Editing Talk:Boot Order
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 5: | Line 5: | ||
* https://www-01.ibm.com/chips/techlib/techlib.nsf/techdocs/AF7832F379790768872572D10047E52B/$file/CellBE_HIG_65nm_v1.01_8Jun2007.pdf | * https://www-01.ibm.com/chips/techlib/techlib.nsf/techdocs/AF7832F379790768872572D10047E52B/$file/CellBE_HIG_65nm_v1.01_8Jun2007.pdf | ||
* http://cell.scei.co.jp/e_download.html | * http://cell.scei.co.jp/e_download.html | ||
===SPI traces/testpoints=== | ===SPI traces/testpoints=== | ||
Line 58: | Line 55: | ||
== What type of encryption? == | == What type of encryption? == | ||
The various loaders and levels | The Boot Order table lists whether the various loaders and levels are encrypted, but doesn't say what type of encryption. Is this generally AES256? | ||
-- 69.55.232.38 | |||
^try reading the alinea just above^ where you posted this question ;) and ofcourse the [[SELF File Format and Decryption]] page is a good reference. :) [[User:Euss|Euss]] | |||
== LV0 == | == LV0 == | ||
Line 208: | Line 208: | ||
|- | |- | ||
|} | |} | ||
== CEB Units == | == CEB Units == | ||
Line 222: | Line 215: | ||
* 1. lv0ldr (the file is actually called this way on NOR) starts, if DIP SW is set to normal position it starts lv0 from lv0_bank0; if lv0_bank0 is missing, corrupt or blank, it starts from lv0_bank1 if none are present, it fails | * 1. lv0ldr (the file is actually called this way on NOR) starts, if DIP SW is set to normal position it starts lv0 from lv0_bank0; if lv0_bank0 is missing, corrupt or blank, it starts from lv0_bank1 if none are present, it fails | ||
If DIP SW is set to update mode, then it starts "updater" instead of lv0_bank0. | If DIP SW is set to update mode, then it starts "updater" instead of lv0_bank0. | ||
* 2. updater is a | * 2. updater is a modifier lv0, it will load isoldr and use it to decrypt ebootroms (old ebootroms are encrypted with AES128CTR), old Ebootroms only contained a NOR image. | ||
* 3. If DIP SW is set to normal, lv0_bank0 is loaded and will start rvkldr which will verify revocation using RL_FOR_PROGRAM.img for lv1.self then lv1ldr, which will decrypt and start lv1.self | * 3. If DIP SW is set to normal, lv0_bank0 is loaded and will start rvkldr which will verify revocation using RL_FOR_PROGRAM.img for lv1.self then lv1ldr, which will decrypt and start lv1.self | ||
* 4. Lv1 will start rvkldr to verify lv2_kernel.self revocation using RL_FOR_PROGRAM.img, if the check passes it will load lv2ldr and lv2_Kernel.self will start | * 4. Lv1 will start rvkldr to verify lv2_kernel.self revocation using RL_FOR_PROGRAM.img, if the check passes it will load lv2ldr and lv2_Kernel.self will start |