RO:UnloadCRO

From 3dbrew
Revision as of 07:11, 19 January 2014 by Yellows8 (talk | contribs) (Created page with "=Request= {| class="wikitable" border="1" |- ! Index Word ! Description |- | 0 | Header code [0x000500C2] |- | 1 | Base address of the mapped CRO, in the process memor...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Request

Index Word Description
0 Header code [0x000500C2]
1 Base address of the mapped CRO, in the process memory, originally passed to RO:LoadExeCRO.
2 Unknown, usually zero?
3 Original address where the CRO was first located in process memory(such as the process heap), also passed to RO:LoadExeCRO.
4 Must be zero
5 KProcess handle

Response

Index Word Description
0 Header code
1 Result code

Description

This resolves the CRS CRO-symbols using the CRS data from RO:Initialize. This resolves the jump-table pointers used by the CRO to call code in the main process .text.