To quote from Dukio.com (linked above): Well, I think it's going to be a good framework for any new enthusiastic developer who wish to start in the ever growing PS3 Jailbreak scene. Below are the changelog for the recent refactoring work that has been done by him to his PL3 git.
WIP: rename macros.h.S to pl3.h.S and make it do a lot more stuff
Make send_eth compatible with FUNC_PTR and add a _res variant
Add proper ifndef/define/endif to all .h.S files
Port all payloads to the new pl3.h.S framework
Factor out the code to hook the hvsc instructions into its own file
160w ago - Update: Chinese PlayStation 3 developer xoeo at A9VG.com has now released a working PSGroove payload to spoof PS3 Firmware version 3.15 / 3.41 to 3.50 along with some PSGroove hex codes, as follows:
Just under a week ago we reported that Medal of Honor was working with Open Manager for PS3 JailBreak users, and today datalogger (JasonMcKey on Twitter) has updated the PL3 Payload which fixes the 80010019 error that Medal of Honor and other new PS3 titles gave users prior to updating them to run.
166w ago - Today KaKaRoTo detailed how to port PL3 to an exploitable PS3 Firmware via Github (linked above).
To quote: "How to port to a new Firmware (but < 3.41) :
First disable the JIG mode, and try to bruteforce the position of the payload with a panic payload (add 'b panic' at payload_start in dump_lv2.S), until you can get a hit reliably (see http://pastie.org/1195108).
Then replace the payload with the original dump_lv2 payload, and connect the ps3 through ethernet to your PC and run wireshark to capture your dump... Run the payload, then once the ps3 panics (to tell you it's done), you can save your wireshark dump to a file in .pcap format.
Then run the tools/dump_lv2_pcap_to_bin program to dump the lv2 binary from the pcap file captured by wireshark.
Open the dump with IDA, set the processor to 'ppc', then run the dump_lv2_analyzer.idc IDC file from the tools directory to get it analyzed and follow the instructions (set TOC table in IDA options).
Once you are done, set the TOC_TABLE value in PSFreedom/PSGroove and set the syscall_table define in macros.h.S.
Then look for the position of the JIG response offset in the dump by searching for a recognizable string you previously put in there. You can now set the JIG response address...
166w ago - Today KaKaRoTo has introduced a common repository of payloads that can be used by any PS3 JailBreak implementation called PL3, and also said he is making progress with PSFreedom ports for PS3 Firmware 3.01, 3.10 and 3.15.
To quote: "I'll announce two things, first, let's talk about PL3.. PL3 is a new project I started in order to have a common repository of payloads that can be used by any 'jailbreak' implementation. I got tired of copying payloads from PSGroove, and I had some nice changes in mine that I thought the PSGroove project could benefit from, so I thought I'd create a single repository that both projects, PSFreedom and PSGroove (or any other similar projects) could use.
You can find it in github, so don't hesitate to submodule it and use it.
Second important news... I've bought a new PS3 just for homebrew. Thanks to all who donated money so I can buy it (I didn't get enough donations to pay for it, but enough to help me). I bought this PS3 used and it came with firmware 3.01! This is good and bad news : I can't use PSFreedom to jailbreak it, so i've put on hold any improvements for it, however,...