Secure LPAR Loader: Difference between revisions

From PS3 Developer wiki
Jump to navigation Jump to search
(kudos to graf/glevand for this reverse engineering)
 
mNo edit summary
Line 1: Line 1:
 
[[Category:Software]]
*SLL opens '''lv2_kernel.self''', parses ELF header and determines the size of initial memory region for GameOS LPAR  
*SLL opens '''lv2_kernel.self''', parses ELF header and determines the size of initial memory region for GameOS LPAR  
*SLL creates a memory region for GameOS LPAR by using '''syscall 0x10000'''.  
*SLL creates a memory region for GameOS LPAR by using '''syscall 0x10000'''.  

Revision as of 06:32, 13 November 2012

  • SLL opens lv2_kernel.self, parses ELF header and determines the size of initial memory region for GameOS LPAR
  • SLL creates a memory region for GameOS LPAR by using syscall 0x10000.
  • SLL opens /proc/partitions/<LPAR id>/mem file and maps it with mmap syscall into it's address space.
  • Then it authenticates, decrypts and copies the SELF file of GameOS to LPAR's memory region by using SPE syscalls 0x10040 and 0x10042.
  • Linux is not loaded by SLL, it's loaded in Process 9 by Linux System Manager
  • GameOS file image lv2_kernel.self is stored on /dev/rflash1


0x14000 - SLL (Secure LPAR Loader)

Packet ID Description
0x14004 Load GOS
0x14005 Unload GOS