@@ -29,6 +29,42 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
2929 the largest set of CPUs permitted by the container's cpuset cgroup and any
3030 other system restrictions (such as isolated CPUs). (#4041 , #4815 , #4858 )
3131
32+ ## [ 1.3.1] - 2025-09-05
33+
34+ > この瓦礫の山でよぉ
35+
36+ ### Fixed
37+ * Container processes will no longer inherit the CPU affinity of runc by
38+ default. Instead, the default CPU affinity of container processes will be
39+ the largest set of CPUs permitted by the container's cpuset cgroup and any
40+ other system restrictions (such as isolated CPUs). (#4041 , #4815 , #4858 )
41+ * Setting ` linux.rootfsPropagation ` to ` shared ` or ` unbindable ` now functions
42+ properly. (#1755 , #1815 , #4724 , #4789 )
43+ * Close seccomp agent connection to prevent resource leaks. (#4796 , #4799 )
44+ * ` runc delete ` and ` runc stop ` can now correctly handle cases where `runc
45+ create` was killed during setup. Previously it was possible for the
46+ container to be in such a state that neither ` runc stop ` nor ` runc delete `
47+ would be unable to kill or delete the container. (#4534 , #4645 , #4757 ,
48+ #4793 )
49+ * ` runc update ` will no longer clear intelRdt state information. (#4828 ,
50+ #4833 )
51+ * CI: Fix exclusion rules and allow us to run jobs manually. (#4760 , #4763 )
52+
53+ ### Changed
54+ * Improvements to the deprecation warnings as part of the
55+ ` github.com/opencontainers/cgroups ` split. (#4784 , #4788 )
56+ * Ignore the dmem controller in our cgroup tests, as systemd does not yet
57+ support it. (#4806 , #4811 )
58+ * ` /proc/net/dev ` is no longer included in the permitted procfs overmount
59+ list. Its inclusion was almost certainly an error, and because ` /proc/net `
60+ is a symlink to ` /proc/self/net ` , overmounting this was almost certainly
61+ never useful (and will be blocked by future kernel versions). (#4817 , #4820 )
62+ * Simplify the ` prepareCriuRestoreMounts ` logic for checkpoint-restore.
63+ (#4765 , #4871 )
64+ * CI: Bump ` golangci-lint ` to v2.1. (#4747 , #4754 )
65+ * CI: Switch to GitHub-hosted ARM runners. Thanks again to @alexellis for
66+ supporting runc's ARM CI up until now. (#4844 , #4856 , #4866 )
67+
3268## [ 1.3.0] - 2025-04-30
3369
3470> Mr. President, we must not allow a mine shaft gap!
@@ -1147,6 +1183,7 @@ implementation (libcontainer) is *not* covered by this policy.
11471183
11481184<!-- minor releases -->
11491185[ Unreleased ] : https://github.com/opencontainers/runc/compare/v1.3.0-rc.1...HEAD
1186+ [ 1.3.0 ] : https://github.com/opencontainers/runc/compare/v1.3.0-rc.2...v1.3.0
11501187[ 1.2.0 ] : https://github.com/opencontainers/runc/compare/v1.2.0-rc.1...v1.2.0
11511188[ 1.1.0 ] : https://github.com/opencontainers/runc/compare/v1.1.0-rc.1...v1.1.0
11521189[ 1.0.0 ] : https://github.com/opencontainers/runc/releases/tag/v1.0.0
@@ -1190,7 +1227,7 @@ implementation (libcontainer) is *not* covered by this policy.
11901227[ 1.2.0-rc.1 ] : https://github.com/opencontainers/runc/compare/v1.1.0...v1.2.0-rc.1
11911228
11921229<!-- 1.3.z patch releases -->
1193- [ Unreleased 1.3.z ] : https://github.com/opencontainers/runc/compare/v1.3.0 ...release-1.3
1194- [ 1.3.0 ] : https://github.com/opencontainers/runc/compare/v1.3.0-rc.2... v1.3.0
1230+ [ Unreleased 1.3.z ] : https://github.com/opencontainers/runc/compare/v1.3.1 ...release-1.3
1231+ [ 1.3.1 ] : https://github.com/opencontainers/runc/compare/v1.3.0... v1.3.1
11951232[ 1.3.0-rc.2 ] : https://github.com/opencontainers/runc/compare/v1.3.0-rc.1...v1.3.0-rc.2
11961233[ 1.3.0-rc.1 ] : https://github.com/opencontainers/runc/compare/v1.2.0...v1.3.0-rc.1
0 commit comments