G06F9/449

String logging in an embedded system
11294650 · 2022-04-05 · ·

Methods for logging strings during execution of a program running on an embedded system without storing the strings in the memory of the embedded system include, during the build process, receiving source code for a program that comprises one or more log statements that identifies a string to be logged; generating object code based on the source code that comprises a special log section that includes the identified strings, and, for each log statement one or more instructions that cause a reference to the corresponding string to be stored in memory of the embedded system; generating execution code based on the object code wherein the special log section is marked as non-loadable and each reference is a location of the corresponding string in the special log section; and, loading the generated executable code into the memory of the embedded system such that the identified strings are not loaded into the memory of the embedded system.

APPLICATION INFRASTRUCTURE CONFIGURATION BASED ON ANNOTATED API SCHEMAS
20220050732 · 2022-02-17 ·

An infrastructure management system automatically determines a configuration of infrastructure services for the execution of applications that best satisfies predefined target criteria based on receiving annotated application programming interface (API) schemas associated with the applications. The system extracts information from customized annotations in a received API schema, sets up an API gateway with an existing configuration of infrastructure services, and logs requests received at this existing configuration via the gateway. The system generates a set of alternate configurations based on the extracted information, simulates execution of a set of logged requests to determine a set of valid configurations, and subsequently selects a new configuration that satisfies threshold predefined target criteria. The system may update the existing configuration to the new configuration without interrupting application services.

Application infrastructure configuration based on annotated API schemas
11237889 · 2022-02-01 · ·

An infrastructure management system automatically determines a configuration of infrastructure services for the execution of applications that best satisfies predefined target criteria based on receiving annotated application programming interface (API) schemas associated with the applications. The system extracts information from customized annotations in a received API schema, sets up an API gateway with an existing configuration of infrastructure services, and logs requests received at this existing configuration via the gateway. The system generates a set of alternate configurations based on the extracted information, simulates execution of a set of logged requests to determine a set of valid configurations, and subsequently selects a new configuration that satisfies threshold predefined target criteria. The system may update the existing configuration to the new configuration without interrupting application services.

METHOD, APPARATUS, AND TERMINAL FOR ACCELERATING COLD STARTUP OF AN APPLICATION
20210232429 · 2021-07-29 ·

This application provides a method and an apparatus, for accelerating cold startup of an application. The method includes after identifying an event that instructs an operating system of a terminal to cold start up an application, obtaining, from a plurality of dimensions, current status information related to the cold startup of the application, where the current status information includes a hardware configuration of the terminal, current load of the operating system of the terminal, resource overheads for cold starting up the application, and duration corresponding to each of a plurality of tasks in a process of cold starting up the application. The method also includes determining, by analyzing the current status information, a plurality of objects that need to be optimized in the current process of cold starting up the application; and then obtaining, based on the determined objects.

Blended virtual machine approach for flexible production delivery of intelligent business workflow rules

A method for blending uncompiled source files and compiled binaries in a single Runtime container. The method may include receiving data at a configuration database. The method may include invoking a scheduler. The method may include determining whether it is time to rerun the software code referenced by the Runtime container. The method may include performing a hash function on source files comprising content and logic. The method may include retrieving source files that include updated hash signatures. The method may include storing an in-memory equivalent of the source files. The method may include invoking a class loader for each source file that has been parsed successfully. The method may include storing, for each successfully loaded source file, a name and reference location. The method may include loading classes based on received names. The method may include compiling the binaries and implementing the logic referenced by the received names.

OPTIMIZING EXECUTION OF FOREIGN METHOD HANDLES ON A VIRTUAL MACHINE

Techniques for reducing overhead in native function calls are disclosed. The system may receive a method invocation instruction for invoking a particular method. The method invocation instruction includes a function descriptor, a method type, and an application binary interface (ABI) descriptor. The function descriptor includes a memory layout corresponding to any data returned by the function and memory layouts corresponding to each argument for the particular method. The system can select an ABI for processing the particular method based on the received ABI descriptor. The system can further associate each argument with a corresponding particular physical register into which the argument is to be loaded. The particular register is selected based on at least the selected ABI and the function descriptor. The system can cause a virtual machine to move each argument into the corresponding associated physical register.

HARDWARE APPARATUSES, METHODS, AND SYSTEMS FOR INDIVIDUALLY REVOCABLE CAPABILITIES FOR ENFORCING TEMPORAL MEMORY SAFETY

Systems, methods, and apparatuses relating to circuitry to implement individually revocable capabilities for enforcing temporal memory safety are described. In one embodiment, a hardware processor comprises an execution unit to execute an instruction to request access to a block of memory through a pointer to the block of memory, and a memory controller circuit to allow access to the block of memory when an allocated object tag in the pointer is validated with an allocated object tag in an entry of a capability table in memory that is indexed by an index value in the pointer, wherein the memory controller circuit is to clear the allocated object tag in the capability table when a corresponding object is deallocated.

Controlling runtime access to application program interfaces

The present invention extends to methods, systems, and computer program products for controlling runtime access to application programming interfaces Embodiments of the invention allow library developers to more precisely and easily control which of their libraries' APIs can be called dynamically. Thus, their servicing and versioning burden can be more appropriately controlled. Further, application developers can control which such APIs to further exclude from dynamic calling scenarios, to minimize the runtime support overhead (e.g., preventing generation of metadata).

METHOD AND APPARATUS FOR DATA INTERACTION
20210157555 · 2021-05-27 ·

This application discloses a data interaction method, for implementing data interaction between a web page module and a functional module of an application. The web page module includes at least one interaction API. The method includes: receiving an interaction request from a target interaction API in the web page module, where the interaction request includes an identifier of a target functional module with which the web page module requests to interact; determining, according to a preset corresponding relationship between interaction APIs and parsing modules, a target parsing module corresponding to the target interaction API; and sending the identifier of the target functional module to the target parsing module, for the target parsing module to call the target functional module to implement a corresponding function.

Application programming interface simulation based on declarative annotations
11030082 · 2021-06-08 · ·

An application programming interface (API) simulator generates synthetic responses for use during development and testing of subsystems. The API simulator receives an API schema including annotations that specify constraints on the synthetic responses. The API simulator generates synthetic responses as results of APIs that conform to the constraints specified using the annotations. The use of API simulator allows testing of subsystems using realistic synthetic responses that satisfy specific constraints as specified using annotations of the API schema.