Solved

What is /boot/System.map ???

Posted on 2002-05-24
3
277 Views
Last Modified: 2013-12-16
What does this file do? (Redhat 7.x)
The kernel README doesnt mention it, but some other documents do. If I am booting various kernels for testing, etc, often the System.map does'nt match the kernel I booted, does that matter, if not- why is it there?  
0
Comment
Question by:medent
  • 2
3 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 100 total points
ID: 7033392
The System.ma file is simply a loader map of the kernel and lists the addresses of kernel variables and functions. It is used by the klogd daemon if a protection fault occurs to translate the addresses into meaningful symbols. There are some drivers that need use System.map and some utilities, like lsof and dosemu (and probably others). The usual way to be able to have more than one kernel installed is to also have that kernel's System.map with some unique name, like perhaps System.map-2.4.18-test1 and use a symlink for System.map.
0
 

Author Comment

by:medent
ID: 7038855
It doesnt seem to make sense that I can setup grub.conf to boot multiple kernels, and initrds, but the not System.map .
0
 
LVL 40

Expert Comment

by:jlevie
ID: 7039233
The the kernel and initrd can be specified to grub and it will use that definition once to boot the system. And since the kernel knows what its ID is it can find the modules dir as needed. The other, application level, things that use System.map have no easy way to figure out what system map is associated with the running kernel.

In a case where one is playing with kernels and has several around to boot with it would be possible to add some code to rc.local that figures out what kernel has just booted from 'uname -r' and adjusts the symlink as appropriate.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Check if a filw is immutable for a certain amount of time 6 48
Reset Root Password on CentOS 6 4 44
expectj telnet failing 5 26
Can't ping New Linux Servers 40 25
Using 'screen' for session sharing, The Simple Edition Step 1: user starts session with command: screen Step 2: other user (logged in with same user account) connects with command: screen -x Done. Both users are connected to the same CLI sessio…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now