Ну нам с PS4 читать не нужно нанд, да и не проблема это как говорится, и как верно сказали выше не за чем А вот добрая старенькая PS3 с нанд памятью стоит того чтоб с ней побороться, и потому прошу помощи сообщества в этом не особо легком деле. Скрин ошибкт нанда. https://drive.google.com/file/d/0ByS2ao-8nM_kdTVHNGtFVGlaWkE/edit?usp=sharing Нанды, первый и второй, ну или TOP and Bottom Ошибка проверки дампа SKU identity data Снимал прогером, раз двадцать, BAD получается в первом нанде (1Bad) Родной нанд записывается нормально, консоль стартует, а вот если пропатчить, то включается и сразу же выключается и мигает красным, заливаю родные нанды, все работает. Как можно решить проблему?
Друзья, ну триста раз уже писали и жевали всюду - это дело надо ремаппить. Пакуете все в архив и отправляете на ps3hax.net юзеру judges, который за таксу в 10 евро на пэйпэл все сделает. Пока что это единственный человек, который знает все алгоритмы ремапа бэдов (а их 16, из которых flowrebuilder знает только два). Проверено лично на куче приставок с подобной ерундой, все работает.
Ух, если честно чем только не пробовал, но основной, которым всегда пользуюсь, PS3 Flash Tool v4.55 by Rogero & Swizzy, им только NAND делаю. Принято, напишу.
Конечно интересно! Вообще нетипичный случай. Одно то, что у тебя флештул ругался на SKUIdentity, уже указывало на то, что модель консоли - CECHB или CECHC, а в них стоит "нормальная" память, 0А, которая обычно не содержит бэдов или ремаппит их по известному ребилдером алгоритму. Рассказывай в общем.
Ничего не обычного не делал, это чтоб потом не было, да, фигня, делается пять сек. FAT консолей с NAND сделал штук 20, и с такой проблемой столкнулся первый раз. как и писал выше в первом NAND, а по версии FlowRebuilder_v.4.2.3.0 NAND0 and NAND1 емеется BAD блок. Сhip: K9F1G08U0A package: TSOP-48 adapter: TST-D40/TS48-N08 Erasing... Testing... Адрес 0062C0-000: 0000 00FF Спойлер: Стирание микросхемы и последующее тестирование на чистоту COM14: V5.7.43.550-1; Mf=B9E60664; Wf=3F4500F1; 17.06.2014 15:44:10 ECF1004B394631473038553041201818 0825121C181840001018F5FFFF7FFF00 00008000000000801060D04004704000 00000000000000000000000000000000 000000FFFF0000000000000000000001 0000000000000000002B9B00000000807A 00000000000000000000000000000000 00000000000000000000000000000000 0F0F0F0F0F0F0F0F7868584838281808 0F0F0F0F0F0F0F0F7868584838281808 0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F 0F0F0F0F0F0F0F0FFFFF0000FF00000055 Cmd=0500; Er=0090; 0062C0-000: 0000 0000 -60 Tm=1581; St=14: Отмена команды пользователем. T=135,68s COM14: V5.7.43.550-1; Mf=B9E60664; Wf=3F4500F1; 17.06.2014 15:46:34 ECF1004B394631473038553041202018 08251218181840001018F5FFFF7FFF00 00008000000000801060D04004704000 00000000000000000000000000000000 000000FFFF0000000000000000000001 0000000000000000002B9B00000000807E 00000000000000000000000000000000 00000000000000000000000000000000 0F0F0F0F0F0F0F0F7868584838281808 0F0F0F0F0F0F0F0F7868584838281808 0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F 0F0F0F0F0F0F0F0FFFFF0000FF00000055 Cmd=0500; Er=0090; 0062C0-000: 0000 0000 -60 Tm=1581; St=14: Отмена команды пользователем. T=142,52s NAND патчил: PS3_NOR-NAND_Statistic_fixed, FlowRebuilder, PS3DumpChecker, BwE NAND Validator После пропатчивания и заливке нанда в микросхему консоль просто включается и сразу же выключается. Если посмотреть на лог BwE NAND Validator то выглядит как то все не очень хорошо. Спойлер: Лог BwE NAND Validator Filename: swap_nand.bin MD5: 2B31C1050AF88B22FFC688809901DDA6 File Size: 268435456 Validator Version: 1.02 ======================================================================= Return Lv0ldr/Bootldr: Encrypted Binary Size - 2A3F ✔ Decrypted Binary Size - 2A3F ✔ Calculated Bootldr Size - 2A430 ✔ Rev Key - 04AD5618648D4994238FB8A1 (CECHA/CECHC/CECHE (COK-001/002/W)) ✔ PerConsole Nonce - 0D5A67124D4EBF262939CB88 ✔ Lv0ldr/Bootldr Corrupt Sequence Check: Nothing