491 bytes added
, 03:39, 10 October 2015
=Request=
{| class="wikitable" border="1"
|-
! Index Word
! Description
|-
| 0
| Header code [0x00010080]
|-
| 1-2
| u64, Title
|}
=Response=
{| class="wikitable" border="1"
|-
! Index Word
! Description
|-
| 0
| Header code
|-
| 1
| Result code
|-
| 3
| KProcess handle
|}
=Description=
This maps 0x10000000 and reads ExeFS:/.code there, then decompresses it if needed. This then uses svcCreateProcess and svcSetupProcess. Once finished this writes the KProcess handle to cmdreply[3].