当前位置:网站首页>Virtual address space
Virtual address space
2022-06-22 04:49:00 【Soy sauce;】
1. Concept
Every process Will allocate virtual address space , stay 32 On the bit machine , The address space is 4G . It is usually stored in virtual form , When an application uses a virtual address to access memory /a.out perform ,mmu Convert the virtual address to the physical address to execute ( Normal files are stored on disk )
Segment error : Illegal memory access , Kernel space is protected
The heap space must be released after storage 
The pointer variable in the process , What is saved is the virtual address . When an application uses a virtual address to access memory , processor (CPU) Will convert it to a physical address (MMU).
MMU: Convert virtual addresses to physical addresses .
The advantage of doing so is :
Process isolation , Better protect the safe operation of the system
Shielding the troubles caused by physical differences , It is convenient for the operating system and compiler to arrange the process address
Recommend a good article
https://www.cnblogs.com/clover-toeic/p/3754433.html
边栏推荐
- 基于深度学习的目标检测算法面试必备(RCNN~YOLOv5)
- [you don't understand the routing strategy? Try it!]
- LeetCode——二叉搜索树的第k大节点(借助中序遍历)
- Systematic arrangement | how many children's shoes have forgotten to be done carefully before the model development (practical operation)
- MySQL common SQL
- 【sdx12】使用QCMAP_CLI启动WiFi操作说明
- 10道不得不会的 Redis 面试题
- Spark - executor initialization &
- QML control types: swipeview, pageindicator
- 网页设计与制作期末大作业报告——小众音乐网站
猜你喜欢
![[details] domestic website filing process and steps](/img/be/be74c1e586ff01403fcafff19a462a.jpg)
[details] domestic website filing process and steps

中闽在线:以“积分”为纽带 共享线上渠道资源

The Impossible Triangle of NLP?

IDS interview questions collection data structure + penetration avalanche + persistence + memory elimination strategy + database double write + Sentinel

New chief maintenance personnel for QT project

ORA-15063: ASM discovered an insufficient number of disks for diskgroup 恢複---惜分飛

Redis 主从复制
![[you don't understand the routing strategy? Try it!]](/img/f6/dfc233af83d04870b46b7279690660.png)
[you don't understand the routing strategy? Try it!]

系统整理|这个模型开发前的重要步骤有多少童鞋忘记细心做好(实操)

Golang concise architecture practice
随机推荐
The best time to climb a ladder & sell shares (notes of the runner)
【科研笔记】关于使用openslide切图的下采样倍数
Digital economy Wang Ning teaches you how to correctly choose short-term investment
爬梯子&&卖卖股份的最佳时期(跑路人笔记)
The application of RPC technology and its framework sekiro in crawler reverse, encrypting data is a shuttle!
go学习(一、基础语法)
ln n, n^k , a^n, n!, The limit problem of n^n
Cloud function realizes fuzzy search function
JUC - thread interrupt and thread waiting and wakeup (locksupport)
After the active RM machine is powered off, RM ha switching is normal. However, the cluster resources cannot be viewed on the yarnui, and the application is always in the accepted state.
Some details
Daily question: the difference between ArrayList and LinkedList
Mongo fuzzy query, with special characters that need to be escaped, and then query
Take you to develop an efficiency enhancing tool -- vscode plug-in
Windows10 cannot access LAN shared folder
Great! Huaibei and Huaibei enterprises are approved to use special marks for geographical indication products
招贤纳士-第23期
Large website technology architecture | application server security defense
New chief maintenance personnel for QT project
Tencent一面