/external/chromium_org/tools/traceline/traceline/ |
syscall_map.h | 25 table[0] = "ntdll.dll!NtAcceptConnectPort"; 26 table[1] = "ntdll.dll!NtAccessCheck"; 27 table[2] = "ntdll.dll!ZwAccessCheckAndAuditAlarm"; 28 table[3] = "ntdll.dll!NtAccessCheckByType"; 29 table[4] = "ntdll.dll!NtAccessCheckByTypeAndAuditAlarm"; 30 table[5] = "ntdll.dll!NtAccessCheckByTypeResultList"; 31 table[6] = "ntdll.dll!NtAccessCheckByTypeResultListAndAuditAlarm"; 32 table[7] = "ntdll.dll!ZwAccessCheckByTypeResultListAndAuditAlarmByHandle"; 33 table[8] = "ntdll.dll!NtAddAtom"; 34 table[9] = "ntdll.dll!ZwAddBootEntry" [all...] |
dump_syscalls_idarub.rb | 9 # are contained in ntdll.dll, user32.dll, gdi32.dll, and imm32.dll.
|
main.cc | 99 resolver_("ntdll.dll"), 295 resolver_.Resolve("ntdll!NtQueryPerformanceCounter"))); 376 static const char* kFuncName = "ntdll!DebugPrint"; 384 proc_, resolver_.Resolve("ntdll!ShowSnaps"), &enabled, 1, NULL); 418 options_.vista() ? "ntdll!NtCreateThreadEx" : "ntdll!NtCreateThread"; 460 static const char* kFuncName = "ntdll!CsrNewThread"; 485 static const char* kFuncName = "ntdll!_RtlUserThreadStart"; 514 static const char* kFuncName = "ntdll!RtlDispatchException"; 561 static const char* kFuncName = "ntdll!LdrShutdownThread" [all...] |
/external/chromium_org/tools/traceline/traceline/scripts/ |
syscalls.py | 6 0: "ntdll.dll!NtAcceptConnectPort", 7 1: "ntdll.dll!NtAccessCheck", 8 2: "ntdll.dll!ZwAccessCheckAndAuditAlarm", 9 3: "ntdll.dll!NtAccessCheckByType", 10 4: "ntdll.dll!NtAccessCheckByTypeAndAuditAlarm", 11 5: "ntdll.dll!NtAccessCheckByTypeResultList", 12 6: "ntdll.dll!NtAccessCheckByTypeResultListAndAuditAlarm", 13 7: "ntdll.dll!ZwAccessCheckByTypeResultListAndAuditAlarmByHandle", 14 8: "ntdll.dll!NtAddAtom", 15 9: "ntdll.dll!ZwAddBootEntry" [all...] |
/external/chromium_org/sandbox/win/src/ |
Wow64.h | 21 Wow64(TargetProcess* child, HMODULE ntdll) 22 : child_(child), ntdll_(ntdll), dll_load_(NULL), continue_load_(NULL) {} 27 // process and wait until ntdll is ready. 38 // Returns true if ntdll.dll is mapped on the child. 42 HMODULE ntdll_; // ntdll on the parent.
|
service_resolver.h | 14 // inside ntdll.dll. 84 // inside ntdll.dll on WOW64 (32 bit ntdll on 64 bit Vista). 99 // inside ntdll.dll on WOW64 for Windows 8. 114 // inside ntdll.dll on Windows 2000 and XP pre SP2. 131 // inside ntdll.dll on Windows 8.
|
policy_broker.cc | 26 // This is the list of all imported symbols from ntdll.dll. 42 HMODULE ntdll = ::GetModuleHandle(kNtdllName); local 43 base::win::PEImage ntdll_image(ntdll); 51 loader_get, &ntdll);
|
policy_broker.h | 17 // Sets up imports from NTDLL for the given target process so the interceptions
|
sandbox_nt_types.h | 36 // This is the value used for the ntdll level allocator.
