Solved

How do I know if the -rmap VM is enabled in the kernel?

Posted on 2004-04-13
3
554 Views
Last Modified: 2010-04-22
Is there any way to find out if the -rmap VM feature is enabled in the kernel?  My Makefile needs to know.
0
Comment
Question by:GSIJoe
  • 2
3 Comments
 
LVL 45

Expert Comment

by:sunnycoder
ID: 10822525
sound like some configurable kernel memory feature ... goto /usr/src/linux

run "make xconfig" ... Now check if it is already selected ... If yes, then in all probabilities you have it enabled unless you meddled with the config file
0
 

Author Comment

by:GSIJoe
ID: 10823725
Hi Sunny,

I should have been more specific.  The situation is that some distributions, notably Red Hat, ship with this feature enabled in the kernel, and my program needs to know about this when it is compiled.  Currently, if someone compiles my program with this VM enabled and tries to run it, he is out of luck ... to fix he has to open an editor, monkey with a couple lines of code, and recompile.  I would really like to automate this process as much as possible so that make or ideally gcc can figure out if this feature is enabled and make the appropriate changes with an #ifdef or something.
0
 
LVL 45

Accepted Solution

by:
sunnycoder earned 125 total points
ID: 10842611
If enabling this feature provide you some command or API, you can try running that command and check the return value ... If you can elaborate a bit on this feature I can try to find out the details ...

Also if this feature appears in kernel configuration options in make xconfig, then there will be a corresponding variable in arch/<your arch>/config.in file and a corresponding header C file (I cant recollect the name!!)... the names are pretty descriptive so you will have no difficulty in detecting the variable ...

If it is configurable option let me know and I will try to search the name of the header file too !!
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Have you ever been frustrated by having to click seven times in order to retrieve a small bit of information from the web, always the same seven clicks, scrolling down and down until you reach your target? When you know the benefits of the command l…
The purpose of this article is to demonstrate how we can upgrade Python from version 2.7.6 to Python 2.7.10 on the Linux Mint operating system. I am using an Oracle Virtual Box where I have installed Linux Mint operating system version 17.2. Once yo…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now