.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65d9b0, size = 0x280
required patch_name : /dev_flash_001.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65dfb0, size = 0x280
dir_num = 1
dirname = /dev_flash/data/font/
dstname = /dev_hdd1/PS3UPDATE/data/font/
file_num = 20
filename = /dev_flash/data/font/SCE-PS3-RD-R-LATIN2.TTF, offset = 0400, size = 0xd67c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-R-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-R-LATIN.TTF, offset = 0de00, size = 0x95f4
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-R-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-VR-R-LATIN2.TTF, offset = 017600, size = 0x218b0
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-VR-R-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-SR-R-LATIN2.TTF, offset = 039200, size = 0x12ee8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-B-LATIN.TTF, offset = 04c400, size = 0x12184
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-B-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-L-LATIN.TTF, offset = 05e800, size = 0x9714
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-L-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-YG-R-KOR.TTF, offset = 068200, size = 0x79728
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-YG-R-KOR.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-I-LATIN.TTF, offset = 0e1c00, size = 0x9ea4
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-I-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-BI-LATIN.TTF, offset = 0ebe00, size = 0x9c80
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-BI-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-LI-LATIN.TTF, offset = 0f5e00, size = 0xa038
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-LI-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-L-JPN.TTF, offset = 0100200, size = 0x2f0eb4
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-L-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-CP-R-KANA.TTF, offset = 03f1400, size = 0xf27c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-CP-R-KANA.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-BI-LATIN.TTF, offset = 0400a00, size = 0x13128
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-BI-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-I-LATIN.TTF, offset = 0413e00, size = 0x133d8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-I-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-SR-R-EXT.TTF, offset = 0427400, size = 0x43450
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-EXT.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-L-LATIN2.TTF, offset = 046ac00, size = 0xd7fc
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-L-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-SR-R-LATIN.TTF, offset = 0478600, size = 0xd1b0
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-R-JPN.TTF, offset = 0485a00, size = 0x2f5c38
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-R-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-YG-B-KOR.TTF, offset = 077ba00, size = 0x78ec8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-YG-B-KOR.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-R-EXT.TTF, offset = 07f4c00, size = 0x443b8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-R-EXT.TTF
required patch_name : /dev_flash_002.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65e5b0, size = 0x280
dir_num = 0
file_num = 3
filename = /dev_flash/data/font/SCE-PS3-SR-R-JPN.TTF, offset = 0200, size = 0x47380c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-B-JPN.TTF, offset = 0473e00, size = 0x2d9724
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-B-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-R-LATIN.TTF, offset = 074d800, size = 0x1202c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-R-LATIN.TTF
required patch_name : /dev_flash_003.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65ebb0, size = 0x280
dirname = /dev_flash/data/font/SONY-CC/
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/
file_num = 12
filename = /dev_flash/data/font/SCE-PS3-DH-R-CGB.TTF, offset = 0200, size = 0x7d8884
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-DH-R-CGB.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-B-LATIN2.TTF, offset = 07d8e00, size = 0xd328
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-B-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-YG-L-KOR.TTF, offset = 07e6400, size = 0x78f68
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-YG-L-KOR.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-B-LATIN.TTF, offset = 085f600, size = 0x9430
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-B-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-VR-R-LATIN.TTF, offset = 0868e00, size = 0x10344
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-VR-R-LATIN.TTF
filename = /dev_flash/data/font/SONY-CC/k006004ds.ttf, offset = 0879600, size = 0xeb94
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/k006004ds.ttf
filename = /dev_flash/data/font/SONY-CC/e046323ts.ttf, offset = 0888400, size = 0xd960
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/e046323ts.ttf
filename = /dev_flash/data/font/SONY-CC/c041056ts.ttf, offset = 0896000, size = 0x116dc
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/c041056ts.ttf
filename = /dev_flash/data/font/SONY-CC/n023055ms.ttf, offset = 08a7a00, size = 0xb38c
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/n023055ms.ttf
filename = /dev_flash/data/font/SONY-CC/e046323ms.ttf, offset = 08b3000, size = 0xc25c
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/e046323ms.ttf
filename = /dev_flash/data/font/SONY-CC/n023055ts.ttf, offset = 08bf600, size = 0xc9c0
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/n023055ts.ttf
filename = /dev_flash/data/font/SONY-CC/d013013ds.ttf, offset = 08cc200, size = 0x11174
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/d013013ds.ttf
required patch_name : /dev_flash_004.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65f1b0, size = 0x280
dir_num = 2
dirname = /dev_flash/vsh/etc/
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/
dirname = /dev_flash/vsh/etc/print/
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/print/
file_num = 11
filename = /dev_flash/vsh/etc/layout_factor_table_720.txt, offset = 0400, size = 0x1ff
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_720.txt
filename = /dev_flash/vsh/etc/layout_grid_table_720.txt, offset = 0800, size = 0x3fd5
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_720.txt
filename = /dev_flash/vsh/etc/layout_grid_table_1080.txt, offset = 04a00, size = 0x41f6
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_1080.txt
filename = /dev_flash/vsh/etc/index.dat, offset = 08e00, size = 0x4f0
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/index.dat
filename = /dev_flash/vsh/etc/layout_factor_table_272.txt, offset = 09600, size = 0x1dd
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_272.txt
filename = /dev_flash/vsh/etc/version.txt, offset = 09a00, size = 0x4ce
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/version.txt
filename = /dev_flash/vsh/etc/layout_grid_table_480.txt, offset = 0a200, size = 0x3dc9
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_480.txt
filename = /dev_flash/vsh/etc/print/epson.pmd, offset = 0e400, size = 0x7154
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/print/epson.pmd
filename = /dev_flash/vsh/etc/layout_grid_table_272.txt, offset = 015800, size = 0x3df7
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_272.txt
filename = /dev_flash/vsh/etc/layout_factor_table_480.txt, offset = 019800, size = 0x1dc
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_480.txt
filename = /dev_flash/vsh/etc/layout_factor_table_1080.txt, offset = 019c00, size = 0x1f2
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_1080.txt
required patch_name : /dev_flash_005.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65f7b0, size = 0x280
required patch_name : /dev_flash_006.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65fdb0, size = 0x280
required patch_name : /dev_flash_007.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6603b0, size = 0x280
required patch_name : /dev_flash_008.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6609b0, size = 0x280
required patch_name : /dev_flash_009.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc660fb0, size = 0x280
required patch_name : /dev_flash_010.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6615b0, size = 0x280
required patch_name : /dev_flash_011.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc661bb0, size = 0x280
required patch_name : /dev_flash_012.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6621b0, size = 0x280
required patch_name : /dev_flash_013.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6627b0, size = 0x280
required patch_name : /dev_flash_014.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc662db0, size = 0x280
required patch_name : /dev_flash_015.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6633b0, size = 0x280
required patch_name : /dev_flash_016.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6639b0, size = 0x280
required patch_name : /dev_flash_017.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc663fb0, size = 0x280
required patch_name : /dev_flash_018.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6645b0, size = 0x280
required patch_name : /dev_flash_019.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc664bb0, size = 0x280
required patch_name : /dev_flash_020.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6651b0, size = 0x280
required patch_name : /dev_flash_021.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6657b0, size = 0x280
required patch_name : /dev_flash_022.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc665db0, size = 0x280
required patch_name : /dev_flash_023.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6663b0, size = 0x280
setup environment for ps3updater done.
umount game cache
umount game cache success
Unmount:: not call unset_storage_event_handler
UfsSysUinit2:not call ffs_uninitUnmount:: not call free


Prepare to shutdown .....Going to shutdown.
        set cinavia_videoplayerutil [file join dev_flash vsh module videoplayer_util.sprx]
Stage 2 says hello (load base = 0x8000000000540000, end = 0x8000000000558330) (version = 0104700F)
        set cinavia_videoplayerplugin [file join dev_flash vsh module videoplayer_plugin.sprx]
OK
        set cinavia_videoeditorplugin [file join dev_flash vsh module videoeditor_plugin.sprx]
        set cinavia_bdpplugin [file join dev_flash vsh module bdp_plugin.sprx]


