In our previous post we successfully setup our development
and build environment, booting a very basic boot loader in QEMU.
In today’s post, we’re going to add some serial integration so that we can see some “signs of life” when our boot
loader runs.
Stack Setup
Before moving on any further, it’ll be a good move for us to setup a temporary stack. It’ll live for as long as our
boot loader lives. We know our boot code is loaded at 0x7C00. The stack grows downward, so we place it below the boot
sector at 0x7000. This keeps it out of the way of our code/data and gives us space to work with. We disable
interrupts while changing SS:SP (an interrupt during this window would push onto an uninitialized stack), then
re-enable them once the stack and data segments are valid.
main:cli; disable interruptsxorax,axmovss,axmovsp,0x7000; stack at 0000:7000 (grows downward)movds,ax; DS = 0 so [label] addresses resolve correctlymoves,ax; ES = 0cld; string ops auto-incrementsti; re-enable interrupts
We make sure we can’t be interrupted while doing this, so we clear the interrupt flag with cli. Next, set up the
stack so that SS:SP points to 0000:7000. Making ds and es point to the same segment as our code 0000
simplifies things for us. cld makes sure that our lods and stos operations always count ascending. Finally, we
re-enable interrupts.
It’ll look something like this:
graph TB
A0["0x0000 — 0x03FF IVT (Interrupt Vector Table)"]
A1["0x0400 — ~0x04FF BDA (BIOS Data Area)"]
A2["..."]
S["0x7000 (SS:SP start) Stack top → grows downward"]
GAP["0x7000 — 0x7BFF Gap (free space)"]
BOOT["0x7C00 — 0x7DFF Boot sector (512 bytes)"]
A3["... up to conventional memory"]
A0 --> A1 --> A2 --> S --> GAP --> BOOT --> A3
Serial
UART (the serial port) is the early
debugging channel that we’ll use. It’s the standard for debugging x86 and embedded work, so it’s perfect for what we’re
doing.
Registers
We write-to and read-from the UART registers to setup communications over serial. Here’s each of the registers.
COM1 is defined at a base-address of 0x3F8. The following map is an offset from that base.
IER or DLM (when DLAB=1) — Interrupt Enable / Divisor Latch High
+2
IIR/FCR — Interrupt ID / FIFO Control
+3
LCR — Line Control (word length, parity, stop, DLAB)
+4
MCR — Modem Control (DTR, RTS, OUT1, OUT2, LOOP)
+5
LSR — Line Status (TX empty, RX ready, etc.)
+6
MSR — Modem Status
+7
SCR — Scratch
Init
We can now walk through the init code for the serial line.
%define COM1 0x3F8
serial_init:; 1) Disable UART-generated interrupts (clear IER)movdx,COM1+1xorax,ax; AL=0outdx,al; IER = 0 (no UART IRQs); 2) Enable DLAB so we can set the baud rate divisormovdx,COM1+3moval,0x80; LCR: DLAB=1outdx,al; 3) Set divisor to 1 -> 115200 baud (on standard PC clock)movdx,COM1+0moval,0x01; DLL = 1outdx,almovdx,COM1+1xoral,al; DLM = 0outdx,al; 4) 8 data bits, no parity, 1 stop bit; clear DLAB to use data regsmovdx,COM1+3moval,0x03; LCR: 8N1 (DLAB=0)outdx,al; 5) Enable FIFO, clear RX/TX FIFOs, set 14-byte RX thresholdmovdx,COM1+2moval,0xC7; FCR: 1100_0111boutdx,al; 6) Modem Control: assert DTR, RTS, and OUT2movdx,COM1+4moval,0x0B; MCR: DTR|RTS|OUT2outdx,alret
Each of these steps is needed in the init phase:
IER=0 (no UART IRQs): We’re going to use polling (check LSR bits) in early boot, so we explicitly disable UART interrupts.
DLAB=1, set divisor: Standard PC UART clock (1.8432 MHz / 16 = 115200). A divisor of 1 yields 115200 baud. Later you can choose 2 (57600), 12 (9600), etc.
LCR=0x03 (8N1): The classic “8 data bits, No parity, 1 stop.” Clearing DLAB returns access to THR/RBR/IER instead of the divisor latches.
FCR=0xC7: Enables the FIFO, clears both FIFOs, and sets the RX trigger level to 14 bytes. (On 8250/16450 parts without FIFOs this is ignored—harmless.)
MCR=0x0B: Asserts DTR and RTS so the other side knows we’re ready; sets OUT2, which on PCs typically gates the UART interrupt line (even if we aren’t using IRQs yet, OUT2 is commonly left on).
Waiting
Because working with UART is asynchronous, we need to wait for the transmitter holding register is ready. So this waits
for the THR empty (bit 5).
