当前位置:网站首页>Sub paragraph of Chapter 16
Sub paragraph of Chapter 16
2022-06-13 04:56:00 【CCSUZB】
If we put the entire address space into physical memory , So the space between stack and heap is not
Not used by the process , But it still occupies the actual physical memory .
16.1 piecewise : Generalized base address / boundaries
The segmentation mechanism enables the operating system to put different segments into different physical memory areas , Thus, the unused part of the virtual address space is avoided to occupy the physical memory
Add : Segment error
Segment error refers to an illegal memory access on a machine that supports segmentation . Interestingly , Even on machines that do not support segmentation, the term remains . But if you can't figure out why the code keeps making mistakes , It's not that interesting
16.2 Which paragraph do we quote
The hardware uses segment registers for address translation . How does it know the offset within the segment , And which segment the address refers to ?
So in our example , If the first two are 00, The hardware knows that this is the address of the code segment , So use the base and bounds of the code segment to relocate to the correct physical address . If the first two are 01, Is the heap address , Correspondingly , Use the base and bounds of the heap .
16.3 What about the stack
After the hardware understanding segment can grow in reverse , The address translation of this virtual address must be a little different
16.4 Support sharing
To support sharing , Need some additional hardware support , This is the protection bit (protection bit) . Basically, several bits are added to each segment , Identify whether the program can read and write this segment , Or execute the code .
边栏推荐
- How to understand JS expressions and JS statements
- PowerShell:因为在此系统上禁止运行脚本,解决方法
- On switch() case statement in C language
- Autumn wind, dust, youth
- Chinese trumpet creeper
- Tita performance treasure: remote one-on-one discussion
- Analysis of scoped attribute principle and depth action selector
- Your one-on-one meetings are inefficient. You can do this!
- MySQL8.0.13安装教程(有图)
- The processing flow of thread pool depends on the core parameters
猜你喜欢

Ruoyi cloud startup tutorial (hand-held graphics)

How to use redis

Explain the role of key attribute in V-for

Spice story

Normal distribution (Gaussian distribution)
![[JS solution] leedcode 117 Populate the next right node pointer II for each node](/img/09/9321a3abf9e1118186bb2b101338c9.png)
[JS solution] leedcode 117 Populate the next right node pointer II for each node

Spread your wings and soar

PostgreSQL Guide: inside exploration (Chapter 10 basic backup and point in time recovery) - Notes

利用Javeswingjdbc基于mvc设计系统

QT realizes message sending and file transmission between client and server
随机推荐
Your one-on-one meetings are inefficient. You can do this!
Construction problem of D Xiaohong
rainbow
Brick story
Embedded hardware - read schematic
Red Treasure Book Reading Notes (continuously updated)
Force buckle 25 A group of K flipped linked lists
Force deduction 121 questions
Advantages of win8.1 and win10
UNO
Tita: Xinrui group uses one-to-one talk to promote the success of performance change
PostgreSQL Guide: inside exploration (Chapter 10 basic backup and point in time recovery) - Notes
What is the saturate operation in opencv
josephus problem
Regular expressions in QT
Robot pose description and coordinate transformation
Opencv image storage and reading
How to lay copper in AD (aluminum designer)
如何只用4步,实现一个自定义JDBC驱动?
Vercel uses HTTP caching