• Michael Hudson-Doyle's avatar
    cmd/internal/obj/x86: still use (fake) local exec TLS mode on android/386 · 0fbf0955
    Michael Hudson-Doyle authored
    golang.org/cl/16383 broke android/386 because by a sort of confluence of hacks
    no TLS relocations were emitted at all when Flag_shared != 0. The hack in
    runtime/cgo works as well in a PIE executable as it does with a position
    dependent one, so the simplest fix is to still emit a R_TLS_LE reloc when goos
    == "android".
    
    A real fix is to use something more like the IE model code but loading the
    offset from %gs to the thread local storage from a global variable rather than
    from a location chosen by the system linker (this is how android/arm works).
    
    Issue #9327.
    
    Change-Id: I9fbfc890ec7fe191f80a595b6cf8e2a1fcbe3034
    Reviewed-on: https://go-review.googlesource.com/17049Reviewed-by: 's avatarHyang-Ah Hana Kim <hyangah@gmail.com>
    0fbf0955
Name
Last commit
Last update
..
arm Loading commit data...
arm64 Loading commit data...
mips Loading commit data...
ppc64 Loading commit data...
x86 Loading commit data...
ar.go Loading commit data...
data.go Loading commit data...
flag.go Loading commit data...
fmt.go Loading commit data...
funcdata.go Loading commit data...
go.go Loading commit data...
ld.go Loading commit data...
line_test.go Loading commit data...
link.go Loading commit data...
obj.go Loading commit data...
objfile.go Loading commit data...
pass.go Loading commit data...
pcln.go Loading commit data...
stack.go Loading commit data...
stringer.go Loading commit data...
sym.go Loading commit data...
textflag.go Loading commit data...
typekind.go Loading commit data...
util.go Loading commit data...