Now that we have a way to integrate with the serial line, we can use it to prove signs of life in our bootloader.
After our stack is setup, we can start using these functions.
callserial_init; initialize serialmovsi,msg_alive; si = our string to printcallserial_puts; print the stringhlt; halt.halt:jmp.halt%include "boot/serial.asm" ; serial functions
msg_alivedb"Serialcommunicationsarealive!",0times510-($-$$)db0dw0AA55h
To clean up the boot code, I tucked all of the serial communication code away into an asm file of its own. It’s still
assembled as part of the boot.asm as it’s just text included.
Setting this up for a run, you should see a message in your console.
➜ make run
qemu-system-x86_64 -drive file=os.img,format=raw -serial stdio -debugcon file:debug.log -global isa-debugcon.iobase=0xe9 -display none -no-reboot -no-shutdown -d guest_errors,cpu_reset -D qemu.log
Serial communications are alive!
We are alive!
Conclusion
We have put ourselves in a very strong position with these recent additions. This is an invaluable debugging and
diagnostic tool being able to write breadcrumbs into the console to check where execution has made it to.
We’ll continue to build on this when we return for Stage2.
One of the best ways to learn how computers work is to get as close to the hardware as possible. Writing assembly
language with no other tools or libraries really helps you to understand exactly what makes them tick. I’m building
this article series to walk through the full setup of an x86 system to go from
power on to a minimal running operating system.
I’ll gradually build this from the ground up, introducing concepts as we go through these articles.
Today, we’ll get all the tooling and build environment setup so we can develop comfortably.
Tools
Before we begin, we need some tools installed.
QEMU for virtualising the system that will run our operating system
NASM to be our assembler
Make to manage our build chain
Get these installed on your respective system, and we can get started getting the project directory setup.
Project Setup
First up, let’s create our project directory and get our Makefile and bootloader started.
mkdir byo_os
mkdir byo_os/boot
cd byo_os
Boot loader
A boot loader is the very first piece of software that runs when a computer starts. Its job is to prepare the CPU and
memory so that a full operating system can take over. When the machine powers on, the BIOS (or UEFI) firmware
looks for a bootable program and transfers control to it.
In this tutorial we’re building a BIOS-style boot loader.
When a machine boots in legacy BIOS mode, the firmware reads the first 512 bytes of the boot device — called the
boot sector — into memory at address 0x7C00 and jumps there. Those 512 bytes must end with the magic signature
0xAA55, which tells the BIOS that this sector is bootable. From that point, our code is executing directly on the CPU
in 16-bit real mode, with no operating system or filesystem support at all.
Modern systems use UEFI, which is the successor to BIOS. UEFI firmware looks for a structured executable (a
PE/COFF file) stored on a FAT partition and provides a much richer environment — including APIs for disk I/O,
graphics, and memory services. It’s powerful, but it’s also more complex and hides many of the low-level details we
want to understand.
Starting with BIOS keeps things simple: one sector, one jump, and full control. Once we’ve built a working
real-mode boot loader and kernel, it’ll be easy to explore a UEFI variant later because the CPU initialization concepts
remain the same — only the firmware interface changes.
Here is our first boot loader.
; ./boot/boot.asmORG0x7C00; our code starts at 0x7C00BITS16; we're in 16-bit real modemain:cli; no interruptshlt; stop the processor.halt:jmp.halttimes510-($-$$)db0; pad out to 510 bytesdw0AA55h; 2 byte signature
Our boot loader must be 512 bytes. We ensure that it is with times 510-($-$$) db 0. This directive pads our
boot loader out to 510 bytes, leaving space for the final 2 signature bytes dw 0AA55h which all boot loaders must
finish with.
Building
With this code written, we need to be able to build and run it. Using a Makefile is an easy way to wrap up all of
these actions so we don’t need to remember all of the build steps.
This will build a boot/boot.bin for us, and it will also pack it into an os.img which we will use to run our os.
The key lines in making the os image are the dd and truncate. They get our 512 byte boot sector first in the image,
and then the truncate extends the image to 32 sectors (16 KB total) by padding it with zeros. The extra space
simulates a small disk, leaving room for later stages like a kernel or filesystem. The first 512 bytes remain our boot
sector; the rest is just blank space the BIOS ignores for now.
-drive file=os.img,format=raw Attach a raw disk image as the primary drive. When QEMU boots in BIOS mode, it loads the first sector (the MBR) if it ends with the signature 0xAA55.
-serial stdio redirect the guest’s COM1 serial port (I/O 0x3F8) to this terminal’s stdin/stdout, so any serial output from the guest appears in your console.