###
        if {[file exists $options(--cinavia-videoplayerutil)] == 0 } {
### Software update mode
            log "Skipping videoplayer_util.sprx, $options(--cinavia-videoplayerutil) does not exist"
        } else {
            ::modify_devflash_file ${cinavia_videoplayerutil} ::change_cinavia_files::copy_cinavia_file $::change_cinavia_files::options(--cinavia-videoplayerutil)
        }


mounting the builtin HDD1 : cellFsUtilMount: /dev_hdd1
        if {[file exists $options(--cinavia-videoplayerplugin)] == 0 } {
PROCESS /dev_hdd1/PS3UPDATE/ps3swu.self (01000200) loaded
            log "Skipping cinavia_videoplayerplugin, $options(--cinavia-videoplayerplugin) does not exist"
PROCESS /dev_hdd1/PS3UPDATE/ps3swu.self (01000200_main_ps3swu.self) (01000200) created from parent process:
        } else {
creating the initial system process : OK
            ::modify_devflash_file ${cinavia_videoplayerplugin} ::change_cinavia_files::copy_cinavia_file $::change_cinavia_files::options(--cinavia-videoplayerplugin)
cellFsUtilMount: /dev_flash2
        }
cellFsUtilMount: /dev_flash3
 
Registry: running in recovery mode
        if {[file exists $options(--cinavia-videoeditorplugin)] == 0 } {
Registry initialization start:............ done
            log "Skipping cinavia_videoeditorplugin, $options(--cinavia-videoeditorplugin) does not exist"
We are originally in region 82
        } else {
            ::modify_devflash_file ${cinavia_videoeditorplugin} ::change_cinavia_files::copy_cinavia_file $::change_cinavia_files::options(--cinavia-videoeditorplugin)
        }
       
        # TODO: no known bdp_plugin.sprx patch yet
        if {[file exists $options(--cinavia-bdpplugin)] == 0 } {
            log "Skipping cinavia_bdpplugin, $options(--cinavia-bdpplugin) does not exist"
        } else {
            ::modify_devflash_file ${cinavia_bdpplugin} ::change_cinavia_files::copy_cinavia_file $::change_cinavia_files::options(--cinavia-bdpplugin)
        }
    }
 
    proc copy_cinavia_file { dst src } {
        if {[file exists $src] == 0} {
            die "$src does not exist"
        } else {
            if {[file exists $dst] == 0} {
                die "$dst does not exist"
            } else {
                log "Replacing default file [file tail $dst] with patched [file tail $src]"
                copy_file -force $src $dst
            }
        }
    }
}
</pre>
</pre>
other: http://pastie.org/pastes/10056453/text?key=utexzvyefmddeddktp3og


== Factory Service Mode - Installation log breakdown ==
Note:
Explaination from rms: http://rmscrypt.wordpress.com/2011/02/01/the-downgrade-process/
only :
* bdp_plugin sprx
* videoplayer_plugin sprx
might need proper patching, because videoplayer_util.sprx is the same on Retail/CEX and Debug/DEX and videoeditor_plugin sprx might not be used for playback at all.


Sample logs:
edit, correction: videoeditor_plugin.prx is same on CEX and DEX
* http://pastebin.com/XhcjfAjw (downgrade 3.66 -> 3.15)
 
* http://pastebin.com/SAN7Z3Dq (UPL 3.15)
[http://www.multiupload.com/4LE67XL4TM cinavia-310.rar (2.32 MB)]
----


