Talk:Playstation Update Package (PUP): Difference between revisions

From PS3 Developer wiki
Jump to navigation Jump to search
 
(81 intermediate revisions by 21 users not shown)
Line 1: Line 1:
= Playstation Update Package (PUP) - Discussion/Talk =
= Changelogs =


What is the part that defines, what firmware it really is?. I mean, for firmwares below 3.55 we have all the keys so whe can forge any PUP and make it appear as a +3.55, that would be a way to downgrade, without the need of a dongle and recovery mode.
Wikipedia is removing firmware changelogs, last complete version:


I know there are version strings in pupheader,version.txt, info0, and in vsh.self.. but what is missing? What isn´t correclty set in mfw to make it pass the checks of a legit +3.55 fw?  
PSVita: https://en.wikipedia.org/w/index.php?title=PlayStation_Vita_system_software&oldid=668447442


We are using recovery mode to downgrade because, we haven´t found a way to create a legit +3.55
PSP: https://en.wikipedia.org/w/index.php?title=PlayStation_Portable_system_software&oldid=672507694


= PS3 talk =
What is the part that defines what firmware it really is? I mean, for firmwares below 3.55 we have all the keys so we can forge any .PUP and make it appear as a +3.55, that would be a way to downgrade, without the need of a dongle and recovery mode.
I know there are version strings in pupheader, version.txt, info0, and in vsh.self. But what is missing? What isn´t correctly set in the MFW to make it pass the checks of a legit +3.55 FW?.
We are using recovery mode to downgrade because we haven´t found a way to create a legit +3.55 firmware
== Unpacking a PlayStation Update Package ==
=== Unpack the PUP ===


== Unpacking a firmware ==
===Unpack the PUP===
  Dots.txt
  Dots.txt
  EULA.xml
  license.xml
ps3swu.self
ps3swu2.self
spkg_hdr.tar
  Update_Files.tar
  Update_Files.tar
  Updater.self
  update_flags.txt
  Version.txt
  Version.txt
  VSH.tar
  VSH.tar
Zeros.bin
 
=== Untar the Update_Files.tar ===
=== Untar the Update_Files.tar ===
  BDIT_FIRMWARE_PACKAGE.pkg
  BDIT_FIRMWARE_PACKAGE.pkg
Line 25: Line 37:
  BDPT_FIRMWARE_PACKAGE_306R.pkg
  BDPT_FIRMWARE_PACKAGE_306R.pkg
  BDPT_FIRMWARE_PACKAGE_308R.pkg
  BDPT_FIRMWARE_PACKAGE_308R.pkg
BDPT_FIRMWARE_PACKAGE_310R.pkg
BDPT_FIRMWARE_PACKAGE_312R.pkg
BDPT_FIRMWARE_PACKAGE_314R.pkg
BDPT_FIRMWARE_PACKAGE_316R.pkg
  BLUETOOTH_FIRMWARE.pkg
  BLUETOOTH_FIRMWARE.pkg
  CORE_OS_PACKAGE.pkg
  CORE_OS_PACKAGE.pkg
  dev_flash3_022.tar.aa.2010_11_27_051800
  dev_flash3_023.tar.aa.2013_06_20_055817
  dev_flash_000.tar.aa.2010_11_27_051337
  dev_flash_000.tar.aa.2013_06_20_055817
  dev_flash_001.tar.aa.2010_11_27_051337
  dev_flash_001.tar.aa.2013_06_20_055817
  dev_flash_002.tar.aa.2010_11_27_051337
  dev_flash_002.tar.aa.2013_06_20_055817
  dev_flash_003.tar.aa.2010_11_27_051337
  dev_flash_003.tar.aa.2013_06_20_055817
  dev_flash_004.tar.aa.2010_11_27_051337
  dev_flash_004.tar.aa.2013_06_20_055817
  dev_flash_005.tar.aa.2010_11_27_051337
  dev_flash_005.tar.aa.2013_06_20_051337
  dev_flash_006.tar.aa.2010_11_27_051337
  dev_flash_006.tar.aa.2013_06_20_051337
  dev_flash_007.tar.aa.2010_11_27_051337
  dev_flash_007.tar.aa.2013_06_20_051337
  dev_flash_008.tar.aa.2010_11_27_051337
  dev_flash_008.tar.aa.2013_06_20_051337
  dev_flash_009.tar.aa.2010_11_27_051337
  dev_flash_009.tar.aa.2013_06_20_051337
  dev_flash_010.tar.aa.2010_11_27_051337
  dev_flash_010.tar.aa.2013_06_20_051337
  dev_flash_011.tar.aa.2010_11_27_051337
  dev_flash_011.tar.aa.2013_06_20_051337
  dev_flash_012.tar.aa.2010_11_27_051337
  dev_flash_012.tar.aa.2013_06_20_051337
  dev_flash_013.tar.aa.2010_11_27_051337
  dev_flash_013.tar.aa.2013_06_20_051337
  dev_flash_014.tar.aa.2010_11_27_051337
  dev_flash_014.tar.aa.2013_06_20_051337
  dev_flash_015.tar.aa.2010_11_27_051337
  dev_flash_015.tar.aa.2013_06_20_051337
  dev_flash_016.tar.aa.2010_11_27_051337
  dev_flash_016.tar.aa.2013_06_20_051337
  dev_flash_017.tar.aa.2010_11_27_051337
  dev_flash_017.tar.aa.2013_06_20_051337
  dev_flash_018.tar.aa.2010_11_27_051337
  dev_flash_018.tar.aa.2013_06_20_051337
  dev_flash_019.tar.aa.2010_11_27_051337
  dev_flash_019.tar.aa.2013_06_20_051337
  dev_flash_020.tar.aa.2010_11_27_051337
  dev_flash_020.tar.aa.2013_06_20_051337
  dev_flash_021.tar.aa.2010_11_27_051337
  dev_flash_021.tar.aa.2013_06_20_051337
dev_flash_022.tar.aa.2013_06_20_055817
  MULTI_CARD_FIRMWARE.pkg
  MULTI_CARD_FIRMWARE.pkg
  RL_FOR_PACKAGE.img
  RL_FOR_PACKAGE.img
Line 93: Line 110:
====== unself the self's ======
====== unself the self's ======
...
...
==== unpkg dev_flash* ====
==== unpkg dev_flash* ====
  content
  content
Line 211: Line 229:
  │      ├── info0
  │      ├── info0
  │      └── info1
  │      └── info1
├── update_files.tar
  ├── update_flags.txt
  ├── update_flags.txt
  ├── version.txt
  ├── version.txt
  └── vsh.tar
  └── vsh.tar
 
    └──a
 
----
 
 
== PS3 Recovery Menu ==
note: FW 2.50 or higher <br />
CoreOS file: emer_init.self <br />
 
=== Videomode limitations ===
There are no known limitations on the used video output. Works fine on:
* Composite
* Scart-Composite
* Svideo
* RGB
** Scart-RGB
** RGB Dsub
** RGB Cinch
* Component
** Component Dsub
** Component Cinch
* HDMI
 
=== Getting into recovery mode ===
 
# With the system in standby mode. Press and hold the power button down until the system turns on and then off again. Release the power button. Very important to hold the power button until the console shuts off and to release the power button before continuing to step 2.
# After about 1 - 2 seconds press and hold the power button again, until you hear 2 consecutive beeps. Release the power button. During this step you will actually here three beeps. There will be one single beep then a short delay followed by the 2 consecutive beeps. Only release the the power button after the 2 consecutive beeps.
# You will then be instructed to plug in a controller, via the usb cord, and press the PS button : "Connect the controller using a USB cable and then press the PS button".
# At this point the PS3 Recovery Menu will be shown on the screen.
 
Note: some people have trouble hearing the beeps: the led goes off the same moment it beeps, so the 2 consecutive beeps can also be noticed by seeing the green led fast blink off twice.
 
 
=== PS3 Recovery Menu Options ===
 
==== 1. Restart System ====
This option boots your system as normal without changing any settings or files.
 
==== 2. Restore Default Settings ====
Restores all default settings on the PS3 for networking, clock, video, etc. For a full list of the restored settings you can look under settings> system settings > restore defaults on your console. This should not eliminate your game saves or other saved content, including your user login.
 
==== 3. Restore File System ====
This will rewrite the files the PS3 uses to boot. This feature will help if files have become corrupted and are not allowing the console to boot as normal. This should not erase any of your saved data or settings.
 
==== 4. Rebuild Database ====
This can be a usefull feature if you have lost files on your system for no apparent reason. Try using this feature to see if it can restore those files. This will also rewrite corrupted files within the database, potentially eliminating future issues. This feature should not erase any of your saved data or settings. <br />
Deletes messages, playlists, changes made on "Information" screens, trimming information for pictures in "Photo", video thumbnails, video playback history and video resume information.
This operation may take a long time depending on the type and number of data items.
 
==== 5. Restore PS3 System ====
This will restore your system to original including, formatting and erasing all of the data on the HD and returning all system settings to default. This will not take your system back to a previous Firmware release. Use this option as a last resort, unless you have nothing on the console that you want or you want to erase everything on the console, do not use this option. <br />
This is the same as "Restore PS3 system" on the XMB. All data and settings will be lost by performing this step.
 
==== 6. System Update ====
This will allow the user to update their console with new firmware via a Flash drive or other portable media. This will not allow you to update via an internet connection. This can usefull if your system has become corrupted to the point you can not boot.
Needed for installing same versions MFWs over OFW/MFWs.
 
=== When to use Recovery Menu ===
 
Execute Recovery Menu when the PS3 is experiencing the following symptoms:
 
* When the PS3 is started up, the XMB menu is not displayed (only the wave screen background appears)
* When the PS3 is started up, nothing appears on the screen
* When the PS3 is started up, a message stating "The hard disk's file system is corrupted and will be restored." is displayed and prompts the user to press X to Restore the system. Original message is displayed again or the system stops during restoration.
* When the PS3 system is started up, an error message stating "The hard disk's database will be rebuilt." is displayed and prompts the user to press X. The system again fails start up or stops while formatting the hard drive.
* The system stops while restarting after a PS3 system update or while updating or rebuilding the database.
* When wanting to install a same version firmware (e.g. MFW/CFW over an OFW).
 
 
----
----


Line 294: Line 243:
  vsh.self maybe too
  vsh.self maybe too
[http://www.ps3hax.net/showpost.php?p=260186&postcount=14 Creating a MFW? (3.41/3.55 with 3.56 keys)]
[http://www.ps3hax.net/showpost.php?p=260186&postcount=14 Creating a MFW? (3.41/3.55 with 3.56 keys)]
Proof of concept with added keys to appldr (and none of the other mentioned files above) : [[Talk:Patches#appldr_3.55_add_3.56.2F3.60_keys|appldr 3.55 add 3.56/3.60 keys]]


----
----


== Using fake upgrade to get lowest firmware version info ==
== Using fake upgrade to get lowest firmware version info ==
<div style="float:right">[[File:PS3 MinVerChk PUP on USB.jpg|thumb|left|PS3 MinVerChk PUP on USB]]</div>


[http://www.multiupload.com/RW55LOETIW MinVerChk.rar (3.96 KB)]
<span style="text-decoration: line-through;">https://web.archive.org/web/*/http://ps3devwiki.com/files/firmware/MFW-CEX/MinVerCheck/</span>  // <span style="text-decoration: line-through;">[http://www.mirrorcreator.com/files/KMIA5YMJ/MinVerCheck.rar_links MinVerChk.rar (1.28 KB)]</span> / <span style="text-decoration: line-through;">[http://www.sendspace.com/file/l2fixi mirror]</span> --- [https://mega.nz/#!FUVm1C7a!IbCyN_uzCQh7hZb7eu3pRrwBuezLh1r4Ha7eeB9RlZk mirror 2]
# Unrar and copy the MinVerChk PUP to your USB stick, the same way as if it was an firmware upgrade.
CRC-16: 9A11
CRC-32 (Ethernet and PKZIP): 50EE9A92
SHA-1: 1B60E0ADE8E698D9796AA78B7AD54B10E05A9B0B
MD-5: BB39828156BC7DF144E4D06D81C801AB
# Unrar and copy this MinVerChk PUP to your USB stick (/PS3/UPDATE/PS3UPDAT.PUP), the same way as if it was an firmware upgrade.
# Insert the USB stick into the PS3.
# Insert the USB stick into the PS3.
# Start a firmware update like normal from XMB (Don’t worry, it will not update!)
# Start a firmware update like normal from XMB (Don’t worry, it will not update!)
# It will shortly fail and display the Firmware Base Value
# It will shortly fail and display the Firmware Base Value


Note: console needs to run at least FW 2.50? (2.30 didn't work)
Note: console needs to run at least FW 2.50? (2.30 didn't work); This only works when the minimum update version is 1.00, otherwise any minimum value lower than 1.00 reports as 1.00 using this method.
DECR-1000 (0.08), DEH-H1000A-E (??0.92??), DEH-H1001-D (??0.92??), DECHA00A (??0.92??) are effectively affected by this.


----
<gallery>
File:PS3 MinVerChk Result CECHC04.JPG|PS3 MinVerChk on the CECHC04
File:PS3 MinVerChk used on CECHG04 SEM-001.jpg|PS3 MinVerChk on the CECHG04
</gallery>


== Cinavia DRM ==
== Hashes ==
Watermark which survives ripping to e.g. xvid/mp3
{| border="1" cellspacing="0" cellpadding="5" border="#999" class="wikitable sortable" style="border:1px solid #999; border-collapse: collapse;"
Detection of watermark
|- bgcolor="#cccccc"
! Version !! MD5 !! SHA1 !! CRC32 !! CRC16 !! HMAC_SHA1
|-
| 0 file (do not use)      || MD5::1f5039e50bd66b290c56684d8550c6c2 || SHA1::7b91dbdc56c5781edf6c8847b4aa6965566c5c75 || CRC32::2A0E7DBB || CRC16::0 || HMAC_SHA1::
|-
| 3.41 RETAIL/CEX PSJB      || MD5::6f1ef9144c43c9a6f00f7ee7464a6689 || SHA1::f3c19e06c0e7b8cc550bb3244f5f88356173fa6d || CRC32::8A1E7548 || CRC16::7FFC || HMAC_SHA1::9F7001A6A93AE03A61ED7CFB7156A68DF0740708
|-
|}


According to Cinavia website (www cinavia com) there are 4 possible warning messages on detection:


=== Message Code 1: Playback stopped ===
=== PS3UPDAT.SHA ===  
<pre>Typical on-screen message:


“Playback stopped. The content being played is protected by Cinavia™ and is not authorized for playback on this device.
Some BluRay-Movie Discs contain firmware updates for the Playstation 3 Console. Inside the /PS3/UPDATE folder can be a file called "PS3UPDAT.SHA".
For more information, see http://www.cinavia.com.
Message Code 1.
Typical front panel message:


“Cinavia™ playback restriction (1).”
==== example ====


This is an example from the movie "Priest" with [[3.50 CEX|3.50]] firmware


Explanation
{| class="wikitable"
|-
! 0x002F070 - 0x002F8CF
|-
| <pre>Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
00000000  61 7F 7F 6B 07 07 07 0B 00 00 00 00 00 00 00 00  a..k............
00000010  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
00000020  B8 19 86 1F 75 D5 08 82 14 2C BE C8 AF 54 B0 00  ....u....,...T..
00000030  12 BC 04 9D 00 00 00 00 00 00 00 00 00 00 00 00  ................
</pre>
|-
|}
==== structure ====
{|class="wikitable"
|-
! Address !! Size !! Value !! Description !! Observations
|-
| 0x0 || 0x8 || 61 7F 7F 6B 07 07 07 0B || Unknown  ||
|-
| 0x8 || 0x18 || 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 || Padding ||
|-
| 0x20 || 0x14 || B8 19 86 1F 75 D5 08 82 14 2C BE C8 AF 54 B0 00 12 BC 04 9D || SHA1 hash of PS3UPDAT.PUP ||
|-
| 0x34 || 0xC || 00 00 00 00 00 00 00 00 00 00 00 00 || Padding ||
|-
| Rest || Rest || Rest || Encrypted Data ||
|}


The audio track of the video that you are playing contains a Cinavia code indicating it was intended for presentation using professional equipment only (for example, in a theater) and is not authorized for playback by consumers.


----


Recommendations
==Repositories==


If the video that you are playing is a professionally produced video (such as a movie or television show), you will need to obtain a copy that was made with the permission of the copyright owner.
[http://pubrepo.stoker25.com/Consoles/Playstation%203/updates/ stoker25 - specialises in debug/DEX and DECR/TOOL firmwares] (self hosted)


If the video that you are playing back is a home movie or other personal recording, that includes some professionally produced content (including the audio track of a professionally produced movie or television show), you will need to either skip over the parts of the video that contain the professionally produced content during playback or else create or obtain a version of the video that does not include this protected material.</pre>
== Remark @ Installation ==
=== Message Code 2: Copying stopped ===
<pre>Typical on-screen message:


“Copying stopped. The content being copied is protected by Cinavia™ and is not authorized for copying from this device.
ps3d storage region 3 on the internal harddisk (ps3dc) is used by the PS3 as temp for installing updates. When installing PUP files, the PUP content gets unpacked there, checked - the system flags the update bit and prompts for reboot. After reboot it sees the update bit set and installs the files from ps3dc without rechecking (!) -> possible attack vector for circumventing checks, like down-/crossgrading). edit-note: doesn't seem to be true, it is still checked.
For more information, see http:// www.cinavia.com.
Message Code 2.
Typical front panel message:
 
“Cinavia™ copy restriction (2)”


ps3d - 4 possible regions :
ps3da : whole disk
  ps3db : UFS2 : GameOS
  ps3dc : FAT (2GB) : Update
  ps3dd : EXT3 : OtherOS (in the <=3.15 way)


Explanation


The audio track of the video that you are copying contains a Cinavia code indicating that it was intended for duplication using professional equipment only (for example, by a professional replicator) and is not authorized for copying by consumers.
== No applicable data found - technical pov ==


Reasons why the playstation updating process does not recognize a pup.


Recommendations
* 1) Missing files/Reading failure of:
** [[patch_build.txt]] (vsh target)
** [[promo_flags.txt]] (incorrect flag will result in "data corrupt")


If the video that you are copying is a professionally produced movie or television show, you will need to obtain a copy that was made with the permission of its copyright owner.
* 2) [[update_files.tar]]
** unable to open PUP (rb)
** unable to read first 0x30 Bytes (header)
** unable to read further 0x20 Bytes sized segment_table (aka file tables)
** unable to find [[CoreOS|core os package.pkg]] inside update_files.tar


If the video that you are copying is a home movie or other personal recording that includes some professionally produced content (including the audio track of a professionally produced movie or television show), in order to make a copy you will need to either copy only those parts of the recording that do not include professionally produced content or else you may create or obtain a version of the video that does not include this protected material.</pre>
* 3) Unable to open Storage Region 1/2 on HDD.
=== Message Code 3: Audio muted ===
* 4) No Media present. (no success when fstat)
<pre>Typical on-screen message:
 
“Audio outputs temporarily muted. Do not adjust the playback volume. The content being played is protected by Cinavia™
and is not authorized for playback on this device. For more information, see http://www.cinavia.com. Message Code 3.”
Typical front panel message:
 
“Cinavia™ playback restriction (3)
 
 
Explanation
 
The audio track of the video that you are playing contains a Cinavia code indicating that it is an unauthorized copy of professionally-produced content.
 
 
Recommendations
 
If the video that you are playing is a professionally produced video (such as a movie or television show), you will need to obtain a copy that was made with the permission of the copyright owner.
 
If the video that you are playing is a home movie or other personal recording that includes some professionally produced content (including the audio track of a professionally produced video), to play your recording without muting you may either:
 
    Pause the video, wait 30 seconds for the audio to be un-muted, then skip over those portions where the professionally produced material is used and continue playing the rest of the video, or
    Pause the video, wait 30 seconds for the audio to be un-muted, then play video from a different optical disc for at least 10 minutes before continuing playback of this video.
 
For information on how this professionally produced content can be included in your home movies or other personal recordings in a way that will not be limited by Blu-ray Disc players, see Cinavia website : Guidelines for Use of Content in Home Movies.</pre>
=== Message Code 4: Copying stopped ===
<pre>Typical on-screen message:
 
“Copying stopped. This content is protected by Cinavia™
and is not authorized for copying from this device.
For more information, see http://www.cinavia.com”
Typical front panel message:
 
“Cinavia™ copy restriction (4)
 
 
Explanation
The audio track of the video that you are copying contains a Cinavia code indicating that it is an unauthorized copy of professionally produced content.
 
 
Recommendation
 
If the video that you are copying is a professionally produced video (such as a movie or television show), you should obtain a copy that was made with the permission of the copyright owner.
 
If the video that you are copying is a home movie or other personal recording that includes some professionally produced material (including the audio track of a professionally produced movie or television show), in order to make a copy without interruption you will need to either copy only those parts of the recording that do not include professionally produced content or else you may create or obtain a version of the video that does not include this protected material.
 
For information on how this professionally produced material can be included in your home movies or other personal recordings in a way that will not be limited by Blu-ray Disc players, see Guidelines for Use of Content in Home Movies.</pre>
 
=== PS3 specifics ===
 
Cinavia is not experienced in firmware 3.01 and older - firmware 3.10 and higher contain Cinavia DRM
Most likely suspects for the DRM are the player, streamsplitter and video- / audio decoders (e.g. libmp3dec.sprx)
Content known to trigger Cinavia DRM: certain xvid/mp3 rips (e.g. Battle_Los_Angeles_2011_R5_XViD-IMAGiNE &amp; the R5.LiNE.XViD-FOAM release of that same title / The.Tourist.DVDR-TWiZTED)
 
Playing Cinavia DRM protected content with Showtime works without problems (Showtime uses ffmpg), PS3 Media Server can also be used with the MEncoder transcoder otherwise it fails.
 
Debug firmware doesnt contain Cinavia DRM, neither has Rebug which uses same Debug system files (only CoreOS = Retail on Rebug)
 
====30.07.2011 addition====
''''I have traced the Cinavia DRM checks to 4 separate sprx files and after a long time trying to patch these files I have found that 3 of those files are present in the DEBUG (DEX) firmware don’t have the Cinavia DRM checks enabled. Files are videoplayer_util sprx, videoplayer_plugin sprx and videoeditor_plugin sprx.''
 
''I have successfully copied these 3 sprx files from DEBUG (DEX) FW 341 over to my retail PS3 unit running OFW 341 using dev_blind and Cinavia seems to be now disabled. I’ve confirmed this by playing back a number of Cinavia affected video files.''
 
''This means that Cinavia is now disabled for all DLNA playback and copying, but Cinavia checks on AVCHD and BD playback are still present with Message Code 3 that mutes the audio as the sprx file with the Cinavia check bdp_plugin sprx is not present in DEX firmware because BD playback is disabled in DEBUG. If someone is able to patch Cinavia out of bdp_plugin sprx this will be solved too.''
 
