Editing Mounting HDD in Linux
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
Unlike PS3, where every part of per-console security (including the HDD) is dictated by the eid_root_key, PS4 has two per-console keys for the HDD, one handled by SAMU (we cannot obtain this key | Unlike PS3, where every part of per-console security (including the HDD) is dictated by the eid_root_key, PS4 has two per-console keys for the HDD, one handled by SAMU (we cannot obtain this key atm) and the other handled by the South Bridge (Aeolia / Belize) which can be obtained. | ||
Here are described the steps to mount a PS4 HDD on PC using the cryptmount utility on Linux. | Here are described the steps to mount a PS4 HDD on PC using the cryptmount utility on Linux. | ||
Line 7: | Line 7: | ||
* preinst, preinst2, system, system(b), system_ex, system_ex(b) cannot be mounted as they use a key hidden in SAMU not eap_hdd_key. Cryptmount returns error device-mapper ioctl when trying with fstype=tmpfs. | * preinst, preinst2, system, system(b), system_ex, system_ex(b) cannot be mounted as they use a key hidden in SAMU not eap_hdd_key. Cryptmount returns error device-mapper ioctl when trying with fstype=tmpfs. | ||
* eap_vsh, update, user and eap_user can be mounted using cryptmount and eap_hdd_key. | * eap_vsh, update, user and eap_user can be mounted using cryptmount and eap_hdd_key. | ||
* eap_kern can be read directly | * eap_kern can be read directly wihtout mounting but anyway it remains an encrypted file that is decrypted by PS4 OS. | ||
* sda13 cannot be mounted for now. Investigation neeeded. It might be system_data partition and so would behave as system and system_ex. It might also be swap partition. | * sda13 cannot be mounted for now. Investigation neeeded. It might be system_data partition and so would behave as system and system_ex. It might also be swap partition. | ||
* sda17 and sda19 can be mounted with fstype=tmpfs but they are void. Investigation neeeded. | * sda17 and sda19 can be mounted with fstype=tmpfs but they are void. Investigation neeeded. | ||
Line 16: | Line 16: | ||
== Prerequisites == | == Prerequisites == | ||
* Per-console PS4 EAP HDD Key (check in your kernel dump and in | * Per-console PS4 EAP HDD Key (check in your kernel dump and in hxxps://github.com/Ps3itaTeam/ps4-kexec/blob/master/magic.h kern_off_eap_hdd_key offset) | ||
* A PC running a Linux Distribution (ex: ubuntu, xubuntu live) that supports cryptmount | * A PC running a Linux Distribution (ex: ubuntu, xubuntu live) that supports cryptmount | ||
Line 35: | Line 35: | ||
40 00 30 50 DE DB 76 EC 5A D3 D2 8B B3 86 60 D2 | 40 00 30 50 DE DB 76 EC 5A D3 D2 8B B3 86 60 D2 | ||
6B FA DD 0A 1F 3C 03 4B 59 A8 3D 44 04 AE D6 15 | 6B FA DD 0A 1F 3C 03 4B 59 A8 3D 44 04 AE D6 15 | ||
</pre> | </pre> | ||
Line 57: | Line 51: | ||
* Add write permission on cmtab file: | * Add write permission on cmtab file: | ||
<pre> | <pre> | ||
sudo chmod 777 / | sudo chmod 777 /dev/cryptmount/cmtab | ||
</pre> | </pre> | ||
Line 109: | Line 103: | ||
* Remove write permission on cmtab file: | * Remove write permission on cmtab file: | ||
<pre> | <pre> | ||
sudo chmod | sudo chmod 775 /dev/cryptmount/cmtab | ||
</pre> | </pre> | ||
* Mount PS4 "user" partition: | * Mount PS4 "user" partition: |