167w ago - Just over a month ago the PS3 Hypervisor lv2 (GameOS) was dumped and GeoHothinted that it was accomplished by commanding an SPU to load METLDR.
Today dondolo let us know that simone has detailed how to load METLDR in SPU isolation mode on the PlayStation 3 and included some source code.
While this is definitely a step forward, he still doesn't specify what the read/write u32 functions are... or which functions to add to the recent XorHack release.
Those interested can check it out below, and to quote:
"After some experiment I succeded to load METLDR in spu isolation.
You need geohot's exploit to do this, because you need to turn spu relocation off (MFC_SR1[R]=0) and not let know the HV you are using a SPU (so no calls to lv1_construct_logical_spe or similar). For some strange conf, it doesn't work in HV way."
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Don't think there's anything to add to XorHack's code. Just compile a new module to be "modprobed" after the hack is done (i'm not sure even if the hack has to be done).
anyway, read_uXX(in_address) reads a 32/64 bit value from in_address. write_uXX does the exact opposite. The problem you have are not the functions, it's the constants SPU_PX(XXXXX), but they could be already defined in the kernel, really don't know...
Advice: Read the entire thread before asking a question that was already answered. That way you don't look like a dumbass.
Actually I take that back, you quoted the answer you were looking for when you posted your question. If you don't understand what "running unsigned code from the XMB" means perhaps you should do some googling.