Skip to content
Lawrence Wu edited this page Mar 20, 2015 · 2 revisions

Introduction

The PSP uses a Runlevel-System similiar to that of Linux Operating Systems to dynamically load and unload modules.

The Reboot Sector is the very first code that gets executed everytime the system switches from one runlevel to another.

Functionality

The Reboot Sector of the PSP is always located at the same location in Kernel Memory, it contains security code to prevent the execution of unsigned modules.

In PRO CFW this is circumvented by replacing the Reboot Sector with a custom one to remove parts of the security code.

This is done by utilizing a handful of different Kernel Exploits.

Comments

Comment by ding...@QQ.com, Jun 1, 2011

OK

Comment by hiry...@gmail.com, Jun 13, 2011

I've read here that none ofw files are replaced - this info states different. Care to explain?

Comment by onhe...@gmail.com, Jun 13, 2011

This replacement is in Kernel Memory, not in NAND.

Comment by hiry...@gmail.com, Jul 4, 2011

@up - Could I ask for some more information? Or links as google isn't very on topic in explaining what is psp kernel memory, not where to dl kernel memory dumper ;) Thx in advance!

Comment by hexidime...@gmail.com, Nov 8, 2011

basically when the psp goes to load the security information from the rom into the ram, the exploit filters out the parts that disallow unsigned applications