4.84 CFW / Homebrew / Plugins / Tools

Discussion in 'PS3 Jailbreak CFW and PS3HEN' started by STLcardsWS, Feb 13, 2019.

  1. 758
    888
    147
    Zar

    Zar Developer

    Joined:
    Oct 15, 2014
    Messages:
    758
    Likes Received:
    888
    Trophy Points:
    147
    in cex, there is

    ps2_nonbw_offset
    ps2_nonbw_offset2
    ps2_nonbw_offset3
    dex_ps2_nonbw_offset
    dex_ps2_nonbw_offset2
    dex_ps2_nonbw_offset3

    but in dex there is only
    ps2_nonbw_offset
    ps2_nonbw_offset2
    ps2_nonbw_offset3

    maybe mamba PS2 in rebug dex never worked ?

    @Rancid-o plz, can you helpp us ?
     
  2. 146
    43
    57
    Omage

    Omage Member

    Joined:
    Feb 23, 2015
    Messages:
    146
    Likes Received:
    43
    Trophy Points:
    57
    PS2ISO can work by mamba
     

    Attached Files:

    • 1.jpg
      1.jpg
      File size:
      84.4 KB
      Views:
      88
    • 2.jpg
      2.jpg
      File size:
      113.1 KB
      Views:
      78
  3. 1,275
    740
    222
    Louay

    Louay Senior Member

    Joined:
    Jan 23, 2017
    Messages:
    1,275
    Likes Received:
    740
    Trophy Points:
    222
    Gender:
    Male
    Occupation:
    College student
    Location:
    Tunisie
    Home Page:
    how did you make the toolbox show correct firmware version as it says 4.82 or 4.75 in rebug toolbox or multiman can you upload links of multiman and rebug toolbox that shows correct fw version ?
     
  4. 7,553
    5,657
    872
    kozarovv

    kozarovv Super Moderator

    Joined:
    Nov 8, 2014
    Messages:
    7,553
    Likes Received:
    5,657
    Trophy Points:
    872
    Home Page:
    Toolbox is included with latest Rebug firmware...
     
    Louay likes this.
  5. 1,275
    740
    222
    Louay

    Louay Senior Member

    Joined:
    Jan 23, 2017
    Messages:
    1,275
    Likes Received:
    740
    Trophy Points:
    222
    Gender:
    Male
    Occupation:
    College student
    Location:
    Tunisie
    Home Page:
    Okey man thank you and how about multiMan ? how can we correct the display of wrong firmware version ?
     
  6. 3,089
    3,077
    372
    Joonie

    Joonie Developer

    Joined:
    Oct 15, 2014
    Messages:
    3,089
    Likes Received:
    3,077
    Trophy Points:
    372
    Location:
    Southwest US
    for multiMAN it needs an update. for Toolbox you just use the one came with the Firmware, also if you disable syscalls this function won't work since it requires CFW syscalls to detect the FW.
     
    Louay likes this.
  7. 1,275
    740
    222
    Louay

    Louay Senior Member

    Joined:
    Jan 23, 2017
    Messages:
    1,275
    Likes Received:
    740
    Trophy Points:
    222
    Gender:
    Male
    Occupation:
    College student
    Location:
    Tunisie
    Home Page:
    Yeah but i see no update only the last one is 4.82 normaly their would been new multiMan after a new Fw appears just like from 4.65 4.70 4.75 4.78 4.80 4.81 4.82..
     
  8. 3,089
    3,077
    372
    Joonie

    Joonie Developer

    Joined:
    Oct 15, 2014
    Messages:
    3,089
    Likes Received:
    3,077
    Trophy Points:
    372
    Location:
    Southwest US
    Because LV2 hasn't changed since 4.75 and it confuses homebrew when it comes FW detection since TOC and SYSCALL TABLE are the same. that's why it needs an extra check to differentiate the version strings. The common method for doing it was to peek compiled month..
     
    Louay likes this.
  9. 1,275
    740
    222
    Louay

    Louay Senior Member

    Joined:
    Jan 23, 2017
    Messages:
    1,275
    Likes Received:
    740
    Trophy Points:
    222
    Gender:
    Male
    Occupation:
    College student
    Location:
    Tunisie
    Home Page:
    can you help make that extra check you talk about ?
     
  10. 758
    888
    147
    Zar

    Zar Developer

    Joined:
    Oct 15, 2014
    Messages:
    758
    Likes Received:
    888
    Trophy Points:
    147
    how ?
    he can't because only deank have multiman sources;
     
    Louay likes this.
  11. 1,275
    740
    222
    Louay

    Louay Senior Member

    Joined:
    Jan 23, 2017
    Messages:
    1,275
    Likes Received:
    740
    Trophy Points:
    222
    Gender:
    Male
    Occupation:
    College student
    Location:
    Tunisie
    Home Page:
    so can deank bring multiMan 4.84 to live ? i enjoy his releases one after each version :)
     
  12. 560
    236
    97
    Spawn

    Spawn Member

    Joined:
    Sep 23, 2017
    Messages:
    560
    Likes Received:
    236
    Trophy Points:
    97
    Gender:
    Male
    Shouldn't sMan be on this list? I use sMan 1.12n on Rebug 4.84 and it works like a charm.
     
  13. 1,164
    1,174
    272
    littlebalup

    littlebalup Developer PSX-Place Supporter

    Joined:
    Oct 16, 2014
    Messages:
    1,164
    Likes Received:
    1,174
    Trophy Points:
    272
    Location:
    43°36'16.0"N 1°26'36.1"E
    @Zar , @Joonie

    I downgraded to 4.80 D-REX and tested ManaGunZ v1.26 (the first version with mamba v3 per the changelog). It doesn't work.
    Also tested the v1.34 in both 4.80 D-REX and 4.81 D-REX without more success.

