Solved

How do I know if the -rmap VM is enabled in the kernel?

Posted on 2004-04-13
3
559 Views
Last Modified: 2010-04-22
Is there any way to find out if the -rmap VM feature is enabled in the kernel?  My Makefile needs to know.
0
Comment
Question by:GSIJoe
  • 2
3 Comments
 
LVL 45

Expert Comment

by:sunnycoder
ID: 10822525
sound like some configurable kernel memory feature ... goto /usr/src/linux

run "make xconfig" ... Now check if it is already selected ... If yes, then in all probabilities you have it enabled unless you meddled with the config file
0
 

Author Comment

by:GSIJoe
ID: 10823725
Hi Sunny,

I should have been more specific.  The situation is that some distributions, notably Red Hat, ship with this feature enabled in the kernel, and my program needs to know about this when it is compiled.  Currently, if someone compiles my program with this VM enabled and tries to run it, he is out of luck ... to fix he has to open an editor, monkey with a couple lines of code, and recompile.  I would really like to automate this process as much as possible so that make or ideally gcc can figure out if this feature is enabled and make the appropriate changes with an #ifdef or something.
0
 
LVL 45

Accepted Solution

by:
sunnycoder earned 125 total points
ID: 10842611
If enabling this feature provide you some command or API, you can try running that command and check the return value ... If you can elaborate a bit on this feature I can try to find out the details ...

Also if this feature appears in kernel configuration options in make xconfig, then there will be a corresponding variable in arch/<your arch>/config.in file and a corresponding header C file (I cant recollect the name!!)... the names are pretty descriptive so you will have no difficulty in detecting the variable ...

If it is configurable option let me know and I will try to search the name of the header file too !!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
what does daemon command do in linux 3 71
Identify Linux loader 67 170
Understanding curl command 1 50
Using init script with Systemd: need help crafting unit file 11 81
The purpose of this article is to fix the unknown display problem in Linux Mint operating system. After installing the OS if you see Display monitor is not recognized then we can install "MESA" utilities to fix this problem or we can install additio…
The purpose of this article is to demonstrate how we can upgrade Python from version 2.7.6 to Python 2.7.10 on the Linux Mint operating system. I am using an Oracle Virtual Box where I have installed Linux Mint operating system version 17.2. Once yo…
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now