{| class="wikitable"
== Hashes ==
{| border="1" cellspacing="0" cellpadding="5" border="#999" class="wikitable sortable" style="border:1px solid #999; border-collapse: collapse;"
|- bgcolor="#cccccc"
! Version !! MD5 !! SHA1 !! CRC32 !! CRC16 !! HMAC_SHA1
|-
| 0 file (do not use)      || MD5::1f5039e50bd66b290c56684d8550c6c2 || SHA1::7b91dbdc56c5781edf6c8847b4aa6965566c5c75 || CRC32::2A0E7DBB || CRC16::0 || HMAC_SHA1::
|-
| 1.02 RETAIL/CEX          || MD5::da5438f39b3b6e5ef904d91162d93086 || SHA1::6ce852438c7473abc073cc97911cc538bf7b6bfb || CRC32::16A6239D || CRC16::2319 || HMAC_SHA1::5A016FE5EF454A9D2E0C6F2C5FBF5709E743B429
|-
| 1.02&nbsp;RETAIL/CEX-DISK      || MD5::df96debb4c014f5673e0ce259e4fb835 || SHA1::4663d7da046b6bbf78b3c050d946b4b148c5a363 || CRC32::96D74F83 || CRC16::51D0 || HMAC_SHA1::5A016FE5EF454A9D2E0C6F2C5FBF5709E743B429
|-
| 1.10 RETAIL/CEX          || MD5::374371771ad1608d0684c4d588440f0b || SHA1::6cd78b1e101e0b8856bc4a7408bb558f525134b3 || CRC32::EC39C478 || CRC16::ECDC || HMAC_SHA1::00ABB79F0E138C380418D4F98C2AD325CA5F7790
|-
| 1.11 RETAIL/CEX          || MD5::8b6b4fb0a5fdd68bf85f02d4f6a0f096 || SHA1::a3d721a241f9b0f82f885877228415b508994d4b || CRC32::13C4C8E9 || CRC16::D7C2 || HMAC_SHA1::A36739D25BE68C255358571AD4751ECE428A0CF5
|-
| 1.30 RETAIL/CEX          || MD5::d2c1aa63e55f5eb74e9846112d843f2b || SHA1::895091bf1c85a1be238eb344dfaaf230a581e325 || CRC32::FC066556 || CRC16::C21B || HMAC_SHA1::4A5D1A97653A6A4CBA6752B989D5A5917DB2846E
|-
| 1.31 RETAIL/CEX          || MD5::602a1373cf1845d56348698d7037ab1b || SHA1::05e391a3b1be3952ef8837bd047a2773af726e04 || CRC32::5B163F66 || CRC16::37EB || HMAC_SHA1::79466F7D8DD03810F2693C386E1423D8E067EA77
|-
| 1.32 RETAIL/CEX          || MD5::c4b08159eaa9fce111e076fb255aa106 || SHA1::b3abbfec073cb083809b0ec102870305fb7d0c3a || CRC32::3879CEFF || CRC16::AF7C || HMAC_SHA1::9F3C8AE69C18F9006916D7C66A9E09A94D7F5B0F
|-
| 1.50 RETAIL/CEX          || MD5::9d7f3830fb3082febf303bd0ce2f17c9 || SHA1::588b6a58c57a6540384227d65b24c9b2fd8765d5 || CRC32::668AECFA || CRC16::AB23 || HMAC_SHA1::AD55657DB858BB5F70A977507482C5539BC3FDE8
|-
| 1.50&nbsp;RETAIL/CEX-DISK      || MD5::c84fe177af97443984696b747e70be51 || SHA1::2fd7928a6f5ba51c0ba1390fee197b6fdbb94421 || CRC32::5CB09520 || CRC16::9 || HMAC_SHA1::AD55657DB858BB5F70A977507482C5539BC3FDE8
|-
| 1.51 RETAIL/CEX          || MD5::afd01d9c72b3b69c03a0206c45d87dda || SHA1::bc7c1b189fb453b4a2387d8dca8d00a6c33bc631 || CRC32::EBED761 || CRC16::D098 || HMAC_SHA1::70B8EC7EADF20F8C375F0235315C033A507A61DB
|-
| 1.51&nbsp;RETAIL/CEX-DISK      || MD5::06008bbf003a6ad46270853d7d077b40 || SHA1::410e17e7718b643623a1cfa93b003827d88cab26 || CRC32::A2240258 || CRC16::E6A2 || HMAC_SHA1::70B8EC7EADF20F8C375F0235315C033A507A61DB
|-
| 1.54 RETAIL/CEX          || MD5::891bf61f56808119c4968ac3a9101540 || SHA1::753485bf7937f5294cb7dfb0fc97ebcf018f90f8 || CRC32::14BBBA5D || CRC16::CCCE || HMAC_SHA1::091FE7875436635F41A40977C419F6F03535BFE0
|-
| 1.54&nbsp;RETAIL/CEX-DISK      || MD5::c745c4950aa0b761a06f4a9637f7f6e3 || SHA1::5aa22e8556d5385605be880e3655bc81e7c5f812 || CRC32::2CA0 || CRC16::51D0 || HMAC_SHA1::091FE7875436635F41A40977C419F6F03535BFE0
|-
| 1.60 RETAIL/CEX          || MD5::3a5f49bcee3948301aa698ed57ecb10e || SHA1::b22abc19ad8d9228967c9a407cdfec7b17cfaf7e || CRC32::7AEB075B || CRC16::BF5F || HMAC_SHA1::A8EE5451C36F08A5F76CF40BBFB747335B5A5496
|-
| 1.60 TOOL/DECR            || MD5::95fdca0641cc66e1f6afa8a9fd260051 || SHA1::bf19b588024e437e2597b30b4ee13d7e6ef42f09 || CRC32::EBA35323 || CRC16::DF1C || HMAC_SHA1::583A85AD4446AC9D9F027CE8C49000F7768CA308
|-
| 1.70 RETAIL/CEX          || MD5::468238974943b45c09aeb632853401f2 || SHA1::e1456431902784999ae0528889c94534a6089c13 || CRC32::53F3C803 || CRC16::DABA || HMAC_SHA1::CD3204B046446C946C9845C567ACB72A01043C77
|-
| 1.70&nbsp;RETAIL/CEX-DISK      || MD5::8ec2c18e456d3e01603c2ac167879157 || SHA1::0c4e2c1c4fef8dd67059da059c51cafa4678fbe4 || CRC32::6A71AA95 || CRC16::3FF5 || HMAC_SHA1::CD3204B046446C946C9845C567ACB72A01043C77
|-
| 1.80 RETAIL/CEX          || MD5::fd9887626f734b46b271aec58e827cb2 || SHA1::6a750b307a52a8a24937887fbf2c2c9c098cd90d || CRC32::F073CF43 || CRC16::6343 || HMAC_SHA1::EF84C1DB2BD1227C6C74F354C8D31A702706977B
|-
| 1.80&nbsp;RETAIL/CEX-DISK      || MD5::2f6375d7f28cfc6587dbc038dae5b3f7 || SHA1::39e94123abaee16be602463f9f8121dce078837c || CRC32::116BB43 || CRC16::8C9 || HMAC_SHA1::EF84C1DB2BD1227C6C74F354C8D31A702706977B
|-
| 1.81 RETAIL/CEX          || MD5::b81fe78b163b62ce8983ad990306fe57 || SHA1::77e957dc895c2da25a962c03a7e58746818cb6fd || CRC32::1C07EC30 || CRC16::F3BF || HMAC_SHA1::96797AA5AEDE03ACE30D13A9148FBD5C311E1DFB
|-
| 1.82 RETAIL/CEX          || MD5::25de800491e8e88104d7e30b7524e9dc || SHA1::33dbc0d3ec44f7dd9db420f6c8029b92769ec5c9 || CRC32::18757187 || CRC16::5CD5 || HMAC_SHA1::DA812239133E14BB5356D81F7EDEEDB7B74E7D15
|-
| 1.82&nbsp;RETAIL/CEX-DISK      || MD5::6a4af7814935980c72487ec3d7d55e50 || SHA1::131fd6c01187ab0c7bcdbf9854f0c6ad588f1573 || CRC32::2F8DA7ED || CRC16::AFE9 || HMAC_SHA1::DA812239133E14BB5356D81F7EDEEDB7B74E7D15
|-
| 1.90 RETAIL/CEX          || MD5::bcefc8569ae4c2f4b7c09fd52f728c02 || SHA1::cbc6a0347abe558c54864193e42752190f802050 || CRC32::4933F5BB || CRC16::EA4D || HMAC_SHA1::91D2096371FA509D2A1380872417DFEAC616750A
|-
| 1.90&nbsp;RETAIL/CEX-DISK      || MD5::15a301e410815ea9c90dc0ddb6e5c695 || SHA1::9b554b76c48642739f9c41fb6015701f578349ca || CRC32::387F3326 || CRC16::BF90 || HMAC_SHA1::91D2096371FA509D2A1380872417DFEAC616750A
|-
| 1.92 RETAIL/CEX          || MD5::0f99147438936578951dd9d3f514000a || SHA1::9b554b76c48642739f9c41fb6015701f578349ca || CRC32::CDD201B6 || CRC16::AB9B || HMAC_SHA1::C7EBD2128E1655AA89689BF80DBDC48A31A74B22
|-
| 1.92 TOOL/DECR            || MD5::21460d2710f2b0910f0caf6e0213cea3 || SHA1::c99d8d91084665d4bef38cab32f2b2f96216c6a8 || CRC32::B670C4F6 || CRC16::ABDB || HMAC_SHA1::AF8ECCED76CC61542DD3C4F3BCA3BC640297CCA4
|-
| 1.93 RETAIL/CEX          || MD5::9c95692d4dd1c1e17c2b0ce5dcaebba1 || SHA1::417e133e07ad0d1f746c32d9f8a6c299b41bce35 || CRC32::DA8CB42D || CRC16::91E8 || HMAC_SHA1::08C4189614C4AA82087B4AAE87F8270BBB485AEC
|-
| 1.93&nbsp;RETAIL/CEX-DISK      || MD5::fa45c168f87f2f42e91675cda9f79cc7 || SHA1::dfcc94dfe4208ff09ea8e084e0f8725235698b8f || CRC32::96AFC96E || CRC16::5A75 || HMAC_SHA1::08C4189614C4AA82087B4AAE87F8270BBB485AEC
|-
| 1.94 RETAIL/CEX-DISK      || MD5::f172f9bd37ca3e779dfaaf20ebfe632b || SHA1::64a98bdd2643448a9b9eb48f5d7bac3c228a168b || CRC32::77396C29 || CRC16::DDF7 || HMAC_SHA1::3E2B91F45C34435BC46D0E94344CFB734D6CF963
|-
| 2.00 RETAIL/CEX          || MD5::f9df10bb57cdeeef8395c39415f54965 || SHA1::adf17bce368d9b93491280a9703f8ccc826a6df2 || CRC32::9AD814A1 || CRC16::4C38 || HMAC_SHA1::A2A0F11B5D6EA95698FCB48EC0851D173EF8667F
|-