-debugcon file:debug.log will dump the debug console into a file called debug.log
-global isa-debugcon.iobase=0xe9 Map QEMU’s simple debug console to I/O port 0xE9. Any out 0xE9, al from your code is appended to debug.log
-display none Disables the graphical display window. No VGA text output will be visible unless you use -nographic, serial, or the 0xE9 debug console
-no-reboot on a guest reboot request, do not reboot; QEMU exits instead (handy for catching triple-fault loops).
-no-shutdown on a guest power-off, don’t quit QEMU; keep it running so logs/console remain available.
-d guest_errors,cpu_reset Enables QEMU’s internal debug logging for guest faults and CPU resets (for example, triple faults). The messages are written to the file specified by -D
-D qemu.log Write QEMU’s debug logs (from -d) to qemu.log instead of stderr.
We will plan to print with BIOS INT 0x10 later on, so this instruction will evolve as we go.
Running
Let’s give it a go.
By running make you should see output like this:
➜ make
nasm -f bin boot/boot.asm -o boot/boot.bin
rm -f os.img
dd if=boot/boot.bin of=os.img bs=512 count=1 conv=notrunc
1+0 records in
1+0 records out
512 bytes copied, 9.4217e-05 s, 5.4 MB/s
truncate -s $((32*512)) os.img
You can then run this make run:
➜ make run
qemu-system-x86_64 -drive file=os.img,format=raw -serial stdio -debugcon file:debug.log -global isa-debugcon.iobase=0xe9 -display none -no-reboot -no-shutdown -d guest_errors,cpu_reset -D qemu.log
And there you have it. Our bootloader ran very briefly, and now our machine is halted.
Conclusion
We’ve managed to setup our build environment and get a very simple boot loader being executed by QEMU. In further
tutorials we’ll look at integrating the serial COM1 ports so that we can get some signs of life reported out to the
console.
The Naive Bayes classifier is one of the simplest algorithms in machine learning, yet it’s surprisingly powerful.
It answers the question:
“Given some evidence, what is the most likely class?”
It’s naive because it assumes that features are conditionally independent given the class. That assumption rarely
holds in the real world — but the algorithm still works remarkably well for many tasks such as spam filtering, document
classification, and sentiment analysis.
At its core, Naive Bayes is just counting, multiplying probabilities, and picking the largest one.
Bayes’ Rule Refresher
First, let’s start with a quick definition of terms.
Class is the label that we’re trying to predict. In our example below, the class will be either “spam” or “ham”
(not spam).
The features are the observed pieces of evidence. For text, features are usually the words in a message.
P is shorthand for “probability”.
P(Class) = the prior probability: how likely a class is before seeing any features.
P(Features | Class) = the likelihood: how likely it is to see those words if the class is true.
P(Features) = the evidence: how likely the features are overall, across the classes. This acts as a normalising constant so probabilities sum to 1.
So both classes land on the same score — a perfect tie, in this example.
Python Demo (from scratch)
Here’s a tiny implementation that mirrors the example above:
fromcollectionsimportCounter,defaultdict# Training data
docs=[("spam","buy cheap"),("spam","cheap pills"),("ham","meeting schedule"),("ham","project meeting"),]class_counts=Counter()word_counts=defaultdict(Counter)# Build counts
forlabel,textindocs:class_counts[label]+=1forwordintext.split():word_counts[label][word]+=1defclassify(text,alpha=1.0):words=text.split()scores={}total_docs=sum(class_counts.values())vocab={wforcountsinword_counts.values()forwincounts}V=len(vocab)forlabelinclass_counts:# Prior
score=class_counts[label]/total_docstotal_words=sum(word_counts[label].values())forwordinwords:count=word_counts[label][word]# Laplace smoothing
score*=(count+alpha)/(total_words+alpha*V)scores[label]=score# Pick the class with the highest score
returnmax(scores,key=scores.get),scoresprint(classify("cheap project"))print(classify("project schedule"))print(classify("cheap schedule"))
As we predicted earlier, "cheap project" is a tie, while "project schedule" is more likely ham. Finally, "cheap schedule"
is noted as spam because it uses stronger spam trigger words.
Real-World Notes
Naive Bayes is fast, memory-efficient, and easy to implement.
Works well for text classification, document tagging, and spam filtering.
The independence assumption is rarely true, but it doesn’t matter — it often performs surprisingly well.
In production, you’d tokenize better, remove stop words, and work with thousands of documents.
Conclusion
Building a Naive Bayes classifier from first principles is a great exercise because it shows how machine learning can be
just careful counting and probability. With priors, likelihoods, and a dash of smoothing, you get a surprisingly useful
classifier — all without heavy math or libraries.
A Bloom filter is a tiny, probabilistic memory that answers “Have I seen this before?” in constant time. It never lies
with a false negative—if it says “no”, the item was definitely never added. But to save huge amounts of space versus
storing all items, it allows false positives—sometimes it will say “probably yes” when collisions happen.