''I have created a new task for PS3MFW so this can be easily made part of any new MFW’s as needed. Any FW version that has had the DEX firmware leaked should be able to be used to create a CFW of the same version. eg DEX 3.41 -> MFW 341 or DEX 355 -> MFW 355 etc etc. Don’t use sprx files from different FW versions! See git hacks for change_cinavia_files task source.''
 
''Big thanks to the KaKaRoTo and REBUG team for their community contributions as this would have never been possible without the knowledge they’ve shared with us.''''
http://git.dashhacks.com/~tical/ps3mfw/ticals-tasks <br />
[http://www.multiupload.com/EOM4RB3DPB change_cinavia_files.tcl (4.22 KB)]  <br />


== Sample Logs normal installation ==
http://pastie.org/10059999
<pre>
<pre>
#!/usr/bin/tclsh
cellFsUtilMount: /dev_hdd0
#
Configuration read. bd_video_region=0,dvd_video_region=0
# ps3mfw -- PS3 MFW creator
spoof_version = 0000, spoof_revision = 0
#
BDemulator: disabled
# Copyright (C) Anonymous Developers (Code Monkeys)
real disc type = ff71
#
effective disc type = ff71, fake disc type = 0
# This software is distributed under the terms of the GNU General Public
probe hdd
# License ("GPL") version 3, as published by the Free Software Foundation.
(v)HDD found.
#
probe hdd done
 
vflash is enabled. search system region.
# Notes: videoplayer_util.sprx, videoplayer_plugin.sprx and videoeditor_plugin.sprx
search system region
#        have Cinavia DRM checks. These checks are disabled in DEX firmware so these
device_id = 0x101000000000007, system_region_id = 0x1
#        files can be replaced by those from the equivalent DEX firmware or if they
ACL[0]: LAID = 0x1070000001000001 : ACL =0xb
#        have been manually patched.  
system region found(mode = 0).
#        TODO: bdp_plugin.sprx also contains checks but BD playback is disabled on
search system region done.
#        DEX firmware so this file is not included in DEX firmware. This means that
search flash regions
#        DNLA copy/playback won't have any Cinavia checks done on it but a copied BD
cellFsUtilMount: /dev_flash
#        playback will still check for Cinavia and mute the audio (Message Code 3)
/dev_flash is clean.
#        until DEX firmware with a bdp_plugin.sprx is released or someone patches
[(v)flash]
#        this file manually.
        info.vendor_id = 0x0
 
        info.device_id = 0x0
# Priority: 2300
        info.sector_size = 0x200
# Description: Change Cinavia DRM affected files
        info.media_count = 0x1
        info.capacity = 0x80000
[device_id = 0x100000200000001]
        info.capacity = 0x63e00
flash region 0x2 found.
expected: start sectors = 0x7800, n_sectors = 0x63e00
start sector = 0x7800.
start sector is correct
region size is correct
[device_id = 0x100000300000001]
        info.capacity = 0x8000
flash region 0x3 found.
expected: start sectors = 0x6b600, n_sectors = 0x8000
start sector = 0x6b600.
[device_id = 0x100000400000001]
        info.capacity = 0x400
flash region 0x4 found.
expected: start sectors = 0x73600, n_sectors = 0x400
start sector = 0x73600.
[device_id = 0x100000500000001]
        info.capacity = 0x2000
flash region 0x5 found.
expected: start sectors = 0x73a00, n_sectors = 0x2000
start sector = 0x73a00.
found all flash regions.
search normal region
normal region 1 found.
search normal region done.
normal region 2 found.
Storage event: 7  0  10300000000000a
Storage event: 3  0  10300000000000a
search update package
seach update package in GAME disc
Disc auth: 5004 29 (process: 01000200_main_mer_init.self)
set drive policy success
profile = 0xff71
umount BDVD
umount /dev_bdvd failure = 0x80010002
mount BDVD
cellFsUtilMount: /dev_bdvd
mount /dev_bdvd success
/dev_bdvd/PS3_UPDATE/PS3UPDAT.PUP found
verify /dev_bdvd/PS3_UPDATE/PS3UPDAT.PUP
Initializing
taking a while...
start Updating Proccess
Initialize elapsed time = 3325 msec
check UPL
Check UPL elapsed time = 79 msec
check Package Size
get package size elapsed time = 25 msec
start Verifying Package only
update package elapsed time = 1731 msec
Updating or Verifying failure 0x8002f169
USB storage: id = 0x10300000000000a
        lun = 0x0
        info.capacity = 0xffffffffe8df8800
lun = 0x0, dev_index = 0xa
index = 0x0, pkg_index = 0x2
mount USB storage 0
mp_name = /dev_usb000
umount /dev_usb000 failure = 0x80010002
mount USB storage 0(LUN=0x0)
dev_name = CELL_FS_IOS:USB_MASS_STORAGE000, mp_name = /dev_usb000
cellFsUtilMount: /dev_usb000
mount /dev_usb000 success
/dev_usb000/PS3/UPDATE/PS3UPDAT.PUP found
verify /dev_usb000/PS3/UPDATE/PS3UPDAT.PUP
Storage event: 4  0  101000000000006
Disc removed.
Storage event: 8  0  101000000000006
Initialize elapsed time = 547 msec
Check UPL elapsed time = 148 msec
get package size elapsed time = 17 msec
update package elapsed time = 18979 msec
post processiong...
post processiong done
search update package done
not to be skipped formatting system region.
re-use old partitions.
re-use old flash partitions.
cellFsUtilMount: /dev_hdd1
setup environment for ps3updater
mount game cache
mount game cache success
mkdir /dev_hdd1/PS3UPDATE success
mkdir /dev_hdd1/PS3UPDATE/vsh success
mkdir /dev_hdd1/PS3UPDATE/vsh/etc success
mkdir /dev_hdd1/PS3UPDATE/data success
mkdir /dev_hdd1/PS3UPDATE/data/font success
Initialize elapsed time = 582 msec
Check UPL elapsed time = 160 msec
update package elapsed time = 20137 msec
copy /dev_usb000/PS3/UPDATE/PS3UPDAT.PUP to /dev_hdd1/PS3UPDATE/PS3UPDAT.PUP
copy id = 0x100, dst = /dev_hdd1/PS3UPDATE/ps3version.txt
copy id = 0x601, dst = /dev_hdd1/PS3UPDATE/ps3swu.self
extarct id = 0x201, dst = /dev_hdd1/PS3UPDATE
segment = 0x300, offset = 0x56f5b0, size = 0xc0e4c00
file_num = 51
required patch_name : /BDIT_FIRMWARE_PACKAGE.pkg.spkg_hdr.1
segment = 0x501, offset = 0xc6541b0, size = 0x14000
file_num = 49
patch found: offset = 0xc6543b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_301R.pkg.spkg_hdr.1
patch found: offset = 0xc6549b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_302R.pkg.spkg_hdr.1
patch found: offset = 0xc654fb0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_303R.pkg.spkg_hdr.1
patch found: offset = 0xc6555b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_304R.pkg.spkg_hdr.1
patch found: offset = 0xc655bb0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_306R.pkg.spkg_hdr.1
patch found: offset = 0xc6561b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_308R.pkg.spkg_hdr.1
patch found: offset = 0xc6567b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_310R.pkg.spkg_hdr.1
patch found: offset = 0xc656db0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_312R.pkg.spkg_hdr.1
patch found: offset = 0xc6573b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_314R.pkg.spkg_hdr.1
patch found: offset = 0xc6579b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_316R.pkg.spkg_hdr.1
patch found: offset = 0xc657fb0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_318R.pkg.spkg_hdr.1
patch found: offset = 0xc6585b0, size = 0x280
required patch_name : /BLUETOOTH_FIRMWARE.pkg.spkg_hdr.1
patch found: offset = 0xc658bb0, size = 0x280
required patch_name : /CORE_OS_PACKAGE.pkg.spkg_hdr.1
patch found: offset = 0xc6591b0, size = 0x280
required patch_name : /MULTI_CARD_FIRMWARE.pkg.spkg_hdr.1
patch found: offset = 0xc6597b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01000006.pkg.spkg_hdr.1
patch found: offset = 0xc659db0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01010303.pkg.spkg_hdr.1
patch found: offset = 0xc65a3b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01020302.pkg.spkg_hdr.1
patch found: offset = 0xc65a9b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01030302.pkg.spkg_hdr.1
patch found: offset = 0xc65afb0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01040402.pkg.spkg_hdr.1
patch found: offset = 0xc65b5b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01050002.pkg.spkg_hdr.1
patch found: offset = 0xc65bbb0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01050101.pkg.spkg_hdr.1
patch found: offset = 0xc65c1b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_S1_00010002083E0832.pkg.spkg_hdr.1
patch found: offset = 0xc65c7b0, size = 0x280
required patch_name : /UPL.xml.pkg.spkg_hdr.1
patch found: offset = 0xc65cdb0, size = 0x280
required patch_name : /RL_FOR_PACKAGE.img.spkg_hdr.1
patch for /RL_FOR_PACKAGE.img not found. skipped
required patch_name : /RL_FOR_PROGRAM.img.spkg_hdr.1
patch for /RL_FOR_PROGRAM.img not found. skipped
required patch_name : /dev_flash3_024.tar.aa.2015_02_05_035051.spkg_hdr.1
patch found: offset = 0xc65d3b0, size = 0x280
required patch_name : /dev_flash_000.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65d9b0, size = 0x280
required patch_name : /dev_flash_001.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65dfb0, size = 0x280
dir_num = 1
dirname = /dev_flash/data/font/
dstname = /dev_hdd1/PS3UPDATE/data/font/
file_num = 20
filename = /dev_flash/data/font/SCE-PS3-RD-R-LATIN2.TTF, offset = 0400, size = 0xd67c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-R-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-R-LATIN.TTF, offset = 0de00, size = 0x95f4
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-R-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-VR-R-LATIN2.TTF, offset = 017600, size = 0x218b0
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-VR-R-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-SR-R-LATIN2.TTF, offset = 039200, size = 0x12ee8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-B-LATIN.TTF, offset = 04c400, size = 0x12184
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-B-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-L-LATIN.TTF, offset = 05e800, size = 0x9714
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-L-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-YG-R-KOR.TTF, offset = 068200, size = 0x79728
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-YG-R-KOR.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-I-LATIN.TTF, offset = 0e1c00, size = 0x9ea4
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-I-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-BI-LATIN.TTF, offset = 0ebe00, size = 0x9c80
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-BI-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-LI-LATIN.TTF, offset = 0f5e00, size = 0xa038
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-LI-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-L-JPN.TTF, offset = 0100200, size = 0x2f0eb4
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-L-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-CP-R-KANA.TTF, offset = 03f1400, size = 0xf27c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-CP-R-KANA.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-BI-LATIN.TTF, offset = 0400a00, size = 0x13128
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-BI-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-I-LATIN.TTF, offset = 0413e00, size = 0x133d8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-I-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-SR-R-EXT.TTF, offset = 0427400, size = 0x43450
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-EXT.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-L-LATIN2.TTF, offset = 046ac00, size = 0xd7fc
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-L-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-SR-R-LATIN.TTF, offset = 0478600, size = 0xd1b0
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-R-JPN.TTF, offset = 0485a00, size = 0x2f5c38
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-R-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-YG-B-KOR.TTF, offset = 077ba00, size = 0x78ec8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-YG-B-KOR.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-R-EXT.TTF, offset = 07f4c00, size = 0x443b8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-R-EXT.TTF
required patch_name : /dev_flash_002.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65e5b0, size = 0x280
dir_num = 0
file_num = 3
filename = /dev_flash/data/font/SCE-PS3-SR-R-JPN.TTF, offset = 0200, size = 0x47380c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-B-JPN.TTF, offset = 0473e00, size = 0x2d9724
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-B-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-R-LATIN.TTF, offset = 074d800, size = 0x1202c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-R-LATIN.TTF
required patch_name : /dev_flash_003.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65ebb0, size = 0x280
dirname = /dev_flash/data/font/SONY-CC/
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/
file_num = 12
filename = /dev_flash/data/font/SCE-PS3-DH-R-CGB.TTF, offset = 0200, size = 0x7d8884
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-DH-R-CGB.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-B-LATIN2.TTF, offset = 07d8e00, size = 0xd328
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-B-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-YG-L-KOR.TTF, offset = 07e6400, size = 0x78f68
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-YG-L-KOR.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-B-LATIN.TTF, offset = 085f600, size = 0x9430
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-B-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-VR-R-LATIN.TTF, offset = 0868e00, size = 0x10344
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-VR-R-LATIN.TTF
filename = /dev_flash/data/font/SONY-CC/k006004ds.ttf, offset = 0879600, size = 0xeb94
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/k006004ds.ttf
filename = /dev_flash/data/font/SONY-CC/e046323ts.ttf, offset = 0888400, size = 0xd960
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/e046323ts.ttf
filename = /dev_flash/data/font/SONY-CC/c041056ts.ttf, offset = 0896000, size = 0x116dc
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/c041056ts.ttf
filename = /dev_flash/data/font/SONY-CC/n023055ms.ttf, offset = 08a7a00, size = 0xb38c
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/n023055ms.ttf
filename = /dev_flash/data/font/SONY-CC/e046323ms.ttf, offset = 08b3000, size = 0xc25c
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/e046323ms.ttf
filename = /dev_flash/data/font/SONY-CC/n023055ts.ttf, offset = 08bf600, size = 0xc9c0
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/n023055ts.ttf
filename = /dev_flash/data/font/SONY-CC/d013013ds.ttf, offset = 08cc200, size = 0x11174
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/d013013ds.ttf
required patch_name : /dev_flash_004.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65f1b0, size = 0x280
dir_num = 2
dirname = /dev_flash/vsh/etc/
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/
dirname = /dev_flash/vsh/etc/print/
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/print/
file_num = 11
filename = /dev_flash/vsh/etc/layout_factor_table_720.txt, offset = 0400, size = 0x1ff
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_720.txt
filename = /dev_flash/vsh/etc/layout_grid_table_720.txt, offset = 0800, size = 0x3fd5
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_720.txt
filename = /dev_flash/vsh/etc/layout_grid_table_1080.txt, offset = 04a00, size = 0x41f6
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_1080.txt
filename = /dev_flash/vsh/etc/index.dat, offset = 08e00, size = 0x4f0
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/index.dat
filename = /dev_flash/vsh/etc/layout_factor_table_272.txt, offset = 09600, size = 0x1dd
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_272.txt
filename = /dev_flash/vsh/etc/version.txt, offset = 09a00, size = 0x4ce
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/version.txt
filename = /dev_flash/vsh/etc/layout_grid_table_480.txt, offset = 0a200, size = 0x3dc9
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_480.txt
filename = /dev_flash/vsh/etc/print/epson.pmd, offset = 0e400, size = 0x7154
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/print/epson.pmd
filename = /dev_flash/vsh/etc/layout_grid_table_272.txt, offset = 015800, size = 0x3df7
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_272.txt
filename = /dev_flash/vsh/etc/layout_factor_table_480.txt, offset = 019800, size = 0x1dc
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_480.txt
filename = /dev_flash/vsh/etc/layout_factor_table_1080.txt, offset = 019c00, size = 0x1f2
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_1080.txt
required patch_name : /dev_flash_005.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65f7b0, size = 0x280
required patch_name : /dev_flash_006.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65fdb0, size = 0x280
required patch_name : /dev_flash_007.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6603b0, size = 0x280
required patch_name : /dev_flash_008.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6609b0, size = 0x280
required patch_name : /dev_flash_009.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc660fb0, size = 0x280
required patch_name : /dev_flash_010.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6615b0, size = 0x280
required patch_name : /dev_flash_011.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc661bb0, size = 0x280
required patch_name : /dev_flash_012.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6621b0, size = 0x280
required patch_name : /dev_flash_013.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6627b0, size = 0x280
required patch_name : /dev_flash_014.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc662db0, size = 0x280
required patch_name : /dev_flash_015.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6633b0, size = 0x280
required patch_name : /dev_flash_016.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6639b0, size = 0x280
required patch_name : /dev_flash_017.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc663fb0, size = 0x280
required patch_name : /dev_flash_018.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6645b0, size = 0x280
required patch_name : /dev_flash_019.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc664bb0, size = 0x280
required patch_name : /dev_flash_020.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6651b0, size = 0x280
required patch_name : /dev_flash_021.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6657b0, size = 0x280
required patch_name : /dev_flash_022.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc665db0, size = 0x280
required patch_name : /dev_flash_023.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6663b0, size = 0x280
setup environment for ps3updater done.
umount game cache
umount game cache success
Unmount:: not call unset_storage_event_handler
UfsSysUinit2:not call ffs_uninitUnmount:: not call free


# Option --cinavia-videoplayerutil: Patched videoplayer_util.sprx filename
Prepare to shutdown .....Going to shutdown.
# Option --cinavia-videoplayerplugin: Patched videoplayer_plugin.sprx filename
Stage 2 says hello (load base = 0x8000000000540000, end = 0x8000000000558330) (version = 0104700F)
# Option --cinavia-videoeditorplugin: Patched videoeditor_plugin.sprx filename
OK
# Option --cinavia-bdpplugin: Patched bdp_plugin.sprx filename


# Type --cinavia-videoplayerutil: file open {"SPRX library" {sprx}}
###
# Type --cinavia-videoplayerplugin: file open {"SPRX library" {sprx}}
### Software update mode
# Type --cinavia-videoeditorplugin: file open {"SPRX library" {sprx}}
# Type --cinavia-bdpplugin: file open {"SPRX library" {sprx}}


namespace eval change_cinavia_files {
mounting the builtin HDD1 : cellFsUtilMount: /dev_hdd1
 
PROCESS /dev_hdd1/PS3UPDATE/ps3swu.self (01000200) loaded
    array set ::change_cinavia_files::options {
PROCESS /dev_hdd1/PS3UPDATE/ps3swu.self (01000200_main_ps3swu.self) (01000200) created from parent process:
        --cinavia-videoplayerutil "/path/to/videoplayer_util.sprx"
creating the initial system process : OK
        --cinavia-videoplayerplugin "/path/to/videoplayer_plugin.sprx"
cellFsUtilMount: /dev_flash2
        --cinavia-videoeditorplugin "/path/to/videoeditor_plugin.sprx"
cellFsUtilMount: /dev_flash3
        --cinavia-bdpplugin "/path/to/bdp_plugin.sprx"
Registry: running in recovery mode
    }
Registry initialization start:............ done
 
We are originally in region 82
    proc main {} {
        variable options
 
        set cinavia_videoplayerutil [file join dev_flash vsh module videoplayer_util.sprx]
        set cinavia_videoplayerplugin [file join dev_flash vsh module videoplayer_plugin.sprx]
        set cinavia_videoeditorplugin [file join dev_flash vsh module videoeditor_plugin.sprx]
        set cinavia_bdpplugin [file join dev_flash vsh module bdp_plugin.sprx]
 
        if {[file exists $options(--cinavia-videoplayerutil)] == 0 } {
            log "Skipping videoplayer_util.sprx, $options(--cinavia-videoplayerutil) does not exist"
        } else {
            ::modify_devflash_file ${cinavia_videoplayerutil} ::change_cinavia_files::copy_cinavia_file $::change_cinavia_files::options(--cinavia-videoplayerutil)
        }
 
        if {[file exists $options(--cinavia-videoplayerplugin)] == 0 } {
            log "Skipping cinavia_videoplayerplugin, $options(--cinavia-videoplayerplugin) does not exist"
        } else {
            ::modify_devflash_file ${cinavia_videoplayerplugin} ::change_cinavia_files::copy_cinavia_file $::change_cinavia_files::options(--cinavia-videoplayerplugin)
        }
 
        if {[file exists $options(--cinavia-videoeditorplugin)] == 0 } {
            log "Skipping cinavia_videoeditorplugin, $options(--cinavia-videoeditorplugin) does not exist"
        } else {
            ::modify_devflash_file ${cinavia_videoeditorplugin} ::change_cinavia_files::copy_cinavia_file $::change_cinavia_files::options(--cinavia-videoeditorplugin)
        }
       
        # TODO: no known bdp_plugin.sprx patch yet
        if {[file exists $options(--cinavia-bdpplugin)] == 0 } {
            log "Skipping cinavia_bdpplugin, $options(--cinavia-bdpplugin) does not exist"
        } else {
            ::modify_devflash_file ${cinavia_bdpplugin} ::change_cinavia_files::copy_cinavia_file $::change_cinavia_files::options(--cinavia-bdpplugin)
        }
    }
 
    proc copy_cinavia_file { dst src } {
        if {[file exists $src] == 0} {
            die "$src does not exist"
        } else {
            if {[file exists $dst] == 0} {
                die "$dst does not exist"
            } else {
                log "Replacing default file [file tail $dst] with patched [file tail $src]"
                copy_file -force $src $dst
            }
        }
    }
}
</pre>
</pre>
other: http://pastie.org/pastes/10056453/text?key=utexzvyefmddeddktp3og


Note:
== Factory Service Mode - Installation log breakdown ==
only :
Explaination from rms: http://rmscrypt.wordpress.com/2011/02/01/the-downgrade-process/
* bdp_plugin sprx
* videoplayer_plugin sprx
might need proper patching, because videoplayer_util.sprx is the same on Retail/CEX and Debug/DEX and videoeditor_plugin sprx might not be used for playback at all.
 
edit, correction: videoeditor_plugin.prx is same on CEX and DEX


[http://www.multiupload.com/4LE67XL4TM cinavia-310.rar (2.32 MB)]
Sample logs:
----
* http://pastebin.com/XhcjfAjw (downgrade 3.66 -> 3.15)
* http://pastebin.com/SAN7Z3Dq (UPL 3.15)


