Lines Matching defs:from

2288 /* An initial stub used if the PLT entry is referenced from Thumb code.  */
2721 /* The symbol table entry, if any, that this was derived from. */
2727 /* Where this stub is being called from, or, in the case of combined
2821 section different from the one we're currently writing out, so record the
2887 bfd_vma from;
2907 /* Some references from Thumb code may be eliminated by BL->BLX
2911 /* How many of the recorded PLT accesses were from non-call relocations.
2920 recomputing it from the PLT offset. */
3029 /* Get the ARM elf linker hash table from a link_info structure. */
5079 /* Pop from tail. */
5101 /* End of NEXT is too far from start, so stop. */
5107 /* OK, the size from the start to the start of CURR is less
5132 /* End of NEXT is too far from stubs, so stop. */
5159 if (ra->from < rb->from)
5161 else if (ra->from > rb->from)
5285 key.from = base_vma + i;
5296 /* We don't care about the error returned from this
5491 If found, the value of the stub's target symbol is updated from SYM_VALUE
5594 gateway veneer to transition from non secure to secure state and create them
5605 its special symbol would have a different value from the normal symbol.
5794 code entry function, ie can be called from non secure code without using a
5856 (present in input import library but absent from the executable being
5958 a secure function callable from non secure code. */
5964 (_("Entry function `%s' disappeared from secure code."), sym_name);
5983 /* Symbol found is not callable from non secure code. */
6059 (_("Start address of `%s' is different from previous link."),
6466 bfd_vma from = section->output_section->vma
6470 if ((from & 0xfff) == 0xffe)
6486 a8_relocs[num_a8_relocs].from = from;
6941 /* Allocate space and symbols for calling a Thumb function from Arm mode.
7173 /* A symbol for the return from the veneer. */
7210 /* The elf32_arm_init_maps function only cares about symbols from input
7293 /* A symbol for the return from the veneer. */
7329 /* The elf32_arm_init_maps function only cares about symbols from input
7366 /* Set the gc mark to prevent the section from being removed by garbage
7373 /* Set size of .plt entries. This function is called from the
7382 /* Add the glue sections to ABFD. This function is called from the
7443 This function is called from the linker scripts in ld/emultempl/
7615 /* This one is a call from arm code. We need to look up
8046 (available from ARM) for details of the erratum. A short version is
8831 /* Offset from the start of the current section
8834 /* Offset of the start of this stub from the start of the stubs. */
8840 /* ARM branches work from the pc of the instruction + 8. */
8914 so construct the address from a relative offset. */
9260 ROOT_PLT points to the offset of the PLT entry from the start of its
9610 /* Return the base VMA address which should be subtracted from real addresses
10169 from the emitted reloc addend. */
10313 A is the addend (extracted from the instruction) in bytes.
10472 /* ??? Need to determine shift amount from operand size. */
10802 which specifies that bit 1 of the target address will come from bit
11266 /* Linker relaxations happens from one of the
11768 /* If REL, extract the addend from the insn. If RELA, it will
11900 /* If REL, extract the addend from the insn. If RELA, it will
11986 /* If REL, extract the addend from the insn. If RELA, it will
12072 /* If REL, extract the addend from the insn. If RELA, it will
12190 /* Get the (signed) value from the instruction. */
12374 /* Get the (signed) value from the instruction. */
12501 /* This may have been marked unresolved because it came from
12689 /* Walk over all EXIDX sections, and create backlinks from the corrsponding
12713 /* Link this .ARM.exidx section back from the text section it
13035 /* Copy backend specific data from one object module to another. */
13168 /* Read the architecture from the Tag_also_compatible_with attribute, if any.
13497 /* Merge EABI object attributes from IBFD into OBFD. Raise an error if there
13604 that from the architecture version alone. */
13710 /* Use the "greatest" from the sequence 0, 2, 1, or the largest
14052 /* If out_attr was copied from in_attr then it won't have a type yet. */
14082 /* Merge backend specific data from an object file to the output
14800 record possible blx references separately from
15132 /* This is a copy of elf_find_function() from elf.c except that
15365 from the dynamic object to this symbol will go through the global
16111 /* If we don't need this section, strip it from the
17422 from their pointers in SYMS. Pointers of symbols to keep should be
17490 SYMCOUNT symbols of ABFD can be examined from their pointers in
17568 copy_exidx_entry (bfd *output_bfd, bfd_byte *to, bfd_byte *from, bfd_vma offset)
17570 unsigned long first_word = bfd_get_32 (output_bfd, from);
17571 unsigned long second_word = bfd_get_32 (output_bfd, from + 4);
17668 /* There's not much we can do apart from complain if this
17707 Encoding is extracted from the
18931 /* Hook called by the linker routine which adds symbols from an object
19049 /* Strip immediate from first add. */
19068 /* Implementation is shamelessly borrowed from _bfd_elf_get_synthetic_symtab. */
19213 FALSE otherwise. ISECTION is the best guess matching section from the
19591 /* Merge backend specific data from an object file to the output