0x7b7c47ef = sceKernelLoadExecVSHDiscDebug
0x821be114 = sceKernelLoadExecVSHDiscUpdater
To avoid groepaz kicking me, i have confirmed at least one of them:
sceKernelLoadExecVSHDiscUpdater is exactly the function that the firmware uses to load exec the update from the disc.
I've tried to test sceKernelLoadExecVSHDiscDebug using the typical parameters of a loadexec function, but it returns 28 and does nothing :O
It's a pity that one cannot post anymore results in http://pspdev.ofcode.com/api2.0/ :(
I hope someone puts the true name of LoadExecForKernel_821BE114 in the LoadExecForKernel stub. LoadExecForKernel_7b7c47ef is not even in the stub (maybe because it's a function that doesn't exist in 1.00).
Some nids of sceLoadExec
This function is only to execute the updater (well, it probably can execute othet things)[wl] wrote:how do u think, is it possible to understand, how to decrypt uploader.psp file from eboot.pbp updater using reverse engineering of sceKernelLoadExecVSHDiscUpdater function?
To decrypt the data.psp of an updater, you can use any psar dumper mod like the mph decryptor or the aenea's one.