aganea wrote:

Thanks for the answer.

Are these new flags `-fms-hotpatch-functions-file=` and 
`-fms-hotpatch-functions-list=` populated with data maintained manually by the 
Windows developpers?

If I understand correctly, what you describe as "symbols that were hot-patched" 
means functions that are ready/candidates for hotpatching at runtime on the OS 
that installs the hotpatch, is that right?

I get the part about the security and verification, but I still don't get the 
`_ref_` thing. Usually after injecting the patched DLLs/SYS files into a 
process, the patcher can (automatically, from the relocs) redirect pointers 
present in the injected DLL to actually use the global state that is being used 
by the in-memory DLL. Is this `_ref_` related to a synchronization thing? Or 
timing? I would assume the kernel still needs a sync point where it stops 
ticking the process, installs the patch, patches all the function pointers from 
the in-memory DLL to the new injected DLL?

It'd be really nice if someone at Microsoft could write at some point a 
supporting documentation to understand how all this is to be used (a tech blog 
or a white paper describing it?)

https://github.com/llvm/llvm-project/pull/138972
_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to