== Hashes ==
{| class="wikitable"
{| border="1" cellspacing="0" cellpadding="5" border="#999" class="wikitable sortable" style="border:1px solid #999; border-collapse: collapse;"
|- bgcolor="#cccccc"
! Version !! MD5 !! SHA1 !! CRC32 !! CRC16 !! HMAC_SHA1
|-
|-
| 0 file (do not use)      || MD5::1f5039e50bd66b290c56684d8550c6c2 || SHA1::7b91dbdc56c5781edf6c8847b4aa6965566c5c75 || CRC32::2A0E7DBB || CRC16::0 || HMAC_SHA1::
! log !! Explaination !! Notes
|-
|-
| 1.00 DEBUG/DEX            || MD5::414577d095cd2b6a4f90f0aae2ac1f43 || SHA1::de3868983d8b7c4bb092c40bb4451b4e173d1749 || CRC32::2CAD4E55 || CRC16::BAD || HMAC_SHA1::CAEE418F3F46FCBED2CDD03C0E63CAF2520463DE
| || manufacturing bit detection in Syscon eeprom, manufacturing mode enabled, looking for lv2_diag.self ||  
|-
|-
| 1.02 RETAIL/CEX          || MD5::da5438f39b3b6e5ef904d91162d93086 || SHA1::6ce852438c7473abc073cc97911cc538bf7b6bfb || CRC32::16A6239D || CRC16::2319 || HMAC_SHA1::5A016FE5EF454A9D2E0C6F2C5FBF5709E743B429
| <pre> manufacturing updating start</pre> || lv2_diag.self initialised ||  
|-
|-
| 1.02&nbsp;RETAIL/CEX-DISK      || MD5::df96debb4c014f5673e0ce259e4fb835 || SHA1::4663d7da046b6bbf78b3c050d946b4b148c5a363 || CRC32::96D74F83 || CRC16::51D0 || HMAC_SHA1::5A016FE5EF454A9D2E0C6F2C5FBF5709E743B429
| <pre>PackageName = /dev_usb000/PS3UPDAT.PUP</pre> || PUP file used for FSM reinstall on USB root ||  
|-
|-
| 1.10 RETAIL/CEX          || MD5::374371771ad1608d0684c4d588440f0b || SHA1::6cd78b1e101e0b8856bc4a7408bb558f525134b3 || CRC32::EC39C478 || CRC16::ECDC || HMAC_SHA1::00ABB79F0E138C380418D4F98C2AD325CA5F7790
| <pre> settle polling interval success</pre> || ||  
|-
|-
| 1.11 RETAIL/CEX          || MD5::8b6b4fb0a5fdd68bf85f02d4f6a0f096 || SHA1::a3d721a241f9b0f82f885877228415b508994d4b || CRC32::13C4C8E9 || CRC16::D7C2 || HMAC_SHA1::A36739D25BE68C255358571AD4751ECE428A0CF5
| <pre> vflash is disabled...
boot from nand flash...</pre> || NAND system detected, vflash disabled ||  
|-
|-
| 1.30 RETAIL/CEX          || MD5::d2c1aa63e55f5eb74e9846112d843f2b || SHA1::895091bf1c85a1be238eb344dfaaf230a581e325 || CRC32::FC066556 || CRC16::C21B || HMAC_SHA1::4A5D1A97653A6A4CBA6752B989D5A5917DB2846E
| <pre> creating flash regions...
create storage region: (region id = 2)
format partition: (region_id = 2, CELL_FS_IOS:BUILTIN_FLSH1, CELL_FS_FAT)
create storage region: (region id = 3)
format partition: (region_id = 3, CELL_FS_IOS:BUILTIN_FLSH2, CELL_FS_FAT)
create storage region: (region id = 4)
format partition: (region_id = 4, CELL_FS_IOS:BUILTIN_FLSH3, CELL_FS_FAT)
create storage region: (region id = 5)
create storage region: (region id = 6)</pre> || creating FLASH regions 2, 3, 4, 5, 6 and formatting regions 2, 3, 4 ||  
|-
|-
| 1.31 RETAIL/CEX          || MD5::602a1373cf1845d56348698d7037ab1b || SHA1::05e391a3b1be3952ef8837bd047a2773af726e04 || CRC32::5B163F66 || CRC16::37EB || HMAC_SHA1::79466F7D8DD03810F2693C386E1423D8E067EA77
| <pre> Initializing
taking a while...
start Updating Proccess
Initialize elapsed time = 61 msec</pre> || Initializing + Start Updating Proccess ||  
|-
|-
| 1.32 RETAIL/CEX          || MD5::c4b08159eaa9fce111e076fb255aa106 || SHA1::b3abbfec073cb083809b0ec102870305fb7d0c3a || CRC32::3879CEFF || CRC16::AF7C || HMAC_SHA1::9F3C8AE69C18F9006916D7C66A9E09A94D7F5B0F
| <pre> check UPL
Check UPL elapsed time = 34 msec
check Package Size
get package size elapsed time = 8 msec
start Updating Package
Update packages num = 29
Update packages total size = 160699026</pre> || UPL.xml.pkg from PUP unpkg'ed and read ||  
|-
|-
| 1.50 DEBUG/DEX            || MD5::6ae921c2f0d511fa6c2785dc89137f35 || SHA1::8b1e825ae1966845f698a20d6124c12afd15d67d || CRC32::8373B23A || CRC16::846B || HMAC_SHA1::35D1318B4930E5EFB330E88FDD933623D92BE543
| <pre> Update Package Revoke list
read package revoke list package (576 bytes) elapsed = 6 msec
update package revoke list elapsed = 331 msec
Update Package Revoke list done(0x8002f000)</pre> || RL_FOR_PACKAGE.img copied from PUP to [[Flash#trvk_pkg|trvk_pkg]] ||  
|-
|-
| 1.50 RETAIL/CEX          || MD5::9d7f3830fb3082febf303bd0ce2f17c9 || SHA1::588b6a58c57a6540384227d65b24c9b2fd8765d5 || CRC32::668AECFA || CRC16::AB23 || HMAC_SHA1::AD55657DB858BB5F70A977507482C5539BC3FDE8
| <pre> Update Core OS Package
read core os package (5193774 bytes) elapsed = 324 msec
update core os package elapsed = 1965 msec
Update Core OS Package done(0x8002f000)</pre> || [[CoreOS|Core OS]] package (CORE_OS_PACKAGE.pkg) is unpkg'ed from PUP and written to [[Flash#ros|ros]] ||  
|-
|-
| 1.50&nbsp;RETAIL/CEX-DISK      || MD5::c84fe177af97443984696b747e70be51 || SHA1::2fd7928a6f5ba51c0ba1390fee197b6fdbb94421 || CRC32::5CB09520 || CRC16::9 || HMAC_SHA1::AD55657DB858BB5F70A977507482C5539BC3FDE8
| <pre> Update VSH Package
sys_memory_container_create() success(id = 0xc0effffe)
Update VSH's package : 1/21
read vsh package (2070 bytes) elapsed = 8 msec
decrypt and verify vsh package elapsed = 23 msec
write vsh package elapsed = 9259 msec
compare vsh package elapsed = 0 msec
Update VSH's package : 2/21
read vsh package (5616383 bytes) elapsed = 351 msec
decrypt and verify vsh package elapsed = 341 msec
write vsh package elapsed = 1725 msec
compare vsh package elapsed = 402 msec
Update VSH's package : 3/21
read vsh package (3357780 bytes) elapsed = 214 msec
decrypt and verify vsh package elapsed = 227 msec
write vsh package elapsed = 2926 msec
compare vsh package elapsed = 312 msec
Update VSH's package : 4/21
read vsh package (5240122 bytes) elapsed = 328 msec
decrypt and verify vsh package elapsed = 309 msec
write vsh package elapsed = 2776 msec
compare vsh package elapsed = 399 msec
Update VSH's package : 5/21
read vsh package (24029 bytes) elapsed = 9 msec
decrypt and verify vsh package elapsed = 24 msec
write vsh package elapsed = 1185 msec
compare vsh package elapsed = 9 msec
Update VSH's package : 6/21
read vsh package (9831317 bytes) elapsed = 599 msec
decrypt and verify vsh package elapsed = 279 msec
write vsh package elapsed = 11830 msec
compare vsh package elapsed = 466 msec
Update VSH's package : 7/21
read vsh package (8662380 bytes) elapsed = 539 msec
decrypt and verify vsh package elapsed = 272 msec
write vsh package elapsed = 16532 msec
compare vsh package elapsed = 474 msec
Update VSH's package : 8/21
read vsh package (8657372 bytes) elapsed = 541 msec
decrypt and verify vsh package elapsed = 361 msec
write vsh package elapsed = 5911 msec
compare vsh package elapsed = 448 msec
Update VSH's package : 9/21
read vsh package (10445426 bytes) elapsed = 635 msec
decrypt and verify vsh package elapsed = 255 msec
write vsh package elapsed = 5408 msec
compare vsh package elapsed = 467 msec
Update VSH's package : 10/21
read vsh package (10252830 bytes) elapsed = 641 msec
decrypt and verify vsh package elapsed = 262 msec
write vsh package elapsed = 8646 msec
compare vsh package elapsed = 476 msec
Update VSH's package : 11/21
read vsh package (9922968 bytes) elapsed = 621 msec
decrypt and verify vsh package elapsed = 252 msec
write vsh package elapsed = 6950 msec
compare vsh package elapsed = 467 msec
Update VSH's package : 12/21
read vsh package (8214459 bytes) elapsed = 505 msec
decrypt and verify vsh package elapsed = 199 msec
write vsh package elapsed = 5843 msec
compare vsh package elapsed = 386 msec
Update VSH's package : 13/21
read vsh package (9428094 bytes) elapsed = 594 msec
decrypt and verify vsh package elapsed = 244 msec
write vsh package elapsed = 5238 msec
compare vsh package elapsed = 442 msec
Update VSH's package : 14/21
read vsh package (7973335 bytes) elapsed = 498 msec
decrypt and verify vsh package elapsed = 346 msec
write vsh package elapsed = 13617 msec
compare vsh package elapsed = 456 msec
Update VSH's package : 15/21
read vsh package (9766737 bytes) elapsed = 603 msec
decrypt and verify vsh package elapsed = 360 msec
write vsh package elapsed = 17267 msec
compare vsh package elapsed = 529 msec
Update VSH's package : 16/21
read vsh package (9199234 bytes) elapsed = 583 msec
decrypt and verify vsh package elapsed = 407 msec
write vsh package elapsed = 23189 msec
compare vsh package elapsed = 689 msec
Update VSH's package : 17/21
read vsh package (7260896 bytes) elapsed = 466 msec
decrypt and verify vsh package elapsed = 286 msec
write vsh package elapsed = 14751 msec
compare vsh package elapsed = 689 msec
Update VSH's package : 18/21
read vsh package (6563380 bytes) elapsed = 422 msec
decrypt and verify vsh package elapsed = 155 msec
write vsh package elapsed = 1906 msec
compare vsh package elapsed = 357 msec
Update VSH's package : 19/21
read vsh package (6092245 bytes) elapsed = 373 msec
decrypt and verify vsh package elapsed = 227 msec
write vsh package elapsed = 1457 msec
compare vsh package elapsed = 405 msec
Update VSH's package : 20/21
read vsh package (9859067 bytes) elapsed = 590 msec
decrypt and verify vsh package elapsed = 238 msec
write vsh package elapsed = 2187 msec
compare vsh package elapsed = 498 msec
Update VSH's package : 21/21
read vsh package (6492084 bytes) elapsed = 419 msec
decrypt and verify vsh package elapsed = 321 msec
write vsh package elapsed = 17509 msec
compare vsh package elapsed = 674 msec
Update VSH Package done(0x8002f000)</pre> || dev_flash_000.tar.aa.* files from PUP are unpkg'ed to dev_flash ||  
|-
|-
| 1.51 RETAIL/CEX          || MD5::afd01d9c72b3b69c03a0206c45d87dda || SHA1::bc7c1b189fb453b4a2387d8dca8d00a6c33bc631 || CRC32::EBED761 || CRC16::D098 || HMAC_SHA1::70B8EC7EADF20F8C375F0235315C033A507A61DB
| <pre> Bul-ray Disc Player Revoke
read bdp revoke package (1904 bytes) elapsed = 23 msec
decrypt and verify bdp revoke package elapsed = 29 msec
write bdp revoke package elapsed = 2240 msec
compare bdprevoke package elapsed = 57 msec
Bul-ray Disc Player Revoke done(0x8002f000)</pre> || dev_flash3_024.tar.aa.* files from PUP are unpkg'ed to dev_flash3 ||  
|-
|-
| 1.51&nbsp;RETAIL/CEX-DISK      || MD5::06008bbf003a6ad46270853d7d077b40 || SHA1::410e17e7718b643623a1cfa93b003827d88cab26 || CRC32::A2240258 || CRC16::E6A2 || HMAC_SHA1::70B8EC7EADF20F8C375F0235315C033A507A61DB
| <pre> Update Program Revoke list
read program revoke list package (704 bytes) elapsed = 7 msec
update program revoke list elapsed = 331 msec
Update Program Revoke list done(0x8002f000)</pre> || RL_FOR_PROGRAM.img from PUP is copied to [[Flash#trvk_prg|trvk_prg]] ||  
|-
|-
| 1.54 RETAIL/CEX          || MD5::891bf61f56808119c4968ac3a9101540 || SHA1::753485bf7937f5294cb7dfb0fc97ebcf018f90f8 || CRC32::14BBBA5D || CRC16::CCCE || HMAC_SHA1::091FE7875436635F41A40977C419F6F03535BFE0
| <pre> move_2block_status_into_the_region(): region id = 3
rewrite_region() region id = 0x3, start_lba = 0x0, end_lba = 0x4000
rewrite region done (ret = 0x8002f000)
rewrite region elapsed time = 1262 msec
touch_1st_sector_in_block() region id = 0x3, start_lba = 0x0, end_lba = 0x4000
touch_1st_sector() done (ret = 0x8002f000)
touch_1st_sector() elapsed time = 1121 msec
rewrite_region() region id = 0x3, start_lba = 0x0, end_lba = 0x4000
rewrite region done (ret = 0x8002f000)
rewrite region elapsed time = 1262 msec</pre> || ||  
|-
|-
| 1.54&nbsp;RETAIL/CEX-DISK      || MD5::c745c4950aa0b761a06f4a9637f7f6e3 || SHA1::5aa22e8556d5385605be880e3655bc81e7c5f812 || CRC32::2CA0 || CRC16::51D0 || HMAC_SHA1::091FE7875436635F41A40977C419F6F03535BFE0
| <pre> Update BD firmware
read BD firmware package (1966992 bytes) elapsed = 142 msec
update BD firmware elapsed = 184 msec
read BD firmware package (951040 bytes) elapsed = 78 msec
update BD firmware elapsed = 142 msec
read BD firmware package (951040 bytes) elapsed = 80 msec
update BD firmware elapsed = 13959 msec
Update BD firmware done(0x8002f000)</pre> || Appropiate [[Bluray_Drive_Firmware|BD firmware]] for that [[Bluray Drive]] is flashed to BD eeprom ||  
|-
|-
| 1.60 RETAIL/CEX          || MD5::3a5f49bcee3948301aa698ed57ecb10e || SHA1::b22abc19ad8d9228967c9a407cdfec7b17cfaf7e || CRC32::7AEB075B || CRC16::BF5F || HMAC_SHA1::A8EE5451C36F08A5F76CF40BBFB747335B5A5496
| <pre> Update Multi-Card controller firmware
read MCC package (28636 bytes) elapsed = 25 msec
update MCC elapsed = 24 msec
Update Multi-Card controller firmware done(0x8002f000)</pre> || If SKU with [[MultiCardReader]] then [[MultiCardReader_Firmware|Multi-Card controller firmware]] is flashed to [[MultiCardReader#SST_39VF010_70-4C-WHE_.28Flash.2C_1Mbit.2C_128K_x8.2C_2.7-3.6V.2C_70ns_TSOP32.29|SST 1mbit Flash]] ||  
|-
|-
| 1.60 TOOL/DECR            || MD5::95fdca0641cc66e1f6afa8a9fd260051 || SHA1::bf19b588024e437e2597b30b4ee13d7e6ef42f09 || CRC32::EBA35323 || CRC16::DF1C || HMAC_SHA1::583A85AD4446AC9D9F027CE8C49000F7768CA308
| <pre> Update BlueTooth firmware
read BT package (639368 bytes) elapsed = 62 msec
update BT elapsed = 56 msec
Update BlueTooth firmware done(0x8002f000)</pre> || [[Bluetooth#Spansion_S99AL008D002_0630DBA_H_.28NOR_Flash_8Mbit_3.3V.29|Bluetooth NOR flash]] is updated with
[[Bluetooth_Firmware|BlueTooth firmware]]
|-
|-
| 1.70 DEBUG/DEX            || MD5::4bb46cd379332da2587e88af68f6df0a || SHA1::720501c9de220645e4ef22fbef5c0a82aef584d4 || CRC32::EC1999FF || CRC16::181C || HMAC_SHA1::CB8F0FA71CDFB07121EB2E88A8F1582778B675F7
| <pre> Update System controller firmware
read SC patch package (4864 bytes) elapsed = 24 msec
read SC patch package (4864 bytes) elapsed = 24 msec
read SC patch package (4864 bytes) elapsed = 23 msec
Update System controller firmware done(0x8002f000)</pre> || [[Syscon Hardware]] is updated with appropiate [[Syscon Firmware]] ||  
|-
|-
| 1.70 RETAIL/CEX          || MD5::468238974943b45c09aeb632853401f2 || SHA1::e1456431902784999ae0528889c94534a6089c13 || CRC32::53F3C803 || CRC16::DABA || HMAC_SHA1::CD3204B046446C946C9845C567ACB72A01043C77
| <pre> update package elapsed time = 228361 msec</pre> || ||  
|-
|-
| 1.70&nbsp;RETAIL/CEX-DISK      || MD5::8ec2c18e456d3e01603c2ac167879157 || SHA1::0c4e2c1c4fef8dd67059da059c51cafa4678fbe4 || CRC32::6A71AA95 || CRC16::3FF5 || HMAC_SHA1::CD3204B046446C946C9845C567ACB72A01043C77
| <pre> post processiong...
post processiong done
cleanup update status (ret = 0)</pre> || ||  
|-
|-
| 1.80 DEBUG/DEX            || MD5::73bb5bb827031a1ec67bf84b009f6848 || SHA1::71bbf83d1807e726b6abf5b64c9431c2bcdea29a || CRC32::D9269785 || CRC16::7ABE || HMAC_SHA1::F072273D191C4BBC392869E5815C61279482363F
| <pre> os version = 03.1500
build_version = 38031,20091206</pre> || ||  
|-
|-
| 1.80 RETAIL/CEX          || MD5::fd9887626f734b46b271aec58e827cb2 || SHA1::6a750b307a52a8a24937887fbf2c2c9c098cd90d || CRC32::F073CF43 || CRC16::6343 || HMAC_SHA1::EF84C1DB2BD1227C6C74F354C8D31A702706977B
| <pre> region of core os package = 0x40000000</pre> || ||  
|-
|-
| 1.80&nbsp;RETAIL/CEX-DISK      || MD5::2f6375d7f28cfc6587dbc038dae5b3f7 || SHA1::39e94123abaee16be602463f9f8121dce078837c || CRC32::116BB43 || CRC16::8C9 || HMAC_SHA1::EF84C1DB2BD1227C6C74F354C8D31A702706977B
| <pre> build_target = CEX-ww
build target id = 0x83</pre> || ||  
|-
|-
| 1.81 RETAIL/CEX          || MD5::b81fe78b163b62ce8983ad990306fe57 || SHA1::77e957dc895c2da25a962c03a7e58746818cb6fd || CRC32::1C07EC30 || CRC16::F3BF || HMAC_SHA1::96797AA5AEDE03ACE30D13A9148FBD5C311E1DFB
| <pre> manufacturing updating SUCCESS(0x8002f000)</pre> || ||  
|-
|-
| 1.82 RETAIL/CEX          || MD5::25de800491e8e88104d7e30b7524e9dc || SHA1::33dbc0d3ec44f7dd9db420f6c8029b92769ec5c9 || CRC32::18757187 || CRC16::5CD5 || HMAC_SHA1::DA812239133E14BB5356D81F7EDEEDB7B74E7D15
| <pre> set product mode (ret = 0)</pre> || ||  
|-
|-
| 1.82&nbsp;RETAIL/CEX-DISK      || MD5::6a4af7814935980c72487ec3d7d55e50 || SHA1::131fd6c01187ab0c7bcdbf9854f0c6ad588f1573 || CRC32::2F8DA7ED || CRC16::AFE9 || HMAC_SHA1::DA812239133E14BB5356D81F7EDEEDB7B74E7D15
| <pre> Total Elapsed time = 230556 msec</pre> || ||  
|-
|-
| 1.90 RETAIL/CEX          || MD5::bcefc8569ae4c2f4b7c09fd52f728c02 || SHA1::cbc6a0347abe558c54864193e42752190f802050 || CRC32::4933F5BB || CRC16::EA4D || HMAC_SHA1::91D2096371FA509D2A1380872417DFEAC616750A
|}
 
== old crossgrading Retail/CEX to Debug/DEX ==
'''Note'''<br />
For this to work your system must be below or at 1.80 for the 1.80 debug update and below or on 2.01 for the 2.15 debug update. Just use the next version up from your current firmware version for the retail update.
 