| 2.01 RETAIL/CEX          || MD5::1d8e69249aa1a5593307cf7d8ca8a331 || SHA1::ed02e584900899e4d3b805b8c2c49013c8b140c8 || CRC32::5FE80672 || CRC16::E629 || HMAC_SHA1::0F0E95D599A830D629539DF37C0BF44A2E3F4F32
|-
| 2.01&nbsp;RETAIL/CEX-DISK      || MD5::13eb4a6d72ddbe1e43a637bdea424e48 || SHA1::b292f1ae622429aa01ac83da43d4cb85ab331c6a || CRC32::D9387BF0 || CRC16::CD7 || HMAC_SHA1::0F0E95D599A830D629539DF37C0BF44A2E3F4F32
|-
| 2.10 RETAIL/CEX          || MD5::08393f1bd8e91589c95837142caf0a58 || SHA1::50abf8f325f5820438bfe94d78b043f141deaf89 || CRC32::FA76AB49 || CRC16::F117 || HMAC_SHA1::DFBF87275D569727AAFF22AD6EB209BD87E4D78B
|-
| 2.10&nbsp;RETAIL/CEX-DISK      || MD5::9d3477d4bf6fd683e6ee4bbeab58d462 || SHA1::796f4771b95d003bb4d6d8a8b2434279b23f6085 || CRC32::AAAB71BC || CRC16::DBF8 || HMAC_SHA1::DFBF87275D569727AAFF22AD6EB209BD87E4D78B
|-
| 2.16&nbsp;RETAIL/CEX-DISK      || MD5::73fe70e0198b80f01525b6b72774af25 || SHA1::62dbf5e4512a2f067b0da5cd1d9808e08a20ae18 || CRC32::6F65BAC0 || CRC16::9DE || HMAC_SHA1::9FDA58F48BF3B5F1063621303D3EC787496E7774
|-
| 2.17 RETAIL/CEX          || MD5::b859ca0f15fe9516d85fd0d89444ac5b || SHA1::bb578fb1a47078d5852ff91a768c68bd096ce866 || CRC32::AECB1E91 || CRC16::10B3 || HMAC_SHA1::AAB83CFF7EB56A4F9CA12120D33334254DEB0BB3
|-
| 2.17&nbsp;RETAIL/CEX-DISK      || MD5::9cc63afcbc1b2ddf1900ceac4d896f32 || SHA1::3f3cfa72423fe3c9222d8107131069690a60c628 || CRC32::F67BC6A5 || CRC16::6798 || HMAC_SHA1::AAB83CFF7EB56A4F9CA12120D33334254DEB0BB3
|-
| 2.20 RETAIL/CEX          || MD5::d33eb3ef5721bc940ca29b4c80b96bde || SHA1::4bfb597b766bd6b99c6612963519bce9a4e1ec7b || CRC32::D82E6A4A || CRC16::8C87 || HMAC_SHA1::0D2D98C983F23B128358759C0F81DE23D7B6EE2C
|-
| 2.20&nbsp;RETAIL/CEX-DISK      || MD5::8129880df87704e9aa84740af3afcb23 || SHA1::0022412e0f12dfaf6d1236a89c4cab94c9bcf720 || CRC32::98937A29 || CRC16::E167 || HMAC_SHA1::0D2D98C983F23B128358759C0F81DE23D7B6EE2C
|-
| 2.30 RETAIL/CEX          || MD5::dd2e675fce5d2eb28ca93bc32edb3de6 || SHA1::fb639b3ed4e7cd5c457855cf1c9b59e06c05c87a || CRC32::811F7B02 || CRC16::9696 || HMAC_SHA1::5ADB88B2B83C89DB0EA01E56A4D7DB4769A311B4
|-
| 2.30&nbsp;RETAIL/CEX-DISK      || MD5::b34951b1c3a181811b11238204044493 || SHA1::999a238c0553db6129c5bb89982ed190ebee2867 || CRC32::908063EF || CRC16::2DDD || HMAC_SHA1::5ADB88B2B83C89DB0EA01E56A4D7DB4769A311B4
|-
| 2.35 RETAIL/CEX          || MD5::db48cbcde359982c065c2f5503204b67 || SHA1::cef64aae9f27914f1078046f5d3fd309d2e92251 || CRC32::CDE621B7 || CRC16::7096 || HMAC_SHA1::DF22B91021C3649912DC70DB6FAACF766DE61DAB
|-
| 2.35&nbsp;RETAIL/CEX-DISK      || MD5::3e4fce1a5648997898300937d081e901 || SHA1::7dc086684ba8cb061e43aba5c31f574179a1f1f8 || CRC32::B384203E || CRC16::40C5 || HMAC_SHA1::DF22B91021C3649912DC70DB6FAACF766DE61DAB
|-
| 2.36 RETAIL/CEX          || MD5::0274382cb3e21aa90e319eba358588c6 || SHA1::f46d5db533590f00d14e1cd739c10fd99e219d5e || CRC32::909DD1F8 || CRC16::5613 || HMAC_SHA1::60430385D9FE540B71C3F6BF6BE42F00AE49EB62
|-
| 2.40 RETAIL/CEX          || MD5::96e9def601672c5abcbb4604bb2346f1 || SHA1::4e399dbdaa8dfe87d008213f9e9a7b456c47fa01 || CRC32::F4413D1C || CRC16::CD8F || HMAC_SHA1::F1FEF8E442586D1182D2AFD12854C4B370AAA7FC
|-
| 2.41 RETAIL/CEX          || MD5::67c660325b0b97acdeda6c0913dc1f74 || SHA1::5aa877ff1368c83d30f90c4a5f64904e6f06e58a || CRC32::3B04F1FC || CRC16::D36F || HMAC_SHA1::AEE1A96018CA715A9BFAE13CE8F4FE46567B89EF
|-
| 2.41&nbsp;RETAIL/CEX-DISK      || MD5::f7d2330ce9162ea512f8474c81a49460 || SHA1::c32b24e8d6ca080d31680e8fc21fff168492c1c8 || CRC32::EE2C843C || CRC16::7ED0 || HMAC_SHA1::AEE1A96018CA715A9BFAE13CE8F4FE46567B89EF
|-
| 2.42 RETAIL/CEX          || MD5::60a6c36e2dd2000b3fda3205428665dc || SHA1::1acc37f4eb6f35bb7b79e24b8d8cc490040ef0ea || CRC32::21C9D3F2 || CRC16::ECDA || HMAC_SHA1::7E1AFE58B57BD71FCE203643C5285B1074F972F2
|-
| 2.42&nbsp;RETAIL/CEX-DISK      || MD5::3637aa0bf185d050b7550c4140c76f3a || SHA1::d5cd94d1797e4a261e0751eb27df654eee581cbc || CRC32::FF66AF3 || CRC16::B4D4 || HMAC_SHA1::7E1AFE58B57BD71FCE203643C5285B1074F972F2
|-
| 2.42 SHOP/SEX            || MD5::8a07b080e7812eb5063c5d449fa67ac8 || SHA1::                                        || CRC32:: || CRC16:: || HMAC_SHA1::
|-
| 2.43 RETAIL/CEX          || MD5::da62cbc7eafde9f6792b8a76a4aef004 || SHA1::6e206243d27c1c5232890c6568dd3121320dfba9 || CRC32::82CE3C47 || CRC16::93BF || HMAC_SHA1::A67344219CEA72E679BA3B2852DD793EAF2EAB3E
|-
| 2.43 RETAIL/CEX JIG      || MD5::1c4baa950f6d74d65742fc77c2470341 || SHA1::8caddcd518ab2ad59f88865c932b1b53bef6433c || CRC32::1128C134 || CRC16::DDD0 || HMAC_SHA1::46A336B7EA1ACDEF54709BB6905A0E217BC19099
|-
| 2.50 RETAIL/CEX          || MD5::823ab63c96d570510b254a80755df446 || SHA1::61bcdff915a88596902d81a756351cb6348a78c3 || CRC32::21F30C8 || CRC16::813A || HMAC_SHA1::052123107A61682F9C82AA7FD820FAEA18AB6042
|-
| 2.50&nbsp;RETAIL/CEX-DISK      || MD5::576413892da8d248ef25701b20b4b7a1 || SHA1::9e7c47851ce010f3534a22a3392b9cead735fab5 || CRC32::18CDF322 || CRC16::5807 || HMAC_SHA1::052123107A61682F9C82AA7FD820FAEA18AB6042
|-
| 2.51 SHOP/SEX            || MD5::252d34d7cdd598ba95ad0fe5662bb60b || SHA1::                                        || CRC32:: || CRC16:: || HMAC_SHA1::
|-
| 2.52 RETAIL/CEX          || MD5::e9cd7c268667ee695a708bf00c6853d8 || SHA1::78d91ef41b399897ff438034aa15b187d29d5f8f || CRC32::270F4B14 || CRC16::6C80 || HMAC_SHA1::D7A99622183C97591B4AD33C082B78D969A3272A
|-
| 2.52&nbsp;RETAIL/CEX-DISK      || MD5::d575a627aefffca7323c7b5df2b6672e || SHA1::b39c956cc5d4b71a054bbd196580a215faa9b920 || CRC32::CE70719F || CRC16::B2F4 || HMAC_SHA1::D7A99622183C97591B4AD33C082B78D969A3272A
|-
| 2.53 RETAIL/CEX          || MD5::5b0e9d62ff6e9edc796db9a2916824f0 || SHA1::30050179863704e2d3c4e8032fa00bfa4df4ab51 || CRC32::F85FA29 || CRC16::94B7 || HMAC_SHA1::7094545B22013A7BA1DD3BD56542A86C760BD0AD
|-
| 2.60 RETAIL/CEX          || MD5::043067d8624040f9f3f1a8dc2e662bce || SHA1::0753ae458e0c94ea0f16e20324ac6b397a45b33a || CRC32::E405C536 || CRC16::C5DA || HMAC_SHA1::B1611B86B218AD18883A0547AA39A04232743191
|-
| 2.60&nbsp;RETAIL/CEX-DISK      || MD5::e39cbd60e584c1ce363407918ae5f076 || SHA1::c691afdd25c575fa78eebec1e61dc0b763646926 || CRC32::E96DF95D || CRC16::C45 || HMAC_SHA1::B1611B86B218AD18883A0547AA39A04232743191
|-
| 2.70 RETAIL/CEX          || MD5::3352adc32e39ec5f7b4cdeb8b861052a || SHA1::75049536382808b734d6c9c2cd838358df0aab0f || CRC32::2224B62A || CRC16::F3B || HMAC_SHA1::5DF12C6D47773B1BECE9CB7300361798B8CF3767
|-
| 2.76 RETAIL/CEX          || MD5::d6856f234f3066b94dc88ab430a63bfb || SHA1::0bc9c54add04a7adabc90e3da5a4fabba9a1e6c5 || CRC32::36F59E13 || CRC16::42D || HMAC_SHA1::0B9AF264D831057472636333F339BFE226848E03
|-
