Path: utzoo!attcan!uunet!nbires!ncar!ames!killer!richardh
From: richardh@killer.UUCP (Richard Hargrove)
Newsgroups: comp.unix.microport
Subject: Interpretation of values reported by nm
Keywords: nm values
Message-ID: <4650@killer.UUCP>
Date: 30 Jun 88 02:50:04 GMT
Organization: The Unix(R) Connection, Dallas, Texas
Lines: 16

This one has me stumped. I was playing around with a program to read
the process table out of the kernel via the /dev/kmem device but when
I nm /system5, ALL of the addresses, except for u, begin with 0x02.
Specifically, proc is 0x0228365a, v is 0x022027ec, etc. These then produce 
garbage when used as offsets into /dev/kmem. Does anyone know what these 
values represent and how I would need to transform them to make them useful 
as /dev/kmem offsets?

I inadvertently discovered that sdb takes hex addresses in the form
 prepended to . Is that the case here? If so, these
seem like very large selectors.

thanks,
richard hargrove
...!{ihnp4 | codas | cbosgd}!killer!richardh
--------------------------------------------