The Architecture of Awakening: From Power Button to Kernel Control

The moment you press the power button on your computer, a complex series of events is triggered to transition the hardware from an inert state to a functional environment. Initially, the CPU operates in a highly primitive mode, lacking any concept of files or memory management. It executes hard-coded instructions at a specific address in the firmware—known as UEFI on modern machines or BIOS on legacy systems. The primary objective of this firmware is to perform basic hardware checks and locate a specialized program on the disk called the bootloader.
Once the bootloader—such as Grub for Linux, iBoot for Mac, or Bootmgr for Windows—is identified, the firmware hands over control. The bootloader's singular mission is to find the operating system's kernel on the storage drive and load it into the system RAM. This transition is critical because it marks the point where the CPU begins running the core code of the operating system with full hardware privileges, allowing it to start building the complex environment we interact with daily.
Key insight: The kernel is the most fundamental part of the OS, acting as the bridge between software applications and the physical hardware of the computer.
| Boot Stage | Primary Responsibility |
|---|---|
| Firmware (UEFI/BIOS) | Initial hardware wake-up and bootloader discovery |
| Bootloader (Grub/iBoot) | Locating and loading the kernel into RAM |
| Kernel Initialization | Establishing memory management and core system structures |
Security and Isolation: The Invisible Walls of Computing

To prevent a single buggy application from crashing the entire system, the operating system employs a concept known as privilege rings. Modern CPUs enforce these levels of authority, primarily distinguishing between Ring 0 (Kernel Mode) and Ring 3 (User Space). The kernel operates in Ring 0 with absolute control over the hardware, while user applications are restricted to Ring 3. This separation ensures that an application cannot directly interfere with hardware or other programs without explicit permission from the kernel.
Another layer of this protection is virtual memory, a sophisticated system where the kernel provides each application with its own isolated memory space. The application believes it has access to a continuous block of memory, but in reality, these are 'fake' addresses. A piece of hardware called the MMU (Memory Management Unit) translates these virtual addresses into physical locations in RAM. This ensures that a web browser cannot read the data of a password manager, effectively keeping every process in its own parallel universe.
ここからが大事な
ポイントです
具体例・注意点・明日から使えるヒントを整理しています。
✨無料閲覧で全文 + 図解の完全版を3日間いつでも読み返せる
この先で、
学びを自分の知識に変える
続きの本文・まとめ図解・FAQ
まで確認できます。
✏️ この記事で学べること
- ▸The sequence of events from hardware power-on to kernel initialization
- ▸Mechanisms of security isolation through CPU privilege rings
10秒で完了・クレカ不要・パスワード作成不要
