Home
last modified time | relevance | path

Searched full:iat (Results 1 – 25 of 48) sorted by relevance

12

/llvm-project/llvm/docs/
H A DHowToBuildWindowsItaniumPrograms.rst53 addresses are patched into the IAT). Therefore, the compiler must emit some code,
54 that runs after IAT patching but before anything that might use the vtable pointers,
55 and sets the vtable pointer to the address from the IAT. For the special case of
/llvm-project/lld/test/COFF/
H A Dautoimport-x86.s28 # Relative offset at 0x1002 pointing at the IAT at 0x2080.
41 # ptr: pointing at the IAT RVA at 0x2080
H A Darm64-localimport-align.s24 // pointer, just like regular LookupChunks in the IAT.
H A Dautoimport-arm64-data.s26 # ptr: pointing at the IAT RVA at 0x2070
H A Dautoimport-arm-data.s26 # ptr: pointing at the IAT RVA at 0x2058
/llvm-project/compiler-rt/lib/interception/
H A Dinterception_win.cpp1409 // We have two parallel arrays: the import address table (IAT) and the table
1411 // the IAT to hold imported addresses and leaves the name table in
1414 RVAPtr<IMAGE_THUNK_DATA> iat(module, imports->FirstThunk);
1415 for (; name_table->u1.Ordinal != 0; ++name_table, ++iat) {
1427 // Now we have the correct IAT entry. Do the swap. We have to make the page
1430 *orig_old_func = iat->u1.AddressOfData;
1432 if (!VirtualProtect(&iat->u1.AddressOfData, 4, PAGE_EXECUTE_READWRITE,
1435 iat->u1.AddressOfData = new_function;
1436 if (!VirtualProtect(&iat->u1.AddressOfData, 4, old_prot, &unused_prot))
1118 RVAPtr<IMAGE_THUNK_DATA> iat(module, imports->FirstThunk); OverrideImportedFunction() local
/llvm-project/llvm/test/tools/llvm-objcopy/COFF/Inputs/
H A Di386-exe.yaml55 IAT:
H A Dx86_64-exe.yaml55 IAT:
/llvm-project/llvm/test/Object/Inputs/COFF/
H A Ddata-dir-out-of-bounds.yaml55 IAT:
H A Ddwarf-debug-only.yaml55 IAT:
/llvm-project/lldb/test/Shell/Minidump/Windows/Inputs/
H A Dbroken-unwind.exe.yaml58 IAT:
H A Darm-fp-unwind.exe.yaml55 IAT:
/llvm-project/lldb/test/Shell/ObjectFile/PECOFF/
H A Dinvalid-export-table.yaml62 IAT:
H A Dsection-types.yaml63 IAT:
H A Dbasic-info.yaml67 IAT:
H A Dbasic-info-arm.yaml67 IAT:
H A Dbasic-info-arm64.yaml67 IAT:
H A Duuid.yaml61 IAT:
H A Ddisassemble-thumb.yaml63 IAT:
H A Dsymbol.yaml66 IAT:
/llvm-project/lldb/test/Shell/Process/Windows/
H A Dlaunch_failure.yaml66 IAT:
/llvm-project/llvm/test/tools/yaml2obj/COFF/
H A Dbasic-arm64.yaml67 IAT:
H A Dvariable-number-rva.yaml78 # ROUNDTRIP16-NEXT: IAT:
258 # ROUNDTRIP18-NEXT: IAT:
/llvm-project/llvm/test/tools/llvm-objdump/COFF/Inputs/
H A Deh_frame-coff.yaml55 IAT:
/llvm-project/llvm/test/CodeGen/WinCFGuard/
H A Dcfguard-giats.ll11 ; Guard Address-Taken IAT Entry (.giats) and Guard Function ID (.gfids) sections.

12