Hello, On the PC ASLR will reduce the interest of calling function by direct litteral address.
But, for example, if you know for sure that the libc is loaded at address X and the function you want has offset Y within this lib, you could certainly call that function directly using this syntax. -------- This is used a lot in the NSPIRE calculator from Texas Instruments. Interesting entry points from the original OS were reverse engineered, and are used to define functions for use in custom software. Addresses differ according to the OS version, so there are mechanisms to choose the correct address. http://hackspire.unsads.com/wiki/index.php/Ndless_features_and_limitations#Syscalls (note: these are not real syscalls, since no part of the nspire os is running in system mode) ----- In TI calculators based on the 68k processor (ti92+ and such), we had a "rom call" table which was a table of function pointers. The base address of the tabme was stored at a known address, and the indexes in the table were associated to identical functions, so we could call a large quantity of pre-coded routines using a set of macros: /*C8h is the memory location that stores the address of the rom call table*/ #define __jmp_tbl (*(void***)0xC8) #define _rom_call_addr_concat(intindex,romindex) (__jmp_tbl [intindex]) #define _rom_call_concat(type,args,intindex,romindex) (*((type (* __ATTR_TIOS__) args) (__rom_call_addr_concat (intindex, romindex)))) #define _rom_call(type,args,index) (_rom_call_concat (type, args, 0x##index, _ROM_CALL_##index)) #define memcpy _rom_call(void*,(void*,const void*,long),26A) #define memmove _rom_call(void*,(void*,const void*,long),26B) #define memset _rom_call(void*,(void*,short,long),27C) #define sprintf _rom_call_attr(short,(char*,const char*,...),__attribute__((__format__(__printf__,2,3))),53) etc. I also see that the Z80 based ti calculators also have something like this with their "bcalls" http://wikiti.brandonw.net/index.php?title=84PCSE:OS:Include_File http://wikiti.brandonw.net/index.php?title=83Plus:BCALLs:5017 Regards Sébastien Lorquet Le 02/10/2014 13:28, 陳韋任 (Wei-Ren Chen) a écrit : >> Well, you know if you or someone else put it there. This is common for >> BIOS-like library functions that are already present in the memory. > > Thanks for your explanation. I have no experience on using BIOS-like > library, but I guess what you mean is some kind of library that > preloaded into memory at a fixed address? > > When talking about function call, I only know call by function name, > or call by a function pointer. Treating a memory address as function > is really new to me. This kind of usage only exists in microchip > enviroment, or I can reproduce it in my PC? Just curious. ;-) > > BR, > chenwj > ------------------------------------------------------------------------------ Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk _______________________________________________ Sdcc-user mailing list Sdcc-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/sdcc-user