Lines Matching refs:process
191 // also loaded in this process. All the injected dlls of interest do this.
362 // process rundll32. After launching the broker we need to pass to
363 // the flash plugin the process id of the broker via the command line
385 base::ProcessHandle process;
386 if (!base::LaunchApp(cmd_final, false, true, &process))
390 base::Int64ToString(::GetProcessId(process)));
402 ::AssignProcessToJobObject(job, process);
409 ::CloseHandle(process);
512 // For the GPU process we gotten as far as USER_LIMITED. The next level
514 // backend. Note that the GPU process is connected to the interactive
576 base::ProcessHandle process = 0;
606 // To decide if the process is going to be sandboxed we have two cases.
607 // First case: all process types except the nacl broker, and the plugin
608 // process are sandboxed by default.
613 // Second case: If it is the plugin process then it depends on it being
623 // Third case: If it is the GPU process then it can be disabled by a
638 // In process plugins won't work if the sandbox is enabled.
645 // In process WebGL won't work if the sandbox is enabled.
660 // Using a different prefetch profile per process type will allow Windows
665 base::LaunchApp(*cmd_line, false, false, &process);
666 return process;
726 process = target.hProcess;
728 // Help the process a little. It can't start the debugger by itself if
729 // the process is in a sandbox.
733 return process;