Project page: Forensic analysis of container checkpoints
Organisation: CRIU
Mentors: Radostin Stoyanov, Adrian Reber
Proposal: Prajwal S N - CRIU (GSoC 2023)
The crit library in go-criu was created during GSoC 2022 to enable analysis of CRIU images with tools written in Go. It allows container management tools such as checkpointctl and Podman to provide capabilities similar to CRIT. The goal of this project is to extend this library with functionality for forensic analysis of container checkpoints to provide a better user experience. To effectively utilise this new feature, the checkpointctl CLI tool would also be extended to display information about the processes included in a container checkpoint and their runtime state (e.g. memory state, open files, sockets, etc).
go-criu#109
crit: fix proto imports for librarycheckpointctl#56
feat: add flag to view process treecheckpointctl#74
feat: display file descriptorsgo-criu#138
feat(crit): addcrit x sk
for socketscheckpointctl#87
feat: filter by PID in process treecheckpointctl#94
feat: display sockets in process tree
I would like to thank my mentors Radostin and Adrian for their encouragement, perspectives, and constant support. This time, apart from becoming a better developer, the experience also taught me about the process of scaling and maintaining an open-source project in a way that enables other developers to contribute seamlessly. I extend my gratitude to the GSoC team at Google for making it possible to contribute and work with this amazing team of people from across the world.
I would also like to thank the mdpdf project for enabling me to conveniently generate PDFs from Markdown.