Found! ✔ Lv0ldr/Bootldr Encrypted Statistics: Sum: 173104 ✔ Mean: 676.1875 ✔ Std Dev: 24.4414466373308 - [WARNING] First Region Header: Unknown Blank - ✔ Magic Header - 0FACE0FF - DEADBEEF ✔ Region Count - 00 ✔ Unknown - 00 ✔ Blank Filled Block - ✔ Return Flash-Region Table: Count - 9 ✔ Length - EBFE00 ✔ asecure_loader ✔ Size: 040000 ✔ Location: 000600 (0x40800) ✔ eEID ✔ Size: 010000 ✔ Location: 040600 (0x80800) ✔ cISD ✔ Size: 000800 ✔ Location: 050600 (0x90800) ✔ cCSD ✔ Size: 000800 ✔ Location: 050E00 (0x91000) ✔ trvk_prg ✔ Size: 002000 ✔ Location: 051600 (0x91800) ✔ trvk_pkg ✔ Size: 002000 ✔ Location: 053600 (0x93800) ✔ creserved_0 ✔ Size: 02A800 ✔ Location: 055600 (0x95800) ✔ ros ✔ Size: E00000 ✔ Location: 07FE00 (0xC0000) ✔ cvtrm ✔ Size: 040000 ✔ Location: E7FE00 (0xEC0000) ✔ Structure/Corruption Check - ✔ Asecure_Loader/Metldr: File Length - 0EDD ✔ Encrypted Binary Size - EE10 ✔ Decrypted Binary Size - 0EDD ✔ File Name - metldr ✔ Calculated Metldr Size - EE10 ✔ Rev Key - 2F6C622ECA7FAE0D2F76B5D4 (CECHA/CECHC/CECHE(COK-001/002/W)) ✔ PerConsole Nonce - 0D5A67124D4EBF262939CB88 ✔ Metldr Version - Metldr Old - Downgradeable ✔ Blank Filled Block - ✔ Asecure_Loader/Metldr Corrupt Sequence Check: Nothing Found! ✔ Asecure_Loader/Metldr Encrypted Statistics: Sum: 60944 ✔ Mean: 238.0625 ✔ Std Dev: 15.3754324026555 ✔ Encrypted Individual Data: Entries - 06 ✔ eEID Package Length - 1DD0 ✔ Blank Filler - ✔ EID Entry Table: EID0 Entry Point - 0070 ✔ Length - 0860 ✔ EID Number - 0 ✔ EID1 Entry Point - 08D0 ✔ Length - 02A0 ✔ EID Number - 1 ✔ EID2 Entry Point - 0B70 ✔ Length - 0730 ✔ EID Number - 2 ✔ EID3 Entry Point - 12A0 ✔ Length - 0100 ✔ EID Number - 3 ✔ EID4 Entry Point - 13A0 ✔ Length - 0030 ✔ EID Number - 4 ✔ EID5 Entry Point - 13D0 ✔ Length - 0A00 ✔ EID Number - 5 ✔ EID0: IDPS - 00000001008C000310006C626558BC83 ✔ PerConsole Nonce - 0D5A67124D4EBF262939CB88 ✔ Static + Count - 0012000B (11) ✔ EID Data Entropy: 7.9058868207992 Bits ✔ EID1: EID Data Entropy: 7.685176277192 Bits ✔ EID2: P-Block Size - 0080 ✔ S-Block Size - 0690 ✔ Padding ✔ EID Data Entropy: 7.88819212897683 Bits ✔ EID3: Content Availiability - 00000001 ✔ Indicating/Build ID - A81F9173 ✔ CKP_Management_ID - 00000000006F4B5E ✔ PerConsole Nonce - 0D5A67124D4EBF262939CB88 ✔ Unknown Static - 000100D0 ✔ EID Data Entropy: 7.08278455364779 Bits ✔ EID4: 128bit Key - A25C694DCFC812C83422676A7C6B5147 ✔ 128bit Key - 180EF83D82D27C72479D1D262D1DEBDA ✔ CMAC-OMAC1 - D2B177C34FA31EBC64915E3D194DBD9E ✔ EID Data Entropy: 5.29329583405449 Bits ✔ EID5: IDPS - 00000001008C000310006C626558BC83 ✔ PerConsole Nonce - 0D5A67124D4EBF262939CB88 ✔ Unknown Static - 00120730 ✔ EID Data Entropy: 7.92760101866097 Bits ✔ EID Unreferenced Area: Filled - ✔ IDPS Info: Target ID - 8C (Retail / Kiosk Russia / CEX RU3) ✔ Model - 03 (CECHC (COK-002)) ✔ IDPS - EID0 & EID5 ✔ Console Individual System Data: Entries - 03 ✔ cISD Package Length - 0270 ✔ Blank Filler - ✔ cISD Entry Table: cISD0 Entry Point - 0040 ✔ Length - 0020 ✔ cISD Number - 0 ✔ cISD1 Entry Point - 0060 ✔ Length - 0200 ✔ cISD Number - 1 ✔ cISD2 Entry Point - 0260 ✔ Length - 0010 ✔ cISD Number - 2 ✔ CISD0: MAC Address - 0019C5BF97E5 ✔ Unknown Static - ✔ CISD1: IDLog Header - 7F49444C (IDL) ✔ Unknown Static -0002 ✔ Area Start - 0100 ✔ Unknown Static - 7F49 ✔ Unknown Static - 0002 ✔ ECID - 01C53D92810497180A0C000000000000 ✔ Board ID - 27430435 ✔ Kiban ID - 3HB21804018F ✔ Unknown ID - 002800280038 ✔ CKP2 Data - 0001 ✔ Unknown Static Block - ✔ Unknown Semi Static ID - 0001001100020012 ✔ CKP Management ID - 00000000006F4B5E ✔ Unknown Data - ✔ Availiable Area - ✔ CISD2: WLAN Channel - 1FFF ✔ WLAN Filler - ✔ Unreferenced Area - ✔ CISD Unreferenced Area: Filled - ✔ Common System Data: Entries - 01 ✔ CCSD Package Length - 0800 ✔ Blank Filler - ✔ CCSD Entry Table: CCSD0 Entry Point - 0020 ✔ Length - 0030 ✔ CCSD Number - 0 ✔ CCSD0: Structure - ✔ CCSD Unreferenced Area: Unreferenced Area - ✔ Return TRVK PRG Header: Offset to region - 1010 ✔ Offset to file - 1010 ✔ Region Size - 2000 ✔ Unknown Filler - ✔ Return TRVK_PRG0: Filler - ✔ Data Size - 02C0 ✔ Header - SCE ✔ Header Filler - ✔ Unknown - ✔ Meta Size - C0 ✔ Unknown 2 - ✔ Unknown 3 - ✔ Empty Space - ✔ Return TRVK_PRG1: Filler - ✔ Data Size - 0000 ✔ Header - SCE ✔ Header Filler - ✔ Unknown - ✔ Meta Size - C0 ✔ Unknown 2 - ✔ Unknown 3 - ✔ Empty Space -[WARNING] - Too long to display! Return TRVK PKG Header: Offset to region - 1010 ✔ Offset to file - 1010 ✔ Region Size - 2000 ✔ Unknown Filler - ✔ Return TRVK_PKG0: Filler - ✔ Data Size - 0240 ✔ Header - SCE ✔ Header Filler - ✔ Unknown - ✔ Meta Size - 40 ✔ Unknown 2 - ✔ Unknown 3 - ✔ Empty Space - ✔ Return TRVK_PKG1: Filler - ✔ Data Size - 0000 ✔ Header - SCE ✔ Header Filler - ✔ Unknown - ✔ Meta Size - 40 ✔ Unknown 2 - ✔ Unknown 3 - ✔ Empty Space -[WARNING] - Too long to display! Creserved_0: Filler - ✔ ROS0/1 Versions: 360.000 ✔ 453.000 ✔ ROS0: Header Filler - ✔ Length of Flash Region - 6FFFE0 ✔ Unknown Static - ✔ Entry Count - 17 ✔ Length of Flash Region 2 - 6FFFE0 ✔ ROS0 360.000 File Table; AuthID & MD5: creserved_0 ✔ AuthID: N/A ✔ MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔ sdk_version ✔ AuthID: N/A ✔ MD5: 4634C0633DC83965F4FB6192C0C0720E ✔ spu_pkg_rvk_verifier.self ✔ AuthID: 1070000022000001 ✔ MD5: 8D206C526AF5943020942DCC1F351A74 ✔ spu_token_processor.self ✔ AuthID: 1070000023000001 ✔ MD5: BA8BF9D8C3477AC4D9E96CDE01D6D4FB ✔ spu_utoken_processor.self ✔ AuthID: 107000004C000001 ✔ MD5: 4AEE9A65BF340CC3860C9FD299885086 ✔ sc_iso.self ✔ AuthID: 1070000020000001 ✔ MD5: 3E54D40C05458CAE7ACD0936942A9657 ✔ aim_spu_module.self ✔ AuthID: 1070000025000001 ✔ MD5: 1F972A1F803DE63BDBC6CE92AC8FC199 ✔ spp_verifier.self ✔ AuthID: 1070000021000001 ✔ MD5: 28C2AA9112D875FC77D907A1658FE94D ✔ mc_iso_spu_module.self ✔ AuthID: 1070000037000001 ✔ MD5: B4642450399A338282E6355899F98B5B ✔ me_iso_spu_module.self ✔ AuthID: 1070000043000001 ✔ MD5: 079B218624983A1D864B33F2A2A503E3 ✔ sv_iso_spu_module.self ✔ AuthID: 1070000024000001 ✔ MD5: CA61237AA2EF64EAA638BADB0C5E7FB1 ✔ sb_iso_spu_module.self ✔ AuthID: 107000001F000001 ✔ MD5: F53F8382A4D2229E0E102B7A64063CA3 ✔ lv1.self ✔ AuthID: 1FF0000002000001 ✔ MD5: 5735217EC885CD474F062953AE075644 ✔ lv0 ✔ AuthID: 1FF0000001000001 ✔ MD5: 3823882072F8E984BC7C9A4AA0254296 ✔ lv0.2 ✔ AuthID: 1FF0000001000001 ✔ MD5: F80BBD2D06CA56B919B5B073C7E53979 ✔ lv2_kernel.self ✔ AuthID: 1050000003000001 ✔ MD5: D03DF023FFBB6491D047B7E23236283A ✔ eurus_fw.bin ✔ AuthID: N/A ✔ MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔ emer_init.self ✔ AuthID: 10700003FC000001 ✔ MD5: 3A5B8431997CC655EEC6E08B04AD65CF ✔ hdd_copy.self ✔ AuthID: 1070000501000001 ✔ MD5: 6C4C3CE9AA21864EA64CD9A9AD5E5C7E ✔ manu_info_spu_module.self ✔ AuthID: 1070000055000001 ✔ MD5: 8EC1208585D367BAD1D9B89DB6B8ACF7 ✔ prog.srvk ✔ AuthID: N/A ✔ MD5: B86A20657203F03CACFBFF3433F8C2A8 ✔ [WARNING] - [DANGER] - 14FB8B69B907B422 MD5: F8BA64550C819EA3E2CFBA069BD68C67 ✔ ROS1: Header Filler - ✔ Length of Flash Region - 6FFFE0 ✔ Unknown Static - ✔ Entry Count - 19 ✔ Length of Flash Region 2 - 6FFFE0 ✔ ROS1 453.000 File Table; AuthID & MD5: creserved_0 ✔ AuthID: N/A ✔ MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔ sdk_version ✔ AuthID: N/A ✔ [DANGER]- 5D36E73110FC41C8584AA5B26938F9E8 spu_pkg_rvk_verifier.self ✔ AuthID: 1070000022000001 ✔ [DANGER]- 1951C6AD7C2B2FA338E2F2F698187097 spu_token_processor.self ✔ AuthID: 1070000023000001 ✔ [DANGER]- DA1CC397CB3508EC90D9999BC9C16753 spu_utoken_processor.self ✔ AuthID: 107000004C000001 ✔ [DANGER]- 248D03F6549D9D9221FBC2FBACDF6744 sc_iso.self ✔ AuthID: 1070000020000001 ✔ [DANGER]- E59C0303581DD966219AEAD5C0DDDB2C aim_spu_module.self ✔ AuthID: 1070000025000001 ✔ [DANGER]- 3C84AC50FBE76E8A383255ADCE3AE0F1 spp_verifier.self ✔ AuthID: 1070000021000001 ✔ [DANGER]- 5FA9DDEAF31DF4BAE690E88A98B3AAF1 mc_iso_spu_module.self ✔ AuthID: 1070000037000001 ✔ [DANGER]- 82978052F562F52E5AB7A9233F4B5351 me_iso_spu_module.self ✔ AuthID: 1070000043000001 ✔ [DANGER]- F1939DFC8545998F1FEBDC6094A497DE sv_iso_spu_module.self ✔ AuthID: 1070000024000001 ✔ [DANGER]- EBE282C3B4AB9FB6E5E38A6BF29D8274 sb_iso_spu_module.self ✔ AuthID: 107000001F000001 ✔ [DANGER]- 25FE425544D749687661EC7E42C6A018 sv_iso_for_ps2emu.self ✔ AuthID: 1070000059000001 ✔ [DANGER]- 02525898CE754CCCF835A82DDC72AB65 default.spp ✔ AuthID: N/A ✔ [DANGER]- 20462B76FB726BC0864138CFD73CFE02 lv1.self ✔ AuthID: 1FF0000002000001 ✔ [DANGER]- 971241231F25EFD25419E9D432A269E0 lv0 ✔ AuthID: 1FF0000001000001 ✔ [DANGER]- 77A5B85CDFA0EBCD63E1E7A16E9E7A49 lv0.2 ✔ AuthID: 1FF0000001000001 ✔ [DANGER]- 59751226BB229CF9C7BD54EB568577F7 lv2_kernel.self ✔ AuthID: 1050000003000001 ✔ [DANGER]- 2304855635A455294AE6000D6DA2A633 eurus_fw.bin ✔ AuthID: N/A ✔ MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔ emer_init.self ✔ AuthID: 10700003FC000001 ✔ [DANGER]- 52C757E0E6D854DD7E975DC8D3D7E586 hdd_copy.self ✔ AuthID: 1070000501000001 ✔ [DANGER]- 5AC1BE7DB6BB19E5E0D78F06A8235055 manu_info_spu_module.self ✔ AuthID: 1070000055000001 ✔ [DANGER]- 583580AFD8025DAEEBC9C96FF3CC1C42 CoreOS MD5 Validation: ROS0: 3.60 - FA0AC8FFDCC06A8C39179017F150BA88 ✔ ROS1: [DANGER] - 48031F979F7905F56B0C068BB1D6AFAA CVTRM: Header 1 - SCEIVTRM ✔ Version - ✔ Unknown Static - ✔ VTRM 0: Header - VTRM ✔ Version - 04 ✔ SHA1 Hash - 2978B8E7D62EEF62DEDB747158D04D3D52F8A9B1 ✔ Structure - ✔ Unknown Data - ✔ Protected Files Table Reserved Entries - 96 ✔ VTRM 0 Entries: Table Entry 1 - ✔ Reserved Table Entry 1 - 0400000002000005 ✔ Used Table Entry 1 - 10700005FF000001 - vsh.self ✔ Self Data Validation - ✔ VTRM 0 Continued: Filler - ✔ Footer - ✔ Unknown Static - ✔ Filled Space - ✔ VTRM 1: Header - VTRM ✔ Version - 04 ✔ SHA1 Hash - 2978B8E7D62EEF62DEDB747158D04D3D52F8A9B1 ✔ X & Y Tables Reserved Entries - 1168 ✔ Protected Files Table Reserved Entries - 2336 ✔ Protected Files Table Used Entries - 2 ✔ Reserved Entries - ✔ VTRM 1 Entries: Table Entry 1 - ✔ Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔ Used Table Entry 1 - 1070000039000001 - bdp_bdmv.self ✔ Self Data Validation - ✔ Table Entry 2 - ✔ Reserved Table Entry 2 - 0400000002000005 ✔ Used Table Entry 2 - 10700005FF000001 - vsh.self ✔ Self Data Validation - ✔ VTRM 1 Continued: Filled Area - ✔ Encrypted Sequence - ✔ Empty Space - ✔ Unknown Filler - ✔ Return CELL_Ext_OS_Area: Header - ✔ Unknown 1 - ✔ Unknown 2 - ✔ Filled Area - ✔ Break Section - ✔ Filled Area 2 - ✔ Empty Area - ✔ MD5: 99E98DA6276D934C9B18BC0D6122BAAE ✔ Return OtherOS: Filled Area - ✔ Return Lv0ldr/Bootldr: Encrypted Binary Size - 2A3F ✔ Decrypted Binary Size - 2A3F ✔ Calculated Bootldr Size - 2A430 ✔ Rev Key - 04AD5618648D4994238FB8A1 (CECHA/CECHC/CECHE (COK-001/002/W)) ✔ PerConsole Nonce - 04AD5618648D4994238FB8A1 ✔ Lv0ldr/Bootldr Corrupt Sequence Check: Nothing Found! ✔ Lv0ldr/Bootldr Encrypted Statistics: Sum: 173104 ✔ Mean: 676.1875 ✔ Std Dev: 24.4414466373308 - [WARNING] Return Min Version: [DANGER] File Digest Key: Total number of keys: 36 ✔ Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔ Bulk AuthID Check: Total number of .self IDs: 52 [WARNING] PerConsole Nonce Match: Metldr, EID0, EID3, EID5 & Bootldr ✔ 16 bit Corrupt Sequence Check: Nothing Found! ✔ 8 bit Corrupt Sequence Check: Nothing Found! ✔ Repetition Check: Nothing Found! ✔ Time to calculate: 33.015526 seconds. Если патчить любой прогой для NAND то лог остается неизменным и консоль не запускается, но вот в комплекте с BwE NAND Validator лежит файл norpatch.exe (позволяет патчить как NAND так и NOR), причем интересным функционалом является то, что позволяет патчить под так называемую прямую установку прошивки, и с использованием донгла. Далее берем и просто перетягиваем файл NAND на файл norpatch.exe, открывается консольное окно где нам предлагают выбрать как патчить нанд, в моем случае помог выбор как на скрине ниже.