| 2.76&nbsp;RETAIL/CEX-DISK      || MD5::7698f1d1d0a4601aa6fe72f784dea498 || SHA1::33a31ca86f8a69845263139a6bb1803edc7521ea || CRC32::2CDEC96C || CRC16::FFD9 || HMAC_SHA1::0B9AF264D831057472636333F339BFE226848E03
|-
| 2.80 RETAIL/CEX          || MD5::d69362743142953be7cb44a5fd5cc888 || SHA1::1bca8ac0573f55217cd5b531f9829ef7f712c349 || CRC32::E28A3FED || CRC16::8822 || HMAC_SHA1::A40FD1CC06772021913A308760FBD0933AC9A061
|-
| 2.80&nbsp;RETAIL/CEX-DISK      || MD5::8f8da49b69a73ef0ae4807d367ea7c3d || SHA1::3758ee3505481ba0d2f3d3fb86326ccf0876bf67 || CRC32::9DE7B260 || CRC16::C79E || HMAC_SHA1::A40FD1CC06772021913A308760FBD0933AC9A061
|-
| 3.00 RETAIL/CEX          || MD5::c049de7a6a4b03d53e7f9fde04e0fc08 || SHA1::3e439744e6905231ca42c2fd33e5e5c568303744 || CRC32::33DF6375 || CRC16::B935 || HMAC_SHA1::ADDE78466CF9B342C00A216895E049C9E2919049
|-
| 3.01 RETAIL/CEX          || MD5::6d956116eb5094564359339f60650f56 || SHA1::a4e3962bb1bf845df93f322adb014c8c7d10d536 || CRC32::88873BB7 || CRC16::CDBF || HMAC_SHA1::6B47B00899392B9480CBB1B96C5E5829EE58E17E
|-
| 3.01&nbsp;RETAIL/CEX-DISK      || MD5::59e7c4e39af57db067c65814a9d33f0b || SHA1::be57e8d752bc05f61b08390bfd223bf8820692f8 || CRC32::3736F646 || CRC16::5415 || HMAC_SHA1::6B47B00899392B9480CBB1B96C5E5829EE58E17E
|-
| 3.10 RETAIL/CEX          || MD5::70296b36d559e35752ae6efd04f702c0 || SHA1::87bfeb3dc793169bd793e5e5e75ab8aa5a364cab || CRC32::EA4430DC || CRC16::DED6 || HMAC_SHA1::3640BBD1CD2738C81A52995DEB12B8ED908691B6
|-
| 3.15 RETAIL/CEX          || MD5::54ee80e14e479f8351a988eb9a472072 || SHA1::fc4e891e84333f9b37ff7f253eca165aa416c6ad || CRC32::E82D9526 || CRC16::7DB || HMAC_SHA1::D87AFAD8C786E0EEE83C0C96EF61492D78F37980
|-
| 3.15&nbsp;RETAIL/CEX-DISK      || MD5::80d7f3ec2cfebf582926228ac3a11e21 || SHA1::7fe68e92353bac93225272f27bf2deb9ab6366a6 || CRC32::5D5C55CB || CRC16::D078 || HMAC_SHA1::D87AFAD8C786E0EEE83C0C96EF61492D78F37980
|-
| 3.21 RETAIL/CEX          || MD5::3a08ef6164a7770ae3e7d5b9f366437a || SHA1::ccf002575ca03b2a48af2b2303732d0b288a638e || CRC32::CD520F90 || CRC16::51DE || HMAC_SHA1::E993F5210B9074071985AC8A706C498629F3FE88
|-
| 3.21&nbsp;RETAIL/CEX-DISK      || MD5::ea615a368a710f961b6a67eb1a6cc16a || SHA1::a9763705f9dc443e48c8b4a333b63247c5b2b570 || CRC32::EBE25BB8 || CRC16::2074 || HMAC_SHA1::E993F5210B9074071985AC8A706C498629F3FE88
|-
| 3.30 RETAIL/CEX          || MD5::6bdf1b2409d705a0136c40746c62e85d || SHA1::c639707de85470fd222a31fb89499192c65151b7 || CRC32::14345D8 || CRC16::F92 || HMAC_SHA1::CFD1BC6F73B0709170AD4F02F903A2D9D04FE75C
|-
| 3.30&nbsp;RETAIL/CEX-DISK      || MD5::905c5ea4b3171bcb99a475118eda047f || SHA1::ad3893712c988c24abdda5e5777f9f0ebdd861fa || CRC32::323DB0F7 || CRC16::909D || HMAC_SHA1::CFD1BC6F73B0709170AD4F02F903A2D9D04FE75C
|-
| 3.40 RETAIL/CEX          || MD5::88b2f8d458119f666c97d893c17201cd || SHA1::37dc3afc3e5b7bfdf00c22d3043395185dd551b0 || CRC32::9F86AC19 || CRC16::4EC4 || HMAC_SHA1::813F084DAE9C2AA486E7EF248E60E78713CB8B61
|-
| 3.40&nbsp;RETAIL/CEX-DISK      || MD5::bcef6f6ba312e2ac1cbd25f0a9c22507 || SHA1::9f5d29da1c03e4d39f9e4d682e1028117d1a69bb || CRC32::76473B7 || CRC16::F4C9 || HMAC_SHA1::813F084DAE9C2AA486E7EF248E60E78713CB8B61
|-
| 3.41 RETAIL/CEX BAD      || MD5::00c835be718fc3d5f793e130a2b74217 || SHA1::c1366a9847034f2581559163cfd04d057a930c74 || CRC32::A57A2958 || CRC16::1740 || HMAC_SHA1::D6EAC01D3472ED686D85F5A36BFE7178D4AA2825
|-
| 3.41&nbsp;RETAIL/CEX-DISK      || MD5::949fcbec0187c2c493694ff7ebc733f0 || SHA1::cfb1b45b4f7558584d9a0f3882741e6a8fa71080 || CRC32::BAA133A || CRC16::1CE3 || HMAC_SHA1::A5A6AE8C67099156BF440C2537AC24436677C765
|-
| 3.41 RETAIL/CEX FIX      || MD5::e07d2b84c9e9691c261b73e5f1aada20 || SHA1::e7f522ba85c8fc780b8bcbaff6c70d36487e2e45 || CRC32::FC4C6497 || CRC16::2850 || HMAC_SHA1::A5A6AE8C67099156BF440C2537AC24436677C765
|-
| 3.41 TOOL/DECR            || MD5::28caaa7796e3cb7ad6500d989cf38b71 || SHA1::6251a7af2abadf899f1100bc212aecef78a49d19 || CRC32::96106F79 || CRC16::C81E || HMAC_SHA1::1C9EAF415BA2F247D80783DFAE40CCAB68F53E40
|-
| 3.41 RETAIL/CEX PSJB      || MD5::6f1ef9144c43c9a6f00f7ee7464a6689 || SHA1::f3c19e06c0e7b8cc550bb3244f5f88356173fa6d || CRC32::8A1E7548 || CRC16::7FFC || HMAC_SHA1::9F7001A6A93AE03A61ED7CFB7156A68DF0740708
|-
| 3.41&nbsp;RETAIL/CEX-PATCH    || MD5::03c376ef09222339531c15a3971ddabb || SHA1::d8d732ddcd3855c7dc63fbb2d6a3f07271107d3e || CRC32:: || CRC16:: || HMAC_SHA1::056FA20CC111BB54C8282CF6B473B2FE06AE453B
|-
| 3.41 SHOP/SEX            || MD5::561b924d2b388fb920f3f7ab12c679ca || SHA1::a216261e3eac55914f8fb5a1a4940ab557c85a17 || CRC32::59899B59 || CRC16::5D23 || HMAC_SHA1::2EF14E6EE9A574CC5602EBD502453309C2BB67A6
|-
| 3.42 RETAIL/CEX          || MD5::6ba866514589155ab094099a9f358ffd || SHA1::62788f6e1555ed62d32591cab463c59ce393e870 || CRC32::DF869675 || CRC16::2E50 || HMAC_SHA1::4797F09270534D22AF2704A19330A7EA45BD175F
|-
|-
! log !! Explaination !! Notes
| 3.42&nbsp;RETAIL/CEX-DISK      || MD5::d4a54d6dac5ee949f4491b219783bd6f || SHA1::56555c31beb79fdadec127845b428e4eb5aaa4da || CRC32::20AC0CA || CRC16::4BA5 || HMAC_SHA1::4797F09270534D22AF2704A19330A7EA45BD175F
|-
|-
| || manufacturing bit detection in Syscon eeprom, manufacturing mode enabled, looking for lv2_diag.self ||  
| 3.42&nbsp;RETAIL/CEX-PATCH    || MD5::f007b6488895021b81ecdf0df52e1e06 || SHA1::686469b05b066f2aa827013240fd9ff4395ca46d || CRC32:: || CRC16:: || HMAC_SHA1::2C29E90B6D43F580267E2D10A1A3F3A1513CE24F
|-
|-
| <pre> manufacturing updating start</pre> || lv2_diag.self initialised ||  
| 3.50 RETAIL/CEX          || MD5::0215e26d1dadeb950471a9c3397a140a || SHA1::b819861f75d50882142cbec8af54b00012bc049d || CRC32::ACC5FC18 || CRC16::55F5 || HMAC_SHA1::C9C4A4C8F98D11C5E55D06AFE40B8416FFE18BAB
|-
|-
| <pre>PackageName = /dev_usb000/PS3UPDAT.PUP</pre> || PUP file used for FSM reinstall on USB root ||  
| 3.50&nbsp;RETAIL/CEX-DISK      || MD5::40b4b53f4900d088b90de328ae2b3989 || SHA1::42b08cdfc4c0ea2acbfafa921364b9b547e2de12 || CRC32::4A5C07E6 || CRC16::3611 || HMAC_SHA1::C9C4A4C8F98D11C5E55D06AFE40B8416FFE18BAB
|-
|-
| <pre> settle polling interval success</pre> || ||  
| 3.50 SHOP/SEX            || MD5::6f74bf20342289277f2e1dbb6d09377e || SHA1::b9a9a7cf2fbdbc836d05ece0b19e2e5b5c5a3457 || CRC32::81D1FD09 || CRC16::39E5 || HMAC_SHA1::1E569C87268A2C867AD16353FC7F8255F4300C0E
|-
|-
| <pre> vflash is disabled...
| 3.55 RETAIL/CEX          || MD5::ca595ad9f3af8f1491d9c9b6921a8c61 || SHA1::a3a0d1c61e17c6a58a5fa247a3dbb51524329e0a || CRC32::FC0B1B98 || CRC16::A90 || HMAC_SHA1::9CBC7D85CEAF24B16BFAA360F03AA0005681EA4D
boot from nand flash...</pre> || NAND system detected, vflash disabled ||  
|-
|-
| <pre> creating flash regions...
| 3.55&nbsp;RETAIL/CEX-PATCH    || MD5::888743a32a40c9a1e3656fc0ef590859 || SHA1::d07b57f1c828ba45d91f06e27b1deb71779e54df || CRC32:: || CRC16:: || HMAC_SHA1::8448713FD6DB7FFDEF917B84EB9272453DC4B671
