summaryrefslogtreecommitdiff
path: root/Userland/Libraries/LibC/assert.cpp
AgeCommit message (Collapse)Author
2022-04-01Everywhere: Run clang-formatIdan Horowitz
2021-12-18LibC: Move `_abort` next to `abort`Michel Hermier
It should be now the only user of it, and it is more logical to have it in `stdlib.h` than in `assert.h`
2021-12-18LibC: Make `__assertion_failed` always definedMichel Hermier
The symbol should be always defined, in case Serenity is built with `NDEBUG` defined, and users wants to use `assert` from `LibC`.
2021-09-18LibC: Don't format strings when asserting with an unstable heapJean-Baptiste Boric
If we hit an assertion while the heap isn't in a stable state, we can't rely on dynamic memory allocation because the malloc mutex is already held and the heap is most likely corrupted. Instead, we need to bail out fast before we make the situation even worse.
2021-07-21LibC: Simplify assertion failure dbgln() a bitAndreas Kling
There's no need to say USERSPACE(PID) since dbgln() will prefix lines with that information anyway.
2021-07-12LibC: Use correct macro to disable assert()Andrew Kaster
The C standard doesn't say anything about DEBUG, just NDEBUG :^)
2021-04-22Everything: Move to SPDX license identifiers in all files.Brian Gianforcaro
SPDX License Identifiers are a more compact / standardized way of representing file license information. See: https://spdx.dev/resources/use/#identifiers This was done with the `ambr` search and replace tool. ambr --no-parent-ignore --key-from-file --rep-from-file key.txt rep.txt *
2021-04-18Kernel+LibC: Clean up how assertions work in the kernel and LibCGunnar Beutner
This also brings LibC's abort() function closer to the spec.
2021-04-12LibC: Turn CRASH() into a function and add noreturn attributeGunnar Beutner
This way CRASH() can be used in functions that are themselves marked as noreturn.
2021-02-17LibC: Convert dbgprintf() => dbgln()Andreas Kling
2021-02-05Userland: Add LibSystem and funnel all syscalls through itAndreas Kling
This achieves two things: - Programs can now intentionally perform arbitrary syscalls by calling syscall(). This allows us to work on things like syscall fuzzing. - It restricts the ability of userspace to make syscalls to a single 4KB page of code. In order to call the kernel directly, an attacker must now locate this page and call through it.
2021-01-12Libraries: Move to Userland/Libraries/Andreas Kling