-
Michael Hudson-Doyle authored
golang.org/cl/16383 broke android/386 because by a sort of confluence of hacks no TLS relocations were emitted at all when Flag_shared != 0. The hack in runtime/cgo works as well in a PIE executable as it does with a position dependent one, so the simplest fix is to still emit a R_TLS_LE reloc when goos == "android". A real fix is to use something more like the IE model code but loading the offset from %gs to the thread local storage from a global variable rather than from a location chosen by the system linker (this is how android/arm works). Issue #9327. Change-Id: I9fbfc890ec7fe191f80a595b6cf8e2a1fcbe3034 Reviewed-on: https://go-review.googlesource.com/17049Reviewed-by: Hyang-Ah Hana Kim <hyangah@gmail.com>
0fbf0955
Name |
Last commit
|
Last update |
---|---|---|
.. | ||
arm | ||
arm64 | ||
mips | ||
ppc64 | ||
x86 | ||
ar.go | ||
data.go | ||
flag.go | ||
fmt.go | ||
funcdata.go | ||
go.go | ||
ld.go | ||
line_test.go | ||
link.go | ||
obj.go | ||
objfile.go | ||
pass.go | ||
pcln.go | ||
stack.go | ||
stringer.go | ||
sym.go | ||
textflag.go | ||
typekind.go | ||
util.go |