@@ -6,9 +6,17 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
6
6
7
7
## [ Unreleased]
8
8
9
+ ## [ 1.4.0-rc.1] - 2025-09-05
10
+
11
+ > おめェもボスになったんだろぉ?
12
+
13
+ This version of runc requires Go 1.24 to build.
14
+
9
15
### libcontainer API
10
16
- The deprecated ` libcontainer/user ` package has been removed; use
11
17
` github.com/moby/sys/user ` instead. (#3999 , #4617 )
18
+ - ` libcontainer/apparmor ` variables containing public functions have been
19
+ switched to wrapper functions. (#4725 )
12
20
13
21
### Breaking
14
22
- runc update no longer allows ` --l3-cache-schema ` or ` --mem-bw-schema ` if
@@ -22,12 +30,110 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
22
30
create a new CLOS but fail to apply the schema, move only the init process
23
31
(omitting children) to the new group, and leave the CLOS orphaned after
24
32
container exit. (#4827 )
33
+ - The deprecated ` --criu ` flag has been removed entirely, instead the ` criu `
34
+ binary in ` $PATH ` will be used. (#4722 )
35
+
36
+ ### Added
37
+ * runc now supports the ` linux.netDevices ` field to allow for devices to be
38
+ moved into container network namespaces seamlessly. (#4538 )
39
+ * ` runc update ` now supports per-device weight and iops cgroup limits. (#4775 )
40
+ * intel rdt: allow explicit assignment to root CLOS. (#4854 )
41
+
42
+ ### Fixed
43
+ * Container processes will no longer inherit the CPU affinity of runc by
44
+ default. Instead, the default CPU affinity of container processes will be
45
+ the largest set of CPUs permitted by the container's cpuset cgroup and any
46
+ other system restrictions (such as isolated CPUs). (#4041 , #4815 , #4858 )
47
+ * Use ` chown(uid, -1) ` when configuring the console inode, to avoid issues
48
+ with unmapped GIDs. (#4679 )
49
+ * Add logging for the cases where failed keyring operations are ignored during
50
+ setup. (#4676 )
51
+ * Optimise ` runc exec ` by avoiding calling into SELinux's ` Set.*Label ` when
52
+ ` processLabel ` is not set. (#4354 )
53
+ * Fix mips64 builds for remap-rootfs. (#4723 )
54
+ * Setting ` linux.rootfsPropagation ` to ` shared ` or ` unbindable ` now functions
55
+ properly. (#1755 , #1815 , #4724 )
56
+ * runc delete and runc stop can now correctly handle cases where runc
57
+ create was killed during setup. Previously it was possible for the
58
+ container to be in such a state that neither runc stop nor runc
59
+ delete would be unable to kill or delete the container. (#4534 ,
60
+ #4645 , #4757 )
61
+ * Close seccomp agent connection to prevent resource leaks. (#4796 )
62
+ * ` runc update ` will no longer clear intelRdt state information. (#4828 )
63
+ * runc will now error out earlier if intelRdt is not enabled. (#4829 )
64
+ * Improve filesystem operations within intelRdt manager. (#4840 , #4831 )
65
+ * Resolve a certain race between ` runc create ` and ` runc delete ` that would
66
+ previously result in spurious errors. (#4735 )
67
+ * CI: skip bpf tests on misbehaving udev systems. (#4825 )
68
+
69
+ ### Changes
70
+ * Use Go's built-in ` pidfd_send_signal(2) ` support when available. (#4666 )
71
+ * Make ` state.json ` 25% smaller. (#4685 )
72
+ * Migrate to Go 1.22+ features. (#4687 , #4703 )
73
+ * Provide private wrappers around common syscalls to make ` -EINTR ` handling
74
+ less cumbersome for the rest of runc. (#4697 )
75
+ * Ignore the dmem controller in our cgroup tests, as systemd does not
76
+ yet support it. (#4806 )
77
+ * ` /proc/net/dev ` is no longer included in the permitted procfs overmount
78
+ list. Its inclusion was almost certainly an error, and because
79
+ ` /proc/net ` is a symlink to ` /proc/self/net ` , overmounting this was
80
+ almost certainly never useful (and will be blocked by future kernel
81
+ versions). (#4817 )
82
+ * Simplify the prepareCriuRestoreMounts logic for checkpoint-restore.
83
+ (#4765 )
84
+ * Bump minimum Go version to 1.24. (#4851 )
85
+ * CI: migrate virtualised Fedora tests from Vagrant + Cirrus to Lima + GHA. We
86
+ still use Cirrus for the AlmaLinux tests, since they can be run without
87
+ virtualisation. (#4664 )
88
+ * CI: install fewer dependencies (#4671 ), bump shellcheck and bats versions
89
+ (#4670 ).
