summaryrefslogtreecommitdiffhomepage
path: root/runsc/boot
diff options
context:
space:
mode:
authorpraveensastry <sastry.praveen@gmail.com>2019-08-06 11:57:50 +1000
committerpraveensastry <sastry.praveen@gmail.com>2019-08-06 11:57:50 +1000
commit8d89c0d92b3839eed0839b1a9bc7666e6261d972 (patch)
tree838fc6f95af35943973d862c594054b20a653653 /runsc/boot
parent607be0585fdc659ec3c043c989a8a6f86fcc14db (diff)
Remove traces option for ref leak mode
Diffstat (limited to 'runsc/boot')
-rw-r--r--runsc/boot/config.go6
-rw-r--r--runsc/boot/loader.go6
2 files changed, 5 insertions, 7 deletions
diff --git a/runsc/boot/config.go b/runsc/boot/config.go
index 139eb1cce..4276a4cc4 100644
--- a/runsc/boot/config.go
+++ b/runsc/boot/config.go
@@ -116,12 +116,10 @@ func MakeWatchdogAction(s string) (watchdog.Action, error) {
// MakeRefsLeakMode converts type from string
func MakeRefsLeakMode(s string) (refs.LeakMode, error) {
switch strings.ToLower(s) {
- case "nocheck":
+ case "disabled":
return refs.NoLeakChecking, nil
case "warning":
return refs.LeaksLogWarning, nil
- case "traces":
- return refs.LeaksLogTraces, nil
default:
return 0, fmt.Errorf("invalid refs leakmode %q", s)
}
@@ -245,7 +243,7 @@ func (c *Config) ToFlags() []string {
"--num-network-channels=" + strconv.Itoa(c.NumNetworkChannels),
"--rootless=" + strconv.FormatBool(c.Rootless),
"--alsologtostderr=" + strconv.FormatBool(c.AlsoLogToStderr),
- "--refs-leak-mode=" + c.ReferenceLeakMode.String(),
+ "--ref-leak-mode=" + c.ReferenceLeakMode.String(),
}
if c.TestOnlyAllowRunAsCurrentUserWithoutChroot {
// Only include if set since it is never to be used by users.
diff --git a/runsc/boot/loader.go b/runsc/boot/loader.go
index 2fce800ae..65ac67dbf 100644
--- a/runsc/boot/loader.go
+++ b/runsc/boot/loader.go
@@ -181,6 +181,9 @@ type Args struct {
// New initializes a new kernel loader configured by spec.
// New also handles setting up a kernel for restoring a container.
func New(args Args) (*Loader, error) {
+ // Sets the reference leak check mode
+ refs.SetLeakMode(args.Conf.ReferenceLeakMode)
+
// We initialize the rand package now to make sure /dev/urandom is pre-opened
// on kernels that do not support getrandom(2).
if err := rand.Init(); err != nil {
@@ -191,9 +194,6 @@ func New(args Args) (*Loader, error) {
return nil, fmt.Errorf("setting up memory usage: %v", err)
}
- // Sets the refs leak check mode
- refs.SetLeakMode(args.Conf.ReferenceLeakMode)
-
// Create kernel and platform.
p, err := createPlatform(args.Conf, args.Device)
if err != nil {