It's not very usefull, esp. nowadays, added for historic reasons
 
===How to install debug firmware on retail PS3===
old source: <span style="text-decoration: line-through;">http://www.ps3hax.net/other-misc-tutorials/4808-tutorial-how-install-debug-firmware-retail-ps3-partially-hdd-swap-method.html</span>
 
====Tools needed====
* 1 PS3 system
* 2 PS3 hard drives that are the same size
* 1 retail firmware upgrade
* 1.80 Or 2.15 debug firmware
 
====Instructions====
 
# Format both hard drives on the PS3 system.
# Download a debug PS3 firmware and place it in USB stick, and start the update. This will copy all the debug firmware files to the PS3's HDD-A.
# After copied the PS3 will restart and you will see the normal update menu which prompts you to click the button to start update. Do NOT update your PS3, but power it off.
# Next remove the HDD-A, and place in the second HDD, HDD-B in the PS3.
# Download and copy a retail PS3 firmware to a USB stick.
# Again as before place USB in PS3 and update the PS3 as normal but when you get to the screen where it asks for you to press button, do that but stop when it asks you to AGREE to Terms and Condition Page.
# While the system is still powered on and on the update screen, REMOVE HDD-B, and insert HDD-A.
# After swapping the HDD's continuie to update the PS3 as normal and the PS3 will install the debug PS3 firmware=
# Go to the settings and check firmware version and there you will also see the debugging PS3 options :)
 
 
 
----
 
 
== Ancient preproduction / prototype ==
ceb decrypter (works on 0.50.004.r010, may work on others)
 
http://pastie.org/private/al9p0vkw3g0lgat2yeazw#4,11
 
  CEB-201x, DEH-R1030 etc.
 
  old SDKs contain these binairy files in \cell\target\bootrom,
  while knowledge about previous version existance can be revealed by the documentation in \cell\info\old\XXX
 
=== ebootrom structure ===
====Header====
{| class="wikitable"
|-
|-
| 1.90&nbsp;RETAIL/CEX-DISK      || MD5::15a301e410815ea9c90dc0ddb6e5c695 || SHA1::9b554b76c48642739f9c41fb6015701f578349ca || CRC32::387F3326 || CRC16::BF90 || HMAC_SHA1::91D2096371FA509D2A1380872417DFEAC616750A
! Offset !! Length !! Type !! Information
|-
|-
| 1.92 DEBUG/DEX            || MD5::be4b4cb17bad2a1fa381475d00e4a23a || SHA1::8db3a32cf51183bc3c49b23c8f855669cb5b56cb || CRC32::32682263 || CRC16::82A6 || HMAC_SHA1::A4A8C0CB4701EC7FD4C358C4A86DF0B3EE67BF67
| 0x0 || 0x4 || unsigned long || Unknown
|-
|-
| 1.92 RETAIL/CEX          || MD5::0f99147438936578951dd9d3f514000a || SHA1::9b554b76c48642739f9c41fb6015701f578349ca || CRC32::CDD201B6 || CRC16::AB9B || HMAC_SHA1::C7EBD2128E1655AA89689BF80DBDC48A31A74B22
| 0x4 || 0x4 || unsigned long || File Count
|-
|-
| 1.92 TOOL/DECR            || MD5::21460d2710f2b0910f0caf6e0213cea3 || SHA1::c99d8d91084665d4bef38cab32f2b2f96216c6a8 || CRC32::B670C4F6 || CRC16::ABDB || HMAC_SHA1::AF8ECCED76CC61542DD3C4F3BCA3BC640297CCA4
| 0x8 || 0x8 || unsigned long || File Length
|-
|-
| 1.93 RETAIL/CEX          || MD5::9c95692d4dd1c1e17c2b0ce5dcaebba1 || SHA1::417e133e07ad0d1f746c32d9f8a6c299b41bce35 || CRC32::DA8CB42D || CRC16::91E8 || HMAC_SHA1::08C4189614C4AA82087B4AAE87F8270BBB485AEC
| 0x10 || 0x30 * '''File Count''' || '''File Table''' || File Table
|-
|-
| 1.93&nbsp;RETAIL/CEX-DISK      || MD5::fa45c168f87f2f42e91675cda9f79cc7 || SHA1::dfcc94dfe4208ff09ea8e084e0f8725235698b8f || CRC32::96AFC96E || CRC16::5A75 || HMAC_SHA1::08C4189614C4AA82087B4AAE87F8270BBB485AEC
|}
====File Table====
The file table consists of a number of file entries determined by '''File Count''', with the format below:
{| class="wikitable"
|-
|-
| 1.94 RETAIL/CEX-DISK      || MD5::f172f9bd37ca3e779dfaaf20ebfe632b || SHA1::64a98bdd2643448a9b9eb48f5d7bac3c228a168b || CRC32::77396C29 || CRC16::DDF7 || HMAC_SHA1::3E2B91F45C34435BC46D0E94344CFB734D6CF963
! Offset !! Length !! Type !! Information
|-
|-
| 2.00 DEBUG/DEX            || MD5::42e46630761b927432b997ebf54b5561 || SHA1::f192c779ed74ecbed12d4e3e2c5a634a013d7de0 || CRC32::A2ED368E || CRC16::8D4D || HMAC_SHA1::914B539B66E5CF0D77EC467CD0BD0094F8010352
| 0x0 || 0x8 || unsigned long || Data Offset
|-
|-
| 2.00 RETAIL/CEX          || MD5::f9df10bb57cdeeef8395c39415f54965 || SHA1::adf17bce368d9b93491280a9703f8ccc826a6df2 || CRC32::9AD814A1 || CRC16::4C38 || HMAC_SHA1::A2A0F11B5D6EA95698FCB48EC0851D173EF8667F
| 0x10 || 0x8 || unsigned long || Data Length
|-
|-
| 2.01 RETAIL/CEX          || MD5::1d8e69249aa1a5593307cf7d8ca8a331 || SHA1::ed02e584900899e4d3b805b8c2c49013c8b140c8 || CRC32::5FE80672 || CRC16::E629 || HMAC_SHA1::0F0E95D599A830D629539DF37C0BF44A2E3F4F32
| 0x20 || 0x20 || unsigned long || Data FileName (see below)
|}
====Filename IDs====
{| class="wikitable"
|-
|-
| 2.01&nbsp;RETAIL/CEX-DISK      || MD5::13eb4a6d72ddbe1e43a637bdea424e48 || SHA1::b292f1ae622429aa01ac83da43d4cb85ab331c6a || CRC32::D9387BF0 || CRC16::CD7 || HMAC_SHA1::0F0E95D599A830D629539DF37C0BF44A2E3F4F32
! File Entry ID !! Filename
|-
|-
| 2.10 DEBUG/DEX            || MD5::c614ec1e0daad8212b9a893af90fbcf1 || SHA1::b020eb59aaa3a85c4be54bbdbd51eff42e5765a1 || CRC32::3B6E7ECB || CRC16::9187 || HMAC_SHA1::AE8F44489B4952767EA9B5A196183C6F2C8033F6
| 0x1 || sdk_version
|-
|-
| 2.10 RETAIL/CEX          || MD5::08393f1bd8e91589c95837142caf0a58 || SHA1::50abf8f325f5820438bfe94d78b043f141deaf89 || CRC32::FA76AB49 || CRC16::F117 || HMAC_SHA1::DFBF87275D569727AAFF22AD6EB209BD87E4D78B
| 0x2 || version.txt
|-
|-
| 2.10&nbsp;RETAIL/CEX-DISK      || MD5::9d3477d4bf6fd683e6ee4bbeab58d462 || SHA1::796f4771b95d003bb4d6d8a8b2434279b23f6085 || CRC32::AAAB71BC || CRC16::DBF8 || HMAC_SHA1::DFBF87275D569727AAFF22AD6EB209BD87E4D78B
| 0x3 || ros (''CORE_OS_PACKAGE.pkg'')
|-
|-
| 2.15 DEBUG/DEX            || MD5::36b23713abccf0f3cec0e514ba8ac0d9 || SHA1::afe1016d413a87e07d76d1c399b1c4f21678ca75 || CRC32::87AAE9E5 || CRC16::2A31 || HMAC_SHA1::818119F1BB5EDBD2FFABFE0A661E34AAE55E0174
| 0x4 || trvk_prg
|-
|-
| 2.16&nbsp;RETAIL/CEX-DISK      || MD5::73fe70e0198b80f01525b6b72774af25 || SHA1::62dbf5e4512a2f067b0da5cd1d9808e08a20ae18 || CRC32::6F65BAC0 || CRC16::9DE || HMAC_SHA1::9FDA58F48BF3B5F1063621303D3EC787496E7774
| 0x5 || trvk_pkg
|-
|-
| 2.17 DEBUG/DEX            || MD5::9171f52305e1478f59be247d477be60c || SHA1::5621e8a6716fa21b25e87a09b4e2a0e20bcfb9b1 || CRC32::C4185B17 || CRC16::1768 || HMAC_SHA1::AD1FE012773763C803D25EDEF2F51495A386C114
| 0x6 || nand_update
|-
|-
| 2.17 RETAIL/CEX          || MD5::b859ca0f15fe9516d85fd0d89444ac5b || SHA1::bb578fb1a47078d5852ff91a768c68bd096ce866 || CRC32::AECB1E91 || CRC16::10B3 || HMAC_SHA1::AAB83CFF7EB56A4F9CA12120D33334254DEB0BB3
| 0x7 || bdit_firmware
|-
|-
| 2.17&nbsp;RETAIL/CEX-DISK      || MD5::9cc63afcbc1b2ddf1900ceac4d896f32 || SHA1::3f3cfa72423fe3c9222d8107131069690a60c628 || CRC32::F67BC6A5 || CRC16::6798 || HMAC_SHA1::AAB83CFF7EB56A4F9CA12120D33334254DEB0BB3
| 0x8 || bdpt_301r_firmware
|-
|-
| 2.20 DEBUG/DEX            || MD5::1e1c45341d152fc554cddbd091729da8 || SHA1::100843290fb3c8296ad9e53a0e411a27addc9424 || CRC32::12954352 || CRC16::498F || HMAC_SHA1::51FD993CF38A5A43C9AB94D69ED1DAB26B23846C
| 0x9 || bdpt_303r_firmware
|-
|-
| 2.20 RETAIL/CEX          || MD5::d33eb3ef5721bc940ca29b4c80b96bde || SHA1::4bfb597b766bd6b99c6612963519bce9a4e1ec7b || CRC32::D82E6A4A || CRC16::8C87 || HMAC_SHA1::0D2D98C983F23B128358759C0F81DE23D7B6EE2C
|}
===== bdit_firmware / bdpt_301r_firmware / bdpt_303r_firmware / nand_update / ros / trvk_pkg / trvk_prg =====
======Header======
{| class="wikitable"
|-
|-
| 2.20&nbsp;RETAIL/CEX-DISK      || MD5::8129880df87704e9aa84740af3afcb23 || SHA1::0022412e0f12dfaf6d1236a89c4cab94c9bcf720 || CRC32::98937A29 || CRC16::E167 || HMAC_SHA1::0D2D98C983F23B128358759C0F81DE23D7B6EE2C
! Offset !! Length !! Type !! Information
|-
|-
| 2.30 DEBUG/DEX            || MD5::0f0dd5dd43d69bf54f1adc3cd1abfaeb || SHA1::c84d8f8eb667d5c67180e77ac8155144a1c304e4 || CRC32::AC8A0152 || CRC16::E5C2 || HMAC_SHA1::3A6140CE6D21B6FB391A575004C8D1E5CA796717
| 0x0 || 0x4 || unsigned long || Unknown
|-
|-
| 2.30 RETAIL/CEX          || MD5::dd2e675fce5d2eb28ca93bc32edb3de6 || SHA1::fb639b3ed4e7cd5c457855cf1c9b59e06c05c87a || CRC32::811F7B02 || CRC16::9696 || HMAC_SHA1::5ADB88B2B83C89DB0EA01E56A4D7DB4769A311B4
| 0x4 || 0x4 || unsigned long || File Count
|-
|-
| 2.30&nbsp;RETAIL/CEX-DISK      || MD5::b34951b1c3a181811b11238204044493 || SHA1::999a238c0553db6129c5bb89982ed190ebee2867 || CRC32::908063EF || CRC16::2DDD || HMAC_SHA1::5ADB88B2B83C89DB0EA01E56A4D7DB4769A311B4
| 0x8 || 0x8 || unsigned long || File Length
|-
|-
| 2.35 RETAIL/CEX          || MD5::db48cbcde359982c065c2f5503204b67 || SHA1::cef64aae9f27914f1078046f5d3fd309d2e92251 || CRC32::CDE621B7 || CRC16::7096 || HMAC_SHA1::DF22B91021C3649912DC70DB6FAACF766DE61DAB
| 0x10 || 0x30 * '''File Count''' || '''File Table''' || File Table
|-
|-
| 2.35&nbsp;RETAIL/CEX-DISK      || MD5::3e4fce1a5648997898300937d081e901 || SHA1::7dc086684ba8cb061e43aba5c31f574179a1f1f8 || CRC32::B384203E || CRC16::40C5 || HMAC_SHA1::DF22B91021C3649912DC70DB6FAACF766DE61DAB
|}
======File Table======
The file table consists of a number of file entries determined by '''File Count''', with the format below:
{| class="wikitable"
|-
|-
| 2.36 DEBUG/DEX            || MD5::f47aa0788201c60c32963e38f1763d4b || SHA1::ea600e94dd19725b5a7d02e861ba8b6b755c0262 || CRC32::25753136 || CRC16::1A97 || HMAC_SHA1::220D82307DA1B92B5AB54665C67AEFE734EB3CC8
! Offset !! Length !! Type !! Information
|-
|-
| 2.36 RETAIL/CEX          || MD5::0274382cb3e21aa90e319eba358588c6 || SHA1::f46d5db533590f00d14e1cd739c10fd99e219d5e || CRC32::909DD1F8 || CRC16::5613 || HMAC_SHA1::60430385D9FE540B71C3F6BF6BE42F00AE49EB62
| 0x0 || 0x8 || unsigned long || Data Offset
|-
|-
| 2.40 DEBUG/DEX            || MD5::57536eaaecf38bff5d9e69ec41ba7df1 || SHA1::9a66a816b326d12b128ea9cd33917bfde7abd0b2 || CRC32::12AE33C8 || CRC16::7484 || HMAC_SHA1::57E083777F6A5B60D869840EFD33B49365BA25E8
| 0x10 || 0x8 || unsigned long || Data Length
|-
|-
| 2.40 RETAIL/CEX          || MD5::96e9def601672c5abcbb4604bb2346f1 || SHA1::4e399dbdaa8dfe87d008213f9e9a7b456c47fa01 || CRC32::F4413D1C || CRC16::CD8F || HMAC_SHA1::F1FEF8E442586D1182D2AFD12854C4B370AAA7FC
| 0x20 || 0x20 || unsigned long || DataName<br />
* bdit_firmware -> BDIT_FIRMWARE_PACKAGE.pkg
* bdpt_301r_firmware -> BDPT_FIRMWARE_PACKAGE_301R.pkg
* bdpt_303r_firmware -> BDPT_FIRMWARE_PACKAGE_303R.pkg
* trvk_pkg -> RL_FOR_PACKAGE.img
* trvk_prg -> RL_FOR_PROGRAM.img
* ros -> CORE_OS_PACKAGE.pkg
* nand_update -> NAND_UPDATE.pkg.[01]-[28]
|-
|-
| 2.41 DEBUG/DEX            || MD5::0c4b9b67a9e6ed4f75bff57eb94c2b0b || SHA1::c31775c6975a5e418992339676b878541f6da811 || CRC32::93860C41 || CRC16::DA2F || HMAC_SHA1::EE170E3804468D9E71E3F85CB3D39A53E8DDF088
| 0x40 || '''Data Length''' || unsigned long || SCE signed package data
|-
|-
| 2.41 RETAIL/CEX          || MD5::67c660325b0b97acdeda6c0913dc1f74 || SHA1::5aa877ff1368c83d30f90c4a5f64904e6f06e58a || CRC32::3B04F1FC || CRC16::D36F || HMAC_SHA1::AEE1A96018CA715A9BFAE13CE8F4FE46567B89EF
|}
|-
====== CORE_OS_PACKAGE.pkg ======
| 2.41&nbsp;RETAIL/CEX-DISK      || MD5::f7d2330ce9162ea512f8474c81a49460 || SHA1::c32b24e8d6ca080d31680e8fc21fff168492c1c8 || CRC32::EE2C843C || CRC16::7ED0 || HMAC_SHA1::AEE1A96018CA715A9BFAE13CE8F4FE46567B89EF
{| class="wikitable"
|-
|-
| 2.42 DEBUG/DEX            || MD5::3ef6023ccff3d7656665162495d25f5d || SHA1::2d64ead7ba5213c1c3fd83f4a1187654687058a8 || CRC32::FDF8213D || CRC16::44BE || HMAC_SHA1::4F198C97C143B9DAF492A56703D2F09107F9091A
! File Entry ID !! Filename
|-
|-
| 2.42 RETAIL/CEX          || MD5::60a6c36e2dd2000b3fda3205428665dc || SHA1::1acc37f4eb6f35bb7b79e24b8d8cc490040ef0ea || CRC32::21C9D3F2 || CRC16::ECDA || HMAC_SHA1::7E1AFE58B57BD71FCE203643C5285B1074F972F2
| || aim_spu_module.self
|-
|-
| 2.42&nbsp;RETAIL/CEX-DISK      || MD5::3637aa0bf185d050b7550c4140c76f3a || SHA1::d5cd94d1797e4a261e0751eb27df654eee581cbc || CRC32::FF66AF3 || CRC16::B4D4 || HMAC_SHA1::7E1AFE58B57BD71FCE203643C5285B1074F972F2
| || appldr
|-
|-
| 2.42 SHOP/SEX            || MD5::8a07b080e7812eb5063c5d449fa67ac8 || SHA1::                                        || CRC32:: || CRC16:: || HMAC_SHA1::
| || creserved_0
|-
|-
| 2.43 RETAIL/CEX          || MD5::da62cbc7eafde9f6792b8a76a4aef004 || SHA1::6e206243d27c1c5232890c6568dd3121320dfba9 || CRC32::82CE3C47 || CRC16::93BF || HMAC_SHA1::A67344219CEA72E679BA3B2852DD793EAF2EAB3E
| || default.spp
|-
|-
| 2.43 RETAIL/CEX JIG      || MD5::1c4baa950f6d74d65742fc77c2470341 || SHA1::8caddcd518ab2ad59f88865c932b1b53bef6433c || CRC32::1128C134 || CRC16::DDD0 || HMAC_SHA1::46A336B7EA1ACDEF54709BB6905A0E217BC19099
| || isoldr
|-
|-
| 2.50 RETAIL/CEX          || MD5::823ab63c96d570510b254a80755df446 || SHA1::61bcdff915a88596902d81a756351cb6348a78c3 || CRC32::21F30C8 || CRC16::813A || HMAC_SHA1::052123107A61682F9C82AA7FD820FAEA18AB6042
| || lv0
|-
|-
| 2.50&nbsp;RETAIL/CEX-DISK      || MD5::576413892da8d248ef25701b20b4b7a1 || SHA1::9e7c47851ce010f3534a22a3392b9cead735fab5 || CRC32::18CDF322 || CRC16::5807 || HMAC_SHA1::052123107A61682F9C82AA7FD820FAEA18AB6042
| || lv1.self
|-
|-
| 2.51 SHOP/SEX            || MD5::252d34d7cdd598ba95ad0fe5662bb60b || SHA1::                                        || CRC32:: || CRC16:: || HMAC_SHA1::
| || lv1ldr
|-
|-
| 2.52 DEBUG/DEX            || MD5::ea6b021f6e4cbb69fa46fb9d9845078f || SHA1::123aa42642f2c069d997b159f8609253eb8a53d5 || CRC32::5D7B137 || CRC16::6986 || HMAC_SHA1::A456643C567048EF934FD41729A569E971CF1D2F
| || lv2_kernel.self
|-
|-
| 2.52 RETAIL/CEX          || MD5::e9cd7c268667ee695a708bf00c6853d8 || SHA1::78d91ef41b399897ff438034aa15b187d29d5f8f || CRC32::270F4B14 || CRC16::6C80 || HMAC_SHA1::D7A99622183C97591B4AD33C082B78D969A3272A
| || lv2ldr
|-
|-
| 2.52&nbsp;RETAIL/CEX-DISK      || MD5::d575a627aefffca7323c7b5df2b6672e || SHA1::b39c956cc5d4b71a054bbd196580a215faa9b920 || CRC32::CE70719F || CRC16::B2F4 || HMAC_SHA1::D7A99622183C97591B4AD33C082B78D969A3272A
| || mc_iso_spu_module.self
|-
|-
| 2.53 DEBUG/DEX            || MD5::269b87f8f8203128c05cddbaf0ba187d || SHA1::c913bf5f056ac1b725d09813b472672e1afa1f6f || CRC32::FA875953 || CRC16::1ED4 || HMAC_SHA1::5E06F430812AFB6C22BD88ADD15F11EEC786F815
| || me_iso_spu_module.self
|-
|-
| 2.53 RETAIL/CEX          || MD5::5b0e9d62ff6e9edc796db9a2916824f0 || SHA1::30050179863704e2d3c4e8032fa00bfa4df4ab51 || CRC32::F85FA29 || CRC16::94B7 || HMAC_SHA1::7094545B22013A7BA1DD3BD56542A86C760BD0AD
| || rvkldr
|-
|-
| 2.60 DEBUG/DEX            || MD5::ba37e05fd07b7ad998718e279cf3824e || SHA1::9c45fdb997844c21b9b3667f12cd62da7e88825c || CRC32::814EBFED || CRC16::9748 || HMAC_SHA1::FB54F6C85803A3ECF890186FF22FC8F6AEE96121
| || sb_iso_spu_module.self
|-
|-
| 2.60 RETAIL/CEX          || MD5::043067d8624040f9f3f1a8dc2e662bce || SHA1::0753ae458e0c94ea0f16e20324ac6b397a45b33a || CRC32::E405C536 || CRC16::C5DA || HMAC_SHA1::B1611B86B218AD18883A0547AA39A04232743191
| || sc_iso.self
|-
|-
| 2.60&nbsp;RETAIL/CEX-DISK      || MD5::e39cbd60e584c1ce363407918ae5f076 || SHA1::c691afdd25c575fa78eebec1e61dc0b763646926 || CRC32::E96DF95D || CRC16::C45 || HMAC_SHA1::B1611B86B218AD18883A0547AA39A04232743191
| || sdk_version
|-
|-
| 2.70 DEBUG/DEX            || MD5::afd11f0158ee7230b95929f59d999c4d || SHA1::824846af35876cb203b53fc7cb421424d12654cd || CRC32::9BE45ED9 || CRC16::5643 || HMAC_SHA1::B2547D4FA7C14D5557A447989DB9BC43D1BC23CE
| || spp_verifier.self
|-
|-
