Searched full:iat (Results 1 – 25 of 48) sorted by relevance
12
/llvm-project/llvm/docs/ |
H A D | HowToBuildWindowsItaniumPrograms.rst | 53 addresses are patched into the IAT). Therefore, the compiler must emit some code, 54 that runs after IAT patching but before anything that might use the vtable pointers, 55 and sets the vtable pointer to the address from the IAT. For the special case of
|
/llvm-project/lld/test/COFF/ |
H A D | autoimport-x86.s | 28 # Relative offset at 0x1002 pointing at the IAT at 0x2080. 41 # ptr: pointing at the IAT RVA at 0x2080
|
H A D | arm64-localimport-align.s | 24 // pointer, just like regular LookupChunks in the IAT.
|
H A D | autoimport-arm64-data.s | 26 # ptr: pointing at the IAT RVA at 0x2070
|
H A D | autoimport-arm-data.s | 26 # ptr: pointing at the IAT RVA at 0x2058
|
/llvm-project/compiler-rt/lib/interception/ |
H A D | interception_win.cpp | 1409 // We have two parallel arrays: the import address table (IAT) and the table 1411 // the IAT to hold imported addresses and leaves the name table in 1414 RVAPtr<IMAGE_THUNK_DATA> iat(module, imports->FirstThunk); 1415 for (; name_table->u1.Ordinal != 0; ++name_table, ++iat) { 1427 // Now we have the correct IAT entry. Do the swap. We have to make the page 1430 *orig_old_func = iat->u1.AddressOfData; 1432 if (!VirtualProtect(&iat->u1.AddressOfData, 4, PAGE_EXECUTE_READWRITE, 1435 iat->u1.AddressOfData = new_function; 1436 if (!VirtualProtect(&iat->u1.AddressOfData, 4, old_prot, &unused_prot)) 1118 RVAPtr<IMAGE_THUNK_DATA> iat(module, imports->FirstThunk); OverrideImportedFunction() local
|
/llvm-project/llvm/test/tools/llvm-objcopy/COFF/Inputs/ |
H A D | i386-exe.yaml | 55 IAT:
|
H A D | x86_64-exe.yaml | 55 IAT:
|
/llvm-project/llvm/test/Object/Inputs/COFF/ |
H A D | data-dir-out-of-bounds.yaml | 55 IAT:
|
H A D | dwarf-debug-only.yaml | 55 IAT:
|
/llvm-project/lldb/test/Shell/Minidump/Windows/Inputs/ |
H A D | broken-unwind.exe.yaml | 58 IAT:
|
H A D | arm-fp-unwind.exe.yaml | 55 IAT:
|
/llvm-project/lldb/test/Shell/ObjectFile/PECOFF/ |
H A D | invalid-export-table.yaml | 62 IAT:
|
H A D | section-types.yaml | 63 IAT:
|
H A D | basic-info.yaml | 67 IAT:
|
H A D | basic-info-arm.yaml | 67 IAT:
|
H A D | basic-info-arm64.yaml | 67 IAT:
|
H A D | uuid.yaml | 61 IAT:
|
H A D | disassemble-thumb.yaml | 63 IAT:
|
H A D | symbol.yaml | 66 IAT:
|
/llvm-project/lldb/test/Shell/Process/Windows/ |
H A D | launch_failure.yaml | 66 IAT:
|
/llvm-project/llvm/test/tools/yaml2obj/COFF/ |
H A D | basic-arm64.yaml | 67 IAT:
|
H A D | variable-number-rva.yaml | 78 # ROUNDTRIP16-NEXT: IAT: 258 # ROUNDTRIP18-NEXT: IAT:
|
/llvm-project/llvm/test/tools/llvm-objdump/COFF/Inputs/ |
H A D | eh_frame-coff.yaml | 55 IAT:
|
/llvm-project/llvm/test/CodeGen/WinCFGuard/ |
H A D | cfguard-giats.ll | 11 ; Guard Address-Taken IAT Entry (.giats) and Guard Function ID (.gfids) sections.
|
12