    So it seems the devil was here since the begining.
     
    sandungas, Joonie and Zar like this.
  14. 3,089
    3,077
    372
    Joonie

    Joonie Developer

    Joined:
    Oct 15, 2014
    Messages:
    3,089
    Likes Received:
    3,077
    Trophy Points:
    372
    Location:
    Southwest US
    ok, compile debug payloads for CEX and compare the output with the one from DEX to see what's missing, I'm pretty sure the dynamic patching for prx modules fail at DEX only. I remember testing the very earlier version of funny mamba loader released by @Rancid-o used to work with IRISMAN just fine..
     
  15. 8,841
    8,780
    1,172
    STLcardsWS

    STLcardsWS Administrator

    Joined:
    Sep 18, 2014
    Messages:
    8,841
    Likes Received:
    8,780
    Trophy Points:
    1,172
    I guess you did not read that text that starts the post...
     
  16. 1,164
    1,174
    272
    littlebalup

    littlebalup Developer PSX-Place Supporter

    Joined:
    Oct 16, 2014
    Messages:
    1,164
    Likes Received:
    1,174
    Trophy Points:
    272
    Location:
    43°36'16.0"N 1°26'36.1"E
    In fact I'm not sure.
    Could you try that:
    - ensure cobra is disabled
    - make an hard reboot
    - dump lv1 (do not load mamba before to dump... like i did)
    Doing that, that time I got 0x510000 for both CEX and DEX.

    Anyway, in fact we should'nt realy care about VSH address in sympols.h as it is dynamicaly searched ("brute-forced") if is not found where we find and set it:
    Code:
    uint64_t vsh_offset = 0;
    
    static INLINE int get_vsh_offset()
    {
        int i;
    
        //First try with static offset..
        if( (lv1_peekd(vsh_pos_in_ram + 0x200) == 0xF821FF917C0802A6ULL) &&
            (lv1_peekd(vsh_pos_in_ram + 0x208) == 0xF80100804800039DULL) &&
            (lv1_peekd(vsh_pos_in_ram + 0x210) == 0x6000000048000405ULL) )
        {
            vsh_offset = vsh_pos_in_ram;
            #ifdef DEBUG
            DPRINTF("Vsh.self found with static offset at address 0x%lx\n", vsh_offset);
            #endif
        }
        //..if that not work brute-force the address
        else
        {
            for(i = 0x10000; i < 0x3000000; i += 0x10000)
            {
                if(lv1_peekd(i + 0x200) == 0xF821FF917C0802A6ULL)
                {
                    if(lv1_peekd(i + 0x208) == 0xF80100804800039DULL)
                    {
                        if(lv1_peekd(i + 0x210) == 0x6000000048000405ULL)
                        {
                            vsh_offset = i;
                            #ifdef DEBUG
                            DPRINTF("Vsh.self found with brute-force at address 0x%lx\n", vsh_offset);
                            #endif
                            break;
                        }
                    }
                }
            }
        }
        //Vsh not found
        if(vsh_offset == 0)
        {
            #ifdef DEBUG
            DPRINTF("Vsh.self not found!!\n");
            #endif
            return -1;
        }
    
        return 0;
    }
    The issue is not here, difinitly.

    Did it.
    In CEX output I have:
    Code:
    Now patching game_ext_plugin.sprx e274af7b0001e5d3
    Offset: 0x000172F0 | Data: 0x38000001
    ...
    Now patching explore_plugin.sprx acf4af2b000ecc91
    Offset: 0x000DDDC4 | Data: 0x38000001
    But nothing in DEX

    Complete outputs:
    Code:
    Output from CEX, CEX VSH (that works):
    
