Active Topics

 



Notices


Reply
Thread Tools
thp's Avatar
Posts: 1,391 | Thanked: 4,272 times | Joined on Sep 2007 @ Vienna, Austria
#31
Originally Posted by Creamy Goodness View Post
do you understand that you have to plug it back in every time you reboot? it doesn't permanently hack the ps3...
It makes the exploit just accessible to a broader range of people, and I think it's a good thing someone writes this driver/module for Linux-based gadgets. Not everyone has a Teensy board lying around, but if you happen to have a N900/N8x0/770 lying around, why not use it for this? It lowers the entry barrier (for users who already have a NIT-ish device). In the case of the N900, you might even be able to charge it while you are playing games.

The thing that worries me is that there's no real information about compilers, SDK, etc.. around that would help getting developers started writing homebrew (for the PS3). Right now, the only use for this *is* the Backup Manager - until some other software becomes available.
 

The Following User Says Thank You to thp For This Useful Post:
Posts: 18 | Thanked: 16 times | Joined on Feb 2010
#32
Originally Posted by Creamy Goodness View Post
yes, you can remove the dongle... i read that.
do you understand that you have to plug it back in every time you reboot? it doesn't permanently hack the ps3...
Yes I understand that, but I think it is not too much hassle since you have to power ps3 on from the unit anyway and not from the controller. And I assume there will be custom firmware within 2 months so I have to plug my N900 to ps3 for about 20-30... So I save an euro in every boot.

Last edited by NOkk3r1; 2010-09-02 at 18:52.
 
Posts: 1,463 | Thanked: 1,916 times | Joined on Feb 2008 @ Edmonton, AB
#33
yeah hmm i forgot even with the usb dongle THING you have to hit eject within 200ms or something, i guess no matter what I have to get off the couch for now
you guys need to remember that the exploit at this stage gives access to the game OS or whatever they call it, not the PS3 kernel. They need to find another exploit to even have the ability to install a permanent replacement firmware (please don't refer to it as CFW, that's a PSP term). So my point is there is absolutely no reason to think that the PS3 can be fully rooted any time soon, unless you are confident that there are more bugs to exploit in their device architecture. The kernel is running on an isolated hardware environment (SPU), so it isn't supposed to be possible to do this. Hopefully, there are some more bugs, and the increased attention brings them to light. But I'm not holding my breath.
 
hawaii's Avatar
Posts: 1,030 | Thanked: 792 times | Joined on Jun 2009
#34
This is the current status of my assistance on the project;

/home/user # ./ps3pwn blob.bin
Loading blob.bin
Blob size is 0x6f0
mmapped 480ab000 -> 0x40002000 [0x1000]
mmapped 48004000 -> 0x40003000 [0x1000]
mmap ok!
Clocks: 032000d2
Revision: 00000033
Resetting OTG controller
Reset complete
Devctl: 00000080
High-speed mode disabled
Configuring endpoints
Waiting for connection...
VBUS detected!
Now soft-connecting
Entering IRQ loop
IRQs: 01
IRQs: 04
High-speed reset
get_descriptor(0, 1, 0) (0x8)
get_descriptor(0, 1, 0) (0x12)
Device 0 now has address 2
Commit pending address 2
get_descriptor(0, 2, 0) (0x8)
get_descriptor(0, 2, 0) (0x19)
Set configuration 1
get_descriptor(0, 41, 0) (0x20)
Set port 1 power to ON
Set port 2 power to ON
Set port 3 power to ON
Set port 4 power to ON
Set port 5 power to ON
Set port 6 power to ON
Triggering connection change for port 1
get_port_status(0001) = 0103 0001
Clear port 1 connect change
get_port_status(0001) = 0103 0000
Reset port 1
get_port_status(0001) = 0103 0010
Clear port 1 reset change
Switching to new device 1
get_descriptor(1, 1, 0) (0x8)
Got a SETUPEND condition
length 0?
get_descriptor(1, 1, 0) (0x8)

It fails after sending the descriptors - for some odd reason. Unable to get passed this on 3.41 with the N900. Beagleboard is a different story. I assum HAL and BME are tying up the driver from releasing and letting the userspace take over to deliver the payload.

If you can legitimately contribute, please do so.

Last edited by hawaii; 2010-09-02 at 20:38.
 

The Following 3 Users Say Thank You to hawaii For This Useful Post:
Posts: 87 | Thanked: 16 times | Joined on Aug 2010 @ Southern California
#35
have older firmware PS3 been tried? I took my fatty off the interwebs to avoid losing my OtherOS...

Last edited by Uxi; 2010-09-03 at 01:17.
 
hawaii's Avatar
Posts: 1,030 | Thanked: 792 times | Joined on Jun 2009
#36
Using an OMAP3 beagleboard and 3.15 - payload delivery is successful, but execution fails - because it's not 3.41

I'll update later.

Last edited by hawaii; 2010-09-02 at 21:36.
 
Posts: 15 | Thanked: 3 times | Joined on Sep 2010
#37
I can test it on a N810 and 3.41 PS3
 
hawaii's Avatar
Posts: 1,030 | Thanked: 792 times | Joined on Jun 2009
#38
Quick update,

Payload delivery and successful execution has been completed by a Palm Pre. Successful PS3 jailbreak from a slaved Pre. N900 is next. Will report back once I confirm it's working.

Also, this has nothing to do with Kakaroto's work - which is just about done as I understand it. His is done through usb gadget, this is done completely through userspace are unbinding the driver.
 

The Following 3 Users Say Thank You to hawaii For This Useful Post:
ZogG's Avatar
Posts: 1,389 | Thanked: 1,857 times | Joined on Feb 2010 @ Israel
#39
Originally Posted by Creamy Goodness View Post
yes, you can remove the dongle... i read that.
do you understand that you have to plug it back in every time you reboot? it doesn't permanently hack the ps3...
First of all, you can dump, as patches to that were released as well
Second, is that this ps3j on n900 is interesting as concept and even u are gonna paly games like that, it wouldn't be hard to have cable in PS3 and as your phone always on you, just connect it when u turn on system
 
Posts: 16 | Thanked: 1 time | Joined on Aug 2010 @ Brazil
#40
Well, as you can see Kakaroto isn't working on a psgroove Port, Hawaii which dev board are you using to run the exploit?
 
Reply


 
Forum Jump


All times are GMT. The time now is 12:16.