Searched refs:ntdll (Results 1 - 12 of 12) sorted by relevance
/external/chromium_org/sandbox/win/src/ |
H A D | Wow64.h | 21 Wow64(TargetProcess* child, HMODULE ntdll) argument 22 : child_(child), ntdll_(ntdll), dll_load_(NULL), continue_load_(NULL) {} 27 // process and wait until ntdll is ready. 38 // Returns true if ntdll.dll is mapped on the child. 42 HMODULE ntdll_; // ntdll on the parent.
|
H A D | sandbox_utils.cc | 21 HMODULE ntdll = ::GetModuleHandle(kNtdllName); local 23 GetProcAddress(ntdll, "RtlInitUnicodeString"));
|
H A D | policy_broker.cc | 26 // This is the list of all imported symbols from ntdll.dll. 42 HMODULE ntdll = ::GetModuleHandle(kNtdllName); local 43 base::win::PEImage ntdll_image(ntdll); 51 loader_get, &ntdll);
|
H A D | win_utils.cc | 304 static volatile HMODULE ntdll = NULL; local 306 if (!ntdll) { 308 // Use PEImage to sanity-check that we have a valid ntdll handle. 311 // Race-safe way to set static ntdll. 313 reinterpret_cast<PVOID volatile*>(&ntdll), ntdll_local, NULL); 317 CHECK_NT(ntdll); 319 *function_ptr = ::GetProcAddress(ntdll, name);
|
H A D | interception.cc | 358 base::string16 ntdll(kNtdllName); 359 if (ntdll == data.dll) 360 return false; // ntdll has to be intercepted from the parent 494 const base::string16 ntdll(kNtdllName); 495 if (it->dll != ntdll)
|
H A D | registry_policy_test.cc | 24 ::GetProcAddress(::GetModuleHandle(L"ntdll.dll"), #name)) 241 HMODULE ntdll = GetModuleHandle(L"ntdll.dll"); local 243 reinterpret_cast<NtDeleteKeyFunction>(GetProcAddress(ntdll,
|
H A D | policy_opcodes_unittest.cc | 14 ::GetProcAddress(ntdll, #member)); \ 23 HMODULE ntdll = ::GetModuleHandle(kNtdllName); local
|
/external/chromium_org/tools/traceline/traceline/ |
H A D | main.cc | 99 resolver_("ntdll.dll"), 295 resolver_.Resolve("ntdll!NtQueryPerformanceCounter"))); 376 static const char* kFuncName = "ntdll!DebugPrint"; 384 proc_, resolver_.Resolve("ntdll!ShowSnaps"), &enabled, 1, NULL); 418 options_.vista() ? "ntdll!NtCreateThreadEx" : "ntdll!NtCreateThread"; 460 static const char* kFuncName = "ntdll!CsrNewThread"; 485 static const char* kFuncName = "ntdll!_RtlUserThreadStart"; 514 static const char* kFuncName = "ntdll!RtlDispatchException"; 561 static const char* kFuncName = "ntdll!LdrShutdownThrea [all...] |
/external/chromium_org/chrome/browser/extensions/api/system_cpu/ |
H A D | cpu_info_provider_win.cc | 16 const wchar_t kNtdll[] = L"ntdll.dll"; 31 HMODULE ntdll = GetModuleHandle(kNtdll); local 32 CHECK(ntdll != NULL); 35 ::GetProcAddress(ntdll, kNtQuerySystemInformationName));
|
/external/chromium_org/components/breakpad/app/ |
H A D | hard_error_handler_win.cc | 45 HMODULE ntdll = ::GetModuleHandleA("NTDLL.DLL"); 50 ntdll,
|
/external/chromium_org/sandbox/win/wow_helper/ |
H A D | service64_resolver.cc | 134 // Get pointers to the functions that we need from ntdll.dll. 136 wchar_t* ntdll_name = L"ntdll.dll"; 137 HMODULE ntdll = ::GetModuleHandle(ntdll_name); local 138 if (!ntdll) 141 void* signal = ::GetProcAddress(ntdll, "NtSignalAndWaitForSingleObject");
|
/external/chromium_org/chrome_elf/blacklist/ |
H A D | blacklist_interceptions.cc | 32 // TODO(robertshield): Merge with ntdll exports cache. 34 HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName); local 35 return ::GetProcAddress(ntdll, export_name);
|
Completed in 862 milliseconds