From 05e75260d6952308d7c865ff67c0e3678b7ba935 Mon Sep 17 00:00:00 2001 From: "Peter S. Mazinger" Date: Thu, 26 Jan 2006 22:04:19 +0000 Subject: Get rid of missing prototype warnings --- libc/sysdeps/linux/common/ssp.c | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) (limited to 'libc/sysdeps/linux/common/ssp.c') diff --git a/libc/sysdeps/linux/common/ssp.c b/libc/sysdeps/linux/common/ssp.c index 33d84e5eb..16b9f9c10 100644 --- a/libc/sysdeps/linux/common/ssp.c +++ b/libc/sysdeps/linux/common/ssp.c @@ -80,8 +80,8 @@ static attribute_noreturn void terminate(void) _exit(127); } -void attribute_noreturn __stack_smash_handler(char func[], int damaged __attribute__ ((unused))); -void attribute_noreturn __stack_smash_handler(char func[], int damaged) +void __stack_smash_handler(char func[], int damaged __attribute__ ((unused))) attribute_noreturn; +void __stack_smash_handler(char func[], int damaged) { static const char message[] = ": stack smashing attack in function "; @@ -94,7 +94,8 @@ void attribute_noreturn __stack_smash_handler(char func[], int damaged) terminate(); } -void attribute_noreturn __stack_chk_fail(void) +void __stack_chk_fail(void) attribute_noreturn; +void __stack_chk_fail(void) { static const char msg1[] = "stack smashing detected: "; static const char msg3[] = " terminated"; @@ -109,7 +110,8 @@ void attribute_noreturn __stack_chk_fail(void) } #if 0 -void attribute_noreturn __chk_fail(void) +void __chk_fail(void) attribute_noreturn; +void __chk_fail(void) { static const char msg1[] = "buffer overflow detected: "; static const char msg3[] = " terminated"; -- cgit v1.2.3