Secure LPAR Loader: Difference between revisions
Jump to navigation
Jump to search
(kudos to graf/glevand for this reverse engineering) |
mNo edit summary |
||
Line 1: | Line 1: | ||
[[Category:Software]] | |||
*SLL opens '''lv2_kernel.self''', parses ELF header and determines the size of initial memory region for GameOS LPAR | *SLL opens '''lv2_kernel.self''', parses ELF header and determines the size of initial memory region for GameOS LPAR | ||
*SLL creates a memory region for GameOS LPAR by using '''syscall 0x10000'''. | *SLL creates a memory region for GameOS LPAR by using '''syscall 0x10000'''. |
Revision as of 05:32, 13 November 2012
- SLL opens lv2_kernel.self, parses ELF header and determines the size of initial memory region for GameOS LPAR
- SLL creates a memory region for GameOS LPAR by using syscall 0x10000.
- SLL opens /proc/partitions/<LPAR id>/mem file and maps it with mmap syscall into it's address space.
- Then it authenticates, decrypts and copies the SELF file of GameOS to LPAR's memory region by using SPE syscalls 0x10040 and 0x10042.
- Linux is not loaded by SLL, it's loaded in Process 9 by Linux System Manager
- GameOS file image lv2_kernel.self is stored on /dev/rflash1
0x14000 - SLL (Secure LPAR Loader)
Packet ID | Description |
---|---|
0x14004 | Load GOS |
0x14005 | Unload GOS |