Line 7: |
Line 7: |
| |- | | |- |
| | 0x00010080 | | | 0x00010080 |
− | | LoadProcess(u64 titlehandle). This maps 0x10000000 and reads ExeFS:/.code there, then decompresses it if needed. This then uses [[SVC|svcCreateProcess]] and svcSetupProcess. Once finished this writes the KProcess handle to cmdreply[3]. | + | | [[LOADER:LoadProcess|LoadProcess]] |
| |- | | |- |
| | 0x00020200 | | | 0x00020200 |
Line 13: |
Line 13: |
| |- | | |- |
| | 0x00030080 | | | 0x00030080 |
− | | UnregisterProgram | + | | [[LOADER:UnregisterProgram|UnregisterProgram]] |
| |- | | |- |
| | 0x00040080 | | | 0x00040080 |
− | | GetExheader(u64 titlehandle) | + | | [[LOADER:GetExheader|GetExheader]] |
| |} | | |} |