frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

How to Defend Against NPM Software Supply Chain Attacks

https://www.endorlabs.com/learn/how-to-defend-against-npm-software-supply-chain-attacks
1•danielhaven•2m ago•0 comments

North Carolina Town First to Deploy Defibrillator Drones During Emergencies

https://gizmodo.com/north-carolina-town-first-in-u-s-to-deploy-defibrillator-drones-during-actual...
1•JumpCrisscross•3m ago•0 comments

The Computer Wants to Lose Your Data: Bonus Bits

https://blog.sinjakli.co.uk/2025/11/29/the-computer-wants-to-lose-your-data-bonus-bits/
1•todsacerdoti•9m ago•0 comments

The Long Read: Heretics in the Temple of Educational Orthodoxy

https://rogerpartridge.substack.com/p/heretics-in-the-temple-of-educational
1•toomuchtodo•12m ago•0 comments

MAME 0.283

https://www.mamedev.org/?p=557
1•chungy•16m ago•1 comments

"Look on every exit as being an entrance somewhere else" – Tom Stoppard died

https://www.bbc.com/news/articles/c74xe49q7vlo
1•mstep•17m ago•0 comments

Show HN: Bingelister – a chronological YouTube channel player

http://bingelister.com
1•zurbaran•17m ago•0 comments

What We Know About the DOE's New Genesis Mission

https://www.hpcwire.com/2025/11/26/heres-what-we-know-about-the-does-new-genesis-mission/
1•rbanffy•22m ago•0 comments

AI-Revived Cube World

1•liangzn•23m ago•0 comments

Wikidata-Toolkit: Java library to interact with Wikibase

https://github.com/Wikidata-Toolkit/Wikidata-Toolkit
1•amadeuspagel•26m ago•0 comments

Claude 4.5 Opus' Soul Document

https://www.lesswrong.com/posts/vpNG99GhbBoLov9og/claude-4-5-opus-soul-document
1•mcculley•26m ago•0 comments

Robert A.M. Stern, Architect Who Reinvented Prewar Splendor, Dies at 86

https://www.nytimes.com/2025/11/27/arts/design/robert-am-stern-dead.html
1•bookofjoe•27m ago•1 comments

Retrobright Damages Plastics – 10 Year Test [video]

https://www.youtube.com/watch?v=_n_WpjseCXA
1•zdw•29m ago•0 comments

The AI Hallucination Debate Is Missing the Point

https://maxbraglia.substack.com/p/the-ai-hallucination-debate-is-missing-the-point
1•maxtermed•30m ago•3 comments

Copper Thieves Are Wreaking Havoc Across America

https://www.wsj.com/business/telecom/copper-thieves-are-wreaking-havoc-across-america-9135906f
4•JumpCrisscross•31m ago•0 comments

Smart City Data Walks Reveal Privacy Concerns

https://spectrum.ieee.org/smart-city-personal-data-collection
2•rbanffy•33m ago•0 comments

Bfs: A breadth-first version of the Unix find command

https://github.com/tavianator/bfs
2•birdculture•35m ago•0 comments

Airbus calls for 'immediate' software upgrade to A320 aircraft

https://www.npr.org/2025/11/28/nx-s1-5624379/airbus-software-upgrade-a320-aircraft
2•manveerc•35m ago•1 comments

Chatrooms with a 24 Life Time

https://cobbic.com
1•gochistuff•38m ago•1 comments

First debris pieces from the Indian ASAT test of 27 March catalogued

https://sattrackcam.blogspot.com/2019/04/first-debris-pieces-from-indian-asat.html
1•fanf2•38m ago•0 comments

Show HN: Rust CLI validates scientific datasets for DOE's Genesis Mission

https://github.com/clay-good/genesis-preflight
1•hireclay•40m ago•0 comments

Show HN: A neuro-symbolic manufacturing engine built in 1 week with Gemini 3.0

https://github.com/globalhawk04/OpenForge
1•knightbat2004•43m ago•0 comments

Even Feminists Can Build Sexist Worlds

https://mythcreants.com/blog/how-even-feminists-can-build-sexist-worlds/
4•BerislavLopac•44m ago•2 comments

Morgan Stanley Warns Oracle Credit Protection Nearing Record High

https://finance.yahoo.com/news/morgan-stanley-warns-oracle-credit-215223845.html
8•zerosizedweasle•44m ago•1 comments

Airbus A320 Software updates using PDL

https://old.reddit.com/r/cyberDeck/comments/1p9rafp/airbus_a320_software_updates_using_pdl/
3•throwaway270925•47m ago•0 comments

