-
Notifications
You must be signed in to change notification settings - Fork 0
Reboot Sector
The PSP uses a Runlevel-System similiar to that of Linux Operating Systems to dynamically load and unload modules.
The Reboot Sector is the very first code that gets executed everytime the system switches from one runlevel to another.
The Reboot Sector of the PSP is always located at the same location in Kernel Memory, it contains security code to prevent the execution of unsigned modules.
In PRO CFW this is circumvented by replacing the Reboot Sector with a custom one to remove parts of the security code.
This is done by utilizing a handful of different Kernel Exploits.
Comment by ding...@QQ.com, Jun 1, 2011
OK
Comment by hiry...@gmail.com, Jun 13, 2011
I've read here that none ofw files are replaced - this info states different. Care to explain?
Comment by onhe...@gmail.com, Jun 13, 2011
This replacement is in Kernel Memory, not in NAND.
Comment by hiry...@gmail.com, Jul 4, 2011
@up - Could I ask for some more information? Or links as google isn't very on topic in explaining what is psp kernel memory, not where to dl kernel memory dumper ;) Thx in advance!
Comment by hexidime...@gmail.com, Nov 8, 2011
basically when the psp goes to load the security information from the rom into the ram, the exploit filters out the parts that disallow unsigned applications