• Michael Hudson-Doyle's avatar
    cmd/internal/obj/x86: still use (fake) local exec TLS mode on android/386 · 0fbf0955
    Michael Hudson-Doyle authored
    golang.org/cl/16383 broke android/386 because by a sort of confluence of hacks
    no TLS relocations were emitted at all when Flag_shared != 0. The hack in
    runtime/cgo works as well in a PIE executable as it does with a position
    dependent one, so the simplest fix is to still emit a R_TLS_LE reloc when goos
    == "android".
    
    A real fix is to use something more like the IE model code but loading the
    offset from %gs to the thread local storage from a global variable rather than
    from a location chosen by the system linker (this is how android/arm works).
    
    Issue #9327.
    
    Change-Id: I9fbfc890ec7fe191f80a595b6cf8e2a1fcbe3034
    Reviewed-on: https://go-review.googlesource.com/17049Reviewed-by: 's avatarHyang-Ah Hana Kim <hyangah@gmail.com>
    0fbf0955
Name
Last commit
Last update
api Loading commit data...
doc Loading commit data...
lib/time Loading commit data...
misc Loading commit data...
src Loading commit data...
test Loading commit data...
.gitattributes Loading commit data...
.gitignore Loading commit data...
AUTHORS Loading commit data...
CONTRIBUTING.md Loading commit data...
CONTRIBUTORS Loading commit data...
LICENSE Loading commit data...
PATENTS Loading commit data...
README.md Loading commit data...
favicon.ico Loading commit data...
robots.txt Loading commit data...