    MAMBA says hello (load base = 0x8000000000620000, end = 0x8000000000639dc0) (version = 0104840F)
    We are in CFW Rebug REX, VSH is CEX
    Vsh.self found with brute-force at address 0x510000
    Offset ps2tonet_size_patch found with static offset at address: 0x5d4e28
    Offset ps2tonet_patch found with static offset at address: 0x5d4e34
    First poke: 0x38a00040
    Second poke: 0x60638204
    SUCCESS: all patches DONE!
    /dev_hdd0/PS2ISO/Ast▒rix & Ob▒lix XXL 2.ISO, filesize: 6d930000
    Storage event: 7  0  101000000000006
    Storage event: 3  0  101000000000006
    Disc Insert
    real disc type = 0
    effective disc type = ff61, fake disc type = ff61
    Storage event: 4  0  101000000000006
    Disc removed.
    Storage event: 8  0  101000000000006
    Disc auth: 5007 d00e1bf0 (process: 01000300_main_vsh.self)
    Read 8000 800
    Changed to part file 0
    /dev_hdd0/PS2ISO/Ast▒rix & Ob▒lix XXL 2.ISO, filesize: 6d930000
    Storage event: 7  0  101000000000006
    Storage event: 3  0  101000000000006
    Disc Insert
    real disc type = 0
    effective disc type = ff61, fake disc type = ff61
    Disc auth: 5007 d00ebbf0 (process: 01000300_main_vsh.self)
    caller_process = 01000300
    hash = 77d4a196000019ca
    caller_process = 01000300
    hash = eb3c000000f5
    caller_process = 01000300
    hash = b0cb000003c0
    Map 8d0000 10000 _main_vsh.self 2008004
    Map 8e0000 10000 _main_vsh.self 2004000
    Faked size to db260
    Read 8000 800
    Changed to part file 0
    Read 8800 800
    Read 81800 800
    cellFsUtilMount: /dev_bdvd
    Read 82800 800
    Read 82800 800
    Read 82800 800
    caller_process = 01000300
    hash = c073ea8b000022fe
    caller_process = 01000300
    hash = 592800000274
    caller_process = 01000300
    hash = 11000000a3e
    Map 8d0000 10000 _main_vsh.self 2008004
    Map 8e0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = c073ea8b000022fe
    caller_process = 01000300
    hash = 592800000274
    caller_process = 01000300
    hash = 11000000a3e
    Map 8d0000 10000 _main_vsh.self 2008004
    Map 8e0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 6794c2b10000438d
    caller_process = 01000300
    hash = 2dd100000391
    caller_process = 01000300
    hash = a9e00001756
    Map 8d0000 10000 _main_vsh.self 2008004
    Map 8e0000 10000 _main_vsh.self 2004000
    Disc auth: 5004 29 (process: 01000300_main_vsh.self)
    caller_process = 01000300
    hash = 2048e4d900018a85
    caller_process = 01000300
    hash = 3173800000012a1
    caller_process = 01000300
    hash = 1d60600001a8e
    Map 850000 30000 _main_vsh.self 2008004
    Map 880000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = a0908f1900006fe9
    caller_process = 01000300
    hash = 2eec000001e0
    caller_process = 01000300
    hash = 46c600000903
    Map 890000 10000 _main_vsh.self 2008004
    Map 8a0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 9a07e2ad0001588f
    caller_process = 01000300
    hash = 22a3c000000b6
    caller_process = 01000300
    hash = 1d47000002ab
    Map 8b0000 40000 _main_vsh.self 2008004
    Map 8f0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = d3046ab800017b85
    caller_process = 01000300
    hash = 786000001cc4
    caller_process = 01000300
    hash = 98a00006561
    Map 900000 50000 _main_vsh.self 2008004
    Map 950000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 4eb79bb70002d15e
    caller_process = 01000300
    hash = 9f963ab000000faf
    caller_process = 01000300
    hash = a7600006952
    Map 960000 70000 _main_vsh.self 2008004
    Map 9d0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 4b77f6ce000061a3
    caller_process = 01000300
    hash = a0fc000002a1
    caller_process = 01000300
    hash = 60e00001aad
    Map 9e0000 10000 _main_vsh.self 2008004
    Map 9f0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = b5988dba00020157
    caller_process = 01000300
    hash = 7700000012d2
    caller_process = 01000300
    hash = 247e0000dc74
    Map a00000 50000 _main_vsh.self 2008004
    Map a50000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 4059aeb6000056ab
    caller_process = 01000300
    hash = 715c2c46000007cc
    caller_process = 01000300
    hash = 1ca8100001b7f
    Map a60000 20000 _main_vsh.self 2008004
    Map a80000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 8b8ca3640000d900
    caller_process = 01000300
    hash = 1c72c00000b04
    caller_process = 01000300
    hash = 13c2000046c3
    Map a90000 30000 _main_vsh.self 2008004
    Map ac0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 9098af370003e3b3
    caller_process = 01000300
    hash = ee88000017bc
    caller_process = 01000300
    hash = 3a8c0000cd59
    Map b60000 a0000 _main_vsh.self 2008004
    Map ad0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 20526d700002f170
    caller_process = 01000300
    hash = 5627000000625
    caller_process = 01000300
    hash = 1bb4600000fde
    Map ae0000 50000 _main_vsh.self 2008004
    Map b30000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 67d32e9400016cdf
    caller_process = 01000300
    hash = 4bc16400000684
    caller_process = 01000300
    hash = 172de0000160d
    Map c00000 30000 _main_vsh.self 2008004
    Map b40000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 8aeb0c5e0000132b
    caller_process = 01000300
    hash = 45c800000094
    caller_process = 01000300
    hash = a46c00000239
    Map b50000 10000 _main_vsh.self 2008004
    Map c30000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 8e8eb940000079cb
    caller_process = 01000300
    hash = 17c1400000149
    caller_process = 01000300
    hash = 3caf0000046a
    Map c40000 10000 _main_vsh.self 2008004
    Map c50000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 6381c64c0000216f
    caller_process = 01000300
    hash = 751800000115
    caller_process = 01000300
    hash = b9eb000003c1
    Map c60000 10000 _main_vsh.self 2008004
    Map c70000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 99934ea300016e4f
    caller_process = 01000300
    hash = 372400000243
    caller_process = 01000300
    hash = 51c2000007b6
    Map c80000 30000 _main_vsh.self 2008004
    Map cb0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 215c0c8c000060ed
    caller_process = 01000300
    hash = e7fc000001e0
    caller_process = 01000300
    hash = 392600000634
    Map cc0000 10000 _main_vsh.self 2008004
    Map cd0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 7630748000f6743
    caller_process = 01000300
    hash = 330307b4000006e7
    caller_process = 01000300
    hash = caaa00000dc9
    Map ce0000 1b0000 _main_vsh.self 2008004
    Map e90000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 3f5ca3a8000020d6
    caller_process = 01000300
    hash = 512c000000f0
    caller_process = 01000300
    hash = ba370000036a
    Map ea0000 10000 _main_vsh.self 2008004
    Map eb0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 4229ba3800020def
    caller_process = 01000300
    hash = f98c0000013a
    caller_process = 01000300
    hash = 4fc500000493
