summaryrefslogtreecommitdiff
path: root/libc/sysdeps/linux/common/ssp.c
diff options
context:
space:
mode:
Diffstat (limited to 'libc/sysdeps/linux/common/ssp.c')
-rw-r--r--libc/sysdeps/linux/common/ssp.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/libc/sysdeps/linux/common/ssp.c b/libc/sysdeps/linux/common/ssp.c
index 2f3a28ba4..43708fe61 100644
--- a/libc/sysdeps/linux/common/ssp.c
+++ b/libc/sysdeps/linux/common/ssp.c
@@ -57,8 +57,8 @@ static __always_inline void terminate(void)
EXIT(127);
}
-void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged __attribute__ ((unused)));
-void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged)
+void attribute_noreturn __stack_smash_handler(char func[], int damaged __attribute__ ((unused)));
+void attribute_noreturn __stack_smash_handler(char func[], int damaged)
{
extern char *__progname;
static const char message[] = ": stack smashing attack in function ";
@@ -72,7 +72,7 @@ void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged)
terminate();
}
-void __attribute__ ((noreturn)) __stack_chk_fail(void)
+void attribute_noreturn __stack_chk_fail(void)
{
extern char *__progname;
static const char msg1[] = "stack smashing detected: ";
@@ -88,7 +88,7 @@ void __attribute__ ((noreturn)) __stack_chk_fail(void)
}
#if 0
-void __attribute__ ((noreturn)) __chk_fail(void)
+void attribute_noreturn __chk_fail(void)
{
extern char *__progname;
static const char msg1[] = "buffer overflow detected: ";