Secure LPAR Loader: Difference between revisions
Jump to navigation
Jump to search
mNo edit summary |
|||
Line 1: | Line 1: | ||
*SLL opens '''lv2_kernel.self''', parses ELF header and determines the size of initial memory region for GameOS LPAR | *SLL opens '''lv2_kernel.self''', parses ELF header and determines the size of initial memory region for GameOS LPAR | ||
*SLL creates a memory region for GameOS LPAR by using '''syscall 0x10000'''. | *SLL creates a memory region for GameOS LPAR by using '''syscall 0x10000'''. | ||
Line 26: | Line 25: | ||
| Unload GOS | | Unload GOS | ||
|} | |} | ||
{{Reverse engineering}}<noinclude>[[Category:Main]]</noinclude> |
Revision as of 20:15, 5 February 2014
- SLL opens lv2_kernel.self, parses ELF header and determines the size of initial memory region for GameOS LPAR
- SLL creates a memory region for GameOS LPAR by using syscall 0x10000.
- SLL opens /proc/partitions/<LPAR id>/mem file and maps it with mmap syscall into it's address space.
- Then it authenticates, decrypts and copies the SELF file of GameOS to LPAR's memory region by using SPE syscalls 0x10040 and 0x10042.
- Linux is not loaded by SLL, it's loaded in Process 9 by Linux System Manager
- GameOS file image lv2_kernel.self is stored on /dev/rflash1
0x14000 - SLL (Secure LPAR Loader)
Packet ID | Description |
---|---|
0x14003 | Shutdown GOS |
0x14004 | Load GOS |
0x14005 | Unload GOS |