Path: utzoo!attcan!uunet!nbires!ncar!ames!killer!richardh From: richardh@killer.UUCP (Richard Hargrove) Newsgroups: comp.unix.microport Subject: Interpretation of values reported by nm Keywords: nm values Message-ID: <4650@killer.UUCP> Date: 30 Jun 88 02:50:04 GMT Organization: The Unix(R) Connection, Dallas, Texas Lines: 16 This one has me stumped. I was playing around with a program to read the process table out of the kernel via the /dev/kmem device but when I nm /system5, ALL of the addresses, except for u, begin with 0x02. Specifically, proc is 0x0228365a, v is 0x022027ec, etc. These then produce garbage when used as offsets into /dev/kmem. Does anyone know what these values represent and how I would need to transform them to make them useful as /dev/kmem offsets? I inadvertently discovered that sdb takes hex addresses in the formprepended to . Is that the case here? If so, these seem like very large selectors. thanks, richard hargrove ...!{ihnp4 | codas | cbosgd}!killer!richardh --------------------------------------------