HomeSort by relevance Sort by last modified time
    Searched full:ntdll (Results 1 - 25 of 55) sorted by null

1 2 3

  /external/chromium_org/tools/traceline/traceline/
syscall_map.h 25 table[0] = "ntdll.dll!NtAcceptConnectPort";
26 table[1] = "ntdll.dll!NtAccessCheck";
27 table[2] = "ntdll.dll!ZwAccessCheckAndAuditAlarm";
28 table[3] = "ntdll.dll!NtAccessCheckByType";
29 table[4] = "ntdll.dll!NtAccessCheckByTypeAndAuditAlarm";
30 table[5] = "ntdll.dll!NtAccessCheckByTypeResultList";
31 table[6] = "ntdll.dll!NtAccessCheckByTypeResultListAndAuditAlarm";
32 table[7] = "ntdll.dll!ZwAccessCheckByTypeResultListAndAuditAlarmByHandle";
33 table[8] = "ntdll.dll!NtAddAtom";
34 table[9] = "ntdll.dll!ZwAddBootEntry"
    [all...]
dump_syscalls_idarub.rb 9 # are contained in ntdll.dll, user32.dll, gdi32.dll, and imm32.dll.
main.cc 99 resolver_("ntdll.dll"),
295 resolver_.Resolve("ntdll!NtQueryPerformanceCounter")));
376 static const char* kFuncName = "ntdll!DebugPrint";
384 proc_, resolver_.Resolve("ntdll!ShowSnaps"), &enabled, 1, NULL);
418 options_.vista() ? "ntdll!NtCreateThreadEx" : "ntdll!NtCreateThread";
460 static const char* kFuncName = "ntdll!CsrNewThread";
485 static const char* kFuncName = "ntdll!_RtlUserThreadStart";
514 static const char* kFuncName = "ntdll!RtlDispatchException";
561 static const char* kFuncName = "ntdll!LdrShutdownThread"
    [all...]
  /external/chromium_org/tools/traceline/traceline/scripts/
syscalls.py 6 0: "ntdll.dll!NtAcceptConnectPort",
7 1: "ntdll.dll!NtAccessCheck",
8 2: "ntdll.dll!ZwAccessCheckAndAuditAlarm",
9 3: "ntdll.dll!NtAccessCheckByType",
10 4: "ntdll.dll!NtAccessCheckByTypeAndAuditAlarm",
11 5: "ntdll.dll!NtAccessCheckByTypeResultList",
12 6: "ntdll.dll!NtAccessCheckByTypeResultListAndAuditAlarm",
13 7: "ntdll.dll!ZwAccessCheckByTypeResultListAndAuditAlarmByHandle",
14 8: "ntdll.dll!NtAddAtom",
15 9: "ntdll.dll!ZwAddBootEntry"
    [all...]
  /external/chromium_org/sandbox/win/src/
Wow64.h 21 Wow64(TargetProcess* child, HMODULE ntdll)
22 : child_(child), ntdll_(ntdll), dll_load_(NULL), continue_load_(NULL) {}
27 // process and wait until ntdll is ready.
38 // Returns true if ntdll.dll is mapped on the child.
42 HMODULE ntdll_; // ntdll on the parent.
service_resolver.h 14 // inside ntdll.dll.
84 // inside ntdll.dll on WOW64 (32 bit ntdll on 64 bit Vista).
99 // inside ntdll.dll on WOW64 for Windows 8.
114 // inside ntdll.dll on Windows 2000 and XP pre SP2.
131 // inside ntdll.dll on Windows 8.
policy_broker.cc 26 // This is the list of all imported symbols from ntdll.dll.
42 HMODULE ntdll = ::GetModuleHandle(kNtdllName); local
43 base::win::PEImage ntdll_image(ntdll);
51 loader_get, &ntdll);
policy_broker.h 17 // Sets up imports from NTDLL for the given target process so the interceptions
sandbox_nt_types.h 36 // This is the value used for the ntdll level allocator.
sandbox_utils.cc 29 HMODULE ntdll = ::GetModuleHandle(kNtdllName); local
31 GetProcAddress(ntdll, "RtlInitUnicodeString"));
interception_unittest.cc 91 interceptions.AddToPatchedFunctions(L"ntdll.dll", "NtCreateFile",
110 interceptions.AddToPatchedFunctions(L"ntdll.dll", "NtClose",
113 interceptions.AddToPatchedFunctions(L"ntdll.dll", "NtOpenFile",
145 // everything from ntdll and stuff set as INTRECEPTION_SERVICE_CALL, and
149 // "interceptions"). There are 3 local interceptions (of ntdll); the
178 interceptions.AddToPatchedFunctions(L"ntdll.dll", "NtCreateFile",
internal_types.h 10 const wchar_t kNtdllName[] = L"ntdll.dll";
sandbox_nt_util.h 12 // Placement new and delete to be used from ntdll interception code.
30 // don't have logging from the ntdll layer on the child.
93 // Initializes our ntdll level heap
