Browse Source

Make use of newly introduced attribute_noreturn

Peter S. Mazinger 18 years ago
parent
commit
aeed8fa791

+ 1 - 1
libc/sysdeps/linux/common/_exit.c

@@ -32,7 +32,7 @@
 static inline _syscall1(void, __syscall_exit, int, status);
 #endif
 
-void __attribute__ ((noreturn)) _exit(int status)
+void attribute_noreturn _exit(int status)
 {
 	/* The loop is added only to keep gcc happy. */
 	while(1)

+ 2 - 2
libc/sysdeps/linux/common/ssp-local.c

@@ -23,12 +23,12 @@
 
 #include <features.h>
 
-extern void __stack_chk_fail (void) __attribute__ ((noreturn));
+extern void __stack_chk_fail (void) attribute_noreturn;
 
 /* On some architectures, this helps needless PIC pointer setup
    that would be needed just for the __stack_chk_fail call.  */
 
-void __attribute__ ((noreturn)) attribute_hidden
+void attribute_noreturn attribute_hidden
 __stack_chk_fail_local (void)
 {
   __stack_chk_fail ();

+ 4 - 4
libc/sysdeps/linux/common/ssp.c

@@ -57,8 +57,8 @@ static __always_inline void terminate(void)
 	EXIT(127);
 }
 
-void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged __attribute__ ((unused)));
-void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged)
+void attribute_noreturn __stack_smash_handler(char func[], int damaged __attribute__ ((unused)));
+void attribute_noreturn __stack_smash_handler(char func[], int damaged)
 {
 	extern char *__progname;
 	static const char message[] = ": stack smashing attack in function ";
@@ -72,7 +72,7 @@ void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged)
 		terminate();
 }
 
-void __attribute__ ((noreturn)) __stack_chk_fail(void)
+void attribute_noreturn __stack_chk_fail(void)
 {
 	extern char *__progname;
 	static const char msg1[] = "stack smashing detected: ";
@@ -88,7 +88,7 @@ void __attribute__ ((noreturn)) __stack_chk_fail(void)
 }
 
 #if 0
-void __attribute__ ((noreturn)) __chk_fail(void)
+void attribute_noreturn __chk_fail(void)
 {
 	extern char *__progname;
 	static const char msg1[] = "buffer overflow detected: ";