| 2.70 RETAIL/CEX          || MD5::3352adc32e39ec5f7b4cdeb8b861052a || SHA1::75049536382808b734d6c9c2cd838358df0aab0f || CRC32::2224B62A || CRC16::F3B || HMAC_SHA1::5DF12C6D47773B1BECE9CB7300361798B8CF3767
| || spu_pkg_rvk_verifier.self
|-
|-
| 2.76 DEBUG/DEX            || MD5::0afa6ec363beab79155162070486dd02 || SHA1::6f26f397d6977f0028ae07f80da4c8d3efa54864 || CRC32::CDA8B489 || CRC16::6EBD || HMAC_SHA1::05200CDC0B853D1ED2113E95BA045816C4A7589B
| || spu_token_processor.self
|-
|-
| 2.76 RETAIL/CEX          || MD5::d6856f234f3066b94dc88ab430a63bfb || SHA1::0bc9c54add04a7adabc90e3da5a4fabba9a1e6c5 || CRC32::36F59E13 || CRC16::42D || HMAC_SHA1::0B9AF264D831057472636333F339BFE226848E03
| || sv_iso_spu_module.self
|-
|-
| 2.76&nbsp;RETAIL/CEX-DISK      || MD5::7698f1d1d0a4601aa6fe72f784dea498 || SHA1::33a31ca86f8a69845263139a6bb1803edc7521ea || CRC32::2CDEC96C || CRC16::FFD9 || HMAC_SHA1::0B9AF264D831057472636333F339BFE226848E03
| || sys_init_app.self
|-
|-
| 2.80 DEBUG/DEX            || MD5::196b9eb2e1f1c2c8ab16ddfda876f579 || SHA1::907b8d38ef9e24e97350f3cbac1492116785b31f || CRC32::1F527852 || CRC16::6EAE || HMAC_SHA1::B1349CD11D1D388910EF90DB4302A0847DB29480
| || sys_init_ios.self
|-
|-
| 2.80 RETAIL/CEX          || MD5::d69362743142953be7cb44a5fd5cc888 || SHA1::1bca8ac0573f55217cd5b531f9829ef7f712c349 || CRC32::E28A3FED || CRC16::8822 || HMAC_SHA1::A40FD1CC06772021913A308760FBD0933AC9A061
|  || sysctl.txt
|-
| 2.80&nbsp;RETAIL/CEX-DISK      || MD5::8f8da49b69a73ef0ae4807d367ea7c3d || SHA1::3758ee3505481ba0d2f3d3fb86326ccf0876bf67 || CRC32::9DE7B260 || CRC16::C79E || HMAC_SHA1::A40FD1CC06772021913A308760FBD0933AC9A061
|-
| 3.00 DEBUG/DEX            || MD5::c0427348a618021050a74c60fadd6d5f || SHA1::82a7ec538c46eeee7994597d9e18c2943321c7a1 || CRC32::E0EB1500 || CRC16::6618 || HMAC_SHA1::8E09D4B789650935983390D5838711E5CB6712BD
|-
| 3.00 RETAIL/CEX          || MD5::c049de7a6a4b03d53e7f9fde04e0fc08 || SHA1::3e439744e6905231ca42c2fd33e5e5c568303744 || CRC32::33DF6375 || CRC16::B935 || HMAC_SHA1::ADDE78466CF9B342C00A216895E049C9E2919049
|-
| 3.01 DEBUG/DEX            || MD5::052ced72a250fd459fae757152d6e527 || SHA1::011aa215b8d1542cbe8a04df9a5584db5eb7b380 || CRC32::C0B3FF06 || CRC16::6077 || HMAC_SHA1::04D80CD56BE9BCFF357E3ACD787109FC553FAEBA
|-
| 3.01 RETAIL/CEX          || MD5::6d956116eb5094564359339f60650f56 || SHA1::a4e3962bb1bf845df93f322adb014c8c7d10d536 || CRC32::88873BB7 || CRC16::CDBF || HMAC_SHA1::6B47B00899392B9480CBB1B96C5E5829EE58E17E
|-
| 3.01&nbsp;RETAIL/CEX-DISK      || MD5::59e7c4e39af57db067c65814a9d33f0b || SHA1::be57e8d752bc05f61b08390bfd223bf8820692f8 || CRC32::3736F646 || CRC16::5415 || HMAC_SHA1::6B47B00899392B9480CBB1B96C5E5829EE58E17E
|-
| 3.10 DEBUG/DEX            || MD5::2d2dbffd1c1cd5549d913d159ef65e8c || SHA1::2f652d0dedbef8bfc400eedf93af5ac8e77d37d9 || CRC32::AD460F4 || CRC16::FF30 || HMAC_SHA1::334D92B452503C7305592A7BE15C6DEBAAC0302C
|-
| 3.10 RETAIL/CEX          || MD5::70296b36d559e35752ae6efd04f702c0 || SHA1::87bfeb3dc793169bd793e5e5e75ab8aa5a364cab || CRC32::EA4430DC || CRC16::DED6 || HMAC_SHA1::3640BBD1CD2738C81A52995DEB12B8ED908691B6
|-
| 3.15 DEBUG/DEX            || MD5::3f40abc76dfad368d3f4411d7d92b475 || SHA1::0d2a15102a142203658db14df554643945817244 || CRC32::7CCB04C0 || CRC16::211C || HMAC_SHA1::59D38EF08A176BC33090A8B768B6AAF1ACCC9BD5
|-
| 3.15 RETAIL/CEX          || MD5::54ee80e14e479f8351a988eb9a472072 || SHA1::fc4e891e84333f9b37ff7f253eca165aa416c6ad || CRC32::E82D9526 || CRC16::7DB || HMAC_SHA1::D87AFAD8C786E0EEE83C0C96EF61492D78F37980
|-
| 3.15&nbsp;RETAIL/CEX-DISK      || MD5::80d7f3ec2cfebf582926228ac3a11e21 || SHA1::7fe68e92353bac93225272f27bf2deb9ab6366a6 || CRC32::5D5C55CB || CRC16::D078 || HMAC_SHA1::D87AFAD8C786E0EEE83C0C96EF61492D78F37980
|-
| 3.20 DEBUG/DEX            || MD5::b21950add14020561c5426b2c974a9a7 || SHA1::93d14576f2888d1193b80a437e1551258b39649c || CRC32::ECE1AADD || CRC16::3E63 || HMAC_SHA1::827C0276607C53B276A5AD231A40F5DEAAD4C199
|-
| 3.21 DEBUG/DEX            || MD5::b43ee87e445d7e0077a974a6d7c16399 || SHA1::4efa7aea94727ac9e9b2442b1ed032a555351797 || CRC32::F3F3A88A || CRC16::6A36 || HMAC_SHA1::EE3BF139069844FB8A5A9EAAC88A5984BAA2CC06
|-
| 3.21 RETAIL/CEX          || MD5::3a08ef6164a7770ae3e7d5b9f366437a || SHA1::ccf002575ca03b2a48af2b2303732d0b288a638e || CRC32::CD520F90 || CRC16::51DE || HMAC_SHA1::E993F5210B9074071985AC8A706C498629F3FE88
|-
| 3.21&nbsp;RETAIL/CEX-DISK      || MD5::ea615a368a710f961b6a67eb1a6cc16a || SHA1::a9763705f9dc443e48c8b4a333b63247c5b2b570 || CRC32::EBE25BB8 || CRC16::2074 || HMAC_SHA1::E993F5210B9074071985AC8A706C498629F3FE88
|-
| 3.30 DEBUG/DEX            || MD5::133296059ced19cfb93f8e0bb4b5c6de || SHA1::e3ff61545eb3b1396adce5029e9c6a083e3f803d || CRC32::6B31B61A || CRC16::A429 || HMAC_SHA1::233E3B7400AF95A6356F723B4F1EE82879ED9420
|-
| 3.30 RETAIL/CEX          || MD5::6bdf1b2409d705a0136c40746c62e85d || SHA1::c639707de85470fd222a31fb89499192c65151b7 || CRC32::14345D8 || CRC16::F92 || HMAC_SHA1::CFD1BC6F73B0709170AD4F02F903A2D9D04FE75C
|-
| 3.30&nbsp;RETAIL/CEX-DISK      || MD5::905c5ea4b3171bcb99a475118eda047f || SHA1::ad3893712c988c24abdda5e5777f9f0ebdd861fa || CRC32::323DB0F7 || CRC16::909D || HMAC_SHA1::CFD1BC6F73B0709170AD4F02F903A2D9D04FE75C
|-
| 3.40 RETAIL/CEX          || MD5::88b2f8d458119f666c97d893c17201cd || SHA1::37dc3afc3e5b7bfdf00c22d3043395185dd551b0 || CRC32::9F86AC19 || CRC16::4EC4 || HMAC_SHA1::813F084DAE9C2AA486E7EF248E60E78713CB8B61
|-
| 3.40&nbsp;RETAIL/CEX-DISK      || MD5::bcef6f6ba312e2ac1cbd25f0a9c22507 || SHA1::9f5d29da1c03e4d39f9e4d682e1028117d1a69bb || CRC32::76473B7 || CRC16::F4C9 || HMAC_SHA1::813F084DAE9C2AA486E7EF248E60E78713CB8B61
|-
| 3.40 DEBUG/DEX            || MD5::b16ced62f6fa925885cd64380ffeb699 || SHA1::3671b2aab115f8165d0cbc6120a22cb14fcc9dfa || CRC32::      || CRC16::    || HMAC_SHA1::
|-
| 3.41 DEBUG/DEX            || MD5::2ed02e302dbbbcbb35cac6a661eea561 || SHA1::5066d3af680b721d5c3c26c562e55fa7a1ede07f || CRC32::5BBF87F5 || CRC16::16DF || HMAC_SHA1::098B0BD889C998E289C25F254E4E883871114D83
|-
| 3.41 RETAIL/CEX BAD      || MD5::00c835be718fc3d5f793e130a2b74217 || SHA1::c1366a9847034f2581559163cfd04d057a930c74 || CRC32::A57A2958 || CRC16::1740 || HMAC_SHA1::D6EAC01D3472ED686D85F5A36BFE7178D4AA2825
|-
| 3.41&nbsp;RETAIL/CEX-DISK      || MD5::949fcbec0187c2c493694ff7ebc733f0 || SHA1::cfb1b45b4f7558584d9a0f3882741e6a8fa71080 || CRC32::BAA133A || CRC16::1CE3 || HMAC_SHA1::A5A6AE8C67099156BF440C2537AC24436677C765
|-
| 3.41 RETAIL/CEX FIX      || MD5::e07d2b84c9e9691c261b73e5f1aada20 || SHA1::e7f522ba85c8fc780b8bcbaff6c70d36487e2e45 || CRC32::FC4C6497 || CRC16::2850 || HMAC_SHA1::A5A6AE8C67099156BF440C2537AC24436677C765
|-
| 3.41 TOOL/DECR            || MD5::28caaa7796e3cb7ad6500d989cf38b71 || SHA1::6251a7af2abadf899f1100bc212aecef78a49d19 || CRC32::96106F79 || CRC16::C81E || HMAC_SHA1::1C9EAF415BA2F247D80783DFAE40CCAB68F53E40
|-
| 3.41 RETAIL/CEX PSJB      || MD5::6f1ef9144c43c9a6f00f7ee7464a6689 || SHA1::f3c19e06c0e7b8cc550bb3244f5f88356173fa6d || CRC32::8A1E7548 || CRC16::7FFC || HMAC_SHA1::9F7001A6A93AE03A61ED7CFB7156A68DF0740708
|-
| 3.41&nbsp;RETAIL/CEX-PATCH    || MD5::03c376ef09222339531c15a3971ddabb || SHA1::d8d732ddcd3855c7dc63fbb2d6a3f07271107d3e || CRC32:: || CRC16:: || HMAC_SHA1::056FA20CC111BB54C8282CF6B473B2FE06AE453B
|-
| 3.41 SHOP/SEX            || MD5::561b924d2b388fb920f3f7ab12c679ca || SHA1::a216261e3eac55914f8fb5a1a4940ab557c85a17 || CRC32::59899B59 || CRC16::5D23 || HMAC_SHA1::2EF14E6EE9A574CC5602EBD502453309C2BB67A6
|-
| 3.42 RETAIL/CEX          || MD5::6ba866514589155ab094099a9f358ffd || SHA1::62788f6e1555ed62d32591cab463c59ce393e870 || CRC32::DF869675 || CRC16::2E50 || HMAC_SHA1::4797F09270534D22AF2704A19330A7EA45BD175F
|-
| 3.42&nbsp;RETAIL/CEX-DISK      || MD5::d4a54d6dac5ee949f4491b219783bd6f || SHA1::56555c31beb79fdadec127845b428e4eb5aaa4da || CRC32::20AC0CA || CRC16::4BA5 || HMAC_SHA1::4797F09270534D22AF2704A19330A7EA45BD175F
|-
| 3.42&nbsp;RETAIL/CEX-PATCH    || MD5::f007b6488895021b81ecdf0df52e1e06 || SHA1::686469b05b066f2aa827013240fd9ff4395ca46d || CRC32:: || CRC16:: || HMAC_SHA1::2C29E90B6D43F580267E2D10A1A3F3A1513CE24F
|-
| 3.50 DEBUG/DEX            || MD5::0e4d8bdbba47382c2be4242f3327e1a1 || SHA1::cbd3ec3e3421c9d3d35e36aba71b97654dabb78c || CRC32::AEC71A1B || CRC16::53BA || HMAC_SHA1::018126EB303EFAF42963D9839E159D2EB82773ED
|-
| 3.50 RETAIL/CEX          || MD5::0215e26d1dadeb950471a9c3397a140a || SHA1::b819861f75d50882142cbec8af54b00012bc049d || CRC32::ACC5FC18 || CRC16::55F5 || HMAC_SHA1::C9C4A4C8F98D11C5E55D06AFE40B8416FFE18BAB
|-
| 3.50&nbsp;RETAIL/CEX-DISK      || MD5::40b4b53f4900d088b90de328ae2b3989 || SHA1::42b08cdfc4c0ea2acbfafa921364b9b547e2de12 || CRC32::4A5C07E6 || CRC16::3611 || HMAC_SHA1::C9C4A4C8F98D11C5E55D06AFE40B8416FFE18BAB
|-
| 3.50 SHOP/SEX            || MD5::6f74bf20342289277f2e1dbb6d09377e || SHA1::b9a9a7cf2fbdbc836d05ece0b19e2e5b5c5a3457 || CRC32::81D1FD09 || CRC16::39E5 || HMAC_SHA1::1E569C87268A2C867AD16353FC7F8255F4300C0E
|-
| 3.55 DEBUG/DEX            || MD5::3b6ebc594de5586b5e289225f6d3164a || SHA1::671d90d77c211e350838b3d6428eb0827fc3f7fb || CRC32::1768BBB3 || CRC16::D698 || HMAC_SHA1::19E9A09AC2A22338C6FC7D14E2F102364E05851F
|-
| 3.55&nbsp;DEBUG/DEX&nbsp;DOWNGRADER || MD5::efa62388ee8d2592727ddbdce9b4bec8 || SHA1::9d28c2533c36c0eff801a41f74632182d408a5a9 || CRC32::F49A0B7E || CRC16::45D2 || HMAC_SHA1::289154362B4A1BC0D34A3815DE7B480B264188FF
|-
| 3.55&nbsp;DEBUG/DEX&nbsp;20101126d  || MD5::047671664d9241c04d44278944e153d9 || SHA1::8ede02636f0dc8905616331bbc6919bc642b556b || CRC32::1A8B3AEE || CRC16::A42E || HMAC_SHA1::CC7B8DB8425F657B7C29E1550EE04059EBB9E812
|-
| 3.55 RETAIL/CEX          || MD5::ca595ad9f3af8f1491d9c9b6921a8c61 || SHA1::a3a0d1c61e17c6a58a5fa247a3dbb51524329e0a || CRC32::FC0B1B98 || CRC16::A90 || HMAC_SHA1::9CBC7D85CEAF24B16BFAA360F03AA0005681EA4D
|-
| 3.55&nbsp;RETAIL/CEX-PATCH    || MD5::888743a32a40c9a1e3656fc0ef590859 || SHA1::d07b57f1c828ba45d91f06e27b1deb71779e54df || CRC32:: || CRC16:: || HMAC_SHA1::8448713FD6DB7FFDEF917B84EB9272453DC4B671
|-
| 3.55 SHOP/SEX            || MD5::a14eaf43b47e6117b6c157c75142ccd1 || SHA1::28ace1db943509092848c525746dad79b5c5a954 || CRC32::54AB0587 || CRC16::7D82 || HMAC_SHA1::A977B6661F8C85DC9F5F61272B3127692404BA8E
|-
| 3.55 TOOL/DECR            || MD5::9085da7157e92fa59157676a429a7c1e || SHA1::b9a9a7cf2fbdbc836d05ece0b19e2e5b5c5a3457 || CRC32::B20A77B4 || CRC16::5996 || HMAC_SHA1::C36454DAD84EB490B1E85436F6A61B743AE32684
|-
| 3.56 DEBUG/DEX            || MD5::a42f46b276dac43851250526a8a8cb7a || SHA1::1b516ad73f90196ba3fcc07dfc44aad09d59e122 || CRC32::1E4F2CC1 || CRC16::C9FC || HMAC_SHA1::6612C356DC7969C4FF528AA21B983F679F895928
|-
| 3.56&nbsp;RETAIL/CEX&nbsp;BAD      || MD5::6e070c96e0464e993aaf9deac3660863 || SHA1::39f38f0e5015bc20dc162c3cf731ffe39320ff3f || CRC32::A6CAF172 || CRC16::331A || HMAC_SHA1::C752AAAE505438F82AE26CCE0DDF648D411FB4AB
|-
| 3.56&nbsp;RETAIL/CEX&nbsp;FIX      || MD5::2a52196399a4b96ea568aafa65d1a27e || SHA1::c372ce26267590dc851eec66b73a162a8cac76ea || CRC32::894AB144 || CRC16::C05A || HMAC_SHA1::CD4BA19DE5A0A1F95D32379AE24594595070076A
|-
| 3.56&nbsp;SHOP/SEX&nbsp;BAD        || MD5::ec5e53bc16d1617dd05ae74907c282af || SHA1::775722df0c31393fbe717d21242ab0f3cad353f3 || CRC32::AFB0E382 || CRC16::3E0C || HMAC_SHA1::9BB8F6BD90F06B63A9D03F26485FE607AB9B2ADE
|-
| 3.56&nbsp;SHOP/SEX&nbsp;FIX        || MD5::bfcfe6e3e1a151817651928f736997f9 || SHA1::20b5695a532f483a10a0990e7fc76b07226e85dc || CRC32::5AEF9EC2 || CRC16::D0F5 || HMAC_SHA1::0BE9862C87DEC6508E67EC0A870C39D61A389AE6
|-
| 3.60 DEBUG/DEX            || MD5::d9d16378dd66aacca6ef0fc8604f9f67 || SHA1::b1f272f8fc28f8dc3cf9fb1ce49f7d2f0a1ca460 || CRC32::429612F3 || CRC16::E539 || HMAC_SHA1::AEBA0A67900C40C2920EE72ADFB8D5E30C1D7522
|-
| 3.60 RETAIL/CEX          || MD5::91ee193a2fa921a6fce780fc40236e3b || SHA1::2399ed938943e85687ed604fb19087058b050cc6 || CRC32::20A3FAFE || CRC16::C407 || HMAC_SHA1::84B1FA33976FE1F7C57B21FB5F2C1B1ECAF48646
|-
| 3.60 SHOP/SEX            || MD5::44e7b52e6423287b6c0861025bf3a377 || SHA1::bc04d3d3e800e6d881735e420e4f0cf4b778ab38 || CRC32::1FEC976D || CRC16::8D1F || HMAC_SHA1::EA646D77D89A16C3C981EC7754798C34861E7871
|-
| 3.61 RETAIL/CEX          || MD5::f446810aabec0af1340c02d852e4118c || SHA1::f3e27e0cd8e85dcb8acd326ac2764653e09bca0f || CRC32::4FE62C5F || CRC16::FEBF || HMAC_SHA1::C23CBF27966B15514CDEB8D99EFDEE4D0478983D
|-
| 3.61 SHOP/SEX            || MD5::0d56e5992872db318f94abf22073443a || SHA1::f9cea2afd7aa1cfb593cdbb738cd4fc0fb6288cd || CRC32::E421893C || CRC16::A5CD || HMAC_SHA1::A0B30A551806EA9F29BF989F7571BC0D98DEEA7F
|-
| 3.65 DEBUG/DEX            || MD5::c5e6e2d0c01d664851ff1b8b28191da6 || SHA1::                                        || CRC32:: || CRC16:: || HMAC_SHA1::
|-
| 3.65 RETAIL/CEX          || MD5::3001e6becbea7abf30fc35a7819c4478 || SHA1::3efd8c919a984de4e77b76db34467dd3524ca0b2 || CRC32::27859CD1 || CRC16::A820 || HMAC_SHA1::2F42A3867CC33209F3582DA36C0A818770473DD4
|-
| 3.66 DEBUG/DEX            || MD5::62bb8875af0ecab5d2f20dffe887feca || SHA1::d5e19a5231ee1ab9d7a40eb7211377dcb15d4336 || CRC32::BDA761E4 || CRC16::700E || HMAC_SHA1::64BD8231BF0E27919FF36144C0EA8CC3447D46EE
|-
| 3.66 RETAIL/CEX          || MD5::f4cbe2651e9a0c6115028043bdc2c5dd || SHA1::3b1d36df451903fcbf7074e18906c8fe252f7c66 || CRC32::12992856 || CRC16::FBBA || HMAC_SHA1::436B778DE7E8AC910C19FCDF21D7408769E34A9E
|-
| 3.66 SHOP/SEX            || MD5::9eb7f8bb685885e77e31da256cb2dd83 || SHA1::8b85242bf44fde4c7aa16d6f4ed124d85b145654 || CRC32::F37ACDC0 || CRC16::B769 || HMAC_SHA1::351B64ED5A636059A30E8CE4BEA3E972089F2EF0
|-
| 3.70 DEBUG/DEX            || MD5::a6c5871cd1f33f1caa77134e258174c2 || SHA1::1cd2c1bf92e5052a29b5a07dcd3837c21968b585 || CRC32::A5956971 || CRC16::1D2D || HMAC_SHA1::7FAD75BA430BDAE384349E67E4A6365FE2381077
|-
| 3.70 RETAIL/CEX          || MD5::7ee6b91bbd07dde1e65a0681de66745b || SHA1::fd8320388e58824249c058ab1bec3f7aecf92cfc || CRC32::947827A7 || CRC16::EC86 || HMAC_SHA1::712AD027443BAB509CCF57533974DE21B9159124
|-
| 3.70 SHOP/SEX            || MD5::83802a6dfa1f564b0fdd4d7ac3d4b4ab || SHA1::a3070b5948c89b6daa08bea87b1a29397e904077 || CRC32::C694BF0A || CRC16::2768 || HMAC_SHA1::9C445BF62E2E7B66B6B8E405CBB9F9F480142DAB
|-
| 3.72&nbsp;DEBUG/DEX&nbsp;BADFILE    || MD5::fb906610575f9b51f2ab8e2174f03c0d || SHA1::4ceeef8a4a805ae19e0e9ed3ba1e54fc93d353cf || CRC32::9701527 || CRC16::F676 || HMAC_SHA1::DC05B52D52A2C2E1E1301A8E8B45FE43FC172BA4
|-
| 3.72 DEBUG/DEX            || MD5:: || SHA1:: || CRC32:: || CRC16:: || HMAC_SHA1::
|-
| 3.72 RETAIL/CEX          || MD5::c7d179d273699c2e5d53e401264828f3 || SHA1::a408ca480788bdbe32ffce23277d7e7d453a0861 || CRC32::8994666F || CRC16::8B6D || HMAC_SHA1::88E98A97980985276960916ACA50AA62CA19A820
|-
| 3.73 RETAIL/CEX          || MD5::077a6a0a9abf3622373e3daa53f3ec70 || SHA1::40163d9693ae58141377a3f270b0ed956c1bcfa7 || CRC32::7CC16F1F || CRC16::A68E || HMAC_SHA1::9BE486B4357132A0C476D1A59247A101F56AC65A
|-
| 3.73&nbsp;RETAIL/CEX-PATCH    || MD5::8aaa8dd1094aafdcc582916e670ad78e || SHA1::0259d592635fc79ec95947fbdaa66fc03d395687 || CRC32::9CC44BA7 || CRC16::327D || HMAC_SHA1::B340764C22E01C65A72E4DCEB89A44F517780156
|-
| 3.74 DEBUG/DEX        || MD5::9ea76c4af7297110cf5923536d8e5c2b || SHA1::7687a01c479fd6b5596f698254161083548687b6 || CRC32::93D05126 || CRC16::99EE || HMAC_SHA1::3AADB91D43D1A1245DB18ED22193E6452919CA57
|-
|-
|}
|}