109 // The returned buffer must be freed with a placement delete from the ntdll
registry_policy_test.cc 24 ::GetProcAddress(::GetModuleHandle(L"ntdll.dll"), #name))
241 HMODULE ntdll = GetModuleHandle(L"ntdll.dll"); local
243 reinterpret_cast<NtDeleteKeyFunction>(GetProcAddress(ntdll,
service_resolver_unittest.cc 18 // inside ntdll.dll.
47 ntdll_base_ = ::GetModuleHandle(L"ntdll.dll");
92 HMODULE ntdll_base = ::GetModuleHandle(L"ntdll.dll");
win_utils.cc 303 // with ntdll/imports underneath us. So, we retry a few times, and in the
310 static HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName); local
313 *function_ptr = ::GetProcAddress(ntdll, name);
318 ntdll = ::GetModuleHandle(sandbox::kNtdllName);
319 *function_ptr = ::GetProcAddress(ntdll, name);
  /external/chromium_org/base/win/
sampling_profiler.cc 84 HMODULE ntdll = ::GetModuleHandle(L"ntdll.dll"); local
85 if (ntdll != NULL) {
87 ::GetProcAddress(ntdll, "ZwSetIntervalProfile"));
89 ::GetProcAddress(ntdll, "ZwQueryIntervalProfile"));
91 ::GetProcAddress(ntdll, "ZwCreateProfile"));
93 ::GetProcAddress(ntdll, "ZwStartProfile"));
95 ::GetProcAddress(ntdll, "ZwStopProfile"));
  /external/chromium_org/tools/valgrind/drmemory/
suppressions_full.txt 51 # Tiny locale-related leaks in ntdll. Probably system bug.
54 ntdll.dll!...
55 ntdll.dll!*
73 ntdll.dll!Rtl*
74 ntdll.dll!Rtl*
75 ntdll.dll!RtlFindActivationContextSectionString
273 ntdll.dll!RtlValidateUnicodeString
299 ntdll.dll!RtlConvertUlongToLargeInteger
300 ntdll.dll!RtlConvertUlongToLargeInteger
301 ntdll.dll!KiUserExceptionDispatche
    [all...]
  /external/chromium_org/chrome/app/
hard_error_handler_win.cc 43 HMODULE ntdll = ::GetModuleHandleA("NTDLL.DLL");
48 ntdll,
  /external/e2fsprogs/lib/uuid/
gen_uuid_nt.c 12 #pragma comment(lib, "ntdll.lib")
  /external/chromium_org/tools/traceline/svgui/
startup-release.json 2 {'stacktrace': [], 'thread': 3956, 'eventtype': 'EVENT_TYPE_APC', 'func_addr_name': 'ntdll.dll!LdrInitializeThunk+0x0', 'ret_addr': 2089872071, 'done': 23.106567999999999, 'func_addr': 2089816446, 'ms': 6.3611440000000004, 'cpu': 2147742720},
3 {'stacktrace': [[2089816487, 'ntdll.dll!LdrpCallInitRoutine+0x14'], [2089929643, 'ntdll.dll!LdrpRunInitializeRoutines+0x1c7'], [2089917304, 'ntdll.dll!LdrpGetProcedureAddress+0x1c3'], [2089917344, 'ntdll.dll!LdrGetProcedureAddress+0x18'], [2089952052, 'ntdll.dll!LdrpInitializeProcess+0x878'], [2089948729, 'ntdll.dll!_LdrpInitialize+0x88d3'], [1717963930, 'failed']], 'thread': 3956, 'eventtype': 'EVENT_TYPE_THREADBEGIN', 'parenteventid': 2147323904, 'startaddr': 2088763392, 'ms': 7.0830229999999998, 'cpu': 2147742720},
4 {'stacktrace': [[2118314946, 'USER32.dll!_UserClientDllInitialize+0x246'], [2089816487, 'ntdll.dll!LdrpCallInitRoutine+0x14'], [2089929643, 'ntdll.dll!LdrpRunInitializeRoutines+0x1c7'], [2089948990, 'ntdll.dll!LdrpInitializeProcess+0xfffffc82'], [2089948729, 'ntdll.dll!_LdrpInitialize+0x88d3'], [1717963 (…)
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
service64_resolver.cc 134 // Get pointers to the functions that we need from ntdll.dll.
136 wchar_t* ntdll_name = L"ntdll.dll";
137 HMODULE ntdll = ::GetModuleHandle(ntdll_name); local
138 if (!ntdll)
141 void* signal = ::GetProcAddress(ntdll, "NtSignalAndWaitForSingleObject");
wow_helper.cc 58 // ntdll.dll. 'thunk' is the buffer on the address space of process 'child',
61 wchar_t* ntdll_name = L"ntdll.dll";
service64_resolver.h 14 // inside ntdll.dll (64-bit).
  /external/chromium_org/base/test/
test_process_killer_win.cc 29 // Get the function pointer to NtQueryInformationProcess in NTDLL.DLL
33 GetProcAddress(GetModuleHandle(L"ntdll.dll"),

Completed in 199 milliseconds

1 2 3