• Michael Hudson-Doyle's avatar
    cmd/internal/obj/x86: still use (fake) local exec TLS mode on android/386 · 0fbf0955
    Michael Hudson-Doyle authored
    golang.org/cl/16383 broke android/386 because by a sort of confluence of hacks
    no TLS relocations were emitted at all when Flag_shared != 0. The hack in
    runtime/cgo works as well in a PIE executable as it does with a position
    dependent one, so the simplest fix is to still emit a R_TLS_LE reloc when goos
    == "android".
    
    A real fix is to use something more like the IE model code but loading the
    offset from %gs to the thread local storage from a global variable rather than
    from a location chosen by the system linker (this is how android/arm works).
    
    Issue #9327.
    
    Change-Id: I9fbfc890ec7fe191f80a595b6cf8e2a1fcbe3034
    Reviewed-on: https://go-review.googlesource.com/17049Reviewed-by: 's avatarHyang-Ah Hana Kim <hyangah@gmail.com>
    0fbf0955
Name
Last commit
Last update
..
gcprog Loading commit data...
goobj Loading commit data...
obj Loading commit data...
objfile Loading commit data...