После прогонки через BwE NAND Validator практически все ошибки в нанде были устранены. Спойлер: BwE NAND Validator swap_nand_patched.bin проверка Filename: swap_nand_patched.bin MD5: EA0E1C280E0A2FB79F605589DAD64736 File Size: 268435456 Validator Version: 1.02 ======================================================================= Return Lv0ldr/Bootldr: Encrypted Binary Size - 2A3F ✔ Decrypted Binary Size - 2A3F ✔ Calculated Bootldr Size - 2A430 ✔ Rev Key - 04AD5618648D4994238FB8A1 (CECHA/CECHC/CECHE (COK-001/002/W)) ✔ PerConsole Nonce - 0D5A67124D4EBF262939CB88 ✔ Lv0ldr/Bootldr Corrupt Sequence Check: Nothing Found! ✔ Lv0ldr/Bootldr Encrypted Statistics: Sum: 173104 ✔ Mean: 676.1875 ✔ Std Dev: 24.4414466373308 - [WARNING] First Region Header: Unknown Blank - ✔ Magic Header - 0FACE0FF - DEADBEEF ✔ Region Count - 00 ✔ Unknown - 00 ✔ Blank Filled Block - ✔ Return Flash-Region Table: Count - 9 ✔ Length - EBFE00 ✔ asecure_loader ✔ Size: 040000 ✔ Location: 000600 (0x40800) ✔ eEID ✔ Size: 010000 ✔ Location: 040600 (0x80800) ✔ cISD ✔ Size: 000800 ✔ Location: 050600 (0x90800) ✔ cCSD ✔ Size: 000800 ✔ Location: 050E00 (0x91000) ✔ trvk_prg ✔ Size: 002000 ✔ Location: 051600 (0x91800) ✔ trvk_pkg ✔ Size: 002000 ✔ Location: 053600 (0x93800) ✔ creserved_0 ✔ Size: 02A800 ✔ Location: 055600 (0x95800) ✔ ros ✔ Size: E00000 ✔ Location: 07FE00 (0xC0000) ✔ cvtrm ✔ Size: 040000 ✔ Location: E7FE00 (0xEC0000) ✔ Structure/Corruption Check - ✔ Asecure_Loader/Metldr: File Length - 0EDD ✔ Encrypted Binary Size - EE10 ✔ Decrypted Binary Size - 0EDD ✔ File Name - metldr ✔ Calculated Metldr Size - EE10 ✔ Rev Key - 2F6C622ECA7FAE0D2F76B5D4 (CECHA/CECHC/CECHE(COK-001/002/W)) ✔ PerConsole Nonce - 0D5A67124D4EBF262939CB88 ✔ Metldr Version - Metldr Old - Downgradeable ✔ Blank Filled Block - ✔ Asecure_Loader/Metldr Corrupt Sequence Check: Nothing Found! ✔ Asecure_Loader/Metldr Encrypted Statistics: Sum: 60944 ✔ Mean: 238.0625 ✔ Std Dev: 15.3754324026555 ✔ Encrypted Individual Data: Entries - 06 ✔ eEID Package Length - 1DD0 ✔ Blank Filler - ✔ EID Entry Table: EID0 Entry Point - 0070 ✔ Length - 0860 ✔ EID Number - 0 ✔ EID1 Entry Point - 08D0 ✔ Length - 02A0 ✔ EID Number - 1 ✔ EID2 Entry Point - 0B70 ✔ Length - 0730 ✔ EID Number - 2 ✔ EID3 Entry Point - 12A0 ✔ Length - 0100 ✔ EID Number - 3 ✔ EID4 Entry Point - 13A0 ✔ Length - 0030 ✔ EID Number - 4 ✔ EID5 Entry Point - 13D0 ✔ Length - 0A00 ✔ EID Number - 5 ✔ EID0: IDPS - 00000001008C000310006C626558BC83 ✔ PerConsole Nonce - 0D5A67124D4EBF262939CB88 ✔ Static + Count - 0012000B (11) ✔ EID Data Entropy: 7.9058868207992 Bits ✔ EID1: EID Data Entropy: 7.685176277192 Bits ✔ EID2: P-Block Size - 0080 ✔ S-Block Size - 0690 ✔ Padding ✔ EID Data Entropy: 7.88819212897683 Bits ✔ EID3: Content Availiability - 00000001 ✔ Indicating/Build ID - A81F9173 ✔ CKP_Management_ID - 00000000006F4B5E ✔ PerConsole Nonce - 0D5A67124D4EBF262939CB88 ✔ Unknown Static - 000100D0 ✔ EID Data Entropy: 7.08278455364779 Bits ✔ EID4: 128bit Key - A25C694DCFC812C83422676A7C6B5147 ✔ 128bit Key - 180EF83D82D27C72479D1D262D1DEBDA ✔ CMAC-OMAC1 - D2B177C34FA31EBC64915E3D194DBD9E ✔ EID Data Entropy: 5.29329583405449 Bits ✔ EID5: IDPS - 00000001008C000310006C626558BC83 ✔ PerConsole Nonce - 0D5A67124D4EBF262939CB88 ✔ Unknown Static - 00120730 ✔ EID Data Entropy: 7.92760101866097 Bits ✔ EID Unreferenced Area: Filled - ✔ IDPS Info: Target