Landlock-Ing Linux

https://blog.prizrak.me/post/landlock/
11•razighter777•50m ago•3 comments

High Bandwidth Flash is years away despite its promise

https://blocksandfiles.com/2025/11/27/stacked-layers-of-stacked-layers-hbf-capacity-and-complexity/
4•rbanffy•52m ago•0 comments

Show HN: Free tool to reduce the size of images

https://simple.photo/tools/format
1•vladoh•54m ago•1 comments

The Clade folding text editor

https://tibleiz.net/clade/
4•todsacerdoti•55m ago•0 comments

The Steam client is now 64-bit on Windows 11 and Windows 10 64-bit

https://store.steampowered.com/news/group/4397053/view/599669707226744433
12•aoli-al•55m ago•2 comments
Open in hackernews

Writing a Self-Mutating x86_64 C Program (2013)

https://ephemeral.cx/2013/12/writing-a-self-mutating-x86_64-c-program/
118•kepler471•6mo ago

Comments

belter•6mo ago
I guess in OpenBSD because of W ^ X this would not work?
akdas•6mo ago
I was thinking the same thing. Usually, you'd want to write the new code to a page that you mark as read and write, then switch that page to read and execute. This becomes tricky if the code that's doing the modifying is in the same page as the code being modified.
timewizard•6mo ago
The way it's coded it wouldn't; however, you can map the same shared memory twice. Once with R|W and a second time with R|X. Then you can write into one region and execute out of it's mirrored mapping.
rkeene2•6mo ago
In Linux it also needs mprotect() to change the permissions on the page so it can write it. The OpenBSD man page[0] indicate that it supports this as well, though notes that not all implementations are guaranteed to allow it, but my guess is it would generally work.

[0] https://man.openbsd.org/mprotect.2

Retr0id•6mo ago
It's not required on linux, if the ELF headers are set up such that the page is mapped rwx to begin with. (but rwx mappings are generally frowned upon from a security perspective)
mananaysiempre•6mo ago
Not as is, but I think OpenBSD permits you to map the same memory twice, once as W and once as X (which would be a reasonable hoop to jump through for JITs etc., except there’s no portable way to do it). ARM64 MacOS doesn’t even permit that, and you need to use OS-specific incantations[1] that essentially prohibit two JITs coexisting in the same process.

[1] https://developer.apple.com/documentation/apple-silicon/port...

saagarjha•6mo ago
No, the protection is per-thread. You can run the JITs in different threads
alcover•6mo ago
I often think this could maybe allow fantastic runtime optimisations. I realise this would be hardly debuggable but still..
Retr0id•6mo ago
It already does, in the form of JIT compilation.
alcover•6mo ago
OK but I meant in already native code, like in a C program - no bytecode.
Retr0id•6mo ago
I mean that, too.
connicpu•6mo ago
LuaJIT has a wonderful dynamic code generation system in the form of the DynASM[1] library. You can use it separately from LuaJIT for dynamic runtime code generation to create machine code optimized for a particular problem.

[1]: https://luajit.org/dynasm.html

lmm•6mo ago
If you are generating or modifying code at runtime then how is that different from bytecode? Standardised bytecodes and JITs are just an organised way of doing the same thing.
vbezhenar•6mo ago
I used GNU lightning library once for such optimisation. I think it was ICFPC 2006 task. I had to write an interpreter for virtual machine. Naive approach worked but was slow, so I decided to speed it up a bit using JIT. It wasn't a 100% JIT, I think I just implemented it for loops but it was enough to tremendously speed it up.
userbinator•6mo ago
Programs from the 80s-90s are likely to have such tricks. I have done something similar to "hardcode" semi-constants like frame sizes and quantisers in critical loops related to audio and video decompression, and the performance gain is indeed measurable.
alcover•6mo ago
> "hardcode" semi-constants

You mean you somehow avoided a load. But what if the constant was already placed in a register ? Also how could you pinpoint the reference to your constant in the machine code ? I'm quite profane about all this.

ronsor•6mo ago
> Also how could you pinpoint the reference to your constant in the machine code?

Not OP, but often one uses an easily identifiable dummy pattern like 0xC0DECA57 or 0xDEADBEEF which can be substituted without also messing up the machine code.

mananaysiempre•6mo ago
If you’re willing to parse object files (a much easier proposition for ELF than for just about anything else), another option is to have the source code mention the constants as addresses of external symbols, then parse the relocations in the compiled object. Unfortunately, I’ve been unable to figure out a reliable recipe to get a C compiler to emit absolute relocations in position-independent code, even after restricting myself to GCC and Clang for x86 Linux; in some configurations it works and in others you (rather pointlessly) get a PC-relative one followed by an add.
userbinator•6mo ago
All the registers were already taken.

