summaryrefslogtreecommitdiff
path: root/libc/sysdeps/linux/common/ssp.c
diff options
context:
space:
mode:
authorPeter S. Mazinger <ps.m@gmx.net>2005-11-04 00:32:26 +0000
committerPeter S. Mazinger <ps.m@gmx.net>2005-11-04 00:32:26 +0000
commitaeed8fa791a55eef54e25bb4d49ae8c19b441082 (patch)
treea32ddd8a3e2296d6cac9ee98894fea36fd78ff1f /libc/sysdeps/linux/common/ssp.c
parent9a6b1a71ca970e4355c6c970e4be9786407e085a (diff)
Make use of newly introduced attribute_noreturn
Diffstat (limited to 'libc/sysdeps/linux/common/ssp.c')
-rw-r--r--libc/sysdeps/linux/common/ssp.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/libc/sysdeps/linux/common/ssp.c b/libc/sysdeps/linux/common/ssp.c
index 2f3a28ba4..43708fe61 100644
--- a/libc/sysdeps/linux/common/ssp.c
+++ b/libc/sysdeps/linux/common/ssp.c
@@ -57,8 +57,8 @@ static __always_inline void terminate(void)
EXIT(127);
}
-void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged __attribute__ ((unused)));
-void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged)
+void attribute_noreturn __stack_smash_handler(char func[], int damaged __attribute__ ((unused)));
+void attribute_noreturn __stack_smash_handler(char func[], int damaged)
{
extern char *__progname;
static const char message[] = ": stack smashing attack in function ";
@@ -72,7 +72,7 @@ void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged)
terminate();
}
-void __attribute__ ((noreturn)) __stack_chk_fail(void)
+void attribute_noreturn __stack_chk_fail(void)
{
extern char *__progname;
static const char msg1[] = "stack smashing detected: ";
@@ -88,7 +88,7 @@ void __attribute__ ((noreturn)) __stack_chk_fail(void)
}
#if 0
-void __attribute__ ((noreturn)) __chk_fail(void)
+void attribute_noreturn __chk_fail(void)
{
extern char *__progname;
static const char msg1[] = "buffer overflow detected: ";