ID - 8C (Retail / Kiosk Russia / CEX RU3) ✔ Model - 03 (CECHC (COK-002)) ✔ IDPS - EID0 & EID5 ✔ Console Individual System Data: Entries - 03 ✔ cISD Package Length - 0270 ✔ Blank Filler - ✔ cISD Entry Table: cISD0 Entry Point - 0040 ✔ Length - 0020 ✔ cISD Number - 0 ✔ cISD1 Entry Point - 0060 ✔ Length - 0200 ✔ cISD Number - 1 ✔ cISD2 Entry Point - 0260 ✔ Length - 0010 ✔ cISD Number - 2 ✔ CISD0: MAC Address - 0019C5BF97E5 ✔ Unknown Static - ✔ CISD1: IDLog Header - 7F49444C (IDL) ✔ Unknown Static -0002 ✔ Area Start - 0100 ✔ Unknown Static - 7F49 ✔ Unknown Static - 0002 ✔ ECID - 01C53D92810497180A0C000000000000 ✔ Board ID - 27430435 ✔ Kiban ID - 3HB21804018F ✔ Unknown ID - 002800280038 ✔ CKP2 Data - 0001 ✔ Unknown Static Block - ✔ Unknown Semi Static ID - 0001001100020012 ✔ CKP Management ID - 00000000006F4B5E ✔ Unknown Data - ✔ Availiable Area - ✔ CISD2: WLAN Channel - 1FFF ✔ WLAN Filler - ✔ Unreferenced Area - ✔ CISD Unreferenced Area: Filled - ✔ Common System Data: Entries - 01 ✔ CCSD Package Length - 0800 ✔ Blank Filler - ✔ CCSD Entry Table: CCSD0 Entry Point - 0020 ✔ Length - 0030 ✔ CCSD Number - 0 ✔ CCSD0: Structure - ✔ CCSD Unreferenced Area: Unreferenced Area - ✔ Return TRVK PRG Header: Offset to region - 1010 ✔ Offset to file - 1010 ✔ Region Size - 2000 ✔ Unknown Filler - ✔ Return TRVK_PRG0: Filler - ✔ Data Size - 02E0 ✔ Header - SCE ✔ Header Filler - ✔ Unknown - ✔ Meta Size - E0 ✔ Unknown 2 - ✔ Unknown 3 - ✔ Empty Space - ✔ Return TRVK_PRG1: Filler - ✔ Data Size - 0000 ✔ Header - SCE ✔ Header Filler - ✔ Unknown - ✔ Meta Size - E0 ✔ Unknown 2 - ✔ Unknown 3 - ✔ Empty Space - ✔ Return TRVK PKG Header: Offset to region - 0020 ✔ Offset to file - 0020 ✔ Region Size - 2000 ✔ Unknown Filler - ✔ Return TRVK_PKG0: Filler - ✔ Data Size - 0260 ✔ Header - SCE ✔ Header Filler - ✔ Unknown - ✔ Meta Size - 60 ✔ Unknown 2 - ✔ Unknown 3 - ✔ Empty Space - ✔ Return TRVK_PKG1: Filler - ✔ Data Size - 0000 ✔ Header - SCE ✔ Header Filler - ✔ Unknown - ✔ Meta Size - 60 ✔ Unknown 2 - ✔ Unknown 3 - ✔ Empty Space - ✔ Creserved_0: Filler - ✔ ROS0/1 Versions: 355.000 ✔ 355.000 ✔ ROS0: Header Filler - ✔ Length of Flash Region - 6FFFE0 ✔ Unknown Static - ✔ Entry Count - 18 ✔ Length of Flash Region 2 - 6FFFE0 ✔ ROS0 355.000 File Table; AuthID & MD5: aim_spu_module.self ✔ AuthID: 1070000025000001 ✔ MD5: CA9BBC99C645173E1F98AA66C47A4500 ✔ appldr ✔ AuthID: 1FF000000C000001 ✔ MD5: 5C7436BFFC7E8D0A8E210BD0CA83CDF2 ✔ creserved_0 ✔ AuthID: N/A ✔ MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔ default.spp ✔ AuthID: N/A ✔ MD5: B0AD88EE637311AE5196F1B11D43BE0A ✔ emer_init.self ✔ AuthID: 10700003FC000001 ✔ MD5: 9D670B662BE696C8460449B7EFDD803E ✔ eurus_fw.bin ✔ AuthID: N/A ✔ MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔ hdd_copy.self ✔ AuthID: 1070000501000001 ✔ MD5: C1DC055EF0D6082580AC066E2B0A3C38 ✔ isoldr ✔ AuthID: 1FF000000A000001 ✔ MD5: 811329ECDB677181B9FC5CC3564D9047 ✔ lv0 ✔ AuthID: 1FF0000001000001 ✔ MD5: FF6753184D15F45508C5330A6144A4D9 ✔ lv1.self ✔ AuthID: 1FF0000002000001 ✔ MD5: 128499C45F6A66D48FCC0AFAE075C188 ✔ lv1ldr ✔ AuthID: 1FF0000008000001 ✔ MD5: E9AE2A62B4CC31750D4E56C7D5FFDD6F ✔ lv2ldr ✔ AuthID: 1FF0000009000001 ✔ MD5: A597AA3D8101674856EEF83AC1D0EF28 ✔ manu_info_spu_module.self ✔ AuthID: 1070000055000001 ✔ MD5: 65A3EEE4C48716674CB1C29609B5F54D ✔ mc_iso_spu_module.self ✔ AuthID: 1070000037000001 ✔ MD5: 