Package: containerd / 1.4.5~ds1-2
Metadata
| Package | Version | Patches format |
|---|---|---|
| containerd | 1.4.5~ds1-2 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| 0001 Add go.mod file.patch | (download) |
go.mod |
1 1 + 0 - 0 ! |
add go.mod file Fix build issue with + github.com/godbus/dbus/v5 + github.com/coreos/go-systemd/v22 |
| 0002 disable runhcs option in cri config.patch | (download) |
vendor/github.com/containerd/cri/pkg/server/helpers.go |
6 0 + 6 - 0 ! |
disable runhcs option in cri config |
| 0003 disable windows support in ctr metric.patch | (download) |
cmd/ctr/commands/tasks/metrics.go |
55 0 + 55 - 0 ! |
disable windows support in ctr metric |
| 0004 Add cgo tag to btrfs plugin.patch | (download) |
cmd/containerd/builtins_btrfs_linux.go |
2 1 + 1 - 0 ! |
add cgo tag to btrfs plugin |
| 0005 backport github.com containerd containerd remotes.patch | (download) |
remotes/docker/auth.go |
198 0 + 198 - 0 ! |
backport_github=2ecom/containerd/containerd/remotes For building docker.io 20.10 This whole directory is replaced by commit 02334356d0774a5b194e67b5f1383fd2485ea67a v1.5.0-beta.3 |
| 0006 backport apparmor handle signal mediation.patch | (download) |
contrib/apparmor/template.go |
46 42 + 4 - 0 ! |
apparmor: handle signal mediation On newer kernels and systems, AppArmor will block sending signals in many scenarios by default resulting in strange behaviours (container programs cannot signal each other, or host processes like containerd cannot signal containers). The reason this happens only on some distributions (and is not a kernel regression) is that the kernel doesn't enforce signal mediation unless the profile contains signal rules. However because our profies #include the distribution-managed <abstractions/base>, some distributions added signal rules -- which results in AppArmor enforcing signal mediation and thus a regression. On these systems, containers cannot send and receive signals at all -- meaning they cannot signal each other and the container runtime cannot kill them either. This issue was fixed in Docker in 2018[1] but this code was copied before then and thus the patches weren't carried. It also contains a new fix for a more esoteric case[2]. Ideally this code should live in a project like "containerd/apparmor" so that Docker, libpod, and containerd can share it, but that's probably something to do separately. In addition, the copyright header is updated to reference that the code is copied from Docker (and thus was not written entirely by the containerd authors). [1]: https://github.com/docker/docker/pull/37831 [2]: https://github.com/docker/docker/pull/41337 Signed-off-by: Aleksa Sarai <cyphar@cyphar.com> |
| 0007 backport runtime ignore file already closed error.patch | (download) |
runtime/v2/shim_unix.go |
7 3 + 4 - 0 ! |
runtime: ignore file-already-closed error if dead shim fix: #5130 Signed-off-by: Wei Fu <fuweid89@gmail.com> |
| 0008 CVE 2021 32760.patch | (download) |
archive/tar_test.go |
35 35 + 0 - 0 ! |
[patch 1/2] use chmod path for checking symlink Signed-off-by: Derek McGowan <derek@mcg.dev> (cherry picked from commit 27597ccfd30d8aa06b448062896bccfb33ad8f22) Signed-off-by: Derek McGowan <derek@mcg.dev> |
