217w ago - Developers at DemonHades have located and mapped the JTag Port on a PS3 Blu-ray drive board today.
To quote, roughly translated: I found the JTag port for the Blu-ray Reader on the PlayStation 3. Last night after finishing the research meeting I went looking for information about BD integrated reader.
In and looking at the information that I found on the back of the plate reader I saw that there is no connector terminals, these terminals belong to a connector which connects 'something' via terminals and through the Internet I found the points used in a JTag, including the TDO, TDI, TMS etc.
Originally developed for printed circuit boards, it is currently used for test of submodules of integrated circuits, and is also useful as a mechanism for debugging embedded applications, as it provides a backdoor to within the system.
When used as a debugging tool, an in-circuit emulator that uses JTag as the transport mechanism allows the programmer to access the debugging module that is integrated into the CPU. The debug module enables the programmer to correct their errors and code logic of their systems.
There are consumer products that have a JTag port integrated, so that the connections are often available on the PCB as part of the prototype phase of the product. These...
248w ago - This was posted 2 days ago (working thread) in the PlayStation 3 Dev News Forum courtesy of XVISTAMAN2005 with assistance from idone, and is handy for PS3 Debug console owners in rebuilding decrypted ELF's from a SELF launched into memory.
To quote: Well this took some time but we have it sorted out, CJPCposted a while back ago that an eboot.bin had been decypted from memory. The bad thing about this is that it is verry difficult to figure out how the file was before it was loaded and to put it back to an executalbe file.
Well after HRS and sleepless nights this has been sorted and put in an easy to do map. The following is an example of the the file location offsets located in the elf header. Based on this the file can be rebuilt in a matter of mins.
NOTE: THIS IS JUST AN EXAMPLE OF HOW IT COULD BE DONE THE MEMORY OFFFSET LOACTIONS CAN CHANGE A BIT FROM FILE TO FILE SO ONE WOULD HAVE TO DOUBLE CHECK THERE MEM DUMP FOR SECTIONS IF THE OFFSET TABLE DOES NOT MATCH UP BUT THIS MAP WAS USED ON 3 DIFFERNT EBOOT.BIN'S SO...