2 # ooh! test input command file for elftosb 2!
5 searchPath = "elftosb2:elftosb2/elf_test_files";
10 productVersion = "4.4.720";
11 componentVersion = "4.4.999";
19 ocram_end = ocram_start + ocram_size - 1;
21 prec_test = 1 + 5 * 10;
22 paren_test = (1 + 5) * 10;
25 foo = (1 + 0x1cf1.w).w ^ 5 + a;
41 # test int size promotion
45 xx = x - (x / 2.b); # should produce byte
46 xy = x + y; # should produce half-word
47 xz = x - z; # should produce word
48 yz = y + z; # should produce word
57 sd_player_elf="elftosb2/elf_test_files/sd_player_gcc";
58 sd_player_srec="elftosb2/elf_test_files/sd_player_gcc.srec";
60 datafile="elftosb2/elf_test_files/hello_NOR_arm";
64 # load 0.w > ocram_start..ocram_end; # word fill all ocram with 0
66 # load hostlink; # load all of hostlink source
68 # load 0x1000ffff.w > 0x1000; # load a word to address 0x1000
69 # load 0x55aa.h > 0x2000; # load a half-word to address 0x2000
70 # load redboot; # load all sections of redboot source
73 # load $.*.text; # load some sections to their natural location
74 # call :_start; # call function "_start" from hostlink
75 # call hostlink:foofn; # call function "foofn" from hostlink
77 # call :monkey (1 + 1); # call function "monkey" from hostlink with an argument
79 # load $* > .; # load all sections of hostlink to their natural location
81 # load $.text > 0x1000; # load .text section to address 0x1000
83 # load 0x55.b > 0x0..0x4000; # fill 0 through 0x4000 with byte pattern 0x55
86 # load $*.text from hostlink > .; # load sections match "*.text" from hostlink to default places
88 # jump redboot; # jump to entry point of redboot source
93 # from sd_player_elf {
99 ## and this one are both equivalent except for section ids
101 # load $* from sd_player_elf;
102 # call sd_player_elf:_start();
106 # # set the value of a symbol
108 # load 0x5555.h > hostlink:g_USBPID;
110 # # load a string to memory
111 # load "this is a string" > 0x1e0;
119 #section('rsrc') <= datafile;