5FFB33A6CECB99081E54A0E36E3C61AF ✔ me_iso_spu_module.self ✔ AuthID: 1070000043000001 ✔ MD5: 3B15C14770D654FEF9987E2517616D89 ✔ sb_iso_spu_module.self ✔ AuthID: 107000001F000001 ✔ MD5: B39E13FBD6B07F65616A0355EF5CB262 ✔ sc_iso.self ✔ AuthID: 1070000020000001 ✔ MD5: D7EDCA0ED3749F11EE34F0F532CF5AA7 ✔ sdk_version ✔ AuthID: N/A ✔ MD5: 3DA12E2CB472EB8193309B663D7C913A ✔ spp_verifier.self ✔ AuthID: 1070000021000001 ✔ MD5: 90D1C8A45F6FEE52219E1B14FF8C9765 ✔ spu_pkg_rvk_verifier.self ✔ AuthID: 1070000022000001 ✔ MD5: B76B7244B19032A9518787D9EC827F3C ✔ spu_token_processor.self ✔ AuthID: 1070000023000001 ✔ MD5: 22ABABCFC027F892AD2CF4E1C9FD925C ✔ spu_utoken_processor.self ✔ AuthID: 107000004C000001 ✔ MD5: 0E5A2E8A68FE09481D728C227DC5A165 ✔ ROS1: Header Filler - ✔ Length of Flash Region - 6FFFE0 ✔ Unknown Static - ✔ Entry Count - 18 ✔ Length of Flash Region 2 - 6FFFE0 ✔ ROS1 355.000 File Table; AuthID & MD5: aim_spu_module.self ✔ AuthID: 1070000025000001 ✔ MD5: CA9BBC99C645173E1F98AA66C47A4500 ✔ appldr ✔ AuthID: 1FF000000C000001 ✔ MD5: 5C7436BFFC7E8D0A8E210BD0CA83CDF2 ✔ creserved_0 ✔ AuthID: N/A ✔ MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔ default.spp ✔ AuthID: N/A ✔ MD5: B0AD88EE637311AE5196F1B11D43BE0A ✔ emer_init.self ✔ AuthID: 10700003FC000001 ✔ MD5: 9D670B662BE696C8460449B7EFDD803E ✔ eurus_fw.bin ✔ AuthID: N/A ✔ MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔ hdd_copy.self ✔ AuthID: 1070000501000001 ✔ MD5: C1DC055EF0D6082580AC066E2B0A3C38 ✔ isoldr ✔ AuthID: 1FF000000A000001 ✔ MD5: 811329ECDB677181B9FC5CC3564D9047 ✔ lv0 ✔ AuthID: 1FF0000001000001 ✔ MD5: FF6753184D15F45508C5330A6144A4D9 ✔ lv1.self ✔ AuthID: 1FF0000002000001 ✔ MD5: 128499C45F6A66D48FCC0AFAE075C188 ✔ lv1ldr ✔ AuthID: 1FF0000008000001 ✔ MD5: E9AE2A62B4CC31750D4E56C7D5FFDD6F ✔ lv2ldr ✔ AuthID: 1FF0000009000001 ✔ MD5: A597AA3D8101674856EEF83AC1D0EF28 ✔ manu_info_spu_module.self ✔ AuthID: 1070000055000001 ✔ MD5: 65A3EEE4C48716674CB1C29609B5F54D ✔ mc_iso_spu_module.self ✔ AuthID: 1070000037000001 ✔ MD5: 5FFB33A6CECB99081E54A0E36E3C61AF ✔ me_iso_spu_module.self ✔ AuthID: 1070000043000001 ✔ MD5: 3B15C14770D654FEF9987E2517616D89 ✔ sb_iso_spu_module.self ✔ AuthID: 107000001F000001 ✔ MD5: B39E13FBD6B07F65616A0355EF5CB262 ✔ sc_iso.self ✔ AuthID: 1070000020000001 ✔ MD5: D7EDCA0ED3749F11EE34F0F532CF5AA7 ✔ sdk_version ✔ AuthID: N/A ✔ MD5: 3DA12E2CB472EB8193309B663D7C913A ✔ spp_verifier.self ✔ AuthID: 1070000021000001 ✔ MD5: 90D1C8A45F6FEE52219E1B14FF8C9765 ✔ spu_pkg_rvk_verifier.self ✔ AuthID: 1070000022000001 ✔ MD5: B76B7244B19032A9518787D9EC827F3C ✔ spu_token_processor.self ✔ AuthID: 1070000023000001 ✔ MD5: 22ABABCFC027F892AD2CF4E1C9FD925C ✔ spu_utoken_processor.self ✔ AuthID: 107000004C000001 ✔ MD5: 0E5A2E8A68FE09481D728C227DC5A165 ✔ CoreOS MD5 Validation: ROS0: 3.55_PATCHED - F162E0D72EBA0F46B7FB36E6AAB63958 ✔ ROS1: 3.55_PATCHED - F162E0D72EBA0F46B7FB36E6AAB63958 ✔ CVTRM: Header 1 - SCEIVTRM ✔ Version - ✔ Unknown Static - ✔ VTRM 0: Header - VTRM ✔ Version - 04 ✔ SHA1 Hash - 2978B8E7D62EEF62DEDB747158D04D3D52F8A9B1 ✔ Structure - ✔ Unknown Data - ✔ Protected Files Table Reserved Entries - 96 ✔ VTRM 0 Entries: Table Entry 1 - ✔ Reserved Table Entry 1 - 0400000002000005 ✔ Used Table Entry 1 - 10700005FF000001 - vsh.self ✔ Self Data Validation - ✔ VTRM 0 Continued: Filler - ✔ Footer - ✔ Unknown Static - ✔ Filled Space - ✔ VTRM 1: Header - VTRM ✔ Version - 04 ✔ SHA1 Hash - 2978B8E7D62EEF62DEDB747158D04D3D52F8A9B1 ✔ X & Y Tables Reserved Entries - 1168 ✔ Protected Files Table Reserved Entries - 2336 ✔ Protected Files Table Used Entries - 2 ✔ Reserved Entries - ✔ VTRM 1 Entries: Table Entry 1 - ✔ Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔ Used Table Entry 1 - 1070000039000001 - bdp_bdmv.self ✔ Self Data Validation - ✔ Table Entry 2 - ✔ Reserved Table Entry 2 - 0400000002000005 ✔ Used Table Entry 2 - 10700005FF000001 - vsh.self ✔ Self Data Validation - ✔ VTRM 1 Continued: Filled Area - ✔ Encrypted Sequence - ✔ Empty Space - ✔ Unknown Filler - ✔ Return CELL_Ext_OS_Area: Header - ✔ Unknown 1 - ✔ Unknown 2 - ✔ Filled Area - ✔ Break Section - ✔ Filled Area 2 - ✔ Empty Area - ✔ MD5: 99E98DA6276D934C9B18BC0D6122BAAE ✔ Return OtherOS: Filled Area - ✔ Return Lv0ldr/Bootldr: Encrypted Binary Size - 2A3F ✔ Decrypted Binary Size - 2A3F ✔ Calculated Bootldr Size - 2A430 ✔ Rev Key - 04AD5618648D4994238FB8A1 (CECHA/CECHC/CECHE (COK-001/002/W)) ✔ PerConsole Nonce - 04AD5618648D4994238FB8A1 ✔ Lv0ldr/Bootldr Corrupt Sequence Check: Nothing Found! ✔ Lv0ldr/Bootldr Encrypted Statistics: Sum: 173104 ✔ Mean: 676.1875 ✔ Std Dev: 24.4414466373308 - [WARNING] Return Min Version: [DANGER] File Digest Key: Total number of keys: 40 ✔ Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔ Bulk AuthID Check: Total number of .self IDs: 54 [WARNING] PerConsole Nonce Match: Metldr, EID0, EID3, EID5 & Bootldr ✔ 16 bit Corrupt Sequence Check: Nothing Found! ✔ 8 bit Corrupt Sequence Check: Nothing Found! ✔ Repetition Check: Nothing Found! ✔ Time to calculate: 29.973506 seconds. и последующая заливка нанда принесла желаемый результат, консоль запустилась, поставилась прошивка Rogero 4.55 ну и успешно была отдана клиенту. Это лично мой случай, не пинать, не кричать что все элементарно, так как помощи ни от кого не дождался и решил проблему сам как мог. методом проб и ошибок. Если гуру скажут что это элементарно, теперь я с вами соглашусь, да, действительно тут ничего страшного и ужасного нет, все просто, главное понимание кухни. конец.
Это не элементарно. У самого за плечами штук 40 нанд-плоек, связываю это только с кривизной автопатчера. Сам патчу всегда винскитом, файлами для 3,55 для даунгрейда с донглом, потому что так привычнее, и можно активировать QA Extra для легкого даунгрейда впоследствии.
Freeplex, даже если хоть 10 бэдов, но ремапленных по известному ребилдеру алгоритму - то он нормально соберет и разберет. А вот если по неизвестному - тогда только judges поможет.
norpatch.exe (позволяет патчить как NAND так и NOR) программа от всеми изветного уже judges , так что нужно пробовать, смотри и поможет. НУ и прогонять потом BwE NAND Validator и смотреть лог.
Я с ним лично переписывался. Алгоритмы патченьЯ с бэдами он убрал из всех своих программ. Отправлено из моего iPhone используя Tapatalk
А если перекинуть флешки, нормальные поставить, залить родные нанды, сделать обновление консоли чтоб затерлизь места где были беды, и далее считать их
Ая-яй, нет, бэды надо ремапить, да так, чтобы консоль потом прочесть смогла, а без пересчета ЕСС этого не сделать. Короче, задавался этим вопросом одно время, потом плюнул и бросил, там все заморочено. Да таких приставок, которые требуют прям ремапа - мало. Пусть делает деньги, спасибо ему вообще, что может помочь в таких ситуациях.