.. |
decimal
|
|
|
interceptor
|
Bug 1659398 - Don't resolve redirecion of JMP for DuplicateHandle. r=handyman
|
2020-08-26 20:26:36 +00:00 |
AutoProfilerLabel.cpp
|
Bug 1223932 - delete guard object uses from the tree; r=jwalden
|
2020-07-30 14:22:38 +00:00 |
AutoProfilerLabel.h
|
Bug 1223932 - delete guard object uses from the tree; r=jwalden
|
2020-07-30 14:22:38 +00:00 |
ConditionVariable_posix.cpp
|
|
|
ConditionVariable_windows.cpp
|
|
|
Debug.h
|
|
|
DynamicallyLinkedFunctionPtr.h
|
|
|
ImportDir.h
|
Bug 1648384 - Make use of Result::propagateErr. r=mhowell
|
2020-06-25 16:07:28 +00:00 |
MmapFaultHandler.cpp
|
Bug 1223932 - delete guard object uses from the tree; r=jwalden
|
2020-07-30 14:22:38 +00:00 |
MmapFaultHandler.h
|
Bug 1223932 - delete guard object uses from the tree; r=jwalden
|
2020-07-30 14:22:38 +00:00 |
moz.build
|
Backed out 2 changesets (bug 1656526) for build bustages on EarlyBlankWindow.cpp. CLOSED TREE
|
2020-08-18 19:10:37 +03:00 |
Mutex_posix.cpp
|
Bug 1519636 - Reformat recent changes to the Google coding style r=andi
|
2020-08-31 09:23:02 +00:00 |
Mutex_windows.cpp
|
|
|
MutexPlatformData_posix.h
|
|
|
MutexPlatformData_windows.h
|
|
|
NativeNt.h
|
Bug 1653335 - Replace MakeSpan uses by constructor calls. r=froydnj
|
2020-08-07 07:49:47 +00:00 |
nsWindowsDllInterceptor.h
|
Bug 1659398 - Don't resolve redirecion of JMP for DuplicateHandle. r=handyman
|
2020-08-26 20:26:36 +00:00 |
PlatformConditionVariable.h
|
|
|
PlatformMutex.h
|
|
|
Printf.cpp
|
|
|
Printf.h
|
|
|
StackWalk_windows.h
|
|
|
StackWalk.cpp
|
Bug 1634205 - Support Gecko Profiler and Base Profiler on FreeBSD r=mstange
|
2020-05-06 17:44:19 +00:00 |
StackWalk.h
|
Bug 1634205 - Support Gecko Profiler and Base Profiler on FreeBSD r=mstange
|
2020-05-06 17:44:19 +00:00 |
TimeStamp_darwin.cpp
|
|
|
TimeStamp_posix.cpp
|
|
|
TimeStamp_windows.cpp
|
|
|
TimeStamp_windows.h
|
|
|
TimeStamp.cpp
|
|
|
TimeStamp.h
|
|
|
WindowsMapRemoteView.cpp
|
|
|
WindowsMapRemoteView.h
|
|
|
WindowsProcessMitigations.cpp
|
Bug 1509748 - Do not touch ntdll's PE header directly if EAF+ is enabled. r=mhowell,mstange
|
2020-05-27 21:48:35 +00:00 |
WindowsProcessMitigations.h
|
Bug 1509748 - Do not touch ntdll's PE header directly if EAF+ is enabled. r=mhowell,mstange
|
2020-05-27 21:48:35 +00:00 |
WindowsUnicode.cpp
|
|
|
WindowsUnicode.h
|
|
|
WinUtils.h
|
|
|