G06F9/4484

CALL AND RETURN INSTRUCTIONS FOR CONFIGURABLE REGISTER CONTEXT SAVE AND RESTORE
20230051855 · 2023-02-16 ·

Systems, devices, circuitries, and methods are disclosed for identifying, within a call instruction, context registers for storing prior to a jump to another subroutine. In one example, a method includes receiving, while executing a first subroutine, a call instruction that includes a first opcode and identifies a first target address, wherein the first target address stores instructions for performing a second subroutine. A first set of context registers identified by the call instruction is determined and the content of the first set of context registers is stored in first memory allocated for context storage for the first subroutine prior to executing the instruction stored in the first target address.

AUTOMATIC COMPUTE KERNEL GENERATION

Apparatuses, systems, and techniques to receive, by a processor of a computer system, one or more operations for a kernel; automatically generate, by the processor, one or more operators that perform the one or more operations on elements of one or more input data structures; and automatically generate, by the processor, the kernel that comprises the one or more operators.

Information processing apparatus and semiconductor device

A semiconductor device includes three integrated circuits. One of the integrated circuits includes: a first connector configured to connect to a device; and a transmitter. The transmitter is configured to transmit to another integrated circuit, first data on each of a plurality of pieces of packet data. The transmitter is also configured to, when the first connector is connected to the device, while a second controller is performing a second process, transmit, to a first controller, a request to process data transmitted from the device.

Systems and methods for developing digital experience applications

In one implementation, systems and methods are provided for developing a computer-implemented digital experience application having a first and a second micro-application. Each micro-application includes a front end interface configured to receive and display information. The first micro-application includes a first event manager configured to detect an application event belonging to a category, and a first state manager configured to detect an application state belonging to the category. The digital experience application further includes a driver application configured to host the first and second micro-applications, an event hub configured to receive the detected application event from the first micro-application, and a state store configured to store the detected application state received from the first micro-application. The second micro-application includes a second event manager configured to receive the detected application event from the event hub, and a second state manager configured to receive the detected application state from the state store.

METHOD AND SYSTEM FOR COMPOUND APPLICATION VIRTUALIZATION
20180011723 · 2018-01-11 · ·

A method for running an application via an operating system executing on a computing device is disclosed. In an embodiment, the method involves subjecting an API call to a complimentary application virtualization layer, after the API call is subjected to the complimentary application virtualization layer, subjecting the API call to a primary application virtualization layer, and after the API call has been subjected to the complimentary application virtualization layer and to the primary application virtualization layer, forwarding the API call to the operating system for processing in the kernel-space.

Shadow stack violation enforcement at module granularity

Enforcing shadow stack violations at module granularity, rather than at thread or process granularity. An exception is processed during execution of a thread based on code of an application binary, which is enabled for shadow stack enforcement, that calls an external module. The exception results from a mismatch between a return address popped from the thread's call stack and a return address popped from the thread's shadow stack. Processing the exception includes determining that the exception resulted from execution of an instruction in the external module, and determining whether or not the external module is enabled for shadow stack enforcement. Based at least on these determinations, execution of the thread is terminated when the external module is enabled for shadow stack enforcement, or the thread is permitted to continue executing when the external module is not enabled for shadow stack enforcement.

Cloud computing platform that executes third-party code in a distributed cloud computing network

A compute server receives a request from a client device that triggers execution of a third-party code piece. The compute server is one of multiple compute servers that are part of a distributed cloud computing network. The request may be an HTTP request and directed to a zone. A single process at the compute server executes the third-party code piece in an isolated execution environment. The single process is also executing other third-party code pieces in other isolated execution environments respectively. A response is generated to the request based at least in part on the executed third-party code piece, and the generated response is transmitted to the client device.

Information processing apparatus, method of controlling information processing apparatus, and storage medium
11550594 · 2023-01-10 · ·

An information processing apparatus includes a storage unit configured to store at least a first boot program and a second boot program corresponding to the first boot program, a controller configured to read and execute a program, detect, in accordance with occurrence of a read error at reading of the first boot program, an address of a storage area storing a program in which the read error has occurred in the first boot program, and specify, from an address of a storage area storing the second boot program, an address corresponding to the detected address. The controller reads and executes the second boot program stored in the specified address.

Using structured data templates and invocation statements to dynamically define values for efficient data encoding

Structured data templates and invocation statements may be used to dynamically define values, which allows for more efficient data encoding than traditional techniques. A given structured data template may be assigned a template identifier. A writer may generate an invocation statement that references a template identifier for a particular structured data template in order to generate a more compact representation of a structured portion of source data (based on the structured data template matching the structured portion of data). The structured data template may specify that any number of the fields is an “unassigned” field. The invocation statement may specify values for these fields, resulting in a more compact representation of the structured portion of data. The use of an invocation statement and a structured data template eliminates the repetitive scaffolding of an object being written out.

Runtime Environment and Method for Creating an Event-Driven Execution Model of an Industrial Application
20220397875 · 2022-12-15 · ·

A runtime environment for execution of an event driven control program for a distributed control system including one or multiple computing resources, wherein the control program includes at least two function blocks. The runtime environment includes for each computing resource an event executor which is configured for execution of sets of events and respective associated data on the respective computing resource. And wherein the runtime environment includes for each function block a memory resource, which memory resource is configured to: store a set of events and associated data for each function block if the data is produced by the function block; and/or store a reference to a set of events and associated data for each function block if the data is consumed by the function block.