    Map ec0000 40000 _main_vsh.self 2008004
    Map f00000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = efdde0ac0000cea2
    caller_process = 01000300
    hash = fe1d64000003e4
    caller_process = 01000300
    hash = 87ff00000a18
    Map f10000 20000 _main_vsh.self 2008004
    Map f30000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = b887276f00029586
    caller_process = 01000300
    hash = 57b21000004cd
    caller_process = 01000300
    hash = 21a400002336
    Map f60000 60000 _main_vsh.self 2008004
    Map f40000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 20656ba5000843d7
    caller_process = 01000300
    hash = bb000006bca
    caller_process = 01000300
    hash = 4180000d1e3
    Map fc0000 140000 _main_vsh.self 2008004
    Map 1100000 50000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 7bf9ed8c000634ca
    Map 10000 f0000 _main_vsh.self 2008004
    caller_process = 01000300
    hash = fff101680000266c
    Map 100000 10000 _main_vsh.self 2004000
    PROCESS /dev_flash/vsh/module/mcore.self (01030200) loaded
    caller_process = 01000300
    hash = 385ccbf800008e7e
    caller_process = 01000300
    hash = e2450000059a
    caller_process = 01000300
    hash = 8024000012ee
    Map 110000 20000 _main_vsh.self 2008004
    Map 130000 10000 _main_vsh.self 2004000
    caller_process = 01030200
    hash = 29de39b500003265
    caller_process = 01030200
    hash = a699ef600000632
    caller_process = 01030200
    hash = 671d00000dce
    Map 140000 10000 _main_mcore.self 2008004
    Map 150000 10000 _main_mcore.self 2004000
    caller_process = 01000300
    hash = 8df3688a000044d8
    caller_process = 01000300
    hash = 1ec6000000234
    caller_process = 01000300
    hash = 75000000918
    Map f50000 10000 _main_vsh.self 2008004
    Map 1150000 20000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 6b9d09920000a797
    caller_process = 01000300
    hash = 900e00000460
    caller_process = 01000300
    hash = 93a00002184
    Map 1170000 20000 _main_vsh.self 2008004
    Map 1190000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 8c0a94500004560f
    caller_process = 01000300
    hash = ec7800002f62
    caller_process = 01000300
    hash = 29ae0000e483
    Map 11a0000 b0000 _main_vsh.self 2008004
    Map 1250000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = c6dd5a7400003ac0
    caller_process = 01000300
    hash = 8010000004c5
    caller_process = 01000300
    hash = 2b5200001914
    Map 1260000 10000 _main_vsh.self 2008004
    Map 1270000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = f3642e130000849c
    caller_process = 01000300
    hash = 32e000000589
    caller_process = 01000300
    hash = 7fc00002bad
    Map 1280000 20000 _main_vsh.self 2008004
    Map 12a0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 2a432b6800001d9b
    caller_process = 01000300
    hash = 13a1d000001ca
    caller_process = 01000300
    hash = 24400000b16
    Map 12b0000 10000 _main_vsh.self 2008004
    Map 12c0000 50000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 2aeb1c40000d3a1
    caller_process = 01000300
    hash = 14a8700000459
    caller_process = 01000300
    hash = 209e00001cab
    Map 1310000 20000 _main_vsh.self 2008004
    Map 1330000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 1b26fe500000cfa7
    caller_process = 01000300
    hash = 3f123000009a7
    caller_process = 01000300
    hash = 4e5600002a54
    Map 1340000 20000 _main_vsh.self 2008004
    Map 1360000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = a2f115c50000a51c
    caller_process = 01000300
    hash = 1fb2400000ac9
    caller_process = 01000300
    hash = 34fa000030b7
    Map 1370000 20000 _main_vsh.self 2008004
    Map 1390000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 62da4d9e00030738
    caller_process = 01000300
    hash = 2138000024b0
    caller_process = 01000300
    hash = 791e0000957e
    Map 13a0000 80000 _main_vsh.self 2008004
    Map 1420000 30000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 32d123bb00007684
    caller_process = 01000300
    hash = 1ef840000010f
    caller_process = 01000300
    hash = 564600000400
    Map 1450000 20000 _main_vsh.self 2008004
    Map 1470000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 889e6035000320bc
    caller_process = 01000300
    hash = 366e3ed500001ad6
    caller_process = 01000300
    hash = 46dd200003234
    Map 1480000 80000 _main_vsh.self 2008004
    Map 1500000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 3e8ef093000160b1
    caller_process = 01000300
    hash = 18fb93e000000e20
    caller_process = 01000300
    hash = 27c600004212
    Map 1510000 40000 _main_vsh.self 2008004
    Map 1550000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 9d05eda700009033
    caller_process = 01000300
    hash = 19ba2000009c1
    caller_process = 01000300
    hash = 12ce00002863
    Map 1560000 20000 _main_vsh.self 2008004
    Map 1580000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = a3fdfafb00005f81
    caller_process = 01000300
    hash = a1530000040b
    caller_process = 01000300
    hash = 6a6000013b2
    Map 1590000 10000 _main_vsh.self 2008004
    Map 15a0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = a252fda00000625a
    caller_process = 01000300
    hash = 2346f1860000011a
    caller_process = 01000300
    hash = 173e00000e0e
    Map 15b0000 10000 _main_vsh.self 2008004
    Map 15c0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 8273ae030000252a
    caller_process = 01000300
    hash = b01f000001c4
    caller_process = 01000300
    hash = 136c0000082e
    Map 15d0000 10000 _main_vsh.self 2008004
    Map 15e0000 10000 _main_vsh.self 2004000
    Read 82800 800
    We are originally in region 85
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 27c800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    caller_process = 01000300
    hash = e274af7b0001e5d3
    Now patching game_ext_plugin.sprx e274af7b0001e5d3
    Offset: 0x000172F0 | Data: 0x38000001
    caller_process = 01000300
    hash = 49c000001db7
    caller_process = 01000300
    hash = 57fa0000d046
    Map 15f0000 50000 _main_vsh.self 2008004
    Map 1640000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 4f72f785000005e6
    caller_process = 01000300
    hash = 8e0400000078
    caller_process = 01000300
    hash = 980000027a
    Map 1650000 10000 _main_vsh.self 2008004
    Map 1660000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = acf4af2b000ecc91
    Now patching explore_plugin.sprx acf4af2b000ecc91
    Offset: 0x000DDDC4 | Data: 0x38000001
    caller_process = 01000300
    hash = d0680001844c
    caller_process = 01000300
    hash = 7ce600087615
    Map 1760000 280000 _main_vsh.self 2008004
    Map 1670000 70000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = f823bf4e00003194
    caller_process = 01000300
    hash = ffff628d00000300
    caller_process = 01000300
    hash = 7f6e00001063
    Map 16e0000 10000 _main_vsh.self 2008004
    Map 16f0000 10000 _main_vsh.self 2004000
    Read 82800 800
    Read 82800 800
    
