Lines Matching full:patching
9 // Provides support for the Windows "Secure Hot-Patching" feature.
11 // Windows contains technology, called "Secure Hot-Patching" (SHP), for securely
36 // function was compiled with hot-patching enabled.
39 // annotate those functions that were marked for hot-patching by command-line
115 // For these reasons, the hot-patching support implemented in this file is
118 // could result in a binary that does not work with hot-patching. For example,
120 // compatible with hot-patching because they cannot use __ref_*-based
155 // A file containing list of mangled function names to mark for hot patching.
159 "Windows Secure Hot-Patching"));
161 // A list of mangled function names to mark for hot patching.
165 "Hot-Patching"),
213 // The front end may have already marked functions for hot-patching. However, in doInitialization()
215 // -ms-hotpatch-functions-list directly to LLVM. This allows hot-patching to in doInitialization()
340 // hot-patching infrastructure. Also, if the GlobalVariable is created as a
476 // Processes a function that is marked for hot-patching.
478 // If a function is marked for hot-patching, we generate an S_HOTPATCHFUNC
609 "unexpected Value in second pass of hot-patching"); in runOnFunction()