>> I didn't check, but how about
>>
>> ((void (*)(void))(0x1234))();
>
> Yes, you are right. But I don't know calling function (address) in such
way.
> How would you know that some function like "foo" is located at 0x1234?

Well, you know if you or someone else put it there. This is common for
BIOS-like library functions that are already present in the memory.

>   And Ben, I found I was wrong. Not only hc08 has such logic, stm8, for
> example, puts IS_LITERAL if-else statement into emitCall (smt8/gen.c).

I would hope all targets have this, because such a construct has no "name"
and needs to read ulFromVlaue() instead.

Maarten

------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Sdcc-user mailing list
Sdcc-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sdcc-user

Reply via email to