图1说明了进程地址空间中的虚拟页如何映射到内存中的物理页帧。
Figure 1 illustrates how virtual pages in a process's address space are mapped to physical page frames in memory.
反向映射提供了一个发现哪些进程正在使用给定的内存物理页的机制。
Reverse mapping provides a mechanism for discovering which processes are using a given physical page of memory.
如何知道哪些页面的内核,在虚拟地址空间对应于一个换出的物理页帧?
How does kernel know, which pages in the virtual address space correspond to a swapped out physical page frame?
Secondly, the book, you can see, one of you had a book here, it's about 1,100 pages and when I learned physics it was, like, 300 pages.
第二点,教材,你们可以看到,这位同学手上就有一本,大概1100页,我当初学物理的时候,教材只有300页
应用推荐