Yo know this sucks for me, bad.
First I had to get rid of my PS3 because I needed cash, now my laptop is dead, and my server is failing too.
I've been messing with this dump basically because I'd like to help
but no PS3, I wish someone would send me one
Can't even work on my SSL project - That's on my laptop and my server is RAID so I can't connect the HDD.
However I'm finding a few "easter eggs" in this dump, one made me LOL pretty hard last night.
0x00500000 - Start of HTAB (key 0x1408F92C94401)
0x00500008 - Real Addr of hypervisor _exploit @ 0x003B4000 (hypervisor_exploit_lv1_peek)
0x00600000 - End of HTAB
Hypervisor Exploit code:
E8 63 00 00 ld r3, 0(r3)
4E 80 00 20 blr
F8 83 00 00 std r4, 0(r3)
38 60 00 00 li r3, 0
4E 80 00 20 blr
I have added those informations on the wiki ps3hvdoc.
Lot of other things to come soon ...
It will be great to have also the dmesg output included with the dump because some address are related to it ...
Thats what I've found:
00080018 gsboot: load_lv2: filename: %s \n
00080040 gsboot: load_lv2: lpar_id: %d laid: %d \n
00080118 SLL: auth_lv2 called\n
00080130 SLL: auth_lv2 fail @%d \n
000807D8 SL:auth_lv2 ret_value %d\n
00082A30 ln security_policy_manager::register_rule:
Is that RSX driver path?
What about: 0012A2C0 /local_sys0/ps2emu/ps2_softemu.self
Can you do something with this, can you run it, anything?
yes of course you can run it if you have access to the file.. decrypting and modifying is also possible with that...
added some more information to ps3hv wiki like i found place of lvl2_kernel.self
well its preatty interesting most files like Linux OS
Apart from the ones you posted the ISA lists 0x0f00 as "Performance Monitor Interrupt" and 0x0f20 is named "Vector Unavailable Interrupt" there.