The trick is simple: keep a row of bits and, for each item, flip a small handful of positions chosen by hash functions.
Later, check those same positions. Any zero means “definitely not”; all ones means “probably yes.” With just a few
bytes, Bloom filters help databases skip disk lookups, caches dodge misses, and systems answer membership queries
blazingly fast.
Pen & Paper Example
Let’s build the smallest possible Bloom filter: 10 bits, indexed 0–9.
We’ll use two playful “hash” functions:
h1(word) = (sum of letter positions) % 10 (a=1, b=2, …, z=26)
h2(word) = (len(word) * 3) % 10
To insert a word, flip bits h1(word) and h2(word) to 1.
To query, compute the same bits:
If any bit is 0 → definitely not present
If both are 1 → probably present
With these rules in place, we can start to insert some words.
Our toy version used silly hash rules. Real implementations use cryptographic hashes and multiple derived functions.
Here’s a slightly more realistic snippet using double hashing from SHA-256 and MD5:
This implementation will allow you to filter much more complex (and longer) content. The wider your bit field is, and the
more complex your hashing algorithms are, the better bit distribution you will get. This gives you a lower
chance of false positives, improving the overall performance of the data structure.
Conclusion
Bloom filters are elegant because of their simplicity: flip a few bits when adding, check those bits when querying.
They trade absolute certainty for massive savings in memory and time. They’re everywhere—from browsers to databases to
networking—and now, thanks to a handful of cat, dog, and cow, you know how they work.
If you’ve spent any time in Haskell or FP circles, you’ll have run into the terms Functor, Applicative, and
Monad. They can sound mysterious, but at their core they’re just design patterns for sequencing computations.
Python isn’t a purely functional language, but we can still capture these ideas in code. In this post, we’ll build a
full Maybe type in Python: a safe container that represents either a value (Some) or no value (Nothing). We’ll
compare it with the Haskell version along the way.
A full runnable demo of the code presented here is available as a gist up on GitHub.
Maybe
We start of with our box or context. In our case today, we might have a value in the box (Some) or the box
maybe empty (Nothing). Because both of these are derivatives of the same thing, we create a base class of Maybe.
Our Maybe class here defines all of the operations we want to be able to perform on this datatype, but does not
implement any of them; leaving the implementation to be filled in my the derivatives. You can expect the implementations
between these derived classes to be quite different to each other.
We should end up with something like this:
classDiagram
class Maybe {
+map(f)
+ap(mb)
+bind(f)
}
class Some {
+value: T
}
class Nothing
Maybe <|-- Some
Maybe <|-- Nothing
Functor: Mapping over values
A Functor is anything you can map a function over. In Haskell, the generic Functor version of this is called
fmap:
fmap(+1)(Just10)-- Just 11fmap(+1)Nothing-- Nothing
The flow of values through map (or fmap) looks like this:
A Monad takes things further: it lets us chain together computations that themselves return a Maybe.
In Haskell, this is the >>= operator (bind):
halfIfEven::Int->MaybeInthalfIfEvenx=ifevenxthenJust(x`div`2)elseNothingJust10>>=halfIfEven-- Just 5Just3>>=halfIfEven-- Nothing
Here we’re chaining a computation that itself returns a Maybe. If the starting point is Nothing, or if the
function returns Nothing, the whole chain collapses.
flowchart LR
S[Some x] --bind f--> FOUT[Some y]
S --bind g--> GOUT[Nothing]
N[Nothing] --bind f--> NRES[Nothing]
Notice how the “empty box” propagates: if at any point we hit Nothing, the rest of the chain is skipped.
You’ll also see a common pattern emerging with all of the implementations for Nothing. There’s no computation. It’s
simply just returning itself. As soon as you hit Nothing, you’re short-circuited to nothing.
Do Notation (Syntactic Sugar)
Haskell makes monadic code look imperative with do notation:
doa<-Just4b<-halfIfEvenareturn(a+b)
In Python, we can approximate this style using a generator-based decorator. Each yield unwraps a Maybe, and the
whole computation short-circuits if we ever see Nothing.
This isn’t strictly necessary, but it makes larger chains of monadic code read like straight-line Python.
Wrapping Up
By porting Maybe into Python and implementing map, ap, and bind, we’ve seen how Functors, Applicatives, and
Monads aren’t magic at all — just structured patterns for working with values in context.
Functor: apply a function inside the box.
Applicative: apply a function that’s also in a box.
Monad: chain computations that each return a box.
Haskell bakes these ideas into the language; in Python, we can experiment with them explicitly. The result is safer,
more composable code — and maybe even a little functional fun.