Welcome!

Final Burn Neo => FBN Development => Topic started by: Haze on July 22, 2010, 09:11:44 AM

Title: Bonky?
Post by: Haze on July 22, 2010, 09:11:44 AM
does Bonky post here? we've pretty much established that mvce.04a in the parent Marvel Vs. Capcom set which he dumped is bad, but nobody seems to have any direct contact with him to ask for a redump.
Title: Re: Bonky?
Post by: JacKc on July 22, 2010, 12:25:22 PM
Hi haze,

I've sent a mail to Bonky to let him know one rom seems to be bad dumped....waiting for an answer.
Title: Re: Bonky?
Post by: Barry Harris on July 23, 2010, 11:40:15 AM
Hi haze,

I've sent a mail to Bonky to let him know one rom seems to be bad dumped....waiting for an answer.

That explains the crash in the ending then! I wasted so much time disabling almost everything (sound, graphics, etc.) before I gave up trying to work out what it was! :)
Title: Re: Bonky?
Post by: Haze on July 23, 2010, 01:29:26 PM
yeah the report here
http://mametesters.org/view.php?id=3948

gives details of it.

At least 2 bytes are bad.  It's possible if his roms were suffering from bitrot that he won't be able to get a good read from that board anyway, but it's worth another try.  The CPS2 ROM checks are useless, they check almost nothing so don't really detect such problems well.
Title: Re: Bonky?
Post by: iq_132 on July 26, 2010, 01:30:32 AM
yeah the report here
http://mametesters.org/view.php?id=3948

gives details of it.

At least 2 bytes are bad.  It's possible if his roms were suffering from bitrot that he won't be able to get a good read from that board anyway, but it's worth another try.  The CPS2 ROM checks are useless, they check almost nothing so don't really detect such problems well.

It's almost definitely at least 3 bytes.  Two of them are in the word at 80040 and the other is in the word at 80060.

The proper decrypted opcode value is the one in the middle column, the right one is the bad value.
80040:   F9   11
80041:   4E   EB
80060:   7C   43
80061:   22   08

Running the cps2 decryption algo and brute forcing the value to give the proper decrypted value at the bad addresses gives these as the most likely "good/encrypted" values:
9A18, 80040 <-- most likely (3 bits difference)
0A7E, 80040
5780, 80060
0BC0, 80060 <-- almost definitely correct for this address (only 1 bit different)
Title: Re: Bonky?
Post by: JacKc on July 26, 2010, 08:41:40 AM
At least, with the new values, the mvsc set won't reset anymore at staff roll [see attached snap]

Waiting now for mvsce.04a Bonky's redump to see if crc32 and sha1 matches...

NOTE: Tested with MAMEUI64 0.138.3

Title: Re: Bonky?
Post by: Bonky0013 on August 02, 2010, 07:22:49 AM
Hello all ,

I haven't this game for a redump now.
But , i think can have an other for redump...
Sorry for long reply, but with my job it's very hard to find time.
Title: Re: Bonky?
Post by: -neoryu- on September 18, 2010, 12:01:38 AM
Whoa.   :eek:

In late 2009, I remember reporting this bug to nes6502 and kenshiro when the Final Burn Legends port was released for the Xbox!!  It's amazing to see it go from a PM all the way to the official PC version's programmers here.   

Here's an understated "Thank You" to everyone here for everything they contributed to this marvelous work of art.  FBA is true arcade preservation.  It would not be without all of the talented coders and contributors here.  :wink: