?
Solved

Where are the pre-JITted assemblies stored and how long?

Posted on 2004-08-01
4
Medium Priority
?
272 Views
Last Modified: 2008-01-09
Hello Friends,

I was reading that GAC stores the pre-JITted assemblies too, apart from the global assemblies. Is that true? Why are they stored in GAC if they are not global? How long are they stored here?

Also, if GAC stores ever the regular pre-JITted assemblies, why don't I see the assemblies that I create on my machine. I use the default JITter.

Thanks,
Srinivas
0
Comment
Question by:srinivas_vemla
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 37

Expert Comment

by:gregoryyoung
ID: 11689591
it happens when you run ngen.exe which creates a full native image of the managed assembly. There is a seperate part of the gac which is reserved to hold native images http://msdn.microsoft.com/library/default.asp?url=/library/en-us/cptools/html/cpgrfnativeimagegeneratorngenexe.asp 
0
 

Author Comment

by:srinivas_vemla
ID: 11689800
Why would I run Ngen? Is that the install-time JIT functionality?
0
 

Author Comment

by:srinivas_vemla
ID: 11689813
Sorry, please ignore my last comment...

I just meant to ask, what these "Native images" are and how are they different from normal assemblies?

Also, say I have a HelloWorld.cs, and I compile it and create an assembly and then run it. The JIT has to cache it, right? Where is this cached?

Thanks,
Srinivas
0
 
LVL 37

Accepted Solution

by:
gregoryyoung earned 400 total points
ID: 11689838
they are precompiled to native code ...

JIT is just in time compiling ... the assembly is compiled as needed (generally stored in memory)

with an ngen'ed image ... all of that compilation is all pre-done ... thus JIT is not performed.
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

More often than not, we developers are confronted with a need: a need to make some kind of magic happen via code. Whether it is for a client, for the boss, or for our own personal projects, the need must be satisfied. Most of the time, the Framework…
Today I had a very interesting conundrum that had to get solved quickly. Needless to say, it wasn't resolved quickly because when we needed it we were very rushed, but as soon as the conference call was over and I took a step back I saw the correct …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question