=== known updates ===


----
==== 0.2 ebootrom ====
 
==Repositories==
 
[http://pubrepo.stoker25.com/Consoles/Playstation%203/updates/ stoker25 - specialises in debug/DEX and DECR/TOOL firmwares] (self hosted)
 
 
===Quick mirror downloadlist===
''This should contain all versions posted at above repositories''
 
*http://rapidshare.com/files/460301984/PS3_102_FW_UPDATE.RAR
*http://rapidshare.com/files/460303096/PS3_276_FW_UPDATE.RAR
*http://rapidshare.com/files/460303222/PS3_321_FW_UPDATE.RAR
*http://rapidshare.com/files/460561257/PS3_355_DEBUG_ONLY_BUILD_FW_UPDATE.RAR
*http://rapidshare.com/files/3951885933/PS3_356_DEBUG_ONLY_BUILD_FW_UPDATE.RAR
*http://rapidshare.com/files/460419174/PS3_356_FW_UPDATE_2ND.RAR
 
 
==== Torrents ====
*http://burnbit.com/torrent/172647/PS3UPDAT_PUP (3.66)
*http://burnbit.com/torrent/175396/PS3UPDAT_PUP (3.70)
*http://burnbit.com/torrent/177433/PS3UPDAT_PUP (3.72)
*http://burnbit.com/torrent/179400/PS3UPDAT_PUP (3.73)
 
== To be crosschecked ==
 
Debug PS3 firmwares
 
*3.74 <!--// [http://www.multiupload.com/0670W5WGRC PS3_374_DEBUG_ONLY_BUILD_FW_UPDATE.RAR (173.19 MB)] //-->
MD5: 9ea76c4af7297110cf5923536d8e5c2b | SHA1: 7687a01c479fd6b5596f698254161083548687b6 | CRC32: 93D05126 | CRC16: 99EE | HMAC_SHA1: 3AADB91D43D1A1245DB18ED22193E6452919CA57
<!--//PUP file information
Package version: 1
Image version: 99999
File count: 9
Header length: 656
Data length: 179844904
PUP file hash : 3AADB91D43D1A1245DB18ED22193E6452919CA57
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x290
Data length: 5
File hash : 20A6EE421A8139E183B3A47C4FA14471D0FE5DE1
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x295
Data length: 264283
File hash : 367FCD28D27719525D0A11A4F2679FBF35B4681F
File 2
Entry id: 0x103
Filename : update_flags.txt
Data offset: 0x40AF0
Data length: 5
File hash : 65A0A6DA7FDB7F7A93C50F2439F6D5FE4C55AF74
File 3
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x40AF5
Data length: 5658464
File hash : 3AA09950E3350D59731ECD703A3B243A9F56E263
File 4
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x5A6255
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 5
Entry id: 0x202
Filename : dots.txt
Data offset: 0x5A8A55
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 6
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x5A8A58
Data length: 168181760
File hash : A0C15EF909F1041CFE260CEBDE28D5611EFBB20F
File 7
Entry id: 0x501
Filename : Unknown entry id
Data offset: 0xA60CA58
Data length: 71680
File hash : E1618EC3A707253A88190A90A1F9FBBD046A398D
File 8
Entry id: 0x601
Filename : Unknown entry id
Data offset: 0xA61E258
Data length: 5658464
File hash : 306FF6F4C5B8E49C2DC25E37B198154A8338B0DE
//-->
 
*3.72 PATCH <!--// [http://www.multiupload.com/YLWYM95WDS PS3 Debug Firmware Update 3.72.rar (10.93 MB)] //--> NOT PROPER!
MD5: FB906610575F9B51F2AB8E2174F03C0D | SHA1: 4CEEEF8A4A805AE19E0E9ED3BA1E54FC93D353CF | CRC32: 9701527 | CRC16: F676 | HMAC_SHA1: 0xDC05B52D52A2C2E1E1301A8E8B45FE43FC172BA4
Does not seem proper (unpacking dev_flash_001.tar.aa.2011_09_14_050233 error):
unpacking update_files.tar (00000000_0a064000 bytes; hmac: FAIL)...
unpacking spkg_hdr.tar (00000000_00011800 bytes; hmac: FAIL)...
unpacking ps3swu2.self (00000000_00565760 bytes; hmac: FAIL)...
<!--//PUP file information
Package version: 1
Image version: 99999
File count: 9
Header length: 656
Data length: 179844904
PUP file hash : DC05B52D52A2C2E1E1301A8E8B45FE43FC172BA4
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x290
Data length: 5
File hash : 8E20378674A5D312D3CF899B8818BD5DA9530F4E
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x295
Data length: 264283
File hash : 367FCD28D27719525D0A11A4F2679FBF35B4681F
File 2
Entry id: 0x103
Filename : update_flags.txt
Data offset: 0x40AF0
Data length: 5
File hash : 65A0A6DA7FDB7F7A93C50F2439F6D5FE4C55AF74
File 3
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x40AF5
Data length: 5658464
File hash : 635883F388DD46FE3560ADABDBCCC5CD94B67A7A
File 4
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x5A6255
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 5
Entry id: 0x202
Filename : dots.txt
Data offset: 0x5A8A55
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 6
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x5A8A58
Data length: 168181760
File hash : DEFC6880C983CCBB0A5E9127DDE930AB62BD1B05
File 7
Entry id: 0x501
Filename : Unknown entry id
Data offset: 0xA60CA58
Data length: 71680
File hash : 1A76D6F88E36F492583DBFC914D49E2831623255
File 8
Entry id: 0x601
Filename : Unknown entry id
Data offset: 0xA61E258
Data length: 5658464
File hash : F381421D0E990D42DEE1B10B46F877DD243D47BD
//-->
 
*3.70 <!--// [http://www.multiupload.com/P35DSI4LZ2 PS3_370_DEBUG_ONLY_BUILD_FW_UPDATE.RAR (173.18 MB)] //-->
MD5: A6C5871CD1F33F1CAA77134E258174C2 | SHA1: 1CD2C1BF92E5052A29B5A07DCD3837C21968B585 | CRC32: A5956971 | CRC16: 1D2D
 
*3.66 - http://www.multiupload.com/CRBMUMTYAX
MD5: 62BB8875AF0ECAB5D2F20DFFE887FECA | SHA1: D5E19A5231EE1AB9D7A40EB7211377DCB15D4336 | CRC32: BDA761E4 | CRC16: 700E | HMAC_SHA1: 0x64BD8231BF0E27919FF36144C0EA8CC3447D46EE
 
*<strike>3.65 – http://www.multiupload.com/O5COVUH270 –</strike> CONFIRMED FAKE  (same MD5/SHA1 pup & hash vsh.tar as CEX/Retail)
MD5: 3001E6BECBEA7ABF30FC35A7819C4478 | SHA1: 3EFD8C919A984DE4E77B76DB34467DD3524CA0B2 | CRC32: 429612F3 | CRC16: E539
 
*3.60 – <strike>http://www.multiupload.com/E8CJI28F6T</strike> (down) - unique hash for vsh.tar:687213434DA1A8E0BC4021C32E9350885B40AE3B //
 
*360.001.forDEX.release.20110303<!--// http://www.uploadonall.com/files/0YPUD7YC/PS3_360_DEBUG_ONLY_BUILD_FW_UPDATE.RAR //-->
MD5: D9D16378DD66AACCA6EF0FC8604F9F67 | SHA1: B1F272F8FC28F8DC3CF9FB1CE49F7D2F0A1CA460 | CRC32: 429612F3 | CRC16: E539
 
*3.56 – <strike>http://www.multiupload.com/9EUXP6ZZIU</strike> (down) – unique hash for vsh.tar:E46C507D3DFF7A943AD559F61519AA0E8209578D <!--// http://www.uploadonall.com/files/IVJYPXOS/PS3_356_DEBUG_ONLY_BUILD_FW_UPDATE.RAR //-->
MD5: A42F46B276DAC43851250526A8A8CB7A | SHA1: 1B516AD73F90196BA3FCC07DFC44AAD09D59E122 | CRC32: 1E4F2CC1 | CRC16: C9FC
 
*3.55 DEX Downgrader
MD5: EFA62388EE8D2592727DDBDCE9B4BEC8 | SHA1: 9D28C2533C36C0EFF801A41F74632182D408A5A9 | CRC32: F49A0B7E | CRC16: 45D2 | HMAC_SHA1: 0x289154362B4A1BC0D34A3815DE7B480B264188FF <!--//PUP file information
Package version: 1
Image version: 99999
File count: 9
Header length: 656
Data length: 170101276
PUP file hash : 289154362B4A1BC0D34A3815DE7B480B264188FF
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x290
Data length: 5
File hash : 0E460E25AAC0687D3AFCBD8C0C9363FFB9687514
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x295
Data length: 264247
File hash : AD137A28F4F28A20BB559412650D99C7FB617654
File 2
Entry id: 0x103
Filename : update_flags.txt
Data offset: 0x40ACC
Data length: 5
File hash : 65A0A6DA7FDB7F7A93C50F2439F6D5FE4C55AF74
File 3
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x40AD1
Data length: 5661656
File hash : 8DBE6CE15595261FAF019AC91B6EE95B8B23177D
File 4
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x5A6EA9
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 5
Entry id: 0x202
Filename : dots.txt
Data offset: 0x5A96A9
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 6
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x5A96AC
Data length: 158433280
File hash : CED28A0B89002C2AC7D4587B85BE76B51FAE321F
File 7
Entry id: 0x501
Filename : Unknown entry id
Data offset: 0x9CC16AC
Data length: 71680
File hash : 5591E8ACA40E5FA5468B6D86F0877E8A6D4B6D29
File 8
Entry id: 0x601
Filename : Unknown entry id
Data offset: 0x9CD2EAC
Data length: 5660160
File hash : 9866063D8DAF42FF2964DE0D7F20E92C7C1C0E3A  //-->
 
*<strike>3.55 – http://www.multiupload.com/0GOMCNU4EH – 3B6EBC594DE5586B5E289225F6D3164A</strike> (already on Wiki)
*<strike>3.50 – http://www.multiupload.com/FCREC0J64G – 0E4D8BDBBA47382C2BE4242F3327E1A1</strike> (already on Wiki)
 
*Ref.Tool DECR UpdateData.355.001d
MD5: 9085DA7157E92FA59157676A429A7C1E | SHA1: BB3A4A83D3E7576A825555FEF047B4DEF8B0168E | CRC32: B20A77B4 | CRC16: 5996 | HMAC_SHA1: 0xC36454DAD84EB490B1E85436F6A61B743AE32684
<!--// PS3_355_TOOL_ONLY_BUILD_FW_UPDATE.RAR (139.86 MB) http://www.multiupload.com/IUVA4T7UVA
PUP file information
Package version: 1
Image version: 99999
File count: 8
Header length: 592
Data length: 145209856
PUP file hash : C36454DAD84EB490B1E85436F6A61B743AE32684
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x250
Data length: 5
File hash : 0E460E25AAC0687D3AFCBD8C0C9363FFB9687514
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x255
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 2
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x258
Data length: 5661688
File hash : 76CAE611D95399B0E7FD21AC469A0FEEE8FD4600
File 3
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x566650
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 4
Entry id: 0x202
Filename : dots.txt
Data offset: 0x568E50
Data length: 0
File hash : B701CBBD3ACE82CAF2E4018E5327AA16637490DE
File 5
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x568E50
Data length: 133836800
File hash : CF61B9C46DF471FAF27A4343E293450E79B0CABD
File 6
Entry id: 0x501
Filename : Unknown entry id
Data offset: 0x850BE50
Data length: 40960
File hash : B22C9A3069906F0B6A0F320171939D236E338B3C
File 7
Entry id: 0x601
Filename : Unknown entry id
Data offset: 0x8515E50
Data length: 5660160
File hash : 5595648CF3648ED1F20BD820B5452E561D19891E //-->
 
*355.001.forDEX.release.20101126d
MD5: 047671664D9241C04D44278944E153D9 | SHA1: 8EDE02636F0DC8905616331BBC6919BC642B556B | CRC32: 1A8B3AEE | CRC16: A42E | HMAC_SHA1: 0xCC7B8DB8425F657B7C29E1550EE04059EBB9E812
<!--// PS3_355_DEBUG_ONLY_BUILD_FW_UPDATE-DECHUpdateData.355.001d.RAR (163.77 MB) http://www.multiupload.com/CM6ZV0WZ3K
PUP file information
Package version: 1
Image version: 99999
File count: 9
Header length: 656
Data length: 170101312
PUP file hash : CC7B8DB8425F657B7C29E1550EE04059EBB9E812
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x290
Data length: 5
File hash : 0E460E25AAC0687D3AFCBD8C0C9363FFB9687514
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x295
Data length: 264283
File hash : 367FCD28D27719525D0A11A4F2679FBF35B4681F
File 2
Entry id: 0x103
Filename : update_flags.txt
Data offset: 0x40AF0
Data length: 5
File hash : 65A0A6DA7FDB7F7A93C50F2439F6D5FE4C55AF74
File 3
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x40AF5
Data length: 5661656
File hash : 8DBE6CE15595261FAF019AC91B6EE95B8B23177D
File 4
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x5A6ECD
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 5
Entry id: 0x202
Filename : dots.txt
Data offset: 0x5A96CD
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 6
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x5A96D0
Data length: 158433280
File hash : CED28A0B89002C2AC7D4587B85BE76B51FAE321F
File 7
Entry id: 0x501
Filename : Unknown entry id
Data offset: 0x9CC16D0
Data length: 71680
File hash : 5591E8ACA40E5FA5468B6D86F0877E8A6D4B6D29
File 8
Entry id: 0x601
Filename : Unknown entry id
Data offset: 0x9CD2ED0
Data length: 5660160
File hash : 9866063D8DAF42FF2964DE0D7F20E92C7C1C0E3A //-->
 
*Ref.Tool DECR 341.001 <!--// [http://www.multiupload.com/J2LPNI8X62 PS3_341_TOOL_ONLY_BUILD_FW_UPDATE.RAR (130.26 MB)] //-->
MD5: 28CAAA7796E3CB7AD6500D989CF38B71 | SHA1: 6251A7AF2ABADF899F1100BC212AECEF78A49D19 | CRC32: 96106F79 | CRC16: C81E | HMAC_SHA1: 0x1C9EAF415BA2F247D80783DFAE40CCAB68F53E40
<!--// PUP file information
Package version: 1
Image version: 99999
File count: 6
Header length: 464
Data length: 135238704
PUP file hash : 1C9EAF415BA2F247D80783DFAE40CCAB68F53E40
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x1D0
Data length: 5
File hash : 6E18EB2E98798EA8F05DE734837EB9BE1BC842C4
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x1D5
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 2
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x1D8
Data length: 5661736
File hash : 4FDAF9FA7DE86FAC2BF544CA6264AA2B3CD0D5ED
File 3
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x566600
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 4
Entry id: 0x202
Filename : dots.txt
Data offset: 0x568E00
Data length: 0
File hash : B701CBBD3ACE82CAF2E4018E5327AA16637490DE
File 5
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x568E00
Data length: 129566720
File hash : 468E61C41D3DA72B4E49A8211472F05935389177  //-->
 
* 3.30 <!--// [http://www.multiupload.com/C3PWSGWR8I PS3_330_DEBUG_ONLY_BUILD_FW_UPDATE.RAR (151.68 MB)] //-->
MD5: 133296059CED19CFB93F8E0BB4B5C6DE | SHA1: E3FF61545EB3B1396ADCE5029E9C6A083E3F803D | CRC32: 6B31B61A | CRC16: A429 | HMAC_SHA1: 0x233E3B7400AF95A6356F723B4F1EE82879ED9420
<!--// PUP file information
Package version: 1
Image version: 99999
File count: 7
Header length: 528
Data length: 158983680
PUP file hash : 233E3B7400AF95A6356F723B4F1EE82879ED9420
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x210
Data length: 5
File hash : C2BC9B07B3F70556051A8ED21CFF1292D7E9C854
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x215
Data length: 264283
File hash : 367FCD28D27719525D0A11A4F2679FBF35B4681F
File 2
Entry id: 0x103
Filename : update_flags.txt
Data offset: 0x40A70
Data length: 5
File hash : 65A0A6DA7FDB7F7A93C50F2439F6D5FE4C55AF74
File 3
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x40A75
Data length: 5662104
File hash : 8C616048FF423C9DA9BEE55060E6EB4FC372D1CC
File 4
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x5A700D
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 5
Entry id: 0x202
Filename : dots.txt
Data offset: 0x5A980D
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 6
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x5A9810
Data length: 153047040
File hash : 30857C394427EEBC8C84C1878AFE39CDB97FF5AC  //-->
 
* 3.15 <!--// [http://www.multiupload.com/GR63ZHF406 PS3_315_DEBUG_ONLY_BUILD_FW_UPDATE.RAR (150.61 MB)] //-->
MD5: 3F40ABC76DFAD368D3F4411D7D92B475 | SHA1: 0D2A15102A142203658DB14DF554643945817244 | CRC32: 7CCB04C0 | CRC16: 211C | HMAC_SHA1: 0x59D38EF08A176BC33090A8B768B6AAF1ACCC9BD5
<!--// PUP file information
Package version: 1
Image version: 99999
File count: 7
Header length: 528
Data length: 156377029
PUP file hash : 59D38EF08A176BC33090A8B768B6AAF1ACCC9BD5
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x210
Data length: 5
File hash : EC7C40217BFC04CD495CCC44ECF6EB4B19F4A611
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x215
Data length: 260088
File hash : EA1FBD687ACE803C74560223048D1CF2F4CB6B08
File 2
Entry id: 0x103
Filename : update_flags.txt
Data offset: 0x3FA0D
Data length: 5
File hash : 65A0A6DA7FDB7F7A93C50F2439F6D5FE4C55AF74
File 3
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x3FA12
Data length: 5517248
File hash : 5D06F5787430B7D4C61DCCB1334D614E189FD4A0
File 4
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x5829D2
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 5
Entry id: 0x202
Filename : dots.txt
Data offset: 0x5851D2
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 6
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x5851D5
Data length: 150589440
File hash : A0428BC27C7C857615A4297DB7E3BB13E44D06B3 //-->
 
* 2.42 <!--// [http://www.multiupload.com/WORYT5HQOA PS3_242_DEBUG_ONLY_BUILD_FW_UPDATE.RAR (117.76 MB)] //-->
MD5: 3EF6023CCFF3D7656665162495D25F5D | SHA1: 2D64EAD7BA5213C1C3FD83F4A1187654687058A8 | CRC32: FDF8213D | CRC16: 44BE | HMAC_SHA1: 0x4F198C97C143B9DAF492A56703D2F09107F9091A
<!--// PUP file information
Package version: 1
Image version: 99999
File count: 6
Header length: 464
Data length: 122267713
PUP file hash : 4F198C97C143B9DAF492A56703D2F09107F9091A
File 0
Entry id: 0x100
Filename : version.txt
Data offset: 0x1D0
Data length: 5
File hash : 7804A2E9819BD88843105C676A8B681629A9E80A
File 1
Entry id: 0x101
Filename : license.xml
Data offset: 0x1D5
Data length: 225345
File hash : 296C3DC63AD1C0FFD4E04D6A9DC24F61A24649ED
File 2
Entry id: 0x200
Filename : ps3swu.self
Data offset: 0x37216
Data length: 5500920
File hash : B3C72D106EC055CF8ED3F7789B51434C826E45C0
File 3
Entry id: 0x201
Filename : vsh.tar
Data offset: 0x57620E
Data length: 10240
File hash : D9B66E0D2845D71A67D76E7907AB06368CE61E08
File 4
Entry id: 0x202
Filename : dots.txt
Data offset: 0x578A0E
Data length: 3
File hash : 1AA4749D0EE0D0AE937FBF73BC4B9ACD352F732A
File 5
Entry id: 0x300
Filename : update_files.tar
Data offset: 0x578A11
Data length: 116531200
File hash : 78AA89892EC9C90114E95DC343970AA62B5AD7A8 //-->
 
----
 
== Remark @ Installation ==
 
ps3d storage region 3 on the internal harddisk (ps3dc) is used by the PS3 as temp for installing updates. When installing PUP files, the PUP content gets unpacked there, checked - the system flags the update bit and prompts for reboot. After reboot it sees the update bit set and installs the files from ps3dc without rechecking (!) -> possible attack vector for circumventing checks, like down-/crossgrading). edit-note: doesn't seem to be true, it is still checked.
 
ps3d - 4 possible regions :
ps3da : whole disk
  ps3db : UFS2 : GameOS
  ps3dc : FAT (2GB) : Update
  ps3dd : EXT3 : OtherOS (in the <=3.15 way)
 
 
----
 
 
== Ancient preproduction / prototype ==
  CEB-201x, DEH-R1030 etc.
 
  old SDKs contain these binairy files in \cell\target\bootrom,
  while knowledge about previous version existance can be revealed by the documentation in \cell\info\old\XXX
 
 
=== 0.2 ebootrom ===


=== 0.3 ebootrom ===
==== 0.3 ebootrom ====
    
    
=== 0.60 ebootrom ===
==== 0.60 ebootrom ====
<pre>  0.60: lv0 contains string : 'Sony CXD9823 NAND Controller'</pre>
<pre>  0.60: lv0 contains string : 'Sony CXD9823 NAND Controller'</pre>
<pre>Boot Loader SE Version 0.6 2006-01-31_13:53:04</pre>
<pre>Boot Loader SE Version 0.5.2005-12-28_16:10:53</pre>


=== 0.80 ebootrom ===
==== 0.80 ebootrom ====
<pre>  key: rev 0x00</pre>
<pre>  key: rev 0x00</pre>


=== 0.84 ebootrom ===
==== 0.84 ebootrom ====
<pre>  0.84: lv0 doesnt contain previous mentioned string</pre>
<pre>  0.84: lv0 doesnt contain previous mentioned string</pre>
<pre>from decrypted lv0 0.84: Boot Loader SE Version 0.8.4 (Build ID: 822,8517, Build Data: 2006-05-16_17:50:21)</pre>
<pre>from decrypted lv0 0.84: Boot Loader SE Version 0.8.4 (Build ID: 822,8517, Build Data: 2006-05-16_17:50:21)</pre>


=== 0.85 ebootrom ===
==== 0.85 ebootrom ====
 
==== 0.90 ebootrom ====


=== 0.90 ebootrom ===
==== 0.90 PUP ====
<pre>  ? 0.90: PS3UPDAT.PUP format was implemented since 0.90 ?</pre>


=== 0.92 ebootrom ===
==== 0.92 ebootrom ====
<pre>  key: rev 0x01 + NP rev 0x01</pre>
<pre>  key: rev 0x01 + NP rev 0x01</pre>


=== 0.93 ebootrom ===
==== 0.93 ebootrom ====


=== 0.94 ebootrom ===
==== 0.94 ebootrom ====


=== 0.95 PUP ===
==== 0.95 PUP ====
<pre>  0.95: PS3UPDAT.PUP format was implemented since 0.95</pre>


=== 0.96 PUP ===
==== 0.96 PUP ====


==== 100.002 ebootrom ====
<pre>from decrypted lv0: Boot Loader SE Version 1.0.0 (Build ID: 1643,16413, Build Data: 2006-10-05_16:32:34)</pre>
[http://www.multiupload.com/FZHV557R2J ebootrom.100.002.rar (51.29 MB)]


= non PS3 FW related =
* https://mega.co.nz/#!YgsziJjT!j4EzExE18pmIrv6a2ITbfMrRPollgzPdpvTjze1CuEc
== PSVita - VITA_FW_XTRACTOR ==
[http://www.megaupload.com/?d=0B6AYNOH vita_win_200.rar (4.03 MB)] // mirror: [http://www.multiupload.com/6YAZWL2Z00 vita_win_200.rar (4.03 MB)] <!--// SKFU //-->

Latest revision as of 01:56, 24 August 2023

Changelogs[edit source]

Wikipedia is removing firmware changelogs, last complete version:

PSVita: https://en.wikipedia.org/w/index.php?title=PlayStation_Vita_system_software&oldid=668447442

PSP: https://en.wikipedia.org/w/index.php?title=PlayStation_Portable_system_software&oldid=672507694

PS3 talk[edit source]

What is the part that defines what firmware it really is? I mean, for firmwares below 3.55 we have all the keys so we can forge any .PUP and make it appear as a +3.55, that would be a way to downgrade, without the need of a dongle and recovery mode.