create storage region: (region id = 2)
format partition: (region_id = 2, CELL_FS_IOS:BUILTIN_FLSH1, CELL_FS_FAT)
create storage region: (region id = 3)
format partition: (region_id = 3, CELL_FS_IOS:BUILTIN_FLSH2, CELL_FS_FAT)
create storage region: (region id = 4)
format partition: (region_id = 4, CELL_FS_IOS:BUILTIN_FLSH3, CELL_FS_FAT)
create storage region: (region id = 5)
create storage region: (region id = 6)</pre> || creating FLASH regions 2, 3, 4, 5, 6 and formatting regions 2, 3, 4 ||
|-
|-
| <pre> Initializing
| 3.55 SHOP/SEX            || MD5::a14eaf43b47e6117b6c157c75142ccd1 || SHA1::28ace1db943509092848c525746dad79b5c5a954 || CRC32::54AB0587 || CRC16::7D82 || HMAC_SHA1::A977B6661F8C85DC9F5F61272B3127692404BA8E
taking a while...
start Updating Proccess
Initialize elapsed time = 61 msec</pre> || Initializing + Start Updating Proccess ||  
|-
|-
| <pre> check UPL
| 3.55 TOOL/DECR            || MD5::9085da7157e92fa59157676a429a7c1e || SHA1::b9a9a7cf2fbdbc836d05ece0b19e2e5b5c5a3457 || CRC32::B20A77B4 || CRC16::5996 || HMAC_SHA1::C36454DAD84EB490B1E85436F6A61B743AE32684
Check UPL elapsed time = 34 msec
check Package Size
get package size elapsed time = 8 msec
start Updating Package
Update packages num = 29
Update packages total size = 160699026</pre> || UPL.xml.pkg from PUP unpkg'ed and read ||  
|-
|-
| <pre> Update Package Revoke list
| 3.56&nbsp;RETAIL/CEX&nbsp;BAD      || MD5::6e070c96e0464e993aaf9deac3660863 || SHA1::39f38f0e5015bc20dc162c3cf731ffe39320ff3f || CRC32::A6CAF172 || CRC16::331A || HMAC_SHA1::C752AAAE505438F82AE26CCE0DDF648D411FB4AB
read package revoke list package (576 bytes) elapsed = 6 msec
update package revoke list elapsed = 331 msec
Update Package Revoke list done(0x8002f000)</pre> || RL_FOR_PACKAGE.img copied from PUP to [[Flash#trvk_pkg|trvk_pkg]] ||  
|-
|-
| <pre> Update Core OS Package
| 3.56&nbsp;RETAIL/CEX&nbsp;FIX      || MD5::2a52196399a4b96ea568aafa65d1a27e || SHA1::c372ce26267590dc851eec66b73a162a8cac76ea || CRC32::894AB144 || CRC16::C05A || HMAC_SHA1::CD4BA19DE5A0A1F95D32379AE24594595070076A
read core os package (5193774 bytes) elapsed = 324 msec
update core os package elapsed = 1965 msec
Update Core OS Package done(0x8002f000)</pre> || [[CoreOS|Core OS]] package (CORE_OS_PACKAGE.pkg) is unpkg'ed from PUP and written to [[Flash#ros|ros]] ||  
|-
|-
| <pre> Update VSH Package
| 3.56&nbsp;SHOP/SEX&nbsp;BAD        || MD5::ec5e53bc16d1617dd05ae74907c282af || SHA1::775722df0c31393fbe717d21242ab0f3cad353f3 || CRC32::AFB0E382 || CRC16::3E0C || HMAC_SHA1::9BB8F6BD90F06B63A9D03F26485FE607AB9B2ADE
sys_memory_container_create() success(id = 0xc0effffe)
Update VSH's package : 1/21
read vsh package (2070 bytes) elapsed = 8 msec
decrypt and verify vsh package elapsed = 23 msec
write vsh package elapsed = 9259 msec
compare vsh package elapsed = 0 msec
Update VSH's package : 2/21
read vsh package (5616383 bytes) elapsed = 351 msec
decrypt and verify vsh package elapsed = 341 msec
write vsh package elapsed = 1725 msec
compare vsh package elapsed = 402 msec
Update VSH's package : 3/21
read vsh package (3357780 bytes) elapsed = 214 msec
decrypt and verify vsh package elapsed = 227 msec
write vsh package elapsed = 2926 msec
compare vsh package elapsed = 312 msec
Update VSH's package : 4/21
read vsh package (5240122 bytes) elapsed = 328 msec
decrypt and verify vsh package elapsed = 309 msec
write vsh package elapsed = 2776 msec
compare vsh package elapsed = 399 msec
Update VSH's package : 5/21
read vsh package (24029 bytes) elapsed = 9 msec
decrypt and verify vsh package elapsed = 24 msec
write vsh package elapsed = 1185 msec
compare vsh package elapsed = 9 msec
Update VSH's package : 6/21
read vsh package (9831317 bytes) elapsed = 599 msec
decrypt and verify vsh package elapsed = 279 msec
write vsh package elapsed = 11830 msec
compare vsh package elapsed = 466 msec
Update VSH's package : 7/21
read vsh package (8662380 bytes) elapsed = 539 msec
decrypt and verify vsh package elapsed = 272 msec
write vsh package elapsed = 16532 msec
compare vsh package elapsed = 474 msec
Update VSH's package : 8/21
read vsh package (8657372 bytes) elapsed = 541 msec
decrypt and verify vsh package elapsed = 361 msec
write vsh package elapsed = 5911 msec
compare vsh package elapsed = 448 msec
Update VSH's package : 9/21
read vsh package (10445426 bytes) elapsed = 635 msec
decrypt and verify vsh package elapsed = 255 msec
write vsh package elapsed = 5408 msec
compare vsh package elapsed = 467 msec
Update VSH's package : 10/21
read vsh package (10252830 bytes) elapsed = 641 msec
decrypt and verify vsh package elapsed = 262 msec
write vsh package elapsed = 8646 msec
compare vsh package elapsed = 476 msec
Update VSH's package : 11/21
read vsh package (9922968 bytes) elapsed = 621 msec
decrypt and verify vsh package elapsed = 252 msec
write vsh package elapsed = 6950 msec
compare vsh package elapsed = 467 msec
Update VSH's package : 12/21
read vsh package (8214459 bytes) elapsed = 505 msec
decrypt and verify vsh package elapsed = 199 msec
write vsh package elapsed = 5843 msec
compare vsh package elapsed = 386 msec
Update VSH's package : 13/21
read vsh package (9428094 bytes) elapsed = 594 msec
decrypt and verify vsh package elapsed = 244 msec
write vsh package elapsed = 5238 msec
compare vsh package elapsed = 442 msec
Update VSH's package : 14/21
read vsh package (7973335 bytes) elapsed = 498 msec
decrypt and verify vsh package elapsed = 346 msec
write vsh package elapsed = 13617 msec
compare vsh package elapsed = 456 msec
Update VSH's package : 15/21
read vsh package (9766737 bytes) elapsed = 603 msec
decrypt and verify vsh package elapsed = 360 msec
write vsh package elapsed = 17267 msec
compare vsh package elapsed = 529 msec
Update VSH's package : 16/21
read vsh package (9199234 bytes) elapsed = 583 msec
decrypt and verify vsh package elapsed = 407 msec
write vsh package elapsed = 23189 msec
compare vsh package elapsed = 689 msec
Update VSH's package : 17/21
read vsh package (7260896 bytes) elapsed = 466 msec
decrypt and verify vsh package elapsed = 286 msec
write vsh package elapsed = 14751 msec
compare vsh package elapsed = 689 msec
Update VSH's package : 18/21
read vsh package (6563380 bytes) elapsed = 422 msec
decrypt and verify vsh package elapsed = 155 msec
write vsh package elapsed = 1906 msec
compare vsh package elapsed = 357 msec
Update VSH's package : 19/21
read vsh package (6092245 bytes) elapsed = 373 msec
decrypt and verify vsh package elapsed = 227 msec
write vsh package elapsed = 1457 msec
compare vsh package elapsed = 405 msec
Update VSH's package : 20/21
read vsh package (9859067 bytes) elapsed = 590 msec
decrypt and verify vsh package elapsed = 238 msec
write vsh package elapsed = 2187 msec
compare vsh package elapsed = 498 msec
