diff options
author | Michał Kowalczyk <redford@dragonsector.pl> | 2022-02-18 00:33:52 +0100 |
---|---|---|
committer | Michał Kowalczyk <redford@dragonsector.pl> | 2022-02-18 00:33:52 +0100 |
commit | f4abf7b7266b3f2d2c996aa2749e6c586b815e3d (patch) | |
tree | 1bbe37fc9df5f20468a72165ced79d2b69c2eb9b | |
parent | cdf8e8f14cca8626a84ccb80cc905306d5e81791 (diff) | |
download | nsjail-f4abf7b7266b3f2d2c996aa2749e6c586b815e3d.tar.gz |
config: Add more docs for `disable_tsc`
-rw-r--r-- | cmdline.cc | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -166,7 +166,7 @@ struct custom_option custom_opts[] = { { { "macvlan_vs_gw", required_argument, NULL, 0x703 }, "Default GW for the 'vs' interface (e.g. \"192.168.0.1\")" }, { { "macvlan_vs_ma", required_argument, NULL, 0x705 }, "MAC-address of the 'vs' interface (e.g. \"ba:ad:ba:be:45:00\")" }, { { "macvlan_vs_mo", required_argument, NULL, 0x706 }, "Mode of the 'vs' interface. Can be either 'private', 'vepa', 'bridge' or 'passthru' (default: 'private')" }, - { { "disable_tsc", no_argument, NULL, 0x707 }, "Disable rdtsc and rdtscp instructions. WARNING: To make it effective, you also need to forbid `prctl(PR_SET_TSC, PR_TSC_ENABLE, ...)` in seccomp rules! (x86 and x86_64 only)" }, + { { "disable_tsc", no_argument, NULL, 0x707 }, "Disable rdtsc and rdtscp instructions. WARNING: To make it effective, you also need to forbid `prctl(PR_SET_TSC, PR_TSC_ENABLE, ...)` in seccomp rules! (x86 and x86_64 only). Dynamic binaries produced by GCC seem to rely on RDTSC, but static ones should work." }, }; // clang-format on |