Search results

Jump to navigation Jump to search

Page title matches

  • ...s a part of NVS that is XTS encrypted and can only be accessed using Ernie secure command 0xD2. eMMC is also XTS encrypted and is accessed with the same comm = Ernie Secure Packets =
    9 KB (1,287 words) - 21:59, 10 January 2024
  • 1 = Secure kernel boot value? 2 = Secure kernel initiated
    34 KB (5,112 words) - 18:25, 17 September 2023
  • A Secure Module, abbreviated as SM, is a module running in the [[Secure Block]] of the PS Vita. A SM is a SELF targetting the [[CMeP]] processor. B = Secure Modules List =
    3 KB (398 words) - 19:17, 20 September 2023
  • ...[[CMeP]] processor. The Secure Block runs the [[Secure Kernel]] and the [[Secure Modules]]. = Secure Kernel =
    2 KB (200 words) - 19:40, 29 March 2023
  • Depending on the [[Secure_Modules|Secure Modules]] that is currently loaded, different commands are handled. ...ode>0xFFFFFFFF</code>) is used to stop the current loaded [[Secure_Modules|Secure Module]].
    53 KB (7,975 words) - 21:55, 10 January 2024

Page text matches

  • | 1.69-3.73 || ScePsp2Swu || Non-secure || User
    417 bytes (53 words) - 21:25, 1 May 2023
  • | 0.940-3.60 || Non-secure || Kernel ...[[SceKernelModulemgr#SceModulemgrForKernel|SceModulemgrForKernel]] || Non-secure || Kernel || 0xC445FA63
    91 KB (11,099 words) - 06:25, 11 November 2023
  • | 0.931-3.65 || Non-secure || Kernel | 0.931-1.69 || [[SceAudio#SceAudioForDriver|SceAudioForDriver]] || Non-secure || Kernel || 0x15D711C1
    4 KB (410 words) - 20:40, 1 May 2023
  • | 1.000.071-3.740.011 || Non-secure || User | 1.030.071-3.740.011 || [[SceLibKernel#SceLibKernel|SceLibKernel]] || Non-secure || User || 0xCAE9ACE6
    54 KB (5,657 words) - 20:43, 2 April 2024
  • | 1.500.151-3.740.011 || Non Secure || Kernel ...011 || [[SceMagicGate#SceMagicGateForDriver|SceMagicGateForDriver]] || Non Secure || Kernel || 0x4EA9847A
    3 KB (334 words) - 00:04, 1 April 2024
  • A Secure Module, abbreviated as SM, is a module running in the [[Secure Block]] of the PS Vita. A SM is a SELF targetting the [[CMeP]] processor. B = Secure Modules List =
    3 KB (398 words) - 19:17, 20 September 2023
  • | 1.030.071-3.740.011 || Non-secure || User | 1.030.071-3.740.011 || [[SceLibDbg#SceDbg|SceDbg]] || Non-secure || User || 0x623DF986
    1 KB (97 words) - 16:13, 30 March 2024
  • This module exists only in non-secure world. The SELF can be found in <code>os0:kd/iofilemgr.skprx</code>. | 0.990-3.60 || Non-secure || Kernel
    71 KB (8,747 words) - 13:51, 13 November 2023
  • | 0.990.000-1.692.000 || Non-secure || Kernel ...[[SceSblFwLoader#SceSblFwLoaderForDriver|SceSblFwLoaderForDriver]] || Non-secure || Kernel || 0x6FE424E4
    3 KB (340 words) - 22:18, 17 January 2024
  • Depending on the [[Secure_Modules|Secure Modules]] that is currently loaded, different commands are handled. ...ode>0xFFFFFFFF</code>) is used to stop the current loaded [[Secure_Modules|Secure Module]].
    53 KB (7,975 words) - 21:55, 10 January 2024
  • ....skprx files, but some are packed as plain Kernel PRX in bootimage.skprx. Secure Kernel modules are in kernel_boot_loader.self and sometimes are LZRA-encode ...l hander is secure and as long as the usermode memory access functions are secure, there is no need for additional checks implemented per function. A similar
    14 KB (1,710 words) - 17:03, 27 July 2023
  • | 0.940-3.730.011 || Non-secure || Kernel ...ceDeci4pDfMgr#SceDeci4pDfMgrForDebugger|SceDeci4pDfMgrForDebugger]] || Non-secure || Kernel || 0x849E3DF5
    4 KB (489 words) - 23:33, 19 May 2023
  • | 0.940 || Secure || Kernel This secure kernel module doesn't export any library.
    461 bytes (48 words) - 23:38, 31 March 2024