90
+ * CI: remove ` toolchain ` from ` go.mod ` and add a CI check to make sure it's
91
+ never added accidentally. (#4717 , #4721 )
92
+ * CI: do not allow ` exclude ` or ` replace ` directives in ` go.mod ` , to make sure
93
+ that ` go install ` doesn't get accidentally broken. (#4750 )
94
+ * CI: fix exclusion rules and allow us to run jobs manually. (#4760 )
95
+ * CI: Switch to GitHub-hosted ARM runners. Thanks again to @alexellis
96
+ for supporting runc's ARM CI up until now. (#4844 , #4856 )
97
+ * Various dependency updates. (#4659 , #4658 , #4662 , #4663 , #4689 , #4694 ,
98
+ #4702 , #4701 , #4707 , #4710 , #4746 , #4756 , #4751 , #4758 , #4764 , #4768 , #4779 ,
99
+ #4783 , #4785 , #4801 , #4808 , #4803 , #4839 , #4846 , #4847 , #4845 , #4850 , #4861 ,
100
+ #4860 )
101
+
102
+ ## [ 1.3.1] - 2025-09-05
103
+
104
+ > この瓦礫の山でよぉ
25
105
26
106
### Fixed
27
107
* Container processes will no longer inherit the CPU affinity of runc by
28
108
default. Instead, the default CPU affinity of container processes will be
29
109
the largest set of CPUs permitted by the container's cpuset cgroup and any
30
110
other system restrictions (such as isolated CPUs). (#4041 , #4815 , #4858 )
111
+ * Setting ` linux.rootfsPropagation ` to ` shared ` or ` unbindable ` now functions
112
+ properly. (#1755 , #1815 , #4724 , #4789 )
113
+ * Close seccomp agent connection to prevent resource leaks. (#4796 , #4799 )
114
+ * ` runc delete ` and ` runc stop ` can now correctly handle cases where `runc
115
+ create` was killed during setup. Previously it was possible for the
116
+ container to be in such a state that neither ` runc stop ` nor ` runc delete `
117
+ would be unable to kill or delete the container. (#4534 , #4645 , #4757 ,
118
+ #4793 )
119
+ * ` runc update ` will no longer clear intelRdt state information. (#4828 ,
120
+ #4833 )
121
+ * CI: Fix exclusion rules and allow us to run jobs manually. (#4760 , #4763 )
122
+
123
+ ### Changed
124
+ * Improvements to the deprecation warnings as part of the
125
+ ` github.com/opencontainers/cgroups ` split. (#4784 , #4788 )
126
+ * Ignore the dmem controller in our cgroup tests, as systemd does not yet
127
+ support it. (#4806 , #4811 )
128
+ * ` /proc/net/dev ` is no longer included in the permitted procfs overmount
129
+ list. Its inclusion was almost certainly an error, and because ` /proc/net `
130
+ is a symlink to ` /proc/self/net ` , overmounting this was almost certainly
131
+ never useful (and will be blocked by future kernel versions). (#4817 , #4820 )
132
+ * Simplify the ` prepareCriuRestoreMounts ` logic for checkpoint-restore.
133
+ (#4765 , #4871 )
134
+ * CI: Bump ` golangci-lint ` to v2.1. (#4747 , #4754 )
135
+ * CI: Switch to GitHub-hosted ARM runners. Thanks again to @alexellis for
136
+ supporting runc's ARM CI up until now. (#4844 , #4856 , #4866 )
31
137
32
138
## [ 1.3.0] - 2025-04-30
33
139
@@ -128,6 +234,47 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
128
234
* Support ` skip-in-flight ` and ` link-remap ` options for CRIU. (#4627 )
129
235
* Support cgroup v1 mounted with ` noprefix ` . (#4513 )
130
236
237
+ ## [ 1.2.7] - 2025-09-05
238
+
239
+ > さんをつけろよデコ助野郎!
