From aeed8fa791a55eef54e25bb4d49ae8c19b441082 Mon Sep 17 00:00:00 2001 From: "Peter S. Mazinger" Date: Fri, 4 Nov 2005 00:32:26 +0000 Subject: Make use of newly introduced attribute_noreturn --- libc/sysdeps/linux/common/ssp.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'libc/sysdeps/linux/common/ssp.c') diff --git a/libc/sysdeps/linux/common/ssp.c b/libc/sysdeps/linux/common/ssp.c index 2f3a28ba4..43708fe61 100644 --- a/libc/sysdeps/linux/common/ssp.c +++ b/libc/sysdeps/linux/common/ssp.c @@ -57,8 +57,8 @@ static __always_inline void terminate(void) EXIT(127); } -void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged __attribute__ ((unused))); -void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged) +void attribute_noreturn __stack_smash_handler(char func[], int damaged __attribute__ ((unused))); +void attribute_noreturn __stack_smash_handler(char func[], int damaged) { extern char *__progname; static const char message[] = ": stack smashing attack in function "; @@ -72,7 +72,7 @@ void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged) terminate(); } -void __attribute__ ((noreturn)) __stack_chk_fail(void) +void attribute_noreturn __stack_chk_fail(void) { extern char *__progname; static const char msg1[] = "stack smashing detected: "; @@ -88,7 +88,7 @@ void __attribute__ ((noreturn)) __stack_chk_fail(void) } #if 0 -void __attribute__ ((noreturn)) __chk_fail(void) +void attribute_noreturn __chk_fail(void) { extern char *__progname; static const char msg1[] = "buffer overflow detected: "; -- cgit v1.2.3