    Code:
    Output from DEX, DEX VSH (that doesn't work):
    
    MAMBA says hello (load base = 0x8000000000640000, end = 0x8000000000659cc0) (version = 0104840F)
    We are in CFW Rebug REX, VSH is DEX
    Vsh.self found with static offset at address 0x510000
    Offset ps2tonet_size_patch found with static offset at address: 0x5da374
    Offset ps2tonet_patch found with static offset at address: 0x5da380
    First poke: 0x38a00040
    Second poke: 0x60638204
    SUCCESS: all patches DONE!
    /dev_hdd0/PS2ISO/Ast▒rix & Ob▒lix XXL 2.ISO, filesize: 6d930000
    Storage event: 7  0  101000000000006
    Storage event: 3  0  101000000000006
    Disc Insert
    real disc type = 0
    effective disc type = ff61, fake disc type = ff61
    Storage event: 4  0  101000000000006
    Disc removed.
    Storage event: 8  0  101000000000006
    Disc auth: 5007 d00e9bf0 (process: 01000300_main_vsh.self)
    Read 8000 800
    Changed to part file 0
    /dev_hdd0/PS2ISO/Ast▒rix & Ob▒lix XXL 2.ISO, filesize: 6d930000
    Storage event: 7  0  101000000000006
    Storage event: 3  0  101000000000006
    Disc Insert
    real disc type = 0
    effective disc type = ff61, fake disc type = ff61
    Disc auth: 5007 d00f3bf0 (process: 01000300_main_vsh.self)
    caller_process = 01000300
    hash = 77d4a196000019ca
    caller_process = 01000300
    hash = eb3c000000f5
    caller_process = 01000300
    hash = b0cb000003c0
    Map 8e0000 10000 _main_vsh.self 2008004
    Map 8f0000 10000 _main_vsh.self 2004000
    Faked size to db260
    Read 8000 800
    Changed to part file 0
    Read 8800 800
    Read 81800 800
    cellFsUtilMount: /dev_bdvd
    Read 82800 800
    Read 82800 800
    Read 82800 800
    caller_process = 01000300
    hash = c073ea8b000022fe
    caller_process = 01000300
    hash = 592800000274
    caller_process = 01000300
    hash = 11000000a3e
    Map 8e0000 10000 _main_vsh.self 2008004
    Map 8f0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = c073ea8b000022fe
    caller_process = 01000300
    hash = 592800000274
    caller_process = 01000300
    hash = 11000000a3e
    Map 8e0000 10000 _main_vsh.self 2008004
    Map 8f0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 6794c2b10000438d
    caller_process = 01000300
    hash = 2dd100000391
    caller_process = 01000300
    hash = a9e00001756
    Map 8e0000 10000 _main_vsh.self 2008004
    Map 8f0000 10000 _main_vsh.self 2004000
    Disc auth: 5004 29 (process: 01000300_main_vsh.self)
    caller_process = 01000300
    hash = 2048e4d900018a85
    caller_process = 01000300
    hash = 3173800000012a1
    caller_process = 01000300
    hash = 1d60600001a8e
    Map 860000 30000 _main_vsh.self 2008004
    Map 890000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = a0908f1900006fe9
    caller_process = 01000300
    hash = 2eec000001e0
    caller_process = 01000300
    hash = 46c600000903
    Map 8a0000 10000 _main_vsh.self 2008004
    Map 8b0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 9a07e2ad0001588f
    caller_process = 01000300
    hash = 22a3c000000b6
    caller_process = 01000300
    hash = 1d47000002ab
    Map 8c0000 40000 _main_vsh.self 2008004
    Map 900000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = d3046ab800017b85
    caller_process = 01000300
    hash = 786000001cc4
    caller_process = 01000300
    hash = 98a00006561
    Map 910000 50000 _main_vsh.self 2008004
    Map 960000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 4eb79bb70002d15e
    caller_process = 01000300
    hash = 9f963ab000000faf
    caller_process = 01000300
    hash = a7600006952
    Map 970000 70000 _main_vsh.self 2008004
    Map 9e0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 4b77f6ce000061a3
    caller_process = 01000300
    hash = a0fc000002a1
    caller_process = 01000300
    hash = 60e00001aad
    Map 9f0000 10000 _main_vsh.self 2008004
    Map a00000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = b5988dba00020157
    caller_process = 01000300
    hash = 7700000012d2
    caller_process = 01000300
    hash = 247e0000dc74
    Map a10000 50000 _main_vsh.self 2008004
    Map a60000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 4059aeb6000056ab
    caller_process = 01000300
    hash = 715c2c46000007cc
    caller_process = 01000300
    hash = 1ca8100001b7f
    Map a70000 20000 _main_vsh.self 2008004
    Map a90000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 9098af370003e3b3
    caller_process = 01000300
    hash = ee88000017bc
    caller_process = 01000300
    hash = 3a8c0000cd59
    Map aa0000 a0000 _main_vsh.self 2008004
    Map b40000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 8b8ca3640000d900
    caller_process = 01000300
    hash = 1c72c00000b04
    caller_process = 01000300
    hash = 13c2000046c3
    Map b70000 30000 _main_vsh.self 2008004
    Map b50000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 20526d700002f170
    caller_process = 01000300
    hash = 5627000000625
    caller_process = 01000300
    hash = 1bb4600000fde
    Map ba0000 50000 _main_vsh.self 2008004
    Map b60000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 67d32e9400016cdf
    caller_process = 01000300
    hash = 4bc16400000684
    caller_process = 01000300
    hash = 172de0000160d
    Map bf0000 30000 _main_vsh.self 2008004
    Map c20000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 8aeb0c5e0000132b
    caller_process = 01000300
    hash = 45c800000094
    caller_process = 01000300
    hash = a46c00000239
    Map c30000 10000 _main_vsh.self 2008004
    Map c40000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 8e8eb940000079cb
    caller_process = 01000300
    hash = 17c1400000149
    caller_process = 01000300
    hash = 3caf0000046a
    Map c50000 10000 _main_vsh.self 2008004
    Map c60000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 6381c64c0000216f
    caller_process = 01000300
    hash = 751800000115
    caller_process = 01000300
    hash = b9eb000003c1
    Map c70000 10000 _main_vsh.self 2008004
    Map c80000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 99934ea300016e4f
    caller_process = 01000300
    hash = 372400000243
    caller_process = 01000300
    hash = 51c2000007b6
    Map c90000 30000 _main_vsh.self 2008004
    Map cc0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 215c0c8c000060ed
    caller_process = 01000300
    hash = e7fc000001e0
    caller_process = 01000300
    hash = 392600000634
    Map cd0000 10000 _main_vsh.self 2008004
    Map ce0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 7630748000f6743
    caller_process = 01000300
    hash = 330307b4000006e7
    caller_process = 01000300
    hash = caaa00000dc9
    Map cf0000 1b0000 _main_vsh.self 2008004
    Map ea0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 3f5ca3a8000020d6
    caller_process = 01000300
    hash = 512c000000f0
    caller_process = 01000300
    hash = ba370000036a
    Map eb0000 10000 _main_vsh.self 2008004
    Map ec0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 4229ba3800020def
