]>
Commit | Line | Data |
---|---|---|
f787e138 FW |
1 | /* Base for test program with impossiblyh large PT_TLS segment. |
2 | Copyright (C) 2022 Free Software Foundation, Inc. | |
3 | This file is part of the GNU C Library. | |
4 | ||
5 | The GNU C Library is free software; you can redistribute it and/or | |
6 | modify it under the terms of the GNU Lesser General Public | |
7 | License as published by the Free Software Foundation; either | |
8 | version 2.1 of the License, or (at your option) any later version. | |
9 | ||
10 | The GNU C Library is distributed in the hope that it will be useful, | |
11 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
12 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
13 | Lesser General Public License for more details. | |
14 | ||
15 | You should have received a copy of the GNU Lesser General Public | |
16 | License along with the GNU C Library; if not, see | |
17 | <https://www.gnu.org/licenses/>. */ | |
18 | ||
19 | /* The test actual binary is patched using scripts/tst-elf-edit.py | |
20 | --maximize-tls-size, and this introduces the expected test | |
21 | allocation failure due to an excessive PT_LS p_memsz value. | |
22 | ||
23 | Patching the binary is required because on some 64-bit targets, TLS | |
24 | relocations can only cover a 32-bit range, and glibc-internal TLS | |
25 | variables such as errno end up outside that range. */ | |
26 | ||
27 | int | |
28 | main (void) | |
29 | { | |
30 | return 0; | |
31 | } |