Debian Patches

Status for runc/1.3.3+ds1-3

Patch Description Author Forwarded Bugs Origin Last update
0005-Update-loongarch64-support.patch Update loongarch64 support Dandan Zhang <zhangdandan@loongson.cn> not-needed debian 2025-09-14
0001-skip-privileged-test-factory_linux_test.go.patch skip privileged test: factory_linux_test.go Dmitry Smirnov <onlyjob@debian.org> not-needed 2018-06-15
0007-Unbreak-when-running-in-incus.patch Unbreak when running in incus
Expands https://github.com/opencontainers/runc/commit/9a7e5a94346df545be991330196ed4d65adcbb26
Reinhard Tartler <siretart@tauware.de> no 2025-09-20
0009-runtime-spec-update-pids.limit-handling-to-match-new.patch runtime-spec: update pids.limit handling to match new guidance
The main update is actually in github.com/opencontainers/cgroups, but we
need to also update runtime-spec to a newer pre-release version to get
the updates from there as well.

In short, the behaviour change is now that "0" is treated as a valid
value to set in "pids.max", "-1" means "max" and unset/nil means "do
nothing". As described in the opencontainers/cgroups PR, this change is
actually backwards compatible because our internal state.json stores
PidsLimit, and that entry is marked as "omitempty". So, an old runc
would omit PidsLimit=0 in state.json, and this will be parsed by a new
runc as being "nil" -- and both would treat this case as "do not set
anything".
Aleksa Sarai <cyphar@cyphar.com> no 2025-10-22
0006-Fix-ftbfs-on-mips64el-in-remap-rootfs.go.patch Fix ftbfs on mips64el in remap-rootfs.go Reinhard Tartler <siretart@tauware.de> no 2025-09-15
0002-skip-privileged-test-nsenter_test.go.patch skip privileged test: nsenter_test.go Shengjing Zhu <zhsj@debian.org> not-needed 2021-01-23
0003-skip-integration-when-no-dev-kmsg.patch skip integration when no /dev/kmsg
By default, privileged lxc container doesn't have /dev/kmsg
Shengjing Zhu <zhsj@debian.org> not-needed 2021-02-04
0004-Compile-against-go-criu-v7.patch Compile against go-criu v7 Reinhard Tartler <siretart@tauware.de> not-needed 2024-08-08
0008-libct-use-manager.AddPid-to-add-exec-to-cgroup.patch libct: use manager.AddPid to add exec to cgroup
The main benefit here is when we are using a systemd cgroup driver,
we actually ask systemd to add a PID, rather than doing it ourselves.
This way, we can add rootless exec PID to a cgroup.

This requires newer opencontainers/cgroups and coreos/go-systemd.
Kir Kolyshkin <kolyshkin@gmail.com> no 2025-07-25

All known versions for source package 'runc'

Links