    caller_process = 01000300
    hash = f98c0000013a
    caller_process = 01000300
    hash = 4fc500000493
    Map ed0000 40000 _main_vsh.self 2008004
    Map f10000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = efdde0ac0000cea2
    caller_process = 01000300
    hash = fe1d64000003e4
    caller_process = 01000300
    hash = 87ff00000a18
    Map f20000 20000 _main_vsh.self 2008004
    Map f40000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = b887276f00029586
    caller_process = 01000300
    hash = 57b21000004cd
    caller_process = 01000300
    hash = 21a400002336
    Map f70000 60000 _main_vsh.self 2008004
    Map f50000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 20656ba5000843d7
    caller_process = 01000300
    hash = bb000006bca
    caller_process = 01000300
    hash = 4180000d1e3
    Map fd0000 140000 _main_vsh.self 2008004
    Map 1110000 50000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 7bf9ed8c000634ca
    Map 10000 f0000 _main_vsh.self 2008004
    caller_process = 01000300
    hash = fff101680000266c
    Map 100000 10000 _main_vsh.self 2004000
    PROCESS /dev_flash/vsh/module/mcore.self (01030200) loaded
    caller_process = 01000300
    hash = 385ccbf800008e7e
    caller_process = 01000300
    hash = e2450000059a
    caller_process = 01000300
    hash = 8024000012ee
    Map 110000 20000 _main_vsh.self 2008004
    Map 130000 10000 _main_vsh.self 2004000
    caller_process = 01030200
    hash = 29de39b500003265
    caller_process = 01030200
    hash = a699ef600000632
    caller_process = 01030200
    hash = 671d00000dce
    Map 140000 10000 _main_mcore.self 2008004
    Map 150000 10000 _main_mcore.self 2004000
    caller_process = 01000300
    hash = 8df3688a000044d8
    caller_process = 01000300
    hash = 1ec6000000234
    caller_process = 01000300
    hash = 75000000918
    Map f60000 10000 _main_vsh.self 2008004
    Map 1160000 20000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 6b9d09920000a797
    caller_process = 01000300
    hash = 900e00000460
    caller_process = 01000300
    hash = 93a00002184
    Map 1180000 20000 _main_vsh.self 2008004
    Map 11a0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 8c0a94500004560f
    caller_process = 01000300
    hash = ec7800002f62
    caller_process = 01000300
    hash = 29ae0000e483
    Map 11b0000 b0000 _main_vsh.self 2008004
    Map 1260000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = c6dd5a7400003ac0
    caller_process = 01000300
    hash = 8010000004c5
    caller_process = 01000300
    hash = 2b5200001914
    Map 1270000 10000 _main_vsh.self 2008004
    Map 1280000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = f3642e130000849c
    caller_process = 01000300
    hash = 32e000000589
    caller_process = 01000300
    hash = 7fc00002bad
    Map 1290000 20000 _main_vsh.self 2008004
    Map 12b0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 2aeb1c40000d3a1
    caller_process = 01000300
    hash = 14a8700000459
    caller_process = 01000300
    hash = 209e00001cab
    Map 12c0000 20000 _main_vsh.self 2008004
    Map 12e0000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 1b26fe500000cfa7
    caller_process = 01000300
    hash = 3f123000009a7
    caller_process = 01000300
    hash = 4e5600002a54
    Map 12f0000 20000 _main_vsh.self 2008004
    Map 1310000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 62da4d9e00030738
    caller_process = 01000300
    hash = 2138000024b0
    caller_process = 01000300
    hash = 791e0000957e
    Map 1370000 80000 _main_vsh.self 2008004
    Map 1320000 30000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 3e8ef093000160b1
    caller_process = 01000300
    hash = 18fb93e000000e20
    caller_process = 01000300
    hash = 27c600004212
    Map 13f0000 40000 _main_vsh.self 2008004
    Map 1350000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 9d05eda700009033
    caller_process = 01000300
    hash = 19ba2000009c1
    caller_process = 01000300
    hash = 12ce00002863
    Map 1430000 20000 _main_vsh.self 2008004
    Map 1360000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = a3fdfafb00005f81
    caller_process = 01000300
    hash = a1530000040b
    caller_process = 01000300
    hash = 6a6000013b2
    Map 1450000 10000 _main_vsh.self 2008004
    Map 1460000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = a252fda00000625a
    caller_process = 01000300
    hash = 2346f1860000011a
    caller_process = 01000300
    hash = 173e00000e0e
    Map 1470000 10000 _main_vsh.self 2008004
    Map 1480000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 8273ae030000252a
    caller_process = 01000300
    hash = b01f000001c4
    caller_process = 01000300
    hash = 136c0000082e
    Map 1490000 10000 _main_vsh.self 2008004
    Map 14a0000 10000 _main_vsh.self 2004000
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 27c800 800
    caller_process = 01000300
    hash = 2a432b6800001d9b
    caller_process = 01000300
    hash = 13a1d000001ca
    caller_process = 01000300
    hash = 24400000b16
    Map 14b0000 10000 _main_vsh.self 2008004
    Map 14c0000 50000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = a2f115c50000a541
    caller_process = 01000300
    hash = 1fb2400000ac9
    caller_process = 01000300
    hash = 34fa000030b7
    Map 1510000 20000 _main_vsh.self 2008004
    Map 1530000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 32d123bb00007684
    caller_process = 01000300
    hash = 1ef840000010f
    caller_process = 01000300
    hash = 564600000400
    Map 1540000 20000 _main_vsh.self 2008004
    Map 1560000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 889e6035000320bc
    caller_process = 01000300
    hash = 366e3ed500001ad6
    caller_process = 01000300
    hash = 46dd200003234
    Map 1570000 80000 _main_vsh.self 2008004
    Map 15f0000 10000 _main_vsh.self 2004000
    Read 82800 800
    We are originally in region 82
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    Read 82800 800
    caller_process = 01000300
    hash = e274af7b0001e5d3
    caller_process = 01000300
    hash = 49c000001db7
    caller_process = 01000300
    hash = 57fa0000d046
    Map 1600000 50000 _main_vsh.self 2008004
    Map 1650000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = 4f72f785000005e6
    caller_process = 01000300
    hash = 8e0400000078
    caller_process = 01000300
    hash = 980000027a
    Map 1660000 10000 _main_vsh.self 2008004
    Map 1670000 10000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = acf4af2b000ecc91
    caller_process = 01000300
    hash = d0680001844c
    caller_process = 01000300
    hash = 7ce600087615
    Map 1770000 280000 _main_vsh.self 2008004
    Map 1680000 70000 _main_vsh.self 2004000
    caller_process = 01000300
    hash = f823bf4e00003194
    caller_process = 01000300
    hash = ffff628d00000300
    caller_process = 01000300
    hash = 7f6e00001063
    Map 16f0000 10000 _main_vsh.self 2008004
    Map 1700000 10000 _main_vsh.self 2004000
    Read 82800 800
    Read 82800 800
    
