Joonas Bergius 8/2/2020

Restore accidentally deleted/replaced binary of a running process

Read Original

The article details a technical challenge where the author accidentally overwrote a buggy build system binary, creating a chicken-and-egg problem. It explains the solution: identifying the running process's PID, examining /proc/[pid]/maps to find the memory-mapped executable regions, and dumping the binary from /proc/[pid]/map_files/ to restore the working version.

Restore accidentally deleted/replaced binary of a running process

Comments

No comments yet

Be the first to share your thoughts!

Browser Extension

Get instant access to AllDevBlogs from your browser

Top of the Week

1
The Beautiful Web
Jens Oliver Meiert 2 votes
3
LLM Use in the Python Source Code
Miguel Grinberg 1 votes
4
Wagon’s algorithm in Python
John D. Cook 1 votes