This is the mail archive of the
gcc-bugs@gcc.gnu.org
mailing list for the GCC project.
[Bug target/63634] Compiler generated R_AARCH64_TLSLE_ADD_TPREL_HI12/LO12 pair overflowed by large TP offset
- From: "renlin at gcc dot gnu.org" <gcc-bugzilla at gcc dot gnu dot org>
- To: gcc-bugs at gcc dot gnu dot org
- Date: Mon, 08 Feb 2016 11:13:23 +0000
- Subject: [Bug target/63634] Compiler generated R_AARCH64_TLSLE_ADD_TPREL_HI12/LO12 pair overflowed by large TP offset
- Auto-submitted: auto-generated
- References: <bug-63634-4 at http dot gcc dot gnu dot org/bugzilla/>
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63634
Renlin Li <renlin at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
CC| |renlin at gcc dot gnu.org
Resolution|--- |FIXED
--- Comment #1 from Renlin Li <renlin at gcc dot gnu.org> ---
r227215 [AArch64][TLSLE][3/3] Implement local executable mode for all memory
model
r227213 [AArch64][TLSLE][2/3] Rename SYMBOL_TLSLE to SYMBOL_TLSLE24
r227212 [AArch64][TLSLE][1/3] Add the option "-mtls-size"
Those three patches implemented TLS local executable mode for all memory
models.
I have double checked, if -mtls-size is specified properly, correct access
sequence and relocations will be emitted.
For example in this case -mtls-size=32 should generate movz/movk pair to give
32-bit TP offset.
So I will close this ticket now.