svn commit: trunk/uClibc/libc/sysdeps/linux/common
psm at uclibc.org
psm at uclibc.org
Fri Nov 4 00:32:28 UTC 2005
Author: psm
Date: 2005-11-03 16:32:26 -0800 (Thu, 03 Nov 2005)
New Revision: 12144
Log:
Make use of newly introduced attribute_noreturn
Modified:
trunk/uClibc/libc/sysdeps/linux/common/_exit.c
trunk/uClibc/libc/sysdeps/linux/common/ssp-local.c
trunk/uClibc/libc/sysdeps/linux/common/ssp.c
Changeset:
Modified: trunk/uClibc/libc/sysdeps/linux/common/_exit.c
===================================================================
--- trunk/uClibc/libc/sysdeps/linux/common/_exit.c 2005-11-04 00:07:48 UTC (rev 12143)
+++ trunk/uClibc/libc/sysdeps/linux/common/_exit.c 2005-11-04 00:32:26 UTC (rev 12144)
@@ -32,7 +32,7 @@
static inline _syscall1(void, __syscall_exit, int, status);
#endif
-void __attribute__ ((noreturn)) _exit(int status)
+void attribute_noreturn _exit(int status)
{
/* The loop is added only to keep gcc happy. */
while(1)
Modified: trunk/uClibc/libc/sysdeps/linux/common/ssp-local.c
===================================================================
--- trunk/uClibc/libc/sysdeps/linux/common/ssp-local.c 2005-11-04 00:07:48 UTC (rev 12143)
+++ trunk/uClibc/libc/sysdeps/linux/common/ssp-local.c 2005-11-04 00:32:26 UTC (rev 12144)
@@ -23,12 +23,12 @@
#include <features.h>
-extern void __stack_chk_fail (void) __attribute__ ((noreturn));
+extern void __stack_chk_fail (void) attribute_noreturn;
/* On some architectures, this helps needless PIC pointer setup
that would be needed just for the __stack_chk_fail call. */
-void __attribute__ ((noreturn)) attribute_hidden
+void attribute_noreturn attribute_hidden
__stack_chk_fail_local (void)
{
__stack_chk_fail ();
Modified: trunk/uClibc/libc/sysdeps/linux/common/ssp.c
===================================================================
--- trunk/uClibc/libc/sysdeps/linux/common/ssp.c 2005-11-04 00:07:48 UTC (rev 12143)
+++ trunk/uClibc/libc/sysdeps/linux/common/ssp.c 2005-11-04 00:32:26 UTC (rev 12144)
@@ -57,8 +57,8 @@
EXIT(127);
}
-void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged __attribute__ ((unused)));
-void __attribute__ ((noreturn)) __stack_smash_handler(char func[], int damaged)
+void attribute_noreturn __stack_smash_handler(char func[], int damaged __attribute__ ((unused)));
+void attribute_noreturn __stack_smash_handler(char func[], int damaged)
{
extern char *__progname;
static const char message[] = ": stack smashing attack in function ";
@@ -72,7 +72,7 @@
terminate();
}
-void __attribute__ ((noreturn)) __stack_chk_fail(void)
+void attribute_noreturn __stack_chk_fail(void)
{
extern char *__progname;
static const char msg1[] = "stack smashing detected: ";
@@ -88,7 +88,7 @@
}
#if 0
-void __attribute__ ((noreturn)) __chk_fail(void)
+void attribute_noreturn __chk_fail(void)
{
extern char *__progname;
static const char msg1[] = "buffer overflow detected: ";
More information about the uClibc-cvs
mailing list