Update VSH's package : 21/21
read vsh package (6492084 bytes) elapsed = 419 msec
decrypt and verify vsh package elapsed = 321 msec
write vsh package elapsed = 17509 msec
compare vsh package elapsed = 674 msec
Update VSH Package done(0x8002f000)</pre> || dev_flash_000.tar.aa.* files from PUP are unpkg'ed to dev_flash ||
|-
|-
| <pre> Bul-ray Disc Player Revoke
| 3.56&nbsp;SHOP/SEX&nbsp;FIX        || MD5::bfcfe6e3e1a151817651928f736997f9 || SHA1::20b5695a532f483a10a0990e7fc76b07226e85dc || CRC32::5AEF9EC2 || CRC16::D0F5 || HMAC_SHA1::0BE9862C87DEC6508E67EC0A870C39D61A389AE6
read bdp revoke package (1904 bytes) elapsed = 23 msec
decrypt and verify bdp revoke package elapsed = 29 msec
write bdp revoke package elapsed = 2240 msec
compare bdprevoke package elapsed = 57 msec
Bul-ray Disc Player Revoke done(0x8002f000)</pre> || dev_flash3_024.tar.aa.* files from PUP are unpkg'ed to dev_flash3 ||  
|-
|-
| <pre> Update Program Revoke list
| 3.60 RETAIL/CEX          || MD5::91ee193a2fa921a6fce780fc40236e3b || SHA1::2399ed938943e85687ed604fb19087058b050cc6 || CRC32::20A3FAFE || CRC16::C407 || HMAC_SHA1::84B1FA33976FE1F7C57B21FB5F2C1B1ECAF48646
read program revoke list package (704 bytes) elapsed = 7 msec
update program revoke list elapsed = 331 msec
Update Program Revoke list done(0x8002f000)</pre> || RL_FOR_PROGRAM.img from PUP is copied to [[Flash#trvk_prg|trvk_prg]] ||  
|-
|-
| <pre> move_2block_status_into_the_region(): region id = 3
| 3.60 SHOP/SEX            || MD5::44e7b52e6423287b6c0861025bf3a377 || SHA1::bc04d3d3e800e6d881735e420e4f0cf4b778ab38 || CRC32::1FEC976D || CRC16::8D1F || HMAC_SHA1::EA646D77D89A16C3C981EC7754798C34861E7871
rewrite_region() region id = 0x3, start_lba = 0x0, end_lba = 0x4000
rewrite region done (ret = 0x8002f000)
rewrite region elapsed time = 1262 msec
touch_1st_sector_in_block() region id = 0x3, start_lba = 0x0, end_lba = 0x4000
touch_1st_sector() done (ret = 0x8002f000)
touch_1st_sector() elapsed time = 1121 msec
rewrite_region() region id = 0x3, start_lba = 0x0, end_lba = 0x4000
rewrite region done (ret = 0x8002f000)
rewrite region elapsed time = 1262 msec</pre> || ||  
|-
|-
| <pre> Update BD firmware
| 3.61 RETAIL/CEX          || MD5::f446810aabec0af1340c02d852e4118c || SHA1::f3e27e0cd8e85dcb8acd326ac2764653e09bca0f || CRC32::4FE62C5F || CRC16::FEBF || HMAC_SHA1::C23CBF27966B15514CDEB8D99EFDEE4D0478983D
read BD firmware package (1966992 bytes) elapsed = 142 msec
update BD firmware elapsed = 184 msec
read BD firmware package (951040 bytes) elapsed = 78 msec
update BD firmware elapsed = 142 msec
read BD firmware package (951040 bytes) elapsed = 80 msec
update BD firmware elapsed = 13959 msec
Update BD firmware done(0x8002f000)</pre> || Appropiate [[Bluray_Drive_Firmware|BD firmware]] for that [[Bluray Drive]] is flashed to BD eeprom ||  
|-
|-
| <pre> Update Multi-Card controller firmware
| 3.61 SHOP/SEX            || MD5::0d56e5992872db318f94abf22073443a || SHA1::f9cea2afd7aa1cfb593cdbb738cd4fc0fb6288cd || CRC32::E421893C || CRC16::A5CD || HMAC_SHA1::A0B30A551806EA9F29BF989F7571BC0D98DEEA7F
read MCC package (28636 bytes) elapsed = 25 msec
update MCC elapsed = 24 msec
Update Multi-Card controller firmware done(0x8002f000)</pre> || If SKU with [[MultiCardReader]] then [[MultiCardReader_Firmware|Multi-Card controller firmware]] is flashed to [[MultiCardReader#SST_39VF010_70-4C-WHE_.28Flash.2C_1Mbit.2C_128K_x8.2C_2.7-3.6V.2C_70ns_TSOP32.29|SST 1mbit Flash]] ||  
|-
|-
| <pre> Update BlueTooth firmware
| 3.65 RETAIL/CEX          || MD5::3001e6becbea7abf30fc35a7819c4478 || SHA1::3efd8c919a984de4e77b76db34467dd3524ca0b2 || CRC32::27859CD1 || CRC16::A820 || HMAC_SHA1::2F42A3867CC33209F3582DA36C0A818770473DD4
read BT package (639368 bytes) elapsed = 62 msec
update BT elapsed = 56 msec
Update BlueTooth firmware done(0x8002f000)</pre> || [[Bluetooth#Spansion_S99AL008D002_0630DBA_H_.28NOR_Flash_8Mbit_3.3V.29|Bluetooth NOR flash]] is updated with
[[Bluetooth_Firmware|BlueTooth firmware]]
|-
|-
| <pre> Update System controller firmware
| 3.66 RETAIL/CEX          || MD5::f4cbe2651e9a0c6115028043bdc2c5dd || SHA1::3b1d36df451903fcbf7074e18906c8fe252f7c66 || CRC32::12992856 || CRC16::FBBA || HMAC_SHA1::436B778DE7E8AC910C19FCDF21D7408769E34A9E
read SC patch package (4864 bytes) elapsed = 24 msec
read SC patch package (4864 bytes) elapsed = 24 msec
read SC patch package (4864 bytes) elapsed = 23 msec
Update System controller firmware done(0x8002f000)</pre> || [[Syscon Hardware]] is updated with appropiate [[Syscon Firmware]] ||  
|-
|-
| <pre> update package elapsed time = 228361 msec</pre> || ||  
| 3.66 SHOP/SEX            || MD5::9eb7f8bb685885e77e31da256cb2dd83 || SHA1::8b85242bf44fde4c7aa16d6f4ed124d85b145654 || CRC32::F37ACDC0 || CRC16::B769 || HMAC_SHA1::351B64ED5A636059A30E8CE4BEA3E972089F2EF0
|-
|-
| <pre> post processiong...
| 3.70 RETAIL/CEX          || MD5::7ee6b91bbd07dde1e65a0681de66745b || SHA1::fd8320388e58824249c058ab1bec3f7aecf92cfc || CRC32::947827A7 || CRC16::EC86 || HMAC_SHA1::712AD027443BAB509CCF57533974DE21B9159124
post processiong done
cleanup update status (ret = 0)</pre> || ||  
|-
|-
| <pre> os version = 03.1500
| 3.70 SHOP/SEX            || MD5::83802a6dfa1f564b0fdd4d7ac3d4b4ab || SHA1::a3070b5948c89b6daa08bea87b1a29397e904077 || CRC32::C694BF0A || CRC16::2768 || HMAC_SHA1::9C445BF62E2E7B66B6B8E405CBB9F9F480142DAB
build_version = 38031,20091206</pre> || ||  
|-
|-
| <pre> region of core os package = 0x40000000</pre> || ||  
| 3.72 RETAIL/CEX          || MD5::c7d179d273699c2e5d53e401264828f3 || SHA1::a408ca480788bdbe32ffce23277d7e7d453a0861 || CRC32::8994666F || CRC16::8B6D || HMAC_SHA1::88E98A97980985276960916ACA50AA62CA19A820
|-
|-
| <pre> build_target = CEX-ww
| 3.73 RETAIL/CEX           || MD5::077a6a0a9abf3622373e3daa53f3ec70 || SHA1::40163d9693ae58141377a3f270b0ed956c1bcfa7 || CRC32::7CC16F1F || CRC16::A68E || HMAC_SHA1::9BE486B4357132A0C476D1A59247A101F56AC65A
build target id = 0x83</pre> || ||  
|-
|-
| <pre> manufacturing updating SUCCESS(0x8002f000)</pre> || ||  
| 3.73&nbsp;RETAIL/CEX-PATCH    || MD5::8aaa8dd1094aafdcc582916e670ad78e || SHA1::0259d592635fc79ec95947fbdaa66fc03d395687 || CRC32::9CC44BA7 || CRC16::327D || HMAC_SHA1::B340764C22E01C65A72E4DCEB89A44F517780156
|-
|-
| <pre> set product mode (ret = 0)</pre> || ||  
| 4.00 RETAIL/CEX          || MD5::52419374ba45a3d4a2b2dface2594140 || SHA1::4eebd993c8966c1c0fdf97d4dcbd74afbd07e764 || CRC32::7079BEB5 || CRC16::A1F9 || HMAC_SHA1::97609E8A9E5F45BAA07B57017DB60A784D20C2E1
|-
|-
| <pre> Total Elapsed time = 230556 msec</pre> || ||  
| 4.00 SHOP/SEX            || MD5::02f03ba6d78bcc71832421ea2619407e || SHA1::fcc34a7a8722d684096df5a1aa2518f3dd7c4e24 || CRC32::86A2C511 || CRC16::E8DF || HMAC_SHA1::0BB1339175A69F87F01B63CD6D18135D9592C9C8
|-
|-
|}
|}


