LOADER:LoadProcess
Request
Index Word | Description |
---|---|
0 | Header code [0x00010080] |
1-2 | u64, Program Handle |
Response
Index Word | Description |
---|---|
0 | Header code |
1 | Result code |
3 | KProcess handle |
Description
This maps 0x10000000 and reads ExeFS:/.code there, then decompresses it if needed. This then uses svcCreateProcess and svcSetupProcess. Once finished this writes the KProcess handle to cmdreply[3].