     
  17. 3,089
    3,077
    372
    Joonie

    Joonie Developer

    Joined:
    Oct 15, 2014
    Messages:
    3,089
    Likes Received:
    3,077
    Trophy Points:
    372
    Location:
    Southwest US
    @littlebalup I think I got it. I force enabled condition_softemu (because I have BC console) and added following in sysmbol.h

    Code:
    /* rebug */
    #define EXPLORE_PLUGIN_REBUG_HASH                   0xACF4AF2B000ECC91
    #define EXPLORE_CATEGORY_GAME_REBUG_HASH            0x9CB3396E00056CE9
    #define GAME_EXT_PLUGIN_REBUG_HASH                  0xE274AF7B0001E5D3
    #define dex_ps2_nonbw_offset                        0xDDDC4
    #define dex_ps2_nonbw_offset2                       0x68264
    #define dex_ps2_nonbw_offset3                       0x172F0
    #define dex_ps2tonet_patch                          0xCA380
    #define dex_ps2tonet_size_patch                     0xCA374
    
    and my log is showing they are being patched. Can you try this?

    Regarding VSH, don't worry about it. I looked at the code, it uses both static offset and searched offset in case of hash failure.

    Code:
    We are originally in region 82
    MAMBA says hello (load base = 0x8000000000660000, end = 0x8000000000679c40) (version = 0104840F)
    We are in CFW Rebug REX, VSH is DEX
    Vsh.self found with static offset at address 0x910000
    PS2 auth patch at HV:165b54
    PS2 unauth patch at HV:165cd0
    Offset ps2tonet_size_patch found with static offset at address: 0x9da374
    Offset ps2tonet_patch found with static offset at address: 0x9da380
    First poke: 0x38a00040
    Second poke: 0x60638204
    SUCCESS: all patches DONE!
    /dev_hdd0/PS2ISO/FF12IZJS_US.iso, filesize: f94ab800
    Disc Insert
    real disc type = 0
    effective disc type = ff61, fake disc type = ff61
    Disc removed.
    Disc auth: 5007 d00dabf0 (process: 01000300_main_vsh.self)
    Read 8000 800
    Changed to part file 0
    /dev_hdd0/PS2ISO/FF12IZJS_US.iso, filesize: f94ab800
    Disc Insert
    real disc type = 0
    effective disc type = ff61, fake disc type = ff61
    Disc auth: 5007 d00e4bf0 (process: 01000300_main_vsh.self)
    Faked size to 1f2957
    Changed to part file 0
    cellFsUtilMount: /dev_bdvd
    Disc auth: 5004 29 (process: 01000300_main_vsh.self)
    PROCESS /dev_flash/vsh/module/mcore.self (01050200) loaded
    We are originally in region 82
    Now patching game_ext_plugin.sprx e274af7b0001e5d3
    Now patching explore_plugin.sprx acf4af2b000ecc91
    
