Changes

m
Add support for memfd_secret file descriptors
Line 1: Line 1:  +
=== Add support for memfd_secret file descriptors ===
 +
 +
'''Summary:''' Support C/R of memfd_secret descriptors
 +
 +
There is memfd_secret syscall which allows user to open
 +
special memfd which is backed by special memory range which
 +
is inaccessible by another processes (and the kernel too!).
 +
 +
At the moment CRIU can't dump processes that have memfd_secret's opened.
 +
 +
'''Links:'''
 +
* https://lwn.net/Articles/865256/
 +
* https://warusadura.github.io/gsoc23-final-report.html
 +
* https://github.com/checkpoint-restore/criu/pull/2247
 +
 +
'''Details:'''
 +
* Skill level: intermediate
 +
* Language: C
 +
* Expected size: 350 hours
 +
* Mentors: Alexander Mikhalitsyn <alexander@mihalicyn.com>, Mike Rapoport <mike.rapoport@gmail.com>
 +
* Suggested by: Alexander Mikhalitsyn <alexander@mihalicyn.com>
 +
 +
=== Forensic analysis of container checkpoints ===
 +
 +
'''Summary:''' Extending go-crit with capabilities for forensic analysis
 +
 +
'''Merged:''' https://github.com/checkpoint-restore/checkpointctl
 +
 +
The go-crit tool was created during GSoC 2022 to enable analysis of CRIU [[images]] with tools written in Go. It allows container management tools such as [https://github.com/checkpoint-restore/checkpointctl checkpointctl] and Podman to provide capabilities similar to CRIT. The goal of this project is to extend go-crit with functionality for forensic analysis of container checkpoints to provide a better user experience.
 +
 +
The go-crit tool is still in its early stages of development. To effectively utilise this new feature, the checkpointctl tool would be extended to display information about the processes included in a container checkpoint and their runtime state (e.g., memory, open files, sockets, etc).
 +
 +
'''Links:'''
 +
* https://criu.org/CRIT_(Go_library)
 +
* https://github.com/checkpoint-restore/go-criu/tree/master/crit
 +
* https://kubernetes.io/blog/2022/12/05/forensic-container-checkpointing-alpha/
 +
 +
 
=== Restrict checks for open/mmaped files ===
 
=== Restrict checks for open/mmaped files ===
 
   
 
   
Line 54: Line 92:     
=== Support sparse ghosts ===
 
=== Support sparse ghosts ===
 +
 +
'''Summary:''' While sparse ghost files were in part supported for quiet some time, we still was not able to handle big sparse ghost files and highly fragmented sparse ghost files effectively.
    
'''Merged:''' https://github.com/checkpoint-restore/criu/pull/1944 https://github.com/checkpoint-restore/criu/pull/1963
 
'''Merged:''' https://github.com/checkpoint-restore/criu/pull/1944 https://github.com/checkpoint-restore/criu/pull/1963
Line 65: Line 105:  
*[[Invisible files]]
 
*[[Invisible files]]
 
*[https://www.kernel.org/doc/html/latest/filesystems/fiemap.html Fiemap ioctl]
 
*[https://www.kernel.org/doc/html/latest/filesystems/fiemap.html Fiemap ioctl]
  −
'''Details:'''
  −
* Skill level: intermediate
  −
* Language: C
  −
* Expected size: 350 hours
  −
* Mentor: Pavel Emelyanov <ovzxemul@gmail.com>
  −
* Mentor: Pavel Tikhomirov <ptikhomirov@virtuozzo.com>
  −
* Suggested by: Pavel Emelyanov <ovzxemul@gmail.com>
      
[[Category:GSoC]]
 
[[Category:GSoC]]
278

edits