  • | 0.940 || Non-secure || Kernel | 0.940 || [[SceSamantha#SceSamanthaForDriver|SceSamanthaForDriver]] || Non-secure || Kernel || 0xD211B5F9
    3 KB (362 words) - 00:12, 1 April 2024
  • | 3.740.011 || Non-secure || User | 3.740.011 || SceCommonGuiDialog || Non-secure || User || 0x4B4AAE97
    5 KB (534 words) - 16:00, 30 March 2024
  • | 0.940-3.65 || Non-secure || Kernel ...0-3.60 || [[SceClockgen#SceClockgenForDriver|SceClockgenForDriver]] || Non-secure || Kernel || 0xFF160234
    3 KB (330 words) - 20:49, 1 May 2023
  • | 1.69-3.60 || Non-secure || User | 3.60 || SceShellSvc || Non-secure || User || 0x773242C7
    10 KB (1,131 words) - 21:31, 1 May 2023
  • | 1.69-3.65 || Non-secure || Kernel | 3.60-3.65 || [[SceCompat#SceCompatForDriver|SceCompatForDriver]] || Non-secure || Kernel || 0x7CFA62CD
    16 KB (1,841 words) - 22:26, 16 July 2023
  • ...https://www.blackhat.com/docs/eu-14/materials/eu-14-Chen-WebKit-Everywhere-Secure-Or-Not.PDF</ref> ...https://www.blackhat.com/docs/eu-14/materials/eu-14-Chen-WebKit-Everywhere-Secure-Or-Not-WP.pdf</ref>
    59 KB (8,666 words) - 18:39, 13 October 2023
  • | 1.800.060-3.740.011 || Non-secure || User | 1.800.060-3.740.011 || [[SceDrmPsmKdc#SceDrmPsmKdc|SceDrmPsmKdc]] || Non-secure || User || 0x36707EDD
    1 KB (148 words) - 00:31, 1 April 2024
  • | 1.800.071-3.720.011 || Non-secure || Kernel ...[[SceDeci4pSDbgp#SceDeci4pSdbgpForKernel|SceDeci4pSdbgpForKernel]] || Non-secure || Kernel || 0x085209B0
    2 KB (221 words) - 15:18, 1 November 2023
  • | 0.931.010-3.740.011 || Non-secure || Kernel | 0.931.010-3.740.011 || [[SceProcessmgr#SceProcessmgr|SceProcessmgr]] || Non-secure || User || 0x2DD91812
    55 KB (6,358 words) - 05:12, 13 February 2024
  • | 1.69-3.60 || Non-secure || Kernel | 1.000.071-3.740.011 || [[ScePower#ScePower|ScePower]] || Non-secure || User || 0x1082DA7F
    35 KB (3,539 words) - 19:42, 25 March 2024
  • | 1.69-3.65 || SceGpuEs4User || Non-secure || User | 3.65 || [[SceGpuEs4User#SceGpuEs4User|SceGpuEs4User]] || Non-secure || User || 0xFAFCA413
    579 bytes (60 words) - 21:03, 1 May 2023
  • See also: [[Ernie Secure]] | 0x18 || 5 || Current Secure Tick || Set on retail. Not set on DevKit. || [[SceRtc#sceRtcSetCurrentSecur
    40 KB (5,023 words) - 22:21, 5 January 2024
  • ...(Secure Monitor Calls). The "SS" abbreviation's first S likely stands for Secure whilst the second S, maybe for State. The equivalent of this proxy for SMCs | 0.931.010 || Non-secure || Kernel
    3 KB (308 words) - 21:07, 1 May 2023
  • | 3.60 || Non-secure || Kernel ...|| [[SceKernelPsp2Config#SceKernelPsp2Config|SceKernelPsp2Config]] || Non-secure || Kernel || 0x3198F2C4
    965 bytes (112 words) - 21:06, 1 May 2023
  • | 1.030.071-3.730.011 || Non-secure || Kernel ...0.071-3.730.011 || [[SceDeci4pUserp#SceDeci4pUserp|SceDeci4pUserp]] || Non-secure || User || 0x797E39C0
    1 KB (136 words) - 00:12, 31 March 2024
  • This module exists in both non-secure and secure world. The non-secure world SELF can be found in <code>os0:kd/intrmgr.skprx</code>. It also can b | 1.69-3.60 || Non-secure || Kernel
    30 KB (3,151 words) - 05:56, 13 October 2023
  • | 0.931-3.60 || Non-secure || Kernel ....60 || [[SceIdStorage#SceIdStorageForDriver|SceIdStorageForDriver]] || Non-secure || Kernel || 0xE1AC6D7C
    10 KB (1,100 words) - 21:04, 1 May 2023
  • | 1.69-3.74 || Non-secure || Kernel ...0.000-3.740.011 || [[SceNetPs#SceNetPsForDriver|SceNetPsForDriver]] || Non-secure || Kernel || 0xB2A5C920
    11 KB (1,445 words) - 21:21, 1 May 2023
  • ...tZone for execution in both a non-secure world and a sandboxed [[TrustZone|Secure World]]. However it is not the first processor to run on boot. The [[Cmep|cmep processor]] is the actual secure boot device rather than the ARM processor. The cmep processor's boot ROM, n
