runc v1.3.1 -- "この瓦礫の山でよぉ"
This is the first patch release of the 1.3.z release series of runc. It
primarily includes some minor fixes for issues found in 1.3.0.
Fixed
- Container processes will no longer inherit the CPU affinity of runc by
default. Instead, the default CPU affinity of container processes will be
the largest set of CPUs permitted by the container's cpuset cgroup and any
other system restrictions (such as isolated CPUs). (#4041, #4815, #4858) - Setting
linux.rootfsPropagationtosharedorunbindablenow functions
properly. (#1755, #1815, #4724, #4789) - Close seccomp agent connection to prevent resource leaks. (#4796, #4799)
runc deleteandrunc stopcan now correctly handle cases where
runc createwas killed during setup. Previously it was possible for the
container to be in such a state that neitherrunc stopnorrunc delete
would be unable to kill or delete the container. (#4534, #4645, #4757,
#4788)runc updatewill no longer clear intelRdt state information. (#4828,
#4833)- CI: Fix exclusion rules and allow us to run jobs manually. (#4760, #4763)
Changed
- Improvements to the deprecation warnings as part of the
github.com/opencontainers/cgroupssplit. (#4784, #4788) - Disable the dmem controller in our cgroup tests, as systemd does not yet
support it. (#4806, #4811) /proc/net/devis no longer included in the permitted procfs overmount
list. Its inclusion was almost certainly an error, and because/proc/net
is a symlink to/proc/self/net, overmounting this was almost certainly
never useful (and will be blocked by future kernel versions). (#4817, #4820)- Simplify the
prepareCriuRestoreMountslogic for checkpoint-restore.
(#4765, #4871) - CI: Bump
golangci-lintto v2.1. (#4747, #4754) - CI: Switch to GitHub-hosted ARM runners. Thanks again to @alexellis for
supporting runc's ARM CI up until now. (#4844, #4856, #4867)
Static Linking Notices
The runc binary distributed with this release are statically linked with
the following GNU LGPL-2.1 licensed libraries, with runc acting
as a "work that uses the Library":
The versions of these libraries were not modified from their upstream versions,
but in order to comply with the LGPL-2.1 (§6(a)), we have attached the
complete source code for those libraries which (when combined with the attached
runc source code) may be used to exercise your rights under the LGPL-2.1.
However we strongly suggest that you make use of your distribution's packages
or download them from the authoritative upstream sources, especially since
these libraries are related to the security of your containers.
Thanks to the following contributors who made this release possible:
- Akihiro Suda [email protected]
- Aleksa Sarai [email protected]
- HirazawaUi [email protected]
- Kir Kolyshkin [email protected]
- Markus Lehtonen [email protected]
- Martin Sivak [email protected]
- Pavel Liubimov [email protected]
- Peter Hunt [email protected]
- Rodrigo Campos [email protected]
- Yusuke Sakurai [email protected]
- lfbzhm [email protected]
- ningmingxiao [email protected]
Signed-off-by: Aleksa Sarai [email protected]