>> I didn't check, but how about >> >> ((void (*)(void))(0x1234))(); > > Yes, you are right. But I don't know calling function (address) in such way. > How would you know that some function like "foo" is located at 0x1234?
Well, you know if you or someone else put it there. This is common for BIOS-like library functions that are already present in the memory. > And Ben, I found I was wrong. Not only hc08 has such logic, stm8, for > example, puts IS_LITERAL if-else statement into emitCall (smt8/gen.c). I would hope all targets have this, because such a construct has no "name" and needs to read ulFromVlaue() instead. Maarten ------------------------------------------------------------------------------ Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk _______________________________________________ Sdcc-user mailing list Sdcc-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/sdcc-user