I know there are version strings in pupheader, version.txt, info0, and in vsh.self. But what is missing? What isn´t correctly set in the MFW to make it pass the checks of a legit +3.55 FW?.

We are using recovery mode to downgrade because we haven´t found a way to create a legit +3.55 firmware

Unpacking a PlayStation Update Package[edit source]

Unpack the PUP[edit source]

Dots.txt
license.xml
ps3swu.self
ps3swu2.self
spkg_hdr.tar
Update_Files.tar
update_flags.txt
Version.txt
VSH.tar

Untar the Update_Files.tar[edit source]

BDIT_FIRMWARE_PACKAGE.pkg
BDPT_FIRMWARE_PACKAGE_301R.pkg
BDPT_FIRMWARE_PACKAGE_302R.pkg
BDPT_FIRMWARE_PACKAGE_303R.pkg
BDPT_FIRMWARE_PACKAGE_304R.pkg
BDPT_FIRMWARE_PACKAGE_306R.pkg
BDPT_FIRMWARE_PACKAGE_308R.pkg
BDPT_FIRMWARE_PACKAGE_310R.pkg
BDPT_FIRMWARE_PACKAGE_312R.pkg
BDPT_FIRMWARE_PACKAGE_314R.pkg
BDPT_FIRMWARE_PACKAGE_316R.pkg
BLUETOOTH_FIRMWARE.pkg
CORE_OS_PACKAGE.pkg
dev_flash3_023.tar.aa.2013_06_20_055817
dev_flash_000.tar.aa.2013_06_20_055817
dev_flash_001.tar.aa.2013_06_20_055817
dev_flash_002.tar.aa.2013_06_20_055817
dev_flash_003.tar.aa.2013_06_20_055817
dev_flash_004.tar.aa.2013_06_20_055817
dev_flash_005.tar.aa.2013_06_20_051337
dev_flash_006.tar.aa.2013_06_20_051337
dev_flash_007.tar.aa.2013_06_20_051337
dev_flash_008.tar.aa.2013_06_20_051337
dev_flash_009.tar.aa.2013_06_20_051337
dev_flash_010.tar.aa.2013_06_20_051337
dev_flash_011.tar.aa.2013_06_20_051337
dev_flash_012.tar.aa.2013_06_20_051337
dev_flash_013.tar.aa.2013_06_20_051337
dev_flash_014.tar.aa.2013_06_20_051337
dev_flash_015.tar.aa.2013_06_20_051337
dev_flash_016.tar.aa.2013_06_20_051337
dev_flash_017.tar.aa.2013_06_20_051337
dev_flash_018.tar.aa.2013_06_20_051337
dev_flash_019.tar.aa.2013_06_20_051337
dev_flash_020.tar.aa.2013_06_20_051337
dev_flash_021.tar.aa.2013_06_20_051337
dev_flash_022.tar.aa.2013_06_20_055817
MULTI_CARD_FIRMWARE.pkg
RL_FOR_PACKAGE.img
RL_FOR_PROGRAM.img
SYS_CON_FIRMWARE_01000006.pkg
SYS_CON_FIRMWARE_01010303.pkg
SYS_CON_FIRMWARE_01020302.pkg
SYS_CON_FIRMWARE_01030302.pkg
SYS_CON_FIRMWARE_01040402.pkg
SYS_CON_FIRMWARE_01050002.pkg
SYS_CON_FIRMWARE_01050101.pkg
SYS_CON_FIRMWARE_S1_00010002083E0832.pkg
UPL.xml.pkg

unpkg CORE_OS_PACKAGE.pkg[edit source]

content
info0
info1
cosunpkg content from CORE_OS_PACKAGE.pkg[edit source]
aim_spu_module.self
appldr
creserved_0
default.spp
emer_init.self
eurus_fw.bin
hdd_copy.self
isoldr
lv0
lv1.self
lv1ldr
lv2ldr
lv2_kernel.self
manu_info_spu_module.self
mc_iso_spu_module.self
me_iso_spu_module.self
sb_iso_spu_module.self
sc_iso.self
sdk_version
spp_verifier.self
spu_pkg_rvk_verifier.self
spu_token_processor.self
spu_utoken_processor.self
sv_iso_spu_module.self
unself the self's[edit source]

...

unpkg dev_flash*[edit source]

content
info0
info1
untar dev_flash* content[edit source]

...

3.55 example[edit source]

PSUPDATE.PUP
├── dots.txt
├── license.txt
├── ps3swu.self 
├── update_files.tar
│   ├── BDIT_FIRMWARE_PACKAGE.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── BDPT_FIRMWARE_PACKAGE_301R.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── BDPT_FIRMWARE_PACKAGE_302R.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── BDPT_FIRMWARE_PACKAGE_303R.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── BDPT_FIRMWARE_PACKAGE_304R.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── BDPT_FIRMWARE_PACKAGE_306R.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── BDPT_FIRMWARE_PACKAGE_308R.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── BLUETOOTH_FIRMWARE.pkg
│   │   ├── content
│   │   │   ├── RC29_firmware_footer.dfu
│   │   │   ├── usb8780-5.0.1-A1-A2.dfu
│   │   │   └── usb8781-20.0.12.0.dfu
│   │   ├── info0
│   │   └── info1
│   ├── CORE_OS_PACKAGE.pkg
│   │   ├── aim_spu_module.self
│   │   ├── appldr
│   │   ├── creserved_0
│   │   ├── default.spp
│   │   ├── emer_init.self
│   │   ├── eurus_fw.bin
│   │   ├── hdd_copy.self
│   │   ├── isoldr
│   │   ├── lv0
│   │   ├── lv1ldr
│   │   ├── lv1.self
│   │   ├── lv2_kernel.self
│   │   ├── lv2ldr
│   │   ├── manu_info_spu_module.self
│   │   ├── mc_iso_spu_module.self
│   │   ├── me_iso_spu_module.self
│   │   ├── sb_iso_spu_module.self
│   │   ├── sc_iso.self
│   │   ├── sdk_version
│   │   ├── spp_verifier.self
│   │   ├── spu_pkg_rvk_verifier.self
│   │   ├── spu_token_processor.self
│   │   ├── spu_utoken_processor.self
│   │   └── sv_iso_spu_module.self
│   ├── dev_flash_XXX.tar.aa.DATE/TIME
│   ├── dev_flash3_XXX.tar.aa.DATE/TIME
│   ├── MULTI_CARD_FIRMWARE.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── RL_FOR_PACKAGE.img
│   ├── RL_FOR_PROGRAM.img
│   ├── SYS_CON_FIRMWARE_01000006.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── SYS_CON_FIRMWARE_01010303.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── SYS_CON_FIRMWARE_01020302
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── SYS_CON_FIRMWARE_01030302.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── SYS_CON_FIRMWARE_01040402.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── SYS_CON_FIRMWARE_01050002.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── SYS_CON_FIRMWARE_01050101.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   ├── SYS_CON_FIRMWARE_S1_00010002083E0832.pkg
│   │   ├── content
│   │   ├── info0
│   │   └── info1
│   └── UPL.xml.pkg
│       ├── content
│       ├── info0
│       └── info1
├── update_flags.txt
├── version.txt
└── vsh.tar
    └──a

Adding new keys to older firmwares[edit source]

patch the loaders
add keys to appldr keys index & tables
there are also npdrm keys inside appldr as well, add the 3.56++ ones
appldr,. lv2.self and game_ext_plugin need patching for new games support
vsh.self maybe too

Creating a MFW? (3.41/3.55 with 3.56 keys)


Proof of concept with added keys to appldr (and none of the other mentioned files above) : appldr 3.55 add 3.56/3.60 keys


Using fake upgrade to get lowest firmware version info[edit source]

PS3 MinVerChk PUP on USB

https://web.archive.org/web/*/http://ps3devwiki.com/files/firmware/MFW-CEX/MinVerCheck/ // MinVerChk.rar (1.28 KB) / mirror --- mirror 2

CRC-16: 9A11
CRC-32 (Ethernet and PKZIP): 50EE9A92
SHA-1: 1B60E0ADE8E698D9796AA78B7AD54B10E05A9B0B
MD-5: BB39828156BC7DF144E4D06D81C801AB
  1. Unrar and copy this MinVerChk PUP to your USB stick (/PS3/UPDATE/PS3UPDAT.PUP), the same way as if it was an firmware upgrade.
  2. Insert the USB stick into the PS3.
  3. Start a firmware update like normal from XMB (Don’t worry, it will not update!)
  4. It will shortly fail and display the Firmware Base Value

Note: console needs to run at least FW 2.50? (2.30 didn't work); This only works when the minimum update version is 1.00, otherwise any minimum value lower than 1.00 reports as 1.00 using this method. DECR-1000 (0.08), DEH-H1000A-E (??0.92??), DEH-H1001-D (??0.92??), DECHA00A (??0.92??) are effectively affected by this.

Hashes[edit source]

Version MD5 SHA1 CRC32 CRC16 HMAC_SHA1
0 file (do not use) MD5::1f5039e50bd66b290c56684d8550c6c2 SHA1::7b91dbdc56c5781edf6c8847b4aa6965566c5c75 CRC32::2A0E7DBB CRC16::0 HMAC_SHA1::
3.41 RETAIL/CEX PSJB MD5::6f1ef9144c43c9a6f00f7ee7464a6689 SHA1::f3c19e06c0e7b8cc550bb3244f5f88356173fa6d CRC32::8A1E7548 CRC16::7FFC HMAC_SHA1::9F7001A6A93AE03A61ED7CFB7156A68DF0740708


PS3UPDAT.SHA[edit source]

Some BluRay-Movie Discs contain firmware updates for the Playstation 3 Console. Inside the /PS3/UPDATE folder can be a file called "PS3UPDAT.SHA".

example[edit source]

This is an example from the movie "Priest" with 3.50 firmware

0x002F070 - 0x002F8CF
Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
00000000  61 7F 7F 6B 07 07 07 0B 00 00 00 00 00 00 00 00  a..k............
00000010  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
00000020  B8 19 86 1F 75 D5 08 82 14 2C BE C8 AF 54 B0 00  ....u....,...T..
00000030  12 BC 04 9D 00 00 00 00 00 00 00 00 00 00 00 00  ................

structure[edit source]

Address Size Value Description Observations
0x0 0x8 61 7F 7F 6B 07 07 07 0B Unknown
0x8 0x18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Padding
0x20 0x14 B8 19 86 1F 75 D5 08 82 14 2C BE C8 AF 54 B0 00 12 BC 04 9D SHA1 hash of PS3UPDAT.PUP
0x34 0xC 00 00 00 00 00 00 00 00 00 00 00 00 Padding
Rest Rest Rest Encrypted Data



Repositories[edit source]

stoker25 - specialises in debug/DEX and DECR/TOOL firmwares (self hosted)

Remark @ Installation[edit source]

ps3d storage region 3 on the internal harddisk (ps3dc) is used by the PS3 as temp for installing updates. When installing PUP files, the PUP content gets unpacked there, checked - the system flags the update bit and prompts for reboot. After reboot it sees the update bit set and installs the files from ps3dc without rechecking (!) -> possible attack vector for circumventing checks, like down-/crossgrading). edit-note: doesn't seem to be true, it is still checked.

ps3d - 4 possible regions :

ps3da : whole disk
  ps3db : UFS2 : GameOS
  ps3dc : FAT (2GB) : Update
  ps3dd : EXT3 : OtherOS (in the <=3.15 way)


No applicable data found - technical pov[edit source]

Reasons why the playstation updating process does not recognize a pup.

  • 2) update_files.tar
    • unable to open PUP (rb)
    • unable to read first 0x30 Bytes (header)
    • unable to read further 0x20 Bytes sized segment_table (aka file tables)
    • unable to find core os package.pkg inside update_files.tar
  • 3) Unable to open Storage Region 1/2 on HDD.
  • 4) No Media present. (no success when fstat)

Sample Logs normal installation[edit source]

http://pastie.org/10059999

cellFsUtilMount: /dev_hdd0
Configuration read. bd_video_region=0,dvd_video_region=0
spoof_version = 0000, spoof_revision = 0
BDemulator: disabled
real disc type = ff71
effective disc type = ff71, fake disc type = 0
probe hdd
(v)HDD found.
probe hdd done
vflash is enabled. search system region.
search system region
device_id = 0x101000000000007, system_region_id = 0x1
ACL[0]: LAID = 0x1070000001000001 : ACL =0xb
system region found(mode = 0).
search system region done.
search flash regions
cellFsUtilMount: /dev_flash
/dev_flash is clean.
[(v)flash]
        info.vendor_id = 0x0
        info.device_id = 0x0
        info.sector_size = 0x200
        info.media_count = 0x1
        info.capacity = 0x80000
[device_id = 0x100000200000001]
        info.capacity = 0x63e00
flash region 0x2 found.
expected: start sectors = 0x7800, n_sectors = 0x63e00
start sector = 0x7800.
start sector is correct
region size is correct
[device_id = 0x100000300000001]
        info.capacity = 0x8000
flash region 0x3 found.
expected: start sectors = 0x6b600, n_sectors = 0x8000
start sector = 0x6b600.
[device_id = 0x100000400000001]
        info.capacity = 0x400
flash region 0x4 found.
expected: start sectors = 0x73600, n_sectors = 0x400
start sector = 0x73600.
[device_id = 0x100000500000001]
        info.capacity = 0x2000
flash region 0x5 found.
expected: start sectors = 0x73a00, n_sectors = 0x2000
start sector = 0x73a00.
found all flash regions.
search normal region
normal region 1 found.
search normal region done.
normal region 2 found.
Storage event: 7  0  10300000000000a
Storage event: 3  0  10300000000000a
search update package
seach update package in GAME disc
Disc auth: 5004 29 (process: 01000200_main_mer_init.self)
set drive policy success
profile = 0xff71
umount BDVD
umount /dev_bdvd failure = 0x80010002
mount BDVD
cellFsUtilMount: /dev_bdvd
mount /dev_bdvd success
/dev_bdvd/PS3_UPDATE/PS3UPDAT.PUP found
verify /dev_bdvd/PS3_UPDATE/PS3UPDAT.PUP
Initializing
taking a while...
start Updating Proccess
Initialize elapsed time = 3325 msec
check UPL
Check UPL elapsed time = 79 msec
check Package Size
get package size elapsed time = 25 msec
start Verifying Package only
update package elapsed time = 1731 msec
Updating or Verifying failure 0x8002f169
USB storage: id = 0x10300000000000a
        lun = 0x0
        info.capacity = 0xffffffffe8df8800
lun = 0x0, dev_index = 0xa
index = 0x0, pkg_index = 0x2
mount USB storage 0
mp_name = /dev_usb000
umount /dev_usb000 failure = 0x80010002
mount USB storage 0(LUN=0x0)
dev_name = CELL_FS_IOS:USB_MASS_STORAGE000, mp_name = /dev_usb000
cellFsUtilMount: /dev_usb000
mount /dev_usb000 success
/dev_usb000/PS3/UPDATE/PS3UPDAT.PUP found
verify /dev_usb000/PS3/UPDATE/PS3UPDAT.PUP
Storage event: 4  0  101000000000006
Disc removed.
Storage event: 8  0  101000000000006
Initialize elapsed time = 547 msec
Check UPL elapsed time = 148 msec
get package size elapsed time = 17 msec
update package elapsed time = 18979 msec
post processiong...
post processiong done
search update package done
not to be skipped formatting system region.
re-use old partitions.
re-use old flash partitions.
cellFsUtilMount: /dev_hdd1
setup environment for ps3updater
mount game cache
mount game cache success
mkdir /dev_hdd1/PS3UPDATE success
mkdir /dev_hdd1/PS3UPDATE/vsh success
mkdir /dev_hdd1/PS3UPDATE/vsh/etc success
mkdir /dev_hdd1/PS3UPDATE/data success
mkdir /dev_hdd1/PS3UPDATE/data/font success
Initialize elapsed time = 582 msec
Check UPL elapsed time = 160 msec
update package elapsed time = 20137 msec
copy /dev_usb000/PS3/UPDATE/PS3UPDAT.PUP to /dev_hdd1/PS3UPDATE/PS3UPDAT.PUP
copy id = 0x100, dst = /dev_hdd1/PS3UPDATE/ps3version.txt
copy id = 0x601, dst = /dev_hdd1/PS3UPDATE/ps3swu.self
extarct id = 0x201, dst = /dev_hdd1/PS3UPDATE
segment = 0x300, offset = 0x56f5b0, size = 0xc0e4c00
file_num = 51
required patch_name : /BDIT_FIRMWARE_PACKAGE.pkg.spkg_hdr.1
segment = 0x501, offset = 0xc6541b0, size = 0x14000
file_num = 49
patch found: offset = 0xc6543b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_301R.pkg.spkg_hdr.1
patch found: offset = 0xc6549b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_302R.pkg.spkg_hdr.1
patch found: offset = 0xc654fb0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_303R.pkg.spkg_hdr.1
patch found: offset = 0xc6555b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_304R.pkg.spkg_hdr.1
patch found: offset = 0xc655bb0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_306R.pkg.spkg_hdr.1
patch found: offset = 0xc6561b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_308R.pkg.spkg_hdr.1
patch found: offset = 0xc6567b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_310R.pkg.spkg_hdr.1
patch found: offset = 0xc656db0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_312R.pkg.spkg_hdr.1
patch found: offset = 0xc6573b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_314R.pkg.spkg_hdr.1
patch found: offset = 0xc6579b0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_316R.pkg.spkg_hdr.1
patch found: offset = 0xc657fb0, size = 0x280
required patch_name : /BDPT_FIRMWARE_PACKAGE_318R.pkg.spkg_hdr.1
patch found: offset = 0xc6585b0, size = 0x280
required patch_name : /BLUETOOTH_FIRMWARE.pkg.spkg_hdr.1
patch found: offset = 0xc658bb0, size = 0x280
required patch_name : /CORE_OS_PACKAGE.pkg.spkg_hdr.1
patch found: offset = 0xc6591b0, size = 0x280
required patch_name : /MULTI_CARD_FIRMWARE.pkg.spkg_hdr.1
patch found: offset = 0xc6597b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01000006.pkg.spkg_hdr.1
patch found: offset = 0xc659db0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01010303.pkg.spkg_hdr.1
patch found: offset = 0xc65a3b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01020302.pkg.spkg_hdr.1
patch found: offset = 0xc65a9b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01030302.pkg.spkg_hdr.1
patch found: offset = 0xc65afb0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01040402.pkg.spkg_hdr.1
patch found: offset = 0xc65b5b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01050002.pkg.spkg_hdr.1
patch found: offset = 0xc65bbb0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_01050101.pkg.spkg_hdr.1
patch found: offset = 0xc65c1b0, size = 0x280
required patch_name : /SYS_CON_FIRMWARE_S1_00010002083E0832.pkg.spkg_hdr.1
patch found: offset = 0xc65c7b0, size = 0x280
required patch_name : /UPL.xml.pkg.spkg_hdr.1
patch found: offset = 0xc65cdb0, size = 0x280
required patch_name : /RL_FOR_PACKAGE.img.spkg_hdr.1
patch for /RL_FOR_PACKAGE.img not found. skipped
required patch_name : /RL_FOR_PROGRAM.img.spkg_hdr.1
patch for /RL_FOR_PROGRAM.img not found. skipped
required patch_name : /dev_flash3_024.tar.aa.2015_02_05_035051.spkg_hdr.1
patch found: offset = 0xc65d3b0, size = 0x280
required patch_name : /dev_flash_000.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65d9b0, size = 0x280
required patch_name : /dev_flash_001.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65dfb0, size = 0x280
dir_num = 1
dirname = /dev_flash/data/font/
dstname = /dev_hdd1/PS3UPDATE/data/font/
file_num = 20
filename = /dev_flash/data/font/SCE-PS3-RD-R-LATIN2.TTF, offset = 0400, size = 0xd67c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-R-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-R-LATIN.TTF, offset = 0de00, size = 0x95f4
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-R-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-VR-R-LATIN2.TTF, offset = 017600, size = 0x218b0
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-VR-R-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-SR-R-LATIN2.TTF, offset = 039200, size = 0x12ee8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-B-LATIN.TTF, offset = 04c400, size = 0x12184
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-B-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-L-LATIN.TTF, offset = 05e800, size = 0x9714
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-L-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-YG-R-KOR.TTF, offset = 068200, size = 0x79728
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-YG-R-KOR.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-I-LATIN.TTF, offset = 0e1c00, size = 0x9ea4
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-I-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-BI-LATIN.TTF, offset = 0ebe00, size = 0x9c80
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-BI-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-LI-LATIN.TTF, offset = 0f5e00, size = 0xa038
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-LI-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-L-JPN.TTF, offset = 0100200, size = 0x2f0eb4
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-L-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-CP-R-KANA.TTF, offset = 03f1400, size = 0xf27c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-CP-R-KANA.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-BI-LATIN.TTF, offset = 0400a00, size = 0x13128
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-BI-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-I-LATIN.TTF, offset = 0413e00, size = 0x133d8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-I-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-SR-R-EXT.TTF, offset = 0427400, size = 0x43450
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-EXT.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-L-LATIN2.TTF, offset = 046ac00, size = 0xd7fc
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-L-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-SR-R-LATIN.TTF, offset = 0478600, size = 0xd1b0
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-R-JPN.TTF, offset = 0485a00, size = 0x2f5c38
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-R-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-YG-B-KOR.TTF, offset = 077ba00, size = 0x78ec8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-YG-B-KOR.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-R-EXT.TTF, offset = 07f4c00, size = 0x443b8
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-R-EXT.TTF
required patch_name : /dev_flash_002.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65e5b0, size = 0x280
dir_num = 0
file_num = 3
filename = /dev_flash/data/font/SCE-PS3-SR-R-JPN.TTF, offset = 0200, size = 0x47380c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-SR-R-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-NR-B-JPN.TTF, offset = 0473e00, size = 0x2d9724
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-NR-B-JPN.TTF
filename = /dev_flash/data/font/SCE-PS3-MT-R-LATIN.TTF, offset = 074d800, size = 0x1202c
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-MT-R-LATIN.TTF
required patch_name : /dev_flash_003.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65ebb0, size = 0x280
dirname = /dev_flash/data/font/SONY-CC/
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/
file_num = 12
filename = /dev_flash/data/font/SCE-PS3-DH-R-CGB.TTF, offset = 0200, size = 0x7d8884
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-DH-R-CGB.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-B-LATIN2.TTF, offset = 07d8e00, size = 0xd328
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-B-LATIN2.TTF
filename = /dev_flash/data/font/SCE-PS3-YG-L-KOR.TTF, offset = 07e6400, size = 0x78f68
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-YG-L-KOR.TTF
filename = /dev_flash/data/font/SCE-PS3-RD-B-LATIN.TTF, offset = 085f600, size = 0x9430
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-RD-B-LATIN.TTF
filename = /dev_flash/data/font/SCE-PS3-VR-R-LATIN.TTF, offset = 0868e00, size = 0x10344
dstname = /dev_hdd1/PS3UPDATE/data/font/SCE-PS3-VR-R-LATIN.TTF
filename = /dev_flash/data/font/SONY-CC/k006004ds.ttf, offset = 0879600, size = 0xeb94
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/k006004ds.ttf
filename = /dev_flash/data/font/SONY-CC/e046323ts.ttf, offset = 0888400, size = 0xd960
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/e046323ts.ttf
filename = /dev_flash/data/font/SONY-CC/c041056ts.ttf, offset = 0896000, size = 0x116dc
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/c041056ts.ttf
filename = /dev_flash/data/font/SONY-CC/n023055ms.ttf, offset = 08a7a00, size = 0xb38c
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/n023055ms.ttf
filename = /dev_flash/data/font/SONY-CC/e046323ms.ttf, offset = 08b3000, size = 0xc25c
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/e046323ms.ttf
filename = /dev_flash/data/font/SONY-CC/n023055ts.ttf, offset = 08bf600, size = 0xc9c0
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/n023055ts.ttf
filename = /dev_flash/data/font/SONY-CC/d013013ds.ttf, offset = 08cc200, size = 0x11174
dstname = /dev_hdd1/PS3UPDATE/data/font/SONY-CC/d013013ds.ttf
required patch_name : /dev_flash_004.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65f1b0, size = 0x280
dir_num = 2
dirname = /dev_flash/vsh/etc/
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/
dirname = /dev_flash/vsh/etc/print/
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/print/
file_num = 11
filename = /dev_flash/vsh/etc/layout_factor_table_720.txt, offset = 0400, size = 0x1ff
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_720.txt
filename = /dev_flash/vsh/etc/layout_grid_table_720.txt, offset = 0800, size = 0x3fd5
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_720.txt
filename = /dev_flash/vsh/etc/layout_grid_table_1080.txt, offset = 04a00, size = 0x41f6
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_1080.txt
filename = /dev_flash/vsh/etc/index.dat, offset = 08e00, size = 0x4f0
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/index.dat
filename = /dev_flash/vsh/etc/layout_factor_table_272.txt, offset = 09600, size = 0x1dd
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_272.txt
filename = /dev_flash/vsh/etc/version.txt, offset = 09a00, size = 0x4ce
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/version.txt
filename = /dev_flash/vsh/etc/layout_grid_table_480.txt, offset = 0a200, size = 0x3dc9
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_480.txt
filename = /dev_flash/vsh/etc/print/epson.pmd, offset = 0e400, size = 0x7154
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/print/epson.pmd
filename = /dev_flash/vsh/etc/layout_grid_table_272.txt, offset = 015800, size = 0x3df7
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_grid_table_272.txt
filename = /dev_flash/vsh/etc/layout_factor_table_480.txt, offset = 019800, size = 0x1dc
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_480.txt
filename = /dev_flash/vsh/etc/layout_factor_table_1080.txt, offset = 019c00, size = 0x1f2
dstname = /dev_hdd1/PS3UPDATE/vsh/etc/layout_factor_table_1080.txt
required patch_name : /dev_flash_005.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65f7b0, size = 0x280
required patch_name : /dev_flash_006.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc65fdb0, size = 0x280
required patch_name : /dev_flash_007.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6603b0, size = 0x280
required patch_name : /dev_flash_008.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6609b0, size = 0x280
required patch_name : /dev_flash_009.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc660fb0, size = 0x280
required patch_name : /dev_flash_010.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6615b0, size = 0x280
required patch_name : /dev_flash_011.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc661bb0, size = 0x280
required patch_name : /dev_flash_012.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6621b0, size = 0x280
required patch_name : /dev_flash_013.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6627b0, size = 0x280
required patch_name : /dev_flash_014.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc662db0, size = 0x280
required patch_name : /dev_flash_015.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6633b0, size = 0x280
required patch_name : /dev_flash_016.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6639b0, size = 0x280
required patch_name : /dev_flash_017.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc663fb0, size = 0x280
required patch_name : /dev_flash_018.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6645b0, size = 0x280
required patch_name : /dev_flash_019.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc664bb0, size = 0x280
required patch_name : /dev_flash_020.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6651b0, size = 0x280
required patch_name : /dev_flash_021.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6657b0, size = 0x280
required patch_name : /dev_flash_022.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc665db0, size = 0x280
required patch_name : /dev_flash_023.tar.aa.2015_02_05_034359.spkg_hdr.1
patch found: offset = 0xc6663b0, size = 0x280
setup environment for ps3updater done.
umount game cache
umount game cache success
Unmount:: not call unset_storage_event_handler
UfsSysUinit2:not call ffs_uninitUnmount:: not call free

