RO:UnloadCRO: Difference between revisions
Jump to navigation
Jump to search
| Line 38: | Line 38: | ||
=Description= | =Description= | ||
This might resolve the | This might resolve the CRO-symbols using the CRS data from [[RO:Initialize]]. This resolves(?) the jump-table pointers used by the CRO to call code in the main process .text. | ||
Revision as of 09:44, 19 January 2014
Request
| Index Word | Description |
|---|---|
| 0 | Header code [0x000500C2] |
| 1 | Base address of the mapped CRO, in the process memory, originally passed to RO:LoadExeCRO. |
| 2 | Unknown, usually zero? |
| 3 | Original address where the CRO was first located in process memory(such as the process heap), also passed to RO:LoadExeCRO. |
| 4 | Must be zero |
| 5 | KProcess handle |
Response
| Index Word | Description |
|---|---|
| 0 | Header code |
| 1 | Result code |
Description
This might resolve the CRO-symbols using the CRS data from RO:Initialize. This resolves(?) the jump-table pointers used by the CRO to call code in the main process .text.