== old crossgrading Retail/CEX to Debug/DEX ==
'''Note'''<br />
For this to work your system must be below or at 1.80 for the 1.80 debug update and below or on 2.01 for the 2.15 debug update. Just use the next version up from your current firmware version for the retail update.


It's not very usefull, esp. nowadays, added for historic reasons
----
 
==Repositories==
 
[http://pubrepo.stoker25.com/Consoles/Playstation%203/updates/ stoker25 - specialises in debug/DEX and DECR/TOOL firmwares] (self hosted)
 
 
===Quick mirror downloadlist===
''This should contain all versions posted at above repositories''
 
*http://rapidshare.com/files/460301984/PS3_102_FW_UPDATE.RAR
*http://rapidshare.com/files/460303096/PS3_276_FW_UPDATE.RAR
*http://rapidshare.com/files/460303222/PS3_321_FW_UPDATE.RAR
*http://rapidshare.com/files/460561257/PS3_355_DEBUG_ONLY_BUILD_FW_UPDATE.RAR
*http://rapidshare.com/files/3951885933/PS3_356_DEBUG_ONLY_BUILD_FW_UPDATE.RAR
*http://rapidshare.com/files/460419174/PS3_356_FW_UPDATE_2ND.RAR


===How to install debug firmware on retail PS3===
old source: <span style="text-decoration: line-through;">http://www.ps3hax.net/other-misc-tutorials/4808-tutorial-how-install-debug-firmware-retail-ps3-partially-hdd-swap-method.html</span>


====Tools needed====
==== Torrents ====
* 1 PS3 system
*http://burnbit.com/torrent/172647/PS3UPDAT_PUP (3.66)
* 2 PS3 hard drives that are the same size
*http://burnbit.com/torrent/175396/PS3UPDAT_PUP (3.70)
* 1 retail firmware upgrade
*http://burnbit.com/torrent/177433/PS3UPDAT_PUP (3.72)
* 1.80 Or 2.15 debug firmware
*http://burnbit.com/torrent/179400/PS3UPDAT_PUP (3.73)
*http://burnbit.com/torrent/182136/PS3UPDAT_PUP (4.00)


====Instructions====
== Remark @ Installation ==


# Format both hard drives on the PS3 system.
ps3d storage region 3 on the internal harddisk (ps3dc) is used by the PS3 as temp for installing updates. When installing PUP files, the PUP content gets unpacked there, checked - the system flags the update bit and prompts for reboot. After reboot it sees the update bit set and installs the files from ps3dc without rechecking (!) -> possible attack vector for circumventing checks, like down-/crossgrading). edit-note: doesn't seem to be true, it is still checked.
# Download a debug PS3 firmware and place it in USB stick, and start the update. This will copy all the debug firmware files to the PS3's HDD-A.
# After copied the PS3 will restart and you will see the normal update menu which prompts you to click the button to start update. Do NOT update your PS3, but power it off.
# Next remove the HDD-A, and place in the second HDD, HDD-B in the PS3.
# Download and copy a retail PS3 firmware to a USB stick.
# Again as before place USB in PS3 and update the PS3 as normal but when you get to the screen where it asks for you to press button, do that but stop when it asks you to AGREE to Terms and Condition Page.
# While the system is still powered on and on the update screen, REMOVE HDD-B, and insert HDD-A.
# After swapping the HDD's continuie to update the PS3 as normal and the PS3 will install the debug PS3 firmware=
# Go to the settings and check firmware version and there you will also see the debugging PS3 options :)


ps3d - 4 possible regions :
ps3da : whole disk
  ps3db : UFS2 : GameOS
  ps3dc : FAT (2GB) : Update
  ps3dd : EXT3 : OtherOS (in the <=3.15 way)




Line 981: Line 806:


== Ancient preproduction / prototype ==
== Ancient preproduction / prototype ==
ceb decrypter (works on 0.50.004.r010, may work on others)
http://pastie.org/private/al9p0vkw3g0lgat2yeazw#4,11
   CEB-201x, DEH-R1030 etc.
   CEB-201x, DEH-R1030 etc.
    
    
Line 1,106: Line 927:
|-
|-
|  || me_iso_spu_module.self
|  || me_iso_spu_module.self
|-
|  || rvkldr
|-
|-
|  || sb_iso_spu_module.self
|  || sb_iso_spu_module.self
Line 1,122: Line 941:
|-
|-
|  || sv_iso_spu_module.self
|  || sv_iso_spu_module.self
|-
|  || sys_init_app.self
|-
|  || sys_init_ios.self
|-
|  || sysctl.txt
|-
|-
|}
|}


=== known updates ===
=== known updates ===
Line 1,139: Line 956:
==== 0.60 ebootrom ====
==== 0.60 ebootrom ====
<pre>  0.60: lv0 contains string : 'Sony CXD9823 NAND Controller'</pre>
<pre>  0.60: lv0 contains string : 'Sony CXD9823 NAND Controller'</pre>
<pre>Boot Loader SE Version 0.6 2006-01-31_13:53:04</pre>
<pre>Boot Loader SE Version 0.5.2005-12-28_16:10:53</pre>


==== 0.80 ebootrom ====
==== 0.80 ebootrom ====
Line 1,152: Line 967:


==== 0.90 ebootrom ====
==== 0.90 ebootrom ====
==== 0.90 PUP ====
<pre>  ? 0.90: PS3UPDAT.PUP format was implemented since 0.90 ?</pre>


==== 0.92 ebootrom ====
==== 0.92 ebootrom ====
Line 1,164: Line 976:


==== 0.95 PUP ====
==== 0.95 PUP ====
<pre>  0.95: PS3UPDAT.PUP format was implemented since 0.95</pre>


==== 0.96 PUP ====
==== 0.96 PUP ====


==== 100.002 ebootrom ====
==== 100.002 ebootrom ====
<pre>from decrypted lv0: Boot Loader SE Version 1.0.0 (Build ID: 1643,16413, Build Data: 2006-10-05_16:32:34)</pre>
[http://www.multiupload.com/FZHV557R2J ebootrom.100.002.rar (51.29 MB)]
[http://www.multiupload.com/FZHV557R2J ebootrom.100.002.rar (51.29 MB)]
* https://mega.co.nz/#!YgsziJjT!j4EzExE18pmIrv6a2ITbfMrRPollgzPdpvTjze1CuEc
Please note that all contributions to PS3 Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see PS3 Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)