Download Latest Version containerd-2.2.0-linux-s390x.tar.gz (34.1 MB)
Email in envelope

Get an email when there's a new version of containerd

Home / v2.2.0
Name Modified Size InfoDownloads / Week
Parent folder
containerd-2.2.0-linux-amd64.tar.gz 2025-11-06 34.9 MB
containerd-2.2.0-linux-amd64.tar.gz.sha256sum 2025-11-06 102 Bytes
containerd-2.2.0-linux-arm64.tar.gz 2025-11-06 32.0 MB
containerd-2.2.0-linux-arm64.tar.gz.sha256sum 2025-11-06 102 Bytes
containerd-static-2.2.0-linux-amd64.tar.gz 2025-11-06 33.5 MB
containerd-static-2.2.0-linux-amd64.tar.gz.sha256sum 2025-11-06 109 Bytes
containerd-static-2.2.0-linux-arm64.tar.gz 2025-11-06 30.5 MB
containerd-static-2.2.0-linux-arm64.tar.gz.sha256sum 2025-11-06 109 Bytes
containerd-static-2.2.0-linux-ppc64le.tar.gz 2025-11-06 30.0 MB
containerd-static-2.2.0-linux-ppc64le.tar.gz.sha256sum 2025-11-06 111 Bytes
containerd-static-2.2.0-linux-riscv64.tar.gz 2025-11-06 30.9 MB
containerd-2.2.0-attestation.intoto.jsonl 2025-11-06 12.3 kB
containerd-2.2.0-linux-ppc64le.tar.gz 2025-11-06 31.7 MB
containerd-2.2.0-linux-ppc64le.tar.gz.sha256sum 2025-11-06 104 Bytes
containerd-2.2.0-linux-riscv64.tar.gz 2025-11-06 32.2 MB
containerd-2.2.0-linux-riscv64.tar.gz.sha256sum 2025-11-06 104 Bytes
containerd-2.2.0-linux-s390x.tar.gz 2025-11-06 34.1 MB
containerd-2.2.0-linux-s390x.tar.gz.sha256sum 2025-11-06 102 Bytes
containerd-2.2.0-windows-amd64.tar.gz 2025-11-06 40.0 MB
containerd-2.2.0-windows-amd64.tar.gz.sha256sum 2025-11-06 104 Bytes
containerd-static-2.2.0-linux-riscv64.tar.gz.sha256sum 2025-11-06 111 Bytes
containerd-static-2.2.0-linux-s390x.tar.gz 2025-11-06 32.4 MB
containerd-static-2.2.0-linux-s390x.tar.gz.sha256sum 2025-11-06 109 Bytes
containerd 2.2.0 source code.tar.gz 2025-11-06 11.5 MB
containerd 2.2.0 source code.zip 2025-11-06 15.9 MB
README.md 2025-11-06 12.3 kB
Totals: 26 Items   389.5 MB 0

Welcome to the v2.2.0 release of containerd!

The second minor release of containerd 2.x focuses on continued stability alongside new features and improvements. This is the second time-based released for containerd.

Highlights

The mount manager is a new service that provides lifecycle management for filesystem mounts to support more advanced use cases, such as: * Device formatting to create formatted filesystems (xfs, ext4) on-demand * Mount activation to prepare devices such as loopbacks or network fileystems * Mount transformation to allow mount arguments to be filled in dynamically from previous mounts * Garbage collection of mounts to ensure temporary mounts are never leaked * Add conf.d include in the default config (#12323) * Add support for back references in the garbage collector (#12025)

Container Runtime Interface (CRI)

  • Pod Sandbox Metrics (#10691)

Full implementation of Kubernetes CRI pod-level metrics API * ListPodSandboxMetrics: Query metrics for running pods/sandboxes * ListMetricsDescriptors: Discover available metrics and their descriptions * Support image volume mount subpath (#11578)

Go client

  • Update pkg/oci to use fs.FS interface and os.OpenRoot (#12245)

Image Distribution

Adds support for unpacking layers in parallel during pull operations. This feature is supported with overlayfs and EROFS snapshotters. * OCI Referrers Support (#12309)

Adds new referrers fetcher to remote registry interface using the new referrers endpoint added in OCI distribution-spec 1.1 * Tar unpack progress through transfer service (#11921)

Image Storage

  • EROFS enhancements using mount manager (#12333)

Improvements to EROFS snapshotter using the new mount manager service * Quota Support: Support for sized block devices as the upper layer for overlayfs * Mount Lifecycle: Loopback setup, block device creation, and overlayfs argument formatting is moved to the mount manager to be performed on-demand or within the runtime. * Mount handler: To allow optimization of EROFS mount types based on the current system * macOS Support: EROFS snapshotter can now be used on Darwin to natively allow image pulls * Tar index mode: Efficiently generate EROFS metadata backed by original tar content (#11919) * Add snapshotter and differ for block CIMs (#12050)

Node Resource Interface (NRI)

Runtime

  • Improve shim load time after restart by loading in parallel (#12142)
  • Fix pidfd leak in UnshareAfterEnterUserns (#12167)

Deprecations

  • Deprecate cgroup v1 (#12445)
  • Postpone v2.2 deprecation items to v2.3 (#12417)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors

  • Derek McGowan
  • Phil Estes
  • Akihiro Suda
  • Maksym Pavlenko
  • Wei Fu
  • Krisztian Litkey
  • Mike Brown
  • Akhil Mohan
  • Markus Lehtonen
  • Samuel Karp
  • Sebastiaan van Stijn
  • ningmingxiao
  • Austin Vazquez
  • yashsingh74
  • Gao Xiang
  • Kirtana Ashok
  • Jin Dong
  • Chris Henzie
  • Aadhar Agarwal
  • Etienne Champetier
  • Henry Wang
  • Rodrigo Campos
  • Sascha Grunert
  • Aleksa Sarai
  • Eric Mountain
  • Keith Mattix II
  • Paweł Gronowski
  • Tõnis Tiigi
  • Adrien Delorme
  • Apurv Barve
  • Enji Cooper
  • Kohei Tokunaga
  • Max Jonas Werner
  • Rehan Khan
  • Yang Yang
  • jinda.ljd
  • jokemanfire
  • Amit Barve
  • Andrew Halaney
  • Antonio Ojea
  • Brian Goff
  • Carlos Eduardo Arango Gutierrez
  • Chenyang Yan
  • Dawei Wei
  • Divya Rani
  • Evan Anderson
  • Fabiano Fidêncio
  • Iceber Gu
  • Jared Ledvina
  • Jonathan Perkin
  • Jose Fernandez
  • Karl Baumgartner
  • Michael Weibel
  • Osama Abdelkader
  • Radostin Stoyanov
  • Ruidong Cao
  • Sameer
  • Sergey Kanzhelev
  • Swagat Bora
  • Sylvain MOUQUET
  • Tom Wieczorek
  • Tycho Andersen
  • Wuyue (Tony) Sun
  • suranmiao
  • tanhuaan
  • wheat2018
  • zounengren

Dependency Changes

Previous release can be found at v2.1.0

Which file should I download?

  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.

In addition to containerd, typically you will have to install runc and CNI plugins from their official sites too.

See also the Getting Started documentation.

Source: README.md, updated 2025-11-06