Search results

Jump to navigation Jump to search
  • SceSblFwLoader is a PS Vita kernel module in charge of loading specific firmware images such as PSPEmu Initial Program Loader contained in === Loading Robin firmware image ===
    3 KB (340 words) - 22:18, 17 January 2024
  • ...ird stage bootloader of the PS Vita system. It is <code>kernel_boot_loader.self</code> in the [[Boot Sequence#Boot Partition|Boot Partition]]. It initializ ...this point. A couple of things are loaded into memory. <code>kprx_auth_sm.self</code> from the [[SLB2]] [[eMMC]] partition is located at <code>0x40000500<
    6 KB (918 words) - 04:43, 1 May 2023
  • ...s). Libraries that deal with encrypted/signed content ([[SELF Loading|SELF loading]], [[PUP]] unpacking, etc) all make calls to the [[TrustZone|Secure World]] ...secure the system in later System Software updates and make usermode code loading a much harder reality.
    5 KB (815 words) - 23:37, 16 July 2023
  • ...the [[NSKBL|non-secure kernel bootloader]]. At this point the kprx_auth_sm.self and prog_rvk.srvk read from the eMMC [[SLB2]] partition are both loaded int | kernel_boot_loader.self
    12 KB (1,757 words) - 08:24, 9 August 2023
  • == Bootrom SLSK loading process ==
    8 KB (1,251 words) - 23:45, 16 July 2023
  • This sets up the library. Call it immediately after loading it.
    4 KB (515 words) - 21:24, 1 May 2023
  • ...then loads and parses System Configuration script which is responsible for loading the rest of the kernel and spawning the Shell. The SELF can be found at <code>os0:kd/sysstatemgr.skprx</code>.
    23 KB (3,187 words) - 21:33, 1 May 2023
  • Right and down are less trusted. kernel_boot_loader.self does not itself run on cmep but only contains encrypted segments for ARM to FW version check in kernel_boot_loader.self. (if is_resume == 0 && kbl_fw_version != second_loader_fw_version, error ou
    6 KB (1,004 words) - 08:27, 4 August 2023
  • | 0x88 || 0x4 || second_loader || <code>context_auth_sm.self</code> raw data paddr | 0x8C || 0x4 || second_loader || <code>context_auth_sm.self</code> size
    33 KB (4,849 words) - 19:57, 30 March 2024
  • ...rnel modules. SceKernelModulemgr calls [[SceSblAuthMgr]] functions for the SELF decryption process. SceKernelModulemgr loads the ELF programs into memory a The SELF can be found in <code> os0:kd/modulemgr.skprx</code>.
    91 KB (11,099 words) - 06:25, 11 November 2023
  • ...cate, it has the role of initializing the Non-Secure state environment and loading the kernel from storage. SceUID moduleId; // SCE_UID_INVALID_UID. It gets filled when loading.
    25 KB (3,006 words) - 17:42, 30 March 2024
  • This module exists in both non-secure and secure world. The non-secure world SELF can be found in <code>os0:kd/excpmgr.skprx</code>. | Enter CDRAM self-refresh mode. The <code>resresh</code> typo is in SCE name.
    39 KB (5,033 words) - 19:23, 25 March 2024
  • ...ceKernelInhibitLoadingModule]]() in their browser, which prevented us from loading additional sysmodules. This limitation is crucial, since this was the only ...2.60 and lower were compiled as a statically linked executable, thus their loading address is always the same, namely 0x81000000, and they cannot be relocated
    59 KB (8,666 words) - 18:39, 13 October 2023
  • 4 = SM loading If it is a non-game/fSELF program and SELF version is 0, or if SELF version is less than or equal to the value in keyring 0x50E, branch to the
    34 KB (5,112 words) - 18:25, 17 September 2023
  • == kprx_auth_sm.self == ...sm]] is a special SM stored in the [[SLB2]] partition. The raw (encrypted) SELF is stored in ARM [[TrustZone]] memory. It is placed there by an early bootl
    53 KB (7,975 words) - 21:55, 10 January 2024
  • This module exists in both non-secure and secure world. The non-secure world SELF can be found in <code>os0:kd/sysmem.skprx</code>. It also can be found in t ! Index !! SM SELF location
    348 KB (38,144 words) - 05:11, 14 March 2024