166w ago - Just over a month ago the PS3 Hypervisor lv2 (GameOS) was dumped and GeoHothinted that it was accomplished by commanding an SPU to load METLDR.
Today dondolo let us know that simone has detailed how to load METLDR in SPU isolation mode on the PlayStation 3 and included some source code.
While this is definitely a step forward, he still doesn't specify what the read/write u32 functions are... or which functions to add to the recent XorHack release.
Those interested can check it out below, and to quote:
"After some experiment I succeded to load METLDR in spu isolation.
You need geohot's exploit to do this, because you need to turn spu relocation off (MFC_SR1[R]=0) and not let know the HV you are using a SPU (so no calls to lv1_construct_logical_spe or similar). For some strange conf, it doesn't work in HV way."
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
CJPC said he would once the missing details are available (what the read/write u32 functions are, which functions to add to the XorHack, etc) so no worries.
Definitely, the lv2 dump needs to be in the eyes of more than a select group of people who keep all the useful things internal and then whine when people want updates. There are countless others willing to help out without the egos or hypocritical anti-warez stance.
SkyOfHitmen: Nice to see you around... I'm sure you're aware that what GeoHot last posted was parroted from loser, who helps talented folks like GeoHot when he has the time but doesn't wish to get involved in scene BS.
Anyway, whatever you may contribute will be welcomed of course!
People seem to blame me for not giving infos, but i cant (and wont) as long as i dont have solid ones to give. Like 'Boss' already mentioned, Hitmen is known for passing infos that are checked, tested and somewhat "ready to use", and no "hey, look at me, i understood the public available pdfs and can do some code" ... anyways, still searching/trying around ...