You use a label.

econ•6mo ago
The 80's:

Say you set a value for some reason. Later you have to check IF it is set. If the condition needs to be checked many times you replace it with the code (rather than set a value to check some place). If you need to check if something is still true repeatedly you replace the condition check with no-ops when it isn't true.

Also funny are insanely large loop unrolls with hard coded valued. You could make a kind of rainbow table of those.

barchar•6mo ago
It sometimes can, but you then have to balance the time spent optimizing against the time spent actually doing whatever you were optimizing.

Also on modern chips you must wait quite a number of cycles before executing modified code or endure a catastrophic performance hit. This is ok for loops and stuff, but makes a lot of the really clever stuff pointless.

The debuggers software breakpoints _are_ self-modifying code :)

112233•6mo ago
Linux kernel had the same idea, and now they have "static keys". It's both impressive and terrifying.
oxcabe•6mo ago
It's impressive how well laid out the content in this article is. The spacing, tables, and code segments all look pristine to me, which is especially helpful given how dense and technical the content is.
AStonesThrow•6mo ago
It was designed by Elves on Christmas Island where Dwarves run the servers and Hobbits operate the power plant
f1shy•6mo ago
I have the suspicion that there is a high correlation between how organized the content is, and how organized and clear the mind of the writer is.
ivanjermakov•6mo ago
I had a great experience writing self modified programs is a single instruction programming game SIC-1: https://store.steampowered.com/app/2124440/SIC1/
ycombinatrix•6mo ago
Cool recommendation, will give it a try.
Someone•6mo ago
Fun article, but the resulting code is extremely brittle:

- assumes x86_64

- makes the invalid assumption that functions get compiled into a contiguous range of bytes (I’m not aware of any compiler that violates that, but especially with profile-guided optimization or compilers that try to minimize program size, that may not be true, and there is nothing in the standard that guarantees it)

- assumes (as the article acknowledges) that “to determine the length of foo(), we added an empty function, bar(), that immediately follows foo(). By subtracting the address of bar() from foo() we can determine the length in bytes of foo().”. Even simple “all functions align at cache lines” slightly violates that, and I can see a compiler or a linker move the otherwise unused bar away from foo for various reasons.

- makes assumptions about the OS it is running on.

- makes assumptions about the instructions that its source code gets compiled into. For example, in the original example, a sufficiently smart compiler could compile

  void foo(void) {
    int i=0;
    i++;
    printf("i: %d\n", i);
  }
as

  void foo(void) {
    printf("1\n");
  }
or maybe even

  void foo(void) {
    puts("1");
  }
Changing compiler flags can already break this program.

Also, why does this example work without flushing the instruction cache after modifying the code?

nekitamo•6mo ago
For the mainstream OSes (Windows, OSX, Linux Android) You don't need to flush the instruction cache on most x86 CPUs after modifying the code segment dynamically, but you do on ARM and MIPS.

This has burned me before while writing a binary packer for Android.

saagarjha•6mo ago
They check all those assumptions by disassembling the code.
Cloudef•6mo ago
> self-modifying code > brittle

I mean that is to be very much expected, unless someone comes up with a programming language that fully embraces the concept.

znpy•6mo ago
The author clearly explained that the whole article is more a demonstration for illustrative purposes than anything else.

> Changing compiler flags can already break this program.

That's not the point of the article.

xixixao•6mo ago
I’ve been thinking a lot about this topic lately, even studying how executables look on arm macOS. My motivation was exploring truly fast incremental compilation for native code.

The only way to do this now on macOS is remapping whole pages as JIT. This makes it quite a challenge but still it might work…

Cloudef•6mo ago
Kaze Emanuar's "Optimizing with Bad Code" video also goes briefly go through self-modifying code https://www.youtube.com/watch?v=4LiP39gJuqE
pfdietz•6mo ago
A program that can generate, compile, and execute new code is nothing special in the Common Lisp world. One can build lambda expressions, invoke the compile function on them, and call the resulting compiled functions. One can even assign these functions to the symbol-function slot of symbols, allowing them to be called from pre-existing code that had been making calls to that function named by that symbol.
BenjiWiebe•6mo ago
I know that no other language can match Lisp, but many languages can generate and execute new code, if they're interpreted. Compile, too, if they're JITted. They all require quite a bit of runtime support though.
DrZhvago•6mo ago
Someone correct me if I am wrong, but self-mutating code is not as uncommon as the author portrays it. I thought the whole idea of hotspot optimization in a compiler is essentially self-mutating code.

Also, I spent a moderately successful internship at Microsoft working on dynamic assemblies. I never got deep enough into that to fully understand when and how customers where actually using it.

https://learn.microsoft.com/en-us/dotnet/fundamentals/reflec...

iamcreasy•5mo ago
Is it possible to mutate the text segment by another process? For example, injecting something malicious instead of exec-ing a shell?