From aeed8fa791a55eef54e25bb4d49ae8c19b441082 Mon Sep 17 00:00:00 2001 From: "Peter S. Mazinger" Date: Fri, 4 Nov 2005 00:32:26 +0000 Subject: Make use of newly introduced attribute_noreturn --- libc/sysdeps/linux/common/_exit.c | 2 +- libc/sysdeps/linux/common/ssp-local.c | 4 ++-- libc/sysdeps/linux/common/ssp.c | 8 ++++---- 3 files changed, 7 insertions(+), 7 deletions(-) (limited to 'libc') diff --git a/libc/sysdeps/linux/common/_exit.c b/libc/sysdeps/linux/common/_exit.c index 3b7d14d62..d0a4ee1d6 100644 --- a/libc/sysdeps/linux/common/_exit.c +++ b/libc/sysdeps/linux/common/_exit.c @@ -32,7 +32,7 @@ static inline _syscall1(void, __syscall_exit, int, status); #endif -void __attribute__ ((noreturn)) _exit(int status) +void attribute_noreturn _exit(int status) { /* The loop is added only to keep gcc happy. */ while(1) diff --git a/libc/sysdeps/linux/common/ssp-local.c b/libc/sysdeps/linux/common/ssp-local.c index a835ced0e..091c34c5d 100644 --- a/libc/sysdeps/linux/common/ssp-local.c +++ b/libc/sysdeps/linux/common/ssp-local.c @@ -23,12 +23,12 @@ #include -extern void __stack_chk_fail (void) __attribute__ ((noreturn)); +extern void __stack_chk_fail (void) attribute_noreturn; /* On some architectures, this helps needless PIC pointer setup that would be needed just for the __stack_chk_fail call. */ -void __attribute__ ((noreturn)) attribute_hidden +void attribute_noreturn attribute_hidden __stack_chk_fail_local (void) { __stack_chk_fail (); diff --git a/libc/sysdeps/linux/common/ssp.c b/libc/sysdeps/linux/common/ssp.c index 2f3a28ba4..43708fe61 100644 --- a/libc/sysdeps/linux/common/ssp.c +++ b/libc/sysdeps/linux/common/ssp.c @@ -57,8 +57,8 @@ static __always_inline void terminate(void) EXIT(127); } -void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged __attribute__ ((unused))); -void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged) +void attribute_noreturn __stack_smash_handler(char func[], int damaged __attribute__ ((unused))); +void attribute_noreturn __stack_smash_handler(char func[], int damaged) { extern char *__progname; static const char message[] = ": stack smashing attack in function "; @@ -72,7 +72,7 @@ void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged) terminate(); } -void __attribute__ ((noreturn)) __stack_chk_fail(void) +void attribute_noreturn __stack_chk_fail(void) { extern char *__progname; static const char msg1[] = "stack smashing detected: "; @@ -88,7 +88,7 @@ void __attribute__ ((noreturn)) __stack_chk_fail(void) } #if 0 -void __attribute__ ((noreturn)) __chk_fail(void) +void attribute_noreturn __chk_fail(void) { extern char *__progname; static const char msg1[] = "buffer overflow detected: "; -- cgit v1.2.3