LOADER:LoadProcess
Request
| Index Word | Description |
|---|---|
| 0 | Header code [0x00010080] |
| 1-2 | u64, Program Handle |
Response
| Index Word | Description |
|---|---|
| 0 | Header code |
| 1 | Result code |
| 3 | KProcess handle |
Description
This maps 0x10000000 and reads ExeFS:/.code there, then decompresses it if needed. This then uses svcCreateCodeSet and then svcCreateProcess. Once finished this writes the KProcess handle to cmdreply[3].