     
    sandungas and littlebalup like this.
  18. 146
    43
    57
    Omage

    Omage Member

    Joined:
    Feb 23, 2015
    Messages:
    146
    Likes Received:
    43
    Trophy Points:
    57
  19. 1,164
    1,174
    272
    littlebalup

    littlebalup Developer PSX-Place Supporter

    Joined:
    Oct 16, 2014
    Messages:
    1,164
    Likes Received:
    1,174
    Trophy Points:
    272
    Location:
    43°36'16.0"N 1°26'36.1"E
    it works !!!!!! :chewie:

    now need to clean up all those sh.... maybe next week
    a big thanks to you :cheerful:
     
    Last edited: Mar 14, 2019
    sandungas, Omage and Joonie like this.
  20. 1,164
    1,174
    272
    littlebalup

    littlebalup Developer PSX-Place Supporter

    Joined:
    Oct 16, 2014
    Messages:
    1,164
    Likes Received:
    1,174
    Trophy Points:
    272
    Location:
    43°36'16.0"N 1°26'36.1"E
    in fact only 'REBUG' hashes are necessary:
    Code:
    /* rebug */
    #define EXPLORE_PLUGIN_REBUG_HASH                   0xACF4AF2B000ECC91
    #define EXPLORE_CATEGORY_GAME_REBUG_HASH            0x9CB3396E00056CE9
    #define GAME_EXT_PLUGIN_REBUG_HASH                  0xE274AF7B0001E5D3
    
    that's ok (tested)

    see modulespatch.c :
    Code:
    PatchTableEntry patch_table[] =
    {
        { LIBFS_EXTERNAL_HASH, libfs_external_patches },
    #ifdef DO_PATCH_PSP
        { PSP_EMULATOR_HASH, psp_emulator_patches },
        { EMULATOR_API_HASH, emulator_api_patches },
        { PEMUCORELIB_HASH, pemucorelib_patches },
        { LIBSYSUTIL_SAVEDATA_PSP_HASH, libsysutil_savedata_psp_patches },
    #endif
    #ifdef DO_PATCH_PS2
        { EXPLORE_PLUGIN_HASH, explore_plugin_patches },
        { EXPLORE_CATEGORY_GAME_HASH, explore_category_game_patches },
        { GAME_EXT_PLUGIN_HASH, game_ext_plugin_patches },
    #endif
    };
    
    PatchTableEntry patch_table_rebug[] =
    {
        { LIBFS_EXTERNAL_HASH, libfs_external_patches },
    #ifdef DO_PATCH_PSP
        { PSP_EMULATOR_HASH, psp_emulator_patches },
        { EMULATOR_API_HASH, emulator_api_patches },
        { PEMUCORELIB_HASH, pemucorelib_patches },
        { LIBSYSUTIL_SAVEDATA_PSP_HASH, libsysutil_savedata_psp_patches },
    #endif
    #ifdef DO_PATCH_PS2
    #ifdef EXPLORE_PLUGIN_REBUG_HASH
        { EXPLORE_PLUGIN_REBUG_HASH, rebug_explore_plugin_patches },
        { EXPLORE_CATEGORY_GAME_REBUG_HASH, rebug_explore_category_game_patches },
        { GAME_EXT_PLUGIN_REBUG_HASH, rebug_game_ext_plugin_patches },
    #endif
    #endif
    };
    and :
    Code:
        if(vsh_type != 0x666)
           memcpy(patch_table, patch_table_rebug, sizeof(patch_table));
    
    So, if 'REBUG' hashes are not defined, they are not be copied in the patch_table... so thay are missing.
    That piece of code should be improved.

    Edit:
    That should do the job without to add anything else to symbols.h :
    Code:
    PatchTableEntry patch_table_rebug[] =
    {
        { LIBFS_EXTERNAL_HASH, libfs_external_patches },
    #ifdef DO_PATCH_PSP
        { PSP_EMULATOR_HASH, psp_emulator_patches },
        { EMULATOR_API_HASH, emulator_api_patches },
        { PEMUCORELIB_HASH, pemucorelib_patches },
        { LIBSYSUTIL_SAVEDATA_PSP_HASH, libsysutil_savedata_psp_patches },
    #endif
    #ifdef DO_PATCH_PS2
    #ifdef EXPLORE_PLUGIN_REBUG_HASH
        { EXPLORE_PLUGIN_REBUG_HASH, rebug_explore_plugin_patches },
        { EXPLORE_CATEGORY_GAME_REBUG_HASH, rebug_explore_category_game_patches },
        { GAME_EXT_PLUGIN_REBUG_HASH, rebug_game_ext_plugin_patches },
    #else
        { EXPLORE_PLUGIN_HASH, explore_plugin_patches },
        { EXPLORE_CATEGORY_GAME_HASH, explore_category_game_patches },
        { GAME_EXT_PLUGIN_HASH, game_ext_plugin_patches },
    #endif
    #endif
    };
    
     
    Last edited: Mar 14, 2019
    sandungas, Joonie and Zar like this.

Share This Page