<html>
<head>
<base href="https://bugs.freedesktop.org/" />
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_REOPENED "
title="REOPENED --- - initial-exec TLS model breaks dlopen'ed libGL"
href="https://bugs.freedesktop.org/show_bug.cgi?id=35268#c16">Comment # 16</a>
on <a class="bz_bug_link
bz_status_REOPENED "
title="REOPENED --- - initial-exec TLS model breaks dlopen'ed libGL"
href="https://bugs.freedesktop.org/show_bug.cgi?id=35268">bug 35268</a>
from <span class="vcard"><a class="email" href="mailto:natanael.copa@gmail.com" title="Natanael Copa <natanael.copa@gmail.com>"> <span class="fn">Natanael Copa</span></a>
</span></b>
<pre>(In reply to <a href="show_bug.cgi?id=35268#c15">comment #15</a>)
<span class="quote">> Note that, at least as I understand
> it, the current approach that "works" with glibc is already fragile; if
> another library with large TLS needs gets loaded via dlopen before libGL.so,
> this may cause libGL.so to fail to load/work.</span >
This should be fairly easy to test. If we add a dlopen of a dso that allocates
slightly less than TLS_STATIC_SURPLUS before we dlopen the libGL we should
trigger an dlopen error.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>