Many applications and libraries are distributed in an intermediate format, such as the MICROSOFT® Intermediate Language (MSIL). These intermediate language binaries (also known as managed assemblies in the case of MICROSOFT® .NET) are typically compiled dynamically at runtime in a virtual machine environment using a Just-in-Time (JIT) compiler. An alternative to dynamic compilation is pre-compilation via Native Generation (NGen). NGen generates machine code and runtime data structures from the intermediate language and persists them in files on disk. The images produced by NGen are called Native or NGen images. Unlike JIT-compiled code, code and data structures in NGen images can be shared across processes. For libraries and frameworks that are typically shared across multiple processes, NGen is extremely useful since it minimizes the working set of each managed process. NGen therefore reduces the overall memory utilization of the system. NGen is also very useful for minimizing start up time of client-side applications.
Several managed platforms/applications are using NGen. Unfortunately, however, it is quite difficult to use NGen in these current platforms. One difficulty that NGen introduces is with servicing. NGen images are persisted on disk, and have to be regenerated as the corresponding intermediate language binaries get updated. Pre-compilation via NGen introduces a servicing burden, which is made worse by the fact that NGen images are “servicing-unfriendly”. One of the biggest issues with servicing NGen images is the fact that servicing an intermediate language binary not only requires the corresponding NGen image to be regenerated, but also requires all intermediate language binaries that depended on the serviced binary to be recompiled. Therefore servicing a binary that a large number of intermediate language binaries depend upon, on a machine that has a lot of managed applications and NGen images, can result in long servicing events or long periods of background compilation which consume machine resources and adversely impact managed application performance.
Various technologies and techniques are disclosed that provide targeted patching for native generation images. Changed binaries are updated with information that indicates whether or not they contain safe changes. In one implementation, the updated binary is compared to an older version of the binary to determine what changed. The changes are then compared to a list of safe changes to determine if the changes are safe, and if so, the binary is updated with information such as an indicator to designate it as safe.
A servicing process can then be provided for a client machine. For any binaries with changes that have been identified as safe, a native generation update is performed that includes recompilation of the binaries with the safe changes, and an updating of binding information for any dependent binaries. For any non-compatible binaries with changes that have been identified as unsafe, a native generation update is performed that includes recompilation of any non-compatible binaries and any dependent binaries.
This Summary was provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
For the purposes of promoting an understanding of the principles of the invention, reference will now be made to the embodiments illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope is thereby intended. Any alterations and further modifications in the described embodiments, and any further applications of the principles as described herein are contemplated as would normally occur to one skilled in the art.
The system may be described in the general context as an application that generates and updates native images (NGen images) in a virtual machine environment, but the system also serves other purposes in addition to these. In one implementation, one or more of the techniques described herein can be implemented as features within a framework program such as MICROSOFT® .NET Framework, Java Virtual Machine, or from any other type of program or service that deals with an intermediate language and then needs to compile that intermediate language into machine code for execution on a target machine.
In one implementation, a native generation application is provided that supports targeted patching which minimizes the number and frequency of binaries that need to be recompiled. Certain types of changes are identified as being safe changes, and any time binaries are modified with changes that only include safe changes, they can be marked with an indicator that notes their dependent binaries can still operate without recompilation.
As shown in
Additionally, device 100 may also have additional features/functionality. For example, device 100 may also include additional storage (removable and/or non-removable) including, but not limited to, magnetic or optical disks or tape. Such additional storage is illustrated in
Computing device 100 includes one or more communication connections 114 that allow computing device 100 to communicate with other computers/applications 115. Device 100 may also have input device(s) 112 such as keyboard, mouse, pen, voice input device, touch input device, etc. Output device(s) 111 such as a display, speakers, printer, etc. may also be included. These devices are well known in the art and need not be discussed at length here. In one implementation, computing device 100 includes native generation application 200. Native generation application 200 will be described in further detail in
Turning now to
Native generation application 200 includes program logic 204, which is responsible for carrying out some or all of the techniques described herein. Program logic 204 includes logic for generating binaries on the client from object-oriented libraries and storing them on disk 206; logic for executing the binaries from disk 208; logic for providing a servicing mechanism that allows the object-oriented libraries and application to be serviced with little client compilation and with later execution performance comparable to native code 210; and other logic for operating the application 220. In one implementation, program logic 204 is operable to be called programmatically from another program, such as using a single call to a procedure in program logic 204.
Turning now to
The system adds additional information to the updated version to indicate compatibility with the original version (stage 278). In one implementation, the additional information is a resource (e.g. called TP info) that is added to the updated version of the binary to indicate that it is compatible with the original version. Numerous other types of additional information could be added to the binary to mark it as having “safe changes”. If the changes are not determined to be safe (decision point 276), then the process ends at end point 280.
Turning now to
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. All equivalents, changes, and modifications that come within the spirit of the implementations as described herein and/or by the following claims are desired to be protected.
For example, a person of ordinary skill in the computer software art will recognize that the client and/or server arrangements, user interface screen content, and/or data layouts as described in the examples discussed herein could be organized differently on one or more computers to include fewer or additional options or features than as portrayed in the examples.
Number | Name | Date | Kind |
---|---|---|---|
5519866 | Lawrence et al. | May 1996 | A |
5586328 | Caron et al. | Dec 1996 | A |
5842017 | Hookway et al. | Nov 1998 | A |
5854932 | Mariani et al. | Dec 1998 | A |
5916308 | Duncan et al. | Jun 1999 | A |
5966539 | Srivastava et al. | Oct 1999 | A |
5978585 | Crelier | Nov 1999 | A |
6289506 | Kwong et al. | Sep 2001 | B1 |
6484313 | Trowbridge et al. | Nov 2002 | B1 |
6658421 | Seshadri | Dec 2003 | B1 |
6973646 | Bordawekar et al. | Dec 2005 | B1 |
7496912 | Keller et al. | Feb 2009 | B2 |
20050091347 | Schmitt et al. | Apr 2005 | A1 |
20060080656 | Cain et al. | Apr 2006 | A1 |
20060117310 | Daniels et al. | Jun 2006 | A1 |
20060130040 | Subramanian et al. | Jun 2006 | A1 |
20060184652 | Teodosiu et al. | Aug 2006 | A1 |
20060248097 | Pritchard et al. | Nov 2006 | A1 |
20070011666 | Tan | Jan 2007 | A1 |
Number | Date | Country | |
---|---|---|---|
20080320456 A1 | Dec 2008 | US |