svn commit: trunk/uClibc/libc/sysdeps/linux/common

psm at uclibc.org psm at uclibc.org
Fri Nov 4 00:32:28 UTC 2005


Author: psm
Date: 2005-11-03 16:32:26 -0800 (Thu, 03 Nov 2005)
New Revision: 12144

Log:
Make use of newly introduced attribute_noreturn

Modified:
   trunk/uClibc/libc/sysdeps/linux/common/_exit.c
   trunk/uClibc/libc/sysdeps/linux/common/ssp-local.c
   trunk/uClibc/libc/sysdeps/linux/common/ssp.c


Changeset:
Modified: trunk/uClibc/libc/sysdeps/linux/common/_exit.c
===================================================================
--- trunk/uClibc/libc/sysdeps/linux/common/_exit.c	2005-11-04 00:07:48 UTC (rev 12143)
+++ trunk/uClibc/libc/sysdeps/linux/common/_exit.c	2005-11-04 00:32:26 UTC (rev 12144)
@@ -32,7 +32,7 @@
 static inline _syscall1(void, __syscall_exit, int, status);
 #endif
 
-void __attribute__ ((noreturn)) _exit(int status)
+void attribute_noreturn _exit(int status)
 {
 	/* The loop is added only to keep gcc happy. */
 	while(1)

Modified: trunk/uClibc/libc/sysdeps/linux/common/ssp-local.c
===================================================================
--- trunk/uClibc/libc/sysdeps/linux/common/ssp-local.c	2005-11-04 00:07:48 UTC (rev 12143)
+++ trunk/uClibc/libc/sysdeps/linux/common/ssp-local.c	2005-11-04 00:32:26 UTC (rev 12144)
@@ -23,12 +23,12 @@
 
 #include <features.h>
 
-extern void __stack_chk_fail (void) __attribute__ ((noreturn));
+extern void __stack_chk_fail (void) attribute_noreturn;
 
 /* On some architectures, this helps needless PIC pointer setup
    that would be needed just for the __stack_chk_fail call.  */
 
-void __attribute__ ((noreturn)) attribute_hidden
+void attribute_noreturn attribute_hidden
 __stack_chk_fail_local (void)
 {
   __stack_chk_fail ();

Modified: trunk/uClibc/libc/sysdeps/linux/common/ssp.c
===================================================================
--- trunk/uClibc/libc/sysdeps/linux/common/ssp.c	2005-11-04 00:07:48 UTC (rev 12143)
+++ trunk/uClibc/libc/sysdeps/linux/common/ssp.c	2005-11-04 00:32:26 UTC (rev 12144)
@@ -57,8 +57,8 @@
 	EXIT(127);
 }
 
-void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged __attribute__ ((unused)));
-void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged)
+void attribute_noreturn __stack_smash_handler(char func[], int damaged __attribute__ ((unused)));
+void attribute_noreturn __stack_smash_handler(char func[], int damaged)
 {
 	extern char *__progname;
 	static const char message[] = ": stack smashing attack in function ";
@@ -72,7 +72,7 @@
 		terminate();
 }
 
-void __attribute__ ((noreturn)) __stack_chk_fail(void)
+void attribute_noreturn __stack_chk_fail(void)
 {
 	extern char *__progname;
 	static const char msg1[] = "stack smashing detected: ";
@@ -88,7 +88,7 @@
 }
 
 #if 0
-void __attribute__ ((noreturn)) __chk_fail(void)
+void attribute_noreturn __chk_fail(void)
 {
 	extern char *__progname;
 	static const char msg1[] = "buffer overflow detected: ";




More information about the uClibc-cvs mailing list