    12 KB (1,757 words) - 08:24, 9 August 2023
  • | 3.60-3.65 || Non-secure || Kernel | 3.65 || [[SceDeci4pLoadp#SceDeci4pLoadp|SceDeci4pLoadp]] || Non-secure || User || 0x7C088954
    2 KB (195 words) - 13:44, 7 October 2023
  • This module exists only in the non-secure kernel. The SELF can be found in <code>bootfs:update_mgr.skprx</code>. | 0.931-3.740.011 || Non-secure || Kernel
    14 KB (1,454 words) - 20:50, 27 December 2023
  • | 0.940 || Secure || Kernel
    281 bytes (28 words) - 23:38, 31 March 2024
  • | 0.990-3.740.011 || Non-secure || Kernel | 1.80 || Secure || Kernel
    848 bytes (93 words) - 00:19, 1 April 2024
  • | 1.030.071-3.740.011 || Non-secure || User | 1.030.071-3.740.011 || [[SceSqliteVsh#SceSqliteVsh|SceSqliteVsh]] || Non-secure || User || 0x52D9C44D
    7 KB (875 words) - 23:07, 31 March 2024
  • | 1.69-3.65 || Non-secure || Kernel | 1.69 || [[SceAVConfig#SceAVConfigForDriver|SceAVConfigForDriver]] || Non-secure || Kernel || 0xECC77DDB
    3 KB (249 words) - 20:37, 1 May 2023
  • ...nfo at <code>0x1F001800</code>, [[Suspend#SKBL Resume code|then enters Non-secure state at <code>0x1F000000</code>]]. ...gned, and belong in a specific range of physical address space (namely Non-Secure DRAM). If the check fails, SKBL enters an infinite loop and the boot proces
    12 KB (1,871 words) - 04:36, 19 June 2022
  • | 3.60 || Non-secure || Kernel || unk | 3.60 || [[SceTestBridge#SceTestBridge|SceTestBridge]] || Non-secure || User || unk
    2 KB (158 words) - 23:31, 31 March 2024
  • This module exists only in non-secure world. The SELF can be found in <code>os0:kd/deci4p_sdeci2p.skprx</code>. | 3.500.011-3.720.011 || Non-secure || Kernel
    1,007 bytes (128 words) - 20:57, 1 May 2023
  • | 1.69-3.65 || Non-secure || Kernel | 1.69 || [[SceLowio#ScePervasiveForDriver|ScePervasiveForDriver]] || Non-secure || Kernel || 0xE692C727
    56 KB (6,898 words) - 22:15, 5 February 2024
  • | 1.69-3.60 || Non-secure || Kernel | 1.69 || [[SceError#SceErrorForDriver|SceErrorForDriver]] || Non-secure || Kernel || 0xBA576248
    10 KB (983 words) - 21:01, 1 May 2023
  • | 1.69-3.60 || SceAvcodecUser || Non-secure || User | 3.60 || SceAudiodecUser || Non-secure || User || 0x2AA62046
    8 KB (646 words) - 20:46, 1 May 2023
  • | 3.60 || Non-secure || User | 3.60 || [[SceAppUtil#SceAppUtil|SceAppUtil]] || Non-secure || User || 0x48E01D74
    11 KB (1,114 words) - 15:07, 30 March 2024
  • ...munication between ARM [[TrustZone]] and [[Cmep]] ([[Second Loader]] and [[Secure Kernel]]), and with the debugger. Communication seems to go through some so ...== 1: valid arguments. See [[#Executing Secure Module functions|Executing Secure Module functions]].
    18 KB (2,382 words) - 02:14, 27 October 2023
  • This module exists only in non-secure. The SELF path is <code>os0:kd/enum_wakeup.skprx</code>. | 0.995-3.65 || Non-secure || Kernel
    2 KB (235 words) - 21:00, 1 May 2023
  • ...[[CMeP]] processor. The Secure Block runs the [[Secure Kernel]] and the [[Secure Modules]]. = Secure Kernel =
    2 KB (200 words) - 19:40, 29 March 2023
  • ...ader|second_loader]], [[Secure_Kernel|secure_kernel]] and [[Secure_Modules|Secure Modules]]. | SPAD32K, ScePowerScratchPad32KiB. After suspend, [[SKBL]] stores there "Non-secure power.kprx resume" using suspendinfo then jumps to it.
    31 KB (4,305 words) - 19:50, 22 February 2024
  • | 1.69-3.65 || Non-secure || Kernel | 1.69 || [[SceCtrl#SceCtrlForDriver|SceCtrlForDriver]] || Non-secure || Kernel || 0x7823A5D1
    13 KB (1,337 words) - 11:44, 7 June 2023

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)