|
sandbox_utils.cc | 29 HMODULE ntdll = ::GetModuleHandle(kNtdllName); local 31 GetProcAddress(ntdll, "RtlInitUnicodeString"));
|
interception_unittest.cc | 91 interceptions.AddToPatchedFunctions(L"ntdll.dll", "NtCreateFile", 110 interceptions.AddToPatchedFunctions(L"ntdll.dll", "NtClose", 113 interceptions.AddToPatchedFunctions(L"ntdll.dll", "NtOpenFile", 145 // everything from ntdll and stuff set as INTRECEPTION_SERVICE_CALL, and 149 // "interceptions"). There are 3 local interceptions (of ntdll); the 178 interceptions.AddToPatchedFunctions(L"ntdll.dll", "NtCreateFile",
|
internal_types.h | 10 const wchar_t kNtdllName[] = L"ntdll.dll";
|
sandbox_nt_util.h | 12 // Placement new and delete to be used from ntdll interception code. 30 // don't have logging from the ntdll layer on the child. 93 // Initializes our ntdll level heap 109 // The returned buffer must be freed with a placement delete from the ntdll
|
registry_policy_test.cc | 24 ::GetProcAddress(::GetModuleHandle(L"ntdll.dll"), #name)) 241 HMODULE ntdll = GetModuleHandle(L"ntdll.dll"); local 243 reinterpret_cast<NtDeleteKeyFunction>(GetProcAddress(ntdll,
|
service_resolver_unittest.cc | 18 // inside ntdll.dll. 47 ntdll_base_ = ::GetModuleHandle(L"ntdll.dll"); 92 HMODULE ntdll_base = ::GetModuleHandle(L"ntdll.dll");
|
win_utils.cc | 303 // with ntdll/imports underneath us. So, we retry a few times, and in the 310 static HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName); local 313 *function_ptr = ::GetProcAddress(ntdll, name); 318 ntdll = ::GetModuleHandle(sandbox::kNtdllName); 319 *function_ptr = ::GetProcAddress(ntdll, name);
|
/external/chromium_org/base/win/ |
sampling_profiler.cc | 84 HMODULE ntdll = ::GetModuleHandle(L"ntdll.dll"); local 85 if (ntdll != NULL) { 87 ::GetProcAddress(ntdll, "ZwSetIntervalProfile")); 89 ::GetProcAddress(ntdll, "ZwQueryIntervalProfile")); 91 ::GetProcAddress(ntdll, "ZwCreateProfile")); 93 ::GetProcAddress(ntdll, "ZwStartProfile")); 95 ::GetProcAddress(ntdll, "ZwStopProfile"));
|
/external/chromium_org/tools/valgrind/drmemory/ |
suppressions_full.txt | 51 # Tiny locale-related leaks in ntdll. Probably system bug. 54 ntdll.dll!... 55 ntdll.dll!* 73 ntdll.dll!Rtl* 74 ntdll.dll!Rtl* 75 ntdll.dll!RtlFindActivationContextSectionString 273 ntdll.dll!RtlValidateUnicodeString 299 ntdll.dll!RtlConvertUlongToLargeInteger 300 ntdll.dll!RtlConvertUlongToLargeInteger 301 ntdll.dll!KiUserExceptionDispatche [all...] |
/external/chromium_org/chrome/app/ |
hard_error_handler_win.cc | 43 HMODULE ntdll = ::GetModuleHandleA("NTDLL.DLL"); 48 ntdll,
|
/external/e2fsprogs/lib/uuid/ |
gen_uuid_nt.c | 12 #pragma comment(lib, "ntdll.lib")
|
/external/chromium_org/tools/traceline/svgui/ |
startup-release.json | 2 {'stacktrace': [], 'thread': 3956, 'eventtype': 'EVENT_TYPE_APC', 'func_addr_name': 'ntdll.dll!LdrInitializeThunk+0x0', 'ret_addr': 2089872071, 'done': 23.106567999999999, 'func_addr': 2089816446, 'ms': 6.3611440000000004, 'cpu': 2147742720}, 3 {'stacktrace': [[2089816487, 'ntdll.dll!LdrpCallInitRoutine+0x14'], [2089929643, 'ntdll.dll!LdrpRunInitializeRoutines+0x1c7'], [2089917304, 'ntdll.dll!LdrpGetProcedureAddress+0x1c3'], [2089917344, 'ntdll.dll!LdrGetProcedureAddress+0x18'], [2089952052, 'ntdll.dll!LdrpInitializeProcess+0x878'], [2089948729, 'ntdll.dll!_LdrpInitialize+0x88d3'], [1717963930, 'failed']], 'thread': 3956, 'eventtype': 'EVENT_TYPE_THREADBEGIN', 'parenteventid': 2147323904, 'startaddr': 2088763392, 'ms': 7.0830229999999998, 'cpu': 2147742720}, 4 {'stacktrace': [[2118314946, 'USER32.dll!_UserClientDllInitialize+0x246'], [2089816487, 'ntdll.dll!LdrpCallInitRoutine+0x14'], [2089929643, 'ntdll.dll!LdrpRunInitializeRoutines+0x1c7'], [2089948990, 'ntdll.dll!LdrpInitializeProcess+0xfffffc82'], [2089948729, 'ntdll.dll!_LdrpInitialize+0x88d3'], [1717963 (…) [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
service64_resolver.cc | 134 // Get pointers to the functions that we need from ntdll.dll. 136 wchar_t* ntdll_name = L"ntdll.dll"; 137 HMODULE ntdll = ::GetModuleHandle(ntdll_name); local 138 if (!ntdll) 141 void* signal = ::GetProcAddress(ntdll, "NtSignalAndWaitForSingleObject");
|
wow_helper.cc | 58 // ntdll.dll. 'thunk' is the buffer on the address space of process 'child', 61 wchar_t* ntdll_name = L"ntdll.dll";
|
service64_resolver.h | 14 // inside ntdll.dll (64-bit).
|
/external/chromium_org/base/test/ |
test_process_killer_win.cc | 29 // Get the function pointer to NtQueryInformationProcess in NTDLL.DLL 33 GetProcAddress(GetModuleHandle(L"ntdll.dll"),
|