This is not the current version of the class.

Lecture 3

Notes by Alisha Ukani

Virtual Memory

In paper notes: line of code for last diagram:

early_pagetable->entry[0] = early_pagetable->entry[256];
early_pagetable[2].entry[510] = 0 | PTE_P | PTE_W | PTE_PS;
early_pagetable[2].entry[511] = (1 << 30) | PTE_P | PTE_W | PTE_PS;

Where things are

Context switches

WeensyOS

Idea: what if we can teach programmers about privilege by making an analogy to privileged code in the systems context?