Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262207AbUK3Rep (ORCPT ); Tue, 30 Nov 2004 12:34:45 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262213AbUK3Rep (ORCPT ); Tue, 30 Nov 2004 12:34:45 -0500 Received: from linux01.gwdg.de ([134.76.13.21]:17300 "EHLO linux01.gwdg.de") by vger.kernel.org with ESMTP id S262207AbUK3Ren (ORCPT ); Tue, 30 Nov 2004 12:34:43 -0500 Date: Tue, 30 Nov 2004 18:34:41 +0100 (MET) From: Jan Engelhardt cc: linux-kernel@vger.kernel.org Subject: Re: Walking all the physical memory in an x86 system In-Reply-To: <41ACADD3.2030206@draigBrady.com> Message-ID: References: <41ACADD3.2030206@draigBrady.com> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 589 Lines: 21 >> what have They done with /dev/mem? ... one once could access e.g. >> position 0x400 of /dev/mem (by seeking) and then read the LPT port value. > >Are you thinking of /dev/port ? No, I was thinking of: unsigned short p; fd = open("/dev/mem", O_RDONLY | O_BINARY); lseek(fd, 0x400, SEEK_SET); read(fd, &p, 2); Jan Engelhardt -- ENOSPC - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/