JustKernel

Ray Of Hope

August, 2013

Xen brief – Architecture

Xen architcture dom0 dom1 dom2 (guest OS) (guest OS) (guest OS) —————-Xen Hypervisor————————- ——————-Hw Resources———————— dom0 priviledged – ring 0 , mostly linux dom1 , dom2 … domN – unpriviledged ring 3 Role of dom0: This is the first guest to run when Xen starts Handling devices, including multiplexing of them for VMs Implementing half […]

Tags:

Posted in virtualization | No Comments »

Protect your allocated memory – Self sustaining Program to detect its own Memory corruptions and leaks

Overrun , Under-run and corruption of the allocated buffers is the common How can you protect these. One of the basic query is how I will detect that my thread has written beyond the allocated buffer at run time. You cant trap the writes to the memory. Even if you trying doing so, then which […]

Tags: ,

Posted in Basic C | No Comments »

To get stacktrace for the program in execution.

Many times its required to get the stack trace during the execution of a program eg . you suspect a particular point in the code to be a possible crash point or whenever you create or kill a thread you want a stack trace or normally you want stack trace at different points of a […]

Posted in Basic C | No Comments »

Simple colinux installation and How to run on XP

1) Download co linux package “coLinux-0.7.9.exe” . Double click on the executable file. 2) Select the checkbox colinux and “Root Filesystem Image Download”. (I selected fedora for download in future steps) 3) Select the installation directory. (Preferably C:) 4) Install the Tap Control for network access. 5) And you are done.. CoLinux is installed on […]

Tags:

Posted in virtualization | No Comments »

A risky affair

Does, passing the address as a variable and then using it it to decipher the value is a risky affair ? and should it not be preferred ? These are the questions which I am thinking and trying to find out answers for.. Just giving you a simple example to explain what I meant.. void […]

Posted in Basic C | No Comments »

Radisys – ATCA, Octeon – My Work

ATCA chasis consits of 14 slots for various blades to fit into. The various blades can be categorized as : 1200 blade: Carrier blade where in we can fit AMC 7212 (Octeon), ATM AMC. 2210 : Its the switch blade that manages the traffic in the chassis . Two set of 2210 blades are configured […]

Tags: ,

Posted in Telecom | No Comments »

VISA Issue – No one ready to sponsor my talent

I want to be a hardcore kernel / device driver professional and in pursuance of that, in my 6 years of career, I have always fought for good challenging work/projects in my organizations. Organizations in India are not involved in much of R&D activities or development activities , specially related to kernel or device driver. […]

Posted in Uncategorized | No Comments »

Return local pointer from function

Return local pointer from function. Is it safe.. It can’t be… You declare a pointer in the function, whose scope of life is only till the function lasts. So a pointer points a valid local variable, till the control is in the local function. As soon as the control is released from the function, the […]

Posted in Basic C | No Comments »

ATM surprise

While testing with ATM card, a thing that never expected occurred. If you transfer your UDP data to ATM card (configure map from udp and map to udp on ATM card), and loopback the traffic, then the UDP payload that you get back has corrupted data. Just a simple UDP loopback test and UDP payload […]

Tags:

Posted in Telecom | No Comments »

Loopback UDP to ATM Cells and Vice Versa..

Loopback from Adax Card (Node 3 ), didn’t work.. Was not able to decipher the reason but the sample application that was running on ADAX card was not able to loopback the packet. Packets were reaching only network processor of the ADAX card but were not relayed to the sample application that was working at […]

Posted in Uncategorized | No Comments »