240
+
241
+ ### Fixed
242
+ * Removed preemptive "full access to cgroups" warning when calling `runc
243
+ pause` or ` runc unpause` as an unprivileged user without
244
+ ` --systemd-cgroups ` . Now the warning is only emitted if an actual permission
245
+ error was encountered. (#4709 , #4720 )
246
+ * Add time namespace to container config after checkpoint/restore. CRIU since
247
+ version 3.14 uses a time namespace for checkpoint/restore, however it was
248
+ not joining the time namespace in runc. (#4696 , #4714 )
249
+ * Container processes will no longer inherit the CPU affinity of runc by
250
+ default. Instead, the default CPU affinity of container processes will be
251
+ the largest set of CPUs permitted by the container's cpuset cgroup and any
252
+ other system restrictions (such as isolated CPUs). (#4041 , #4815 , #4858 )
253
+ * Close seccomp agent connection to prevent resource leaks. (#4796 , #4800 )
254
+ * Several fixes to our CI, mainly related to AlmaLinux and CRIU. (#4670 ,
255
+ #4728 , #4736 , #4742 )
256
+ * Setting ` linux.rootfsPropagation ` to ` shared ` or ` unbindable ` now functions
257
+ properly. (#1755 , #1815 , #4724 , #4791 )
258
+ * ` runc update ` will no longer clear intelRdt state information. (#4828 ,
259
+ #4834 )
260
+
261
+ ### Changed
262
+ * In runc 1.2, we changed our mount behaviour to correctly handle clearing
263
+ flags. However, the error messages we returned did not provide as much
264
+ information to users about what clearing flags were conflicting with locked
265
+ mount flags. We now provide more diagnostic information if there is an error
266
+ when in the fallback path to handle locked mount flags. (#4734 , #4740 )
267
+ * Ignore the dmem controller in our cgroup tests, as systemd does not yet
268
+ support it. (#4806 , #4811 )
269
+ * ` /proc/net/dev ` is no longer included in the permitted procfs overmount
270
+ list. Its inclusion was almost certainly an error, and because ` /proc/net `
271
+ is a symlink to ` /proc/self/net ` , overmounting this was almost certainly
272
+ never useful (and will be blocked by future kernel versions). (#4817 , #4820 )
273
+ * CI: Switch to GitHub-hosted ARM runners. Thanks again to @alexellis for
274
+ supporting runc's ARM CI up until now. (#4844 , #4856 , #4867 )
275
+ * Simplify the ` prepareCriuRestoreMounts ` logic for checkpoint-restore.
276
+ (#4765 , #4872 )
277
+
131
278
## [ 1.2.6] - 2025-03-17
132
279
133
280
> Hasta la victoria, siempre.
@@ -1106,6 +1253,7 @@ implementation (libcontainer) is *not* covered by this policy.
1106
1253
1107
1254
<!-- minor releases -->
1108
1255
[ Unreleased ] : https://github.com/opencontainers/runc/compare/v1.3.0-rc.1...HEAD
1256
+ [ 1.3.0 ] : https://github.com/opencontainers/runc/compare/v1.3.0-rc.2...v1.3.0
1109
1257
[ 1.2.0 ] : https://github.com/opencontainers/runc/compare/v1.2.0-rc.1...v1.2.0
1110
1258
[ 1.1.0 ] : https://github.com/opencontainers/runc/compare/v1.1.0-rc.1...v1.1.0
1111
1259
[ 1.0.0 ] : https://github.com/opencontainers/runc/releases/tag/v1.0.0
@@ -1136,7 +1284,8 @@ implementation (libcontainer) is *not* covered by this policy.
1136
1284
[ 1.1.0-rc.1 ] : https://github.com/opencontainers/runc/compare/v1.0.0...v1.1.0-rc.1
1137
1285
1138
1286
<!-- 1.2.z patch releases -->
1139
- [ Unreleased 1.2.z ] : https://github.com/opencontainers/runc/compare/v1.2.6...release-1.2
1287
+ [ Unreleased 1.2.z ] : https://github.com/opencontainers/runc/compare/v1.2.7...release-1.2
1288
+ [ 1.2.7 ] : https://github.com/opencontainers/runc/compare/v1.2.6...v1.2.7
1140
1289
[ 1.2.6 ] : https://github.com/opencontainers/runc/compare/v1.2.5...v1.2.6
1141
1290
[ 1.2.5 ] : https://github.com/opencontainers/runc/compare/v1.2.4...v1.2.5
1142
1291
[ 1.2.4 ] : https://github.com/opencontainers/runc/compare/v1.2.3...v1.2.4
@@ -1148,7 +1297,10 @@ implementation (libcontainer) is *not* covered by this policy.
1148
1297
[ 1.2.0-rc.1 ] : https://github.com/opencontainers/runc/compare/v1.1.0...v1.2.0-rc.1
1149
1298
1150
1299
<!-- 1.3.z patch releases -->
1151
- [ Unreleased 1.3.z ] : https://github.com/opencontainers/runc/compare/v1.3.0 ...release-1.3
1152
- [ 1.3.0 ] : https://github.com/opencontainers/runc/compare/v1.3.0-rc.2... v1.3.0
1300
+ [ Unreleased 1.3.z ] : https://github.com/opencontainers/runc/compare/v1.3.1 ...release-1.3
1301
+ [ 1.3.1 ] : https://github.com/opencontainers/runc/compare/v1.3.0... v1.3.1
1153
1302
[ 1.3.0-rc.2 ] : https://github.com/opencontainers/runc/compare/v1.3.0-rc.1...v1.3.0-rc.2
1154
1303
[ 1.3.0-rc.1 ] : https://github.com/opencontainers/runc/compare/v1.2.0...v1.3.0-rc.1
1304
+
1305
+ <!-- 1.4.z patch releases -->
1306
+ [ 1.4.0-rc.1 ] : https://github.com/opencontainers/runc/compare/v1.3.0...v1.4.0-rc.1
0 commit comments