Prepare to shutdown .....Going to shutdown.
Stage 2 says hello (load base = 0x8000000000540000, end = 0x8000000000558330) (version = 0104700F)
OK

###
### Software update mode

mounting the builtin HDD1 : cellFsUtilMount: /dev_hdd1
PROCESS /dev_hdd1/PS3UPDATE/ps3swu.self (01000200) loaded
PROCESS /dev_hdd1/PS3UPDATE/ps3swu.self (01000200_main_ps3swu.self) (01000200) created from parent process:
creating the initial system process : OK
cellFsUtilMount: /dev_flash2
cellFsUtilMount: /dev_flash3
Registry: running in recovery mode
Registry initialization start:............ done
We are originally in region 82

other: http://pastie.org/pastes/10056453/text?key=utexzvyefmddeddktp3og

Factory Service Mode - Installation log breakdown[edit source]

Explaination from rms: http://rmscrypt.wordpress.com/2011/02/01/the-downgrade-process/

Sample logs:

log Explaination Notes
manufacturing bit detection in Syscon eeprom, manufacturing mode enabled, looking for lv2_diag.self
 manufacturing updating start
lv2_diag.self initialised
PackageName = /dev_usb000/PS3UPDAT.PUP
PUP file used for FSM reinstall on USB root
 settle polling interval success
 vflash is disabled...
 boot from nand flash...
NAND system detected, vflash disabled
 creating flash regions...
 create storage region: (region id = 2)
 format partition: (region_id = 2, CELL_FS_IOS:BUILTIN_FLSH1, CELL_FS_FAT)
 create storage region: (region id = 3)
 format partition: (region_id = 3, CELL_FS_IOS:BUILTIN_FLSH2, CELL_FS_FAT)
 create storage region: (region id = 4)
 format partition: (region_id = 4, CELL_FS_IOS:BUILTIN_FLSH3, CELL_FS_FAT)
 create storage region: (region id = 5)
 create storage region: (region id = 6)
creating FLASH regions 2, 3, 4, 5, 6 and formatting regions 2, 3, 4
 Initializing
 taking a while...
 start Updating Proccess
 Initialize elapsed time = 61 msec
Initializing + Start Updating Proccess
 check UPL
 Check UPL elapsed time = 34 msec
 check Package Size
 get package size elapsed time = 8 msec
 start Updating Package
 Update packages num = 29
 Update packages total size = 160699026
UPL.xml.pkg from PUP unpkg'ed and read
 Update Package Revoke list
 read package revoke list package (576 bytes) elapsed = 6 msec
 update package revoke list elapsed = 331 msec
 Update Package Revoke list done(0x8002f000)
RL_FOR_PACKAGE.img copied from PUP to trvk_pkg
 Update Core OS Package
 read core os package (5193774 bytes) elapsed = 324 msec
 update core os package elapsed = 1965 msec
 Update Core OS Package done(0x8002f000)
Core OS package (CORE_OS_PACKAGE.pkg) is unpkg'ed from PUP and written to ros
 Update VSH Package
 sys_memory_container_create() success(id = 0xc0effffe)
 Update VSH's package : 1/21
 read vsh package (2070 bytes) elapsed = 8 msec
 decrypt and verify vsh package elapsed = 23 msec
 write vsh package elapsed = 9259 msec
 compare vsh package elapsed = 0 msec
 Update VSH's package : 2/21
 read vsh package (5616383 bytes) elapsed = 351 msec
 decrypt and verify vsh package elapsed = 341 msec
 write vsh package elapsed = 1725 msec
 compare vsh package elapsed = 402 msec
 Update VSH's package : 3/21
 read vsh package (3357780 bytes) elapsed = 214 msec
 decrypt and verify vsh package elapsed = 227 msec
 write vsh package elapsed = 2926 msec
 compare vsh package elapsed = 312 msec
 Update VSH's package : 4/21
 read vsh package (5240122 bytes) elapsed = 328 msec
 decrypt and verify vsh package elapsed = 309 msec
 write vsh package elapsed = 2776 msec
 compare vsh package elapsed = 399 msec
 Update VSH's package : 5/21
 read vsh package (24029 bytes) elapsed = 9 msec
 decrypt and verify vsh package elapsed = 24 msec
 write vsh package elapsed = 1185 msec
 compare vsh package elapsed = 9 msec
 Update VSH's package : 6/21
 read vsh package (9831317 bytes) elapsed = 599 msec
 decrypt and verify vsh package elapsed = 279 msec
 write vsh package elapsed = 11830 msec
 compare vsh package elapsed = 466 msec
 Update VSH's package : 7/21
 read vsh package (8662380 bytes) elapsed = 539 msec
 decrypt and verify vsh package elapsed = 272 msec
 write vsh package elapsed = 16532 msec
 compare vsh package elapsed = 474 msec
 Update VSH's package : 8/21
 read vsh package (8657372 bytes) elapsed = 541 msec
 decrypt and verify vsh package elapsed = 361 msec
 write vsh package elapsed = 5911 msec
 compare vsh package elapsed = 448 msec
 Update VSH's package : 9/21
 read vsh package (10445426 bytes) elapsed = 635 msec
 decrypt and verify vsh package elapsed = 255 msec
 write vsh package elapsed = 5408 msec
 compare vsh package elapsed = 467 msec
 Update VSH's package : 10/21
 read vsh package (10252830 bytes) elapsed = 641 msec
 decrypt and verify vsh package elapsed = 262 msec
 write vsh package elapsed = 8646 msec
 compare vsh package elapsed = 476 msec
 Update VSH's package : 11/21
 read vsh package (9922968 bytes) elapsed = 621 msec
 decrypt and verify vsh package elapsed = 252 msec
 write vsh package elapsed = 6950 msec
 compare vsh package elapsed = 467 msec
 Update VSH's package : 12/21
 read vsh package (8214459 bytes) elapsed = 505 msec
 decrypt and verify vsh package elapsed = 199 msec
 write vsh package elapsed = 5843 msec
 compare vsh package elapsed = 386 msec
 Update VSH's package : 13/21
 read vsh package (9428094 bytes) elapsed = 594 msec
 decrypt and verify vsh package elapsed = 244 msec
 write vsh package elapsed = 5238 msec
 compare vsh package elapsed = 442 msec
 Update VSH's package : 14/21
 read vsh package (7973335 bytes) elapsed = 498 msec
 decrypt and verify vsh package elapsed = 346 msec
 write vsh package elapsed = 13617 msec
 compare vsh package elapsed = 456 msec
 Update VSH's package : 15/21
 read vsh package (9766737 bytes) elapsed = 603 msec
 decrypt and verify vsh package elapsed = 360 msec
 write vsh package elapsed = 17267 msec
 compare vsh package elapsed = 529 msec
 Update VSH's package : 16/21
 read vsh package (9199234 bytes) elapsed = 583 msec
 decrypt and verify vsh package elapsed = 407 msec
 write vsh package elapsed = 23189 msec
 compare vsh package elapsed = 689 msec
 Update VSH's package : 17/21
 read vsh package (7260896 bytes) elapsed = 466 msec
 decrypt and verify vsh package elapsed = 286 msec
 write vsh package elapsed = 14751 msec
 compare vsh package elapsed = 689 msec
 Update VSH's package : 18/21
 read vsh package (6563380 bytes) elapsed = 422 msec
 decrypt and verify vsh package elapsed = 155 msec
 write vsh package elapsed = 1906 msec
 compare vsh package elapsed = 357 msec
 Update VSH's package : 19/21
 read vsh package (6092245 bytes) elapsed = 373 msec
 decrypt and verify vsh package elapsed = 227 msec
 write vsh package elapsed = 1457 msec
 compare vsh package elapsed = 405 msec
 Update VSH's package : 20/21
 read vsh package (9859067 bytes) elapsed = 590 msec
 decrypt and verify vsh package elapsed = 238 msec
 write vsh package elapsed = 2187 msec
 compare vsh package elapsed = 498 msec
 Update VSH's package : 21/21
 read vsh package (6492084 bytes) elapsed = 419 msec
 decrypt and verify vsh package elapsed = 321 msec
 write vsh package elapsed = 17509 msec
 compare vsh package elapsed = 674 msec
 Update VSH Package done(0x8002f000)
dev_flash_000.tar.aa.* files from PUP are unpkg'ed to dev_flash
 Bul-ray Disc Player Revoke
 read bdp revoke package (1904 bytes) elapsed = 23 msec
 decrypt and verify bdp revoke package elapsed = 29 msec
 write bdp revoke package elapsed = 2240 msec
 compare bdprevoke package elapsed = 57 msec
 Bul-ray Disc Player Revoke done(0x8002f000)
dev_flash3_024.tar.aa.* files from PUP are unpkg'ed to dev_flash3
 Update Program Revoke list
 read program revoke list package (704 bytes) elapsed = 7 msec
 update program revoke list elapsed = 331 msec
 Update Program Revoke list done(0x8002f000)
RL_FOR_PROGRAM.img from PUP is copied to trvk_prg
 move_2block_status_into_the_region(): region id = 3
 rewrite_region() region id = 0x3, start_lba = 0x0, end_lba = 0x4000
 rewrite region done (ret = 0x8002f000)
 rewrite region elapsed time = 1262 msec
 touch_1st_sector_in_block() region id = 0x3, start_lba = 0x0, end_lba = 0x4000
 touch_1st_sector() done (ret = 0x8002f000)
 touch_1st_sector() elapsed time = 1121 msec
 rewrite_region() region id = 0x3, start_lba = 0x0, end_lba = 0x4000
 rewrite region done (ret = 0x8002f000)
 rewrite region elapsed time = 1262 msec
 Update BD firmware
 read BD firmware package (1966992 bytes) elapsed = 142 msec
 update BD firmware elapsed = 184 msec
 read BD firmware package (951040 bytes) elapsed = 78 msec
 update BD firmware elapsed = 142 msec
 read BD firmware package (951040 bytes) elapsed = 80 msec
 update BD firmware elapsed = 13959 msec
 Update BD firmware done(0x8002f000)
Appropiate BD firmware for that Bluray Drive is flashed to BD eeprom
 Update Multi-Card controller firmware
 read MCC package (28636 bytes) elapsed = 25 msec
 update MCC elapsed = 24 msec
 Update Multi-Card controller firmware done(0x8002f000)
If SKU with MultiCardReader then Multi-Card controller firmware is flashed to SST 1mbit Flash
 Update BlueTooth firmware
 read BT package (639368 bytes) elapsed = 62 msec
 update BT elapsed = 56 msec
 Update BlueTooth firmware done(0x8002f000)
Bluetooth NOR flash is updated with

BlueTooth firmware

 Update System controller firmware
 read SC patch package (4864 bytes) elapsed = 24 msec
 read SC patch package (4864 bytes) elapsed = 24 msec
 read SC patch package (4864 bytes) elapsed = 23 msec
 Update System controller firmware done(0x8002f000)
Syscon Hardware is updated with appropiate Syscon Firmware
 update package elapsed time = 228361 msec
 post processiong...
 post processiong done
 cleanup update status (ret = 0)
 os version = 03.1500
 build_version = 38031,20091206
 region of core os package = 0x40000000
 build_target = CEX-ww
 build target id = 0x83
 manufacturing updating SUCCESS(0x8002f000)
 set product mode (ret = 0)
 Total Elapsed time = 230556 msec

old crossgrading Retail/CEX to Debug/DEX[edit source]

Note
For this to work your system must be below or at 1.80 for the 1.80 debug update and below or on 2.01 for the 2.15 debug update. Just use the next version up from your current firmware version for the retail update.

It's not very usefull, esp. nowadays, added for historic reasons

How to install debug firmware on retail PS3[edit source]

old source: http://www.ps3hax.net/other-misc-tutorials/4808-tutorial-how-install-debug-firmware-retail-ps3-partially-hdd-swap-method.html

Tools needed[edit source]

  • 1 PS3 system
  • 2 PS3 hard drives that are the same size
  • 1 retail firmware upgrade
  • 1.80 Or 2.15 debug firmware

Instructions[edit source]

  1. Format both hard drives on the PS3 system.
  2. Download a debug PS3 firmware and place it in USB stick, and start the update. This will copy all the debug firmware files to the PS3's HDD-A.
  3. After copied the PS3 will restart and you will see the normal update menu which prompts you to click the button to start update. Do NOT update your PS3, but power it off.
  4. Next remove the HDD-A, and place in the second HDD, HDD-B in the PS3.
  5. Download and copy a retail PS3 firmware to a USB stick.
  6. Again as before place USB in PS3 and update the PS3 as normal but when you get to the screen where it asks for you to press button, do that but stop when it asks you to AGREE to Terms and Condition Page.
  7. While the system is still powered on and on the update screen, REMOVE HDD-B, and insert HDD-A.
  8. After swapping the HDD's continuie to update the PS3 as normal and the PS3 will install the debug PS3 firmware=
  9. Go to the settings and check firmware version and there you will also see the debugging PS3 options :)




Ancient preproduction / prototype[edit source]

ceb decrypter (works on 0.50.004.r010, may work on others)

http://pastie.org/private/al9p0vkw3g0lgat2yeazw#4,11

 CEB-201x, DEH-R1030 etc.
 
 old SDKs contain these binairy files in \cell\target\bootrom, 
 while knowledge about previous version existance can be revealed by the documentation in \cell\info\old\XXX

ebootrom structure[edit source]

Header[edit source]

Offset Length Type Information
0x0 0x4 unsigned long Unknown
0x4 0x4 unsigned long File Count
0x8 0x8 unsigned long File Length
0x10 0x30 * File Count File Table File Table

File Table[edit source]

The file table consists of a number of file entries determined by File Count, with the format below:

Offset Length Type Information
0x0 0x8 unsigned long Data Offset
0x10 0x8 unsigned long Data Length
0x20 0x20 unsigned long Data FileName (see below)

Filename IDs[edit source]

File Entry ID Filename
0x1 sdk_version
0x2 version.txt
0x3 ros (CORE_OS_PACKAGE.pkg)
0x4 trvk_prg
0x5 trvk_pkg
0x6 nand_update
0x7 bdit_firmware
0x8 bdpt_301r_firmware
0x9 bdpt_303r_firmware
bdit_firmware / bdpt_301r_firmware / bdpt_303r_firmware / nand_update / ros / trvk_pkg / trvk_prg[edit source]
Header[edit source]
Offset Length Type Information
0x0 0x4 unsigned long Unknown
0x4 0x4 unsigned long File Count
0x8 0x8 unsigned long File Length
0x10 0x30 * File Count File Table File Table
File Table[edit source]

The file table consists of a number of file entries determined by File Count, with the format below:

Offset Length Type Information
0x0 0x8 unsigned long Data Offset
0x10 0x8 unsigned long Data Length
0x20 0x20 unsigned long DataName
  • bdit_firmware -> BDIT_FIRMWARE_PACKAGE.pkg
  • bdpt_301r_firmware -> BDPT_FIRMWARE_PACKAGE_301R.pkg
  • bdpt_303r_firmware -> BDPT_FIRMWARE_PACKAGE_303R.pkg
  • trvk_pkg -> RL_FOR_PACKAGE.img
  • trvk_prg -> RL_FOR_PROGRAM.img
  • ros -> CORE_OS_PACKAGE.pkg
  • nand_update -> NAND_UPDATE.pkg.[01]-[28]
0x40 Data Length unsigned long SCE signed package data
CORE_OS_PACKAGE.pkg[edit source]
File Entry ID Filename
aim_spu_module.self
appldr
creserved_0
default.spp
isoldr
lv0
lv1.self
lv1ldr
lv2_kernel.self
lv2ldr
mc_iso_spu_module.self
me_iso_spu_module.self
rvkldr
sb_iso_spu_module.self
sc_iso.self
sdk_version
spp_verifier.self
spu_pkg_rvk_verifier.self
spu_token_processor.self
sv_iso_spu_module.self
sys_init_app.self
sys_init_ios.self
sysctl.txt

known updates[edit source]

0.2 ebootrom[edit source]

0.3 ebootrom[edit source]

0.60 ebootrom[edit source]

   0.60: lv0 contains string : 'Sony CXD9823 NAND Controller'
Boot Loader SE Version 0.6 2006-01-31_13:53:04
Boot Loader SE Version 0.5.2005-12-28_16:10:53

0.80 ebootrom[edit source]

   key: rev 0x00

0.84 ebootrom[edit source]

   0.84: lv0 doesnt contain previous mentioned string
from decrypted lv0 0.84: Boot Loader SE Version 0.8.4 (Build ID: 822,8517, Build Data: 2006-05-16_17:50:21)

0.85 ebootrom[edit source]

0.90 ebootrom[edit source]

0.90 PUP[edit source]

   ? 0.90: PS3UPDAT.PUP format was implemented since 0.90 ?

0.92 ebootrom[edit source]

   key: rev 0x01 + NP rev 0x01

0.93 ebootrom[edit source]

0.94 ebootrom[edit source]

0.95 PUP[edit source]

0.96 PUP[edit source]

100.002 ebootrom[edit source]

from decrypted lv0: Boot Loader SE Version 1.0.0 (Build ID: 1643,16413, Build Data: 2006-10-05_16:32:34)

ebootrom.100.002.rar (51.29 MB)