Secure LPAR Loader: Difference between revisions

From PS3 Developer wiki
Jump to navigation Jump to search
mNo edit summary
mNo edit summary
 
Line 5: Line 5:
*Linux is not loaded by SLL, it's loaded in Process 9 by Linux System Manager  
*Linux is not loaded by SLL, it's loaded in Process 9 by Linux System Manager  
*GameOS file image '''lv2_kernel.self''' is stored on '''/dev/rflash1'''
*GameOS file image '''lv2_kernel.self''' is stored on '''/dev/rflash1'''
 
note: inside ss_server3.fself
<br>


== 0x14000 - SLL (Secure LPAR Loader)  ==
== 0x14000 - SLL (Secure LPAR Loader)  ==
Line 14: Line 13:
! Packet ID  
! Packet ID  
! Description
! Description
! Lv1 Parameter Usage
! notes
|-
|-
| 0x14003  
| 0x14003  
| Shutdown GOS
| Shutdown GOS
|-
|
|
|-
|-
| 0x14004  
| 0x14004  
| Load GOS
| Load GOS
|
|
|-
|-
| 0x14005  
| 0x14005  
| Unload GOS
| Unload GOS
|
|
|}
|}




{{Reverse engineering}}<noinclude>[[Category:Main]]</noinclude>
{{Reverse engineering}}<noinclude>[[Category:Main]]</noinclude>

Latest revision as of 09:43, 21 July 2014

  • SLL opens lv2_kernel.self, parses ELF header and determines the size of initial memory region for GameOS LPAR
  • SLL creates a memory region for GameOS LPAR by using syscall 0x10000.
  • SLL opens /proc/partitions/<LPAR id>/mem file and maps it with mmap syscall into it's address space.
  • Then it authenticates, decrypts and copies the SELF file of GameOS to LPAR's memory region by using SPE syscalls 0x10040 and 0x10042.
  • Linux is not loaded by SLL, it's loaded in Process 9 by Linux System Manager
  • GameOS file image lv2_kernel.self is stored on /dev/rflash1
note: inside ss_server3.fself

0x14000 - SLL (Secure LPAR Loader)[edit | edit source]

Packet ID Description Lv1 Parameter Usage notes
0x14003 Shutdown GOS
0x14004 Load GOS
0x14005 Unload GOS