• Michael Hudson-Doyle's avatar
    cmd/internal/obj/x86: still use (fake) local exec TLS mode on android/386 · 0fbf0955
    Michael Hudson-Doyle authored
    golang.org/cl/16383 broke android/386 because by a sort of confluence of hacks
    no TLS relocations were emitted at all when Flag_shared != 0. The hack in
    runtime/cgo works as well in a PIE executable as it does with a position
    dependent one, so the simplest fix is to still emit a R_TLS_LE reloc when goos
    == "android".
    
    A real fix is to use something more like the IE model code but loading the
    offset from %gs to the thread local storage from a global variable rather than
    from a location chosen by the system linker (this is how android/arm works).
    
    Issue #9327.
    
    Change-Id: I9fbfc890ec7fe191f80a595b6cf8e2a1fcbe3034
    Reviewed-on: https://go-review.googlesource.com/17049Reviewed-by: 's avatarHyang-Ah Hana Kim <hyangah@gmail.com>
    0fbf0955
Name
Last commit
Last update
..
addr2line Loading commit data...
api Loading commit data...
asm Loading commit data...
cgo Loading commit data...
compile Loading commit data...
cover Loading commit data...
dist Loading commit data...
doc Loading commit data...
fix Loading commit data...
go Loading commit data...
gofmt Loading commit data...
internal Loading commit data...
link Loading commit data...
newlink Loading commit data...
nm Loading commit data...
objdump Loading commit data...
pack Loading commit data...
pprof Loading commit data...
trace Loading commit data...
vendor Loading commit data...